Connectivity Flashcards

1
Q

State 3 benefits of having a home network

A

Sharing the Internet connection.
Sharing files, including backing up files.
Sharing peripherals, eg. Printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you need in order to connect computers to a network

A

A network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are routers

A

Connecting to the Internet from a home network requires a router. The router connects all of the computers to the modem by giving them an internal IP address so that it knows where to send the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two types of network

A

Cable connection to router using Ethernet cable.

Wireless connection to router using radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 advantages and 3 disadvantages of using a cable connection to a router.

A
  • cables have to run from router to all rooms in house.
  • installation is expensive.
  • you cannot connect in a room without a socket.
    + very fast bandwidth.
    + good security
    + should not experience interference.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 3 advantages and 3 disadvantages of using a wireless connection to a router

A
  • slower bandwidth
  • poor security, unless it has a security password.
  • interference can be affected by obstacles.
    + all you need is a wireless router to set it up
    + it’s cheap as you only have to buy the router.
    + you can access the network from anywhere in the house.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a power line network work

A

It uses existing power wiring as a framework to carry data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a local area network (LAN)

A

To create a home network you set up a LAN. This connects all the computers in the house so that resources can be shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name 3 ways of securing wireless networks

A

Changing the default admin password on the router.
Setting up a form of encryption.
Turning off the router when it is not in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an encryption do

A

An encryption scrambles data so that only computers with the right key can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Jill wears a headset when driving so that she can make calls hands free. State two wireless communication networks that allow her to do this.

A

Bluetooth

3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Jack is in an area where there is no wifi signal. Describe how jack could upload the images from his netbook.

A

If he sets his phone as a portable wifi hotspot the netbook can join this network and use the 3G network to access the Internet and upload images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is bandwidth

A

The number of bits that can go through the network connection in 1 second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is latency

A

The time in milliseconds between a bit leaving one device and arriving at the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For streaming videos what so you need and why

A

A high bandwidth otherwise the video will keep pausing as your computer waits for more bugs to arrive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To get a quick search result from Google what do you need

A

A low latency network connection. Information is traveling in both directions so it needs to arrive quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jeff wants to watch bbc Iplayer in HD on his computer. Explain why a high bandwidth of jeffs internet connection is important.

A

Bandwidth is the number of bits that can go through a network in 1 sec. To stream a HD video Jeff will need a high bandwidth otherwise the video will keep pausing to wait for more bits to arrive.

18
Q

What are 3 benefits and 2 drawbacks of using wifi

A

+ good range
+ speeds of up to 50mbps
+ quite widely available.
- hackers sometimes set up fake wifi hotspots putting users details at risk.
- cannot use of not in range of an access point.

19
Q

What are 2 benefits and 3 drawbacks of using mobile broadband, eg. 3G

A

+ far greater coverage than wifi
+ more secure than wifi as data is encrypted.
- have to pay for mobile broadband, Including roaming charges when abroad.
- downloads are limited
- lower bandwidth than wifi.

20
Q

What is a peer to peer network

A

When digital devices communicate wirelessly with each other directly without the need for a transmitter between them.

21
Q

How do peer to peer networks work

A

By wifi direct

By Bluetooth

22
Q

What are the advantages to using wifi direct

A

Allows users to set up peer to peer networks.

Allows the devices to use an access point for normal wifi use.

23
Q

What are the advantages to using Bluetooth for peer to peer networks

A

Allows devices to communicate automatically when within range - with no user involvement.
Can connect up to eight devices at the same time.

24
Q

Compare Bluetooth and wifi direct’s bandwidth and range for peer to peer networks

A

Bluetooth has faster bandwidth.

Wifi direct has better range.

25
Q

Give two reasons to why Bluetooth is not used to network devices in a large office

A

Bluetooth has a lower range so the devices being networked need to be close together, which would not be the case in a large office. It has a low bandwidth and so data is transfer would be slow.

26
Q

Explain why Bluetooth rather than traditional wifi is used for communication between a mobile phone and a headset for hands-free phone calls.

A

Using Bluetooth, the two devices can communicate directly without the need for a transmitter. They can also communicate automatically without the need for any user actions.

27
Q

What is VoIP

A

Voice over Internet protocol is the set of rules for transmitting audio messages over the Internet. It enables you to make free voice called from your computer.

28
Q

What is SMTP

A

Simple mail transfer protocol is used when email is sent from the senders email client to the senders email server and when the email is delivered to the recipients server.

29
Q

What happens if POP is used to read an email sent via SMTP

A

The mail server will download the emails to the computer. The email is then deleted from the server and can be read offline.

30
Q

What happens if IMAP is used to read an email sent via SMTP

A

The email is read on the mail server. The email is not deleted from the server and can be accessed anywhere using any computer with an Internet connection.

31
Q

Johns email account uses the POP protocol. Describe how the POP protocol is different from IMAP when retrieving an email

A

The mail server downloads the email to johns computer and felted then from the server.
With IMAP John would read the emails on the server. They would not be deleted and he could access and read them from any computer.

32
Q

What is the difference between http and https

A

Http is used to surf the web

HTTPS is used to send confidential information.

33
Q

What is http

A

The protocol of the World Wide Web

34
Q

Why is https used to Send confidential info over the Internet

A

It uses data that is encrypted so that it cannot be read by anyone except the recipient

35
Q

How does https work

A

Browser checks the sites certificate.
Web server and your browser determine the encryption types that they can both use to understand each other. Your browser and web server send each other unique codes to use when encrypting the info being sent. Your browser and the web server start talking to each other using the encryption.

36
Q

What is a firewall

A

A firewall is software that permits or blocks connections between your computer and other computers on the newer work according to the rules you have set

37
Q

What is a virus

A

A program designed to cause other computer programs to malfunction or stop working. Virus’s can replicate themselves and can be passed on to other users using files and emails.

38
Q

Name 3 additional precautions you should take against viruses

A

Install antivirus software and keep it updated.
Run regular scans if files on the computer.
Only download from trusted websites

39
Q

How can you prevent theft of your equipment.

A

Chains and locks can be used to fix a computer/laptop to a desk.

40
Q

For companies who have many computers how can you keep people from stealing them

A

Fit doors with security keypads and keep them locked.
Install burglar alarms.
Require all people entering the building to authenticate their identity.