Connectivity Flashcards

1
Q

To create a home network which type of network do you need to set up?

A

LAN (Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of using a cable connection to the router?

A
  • Very Fast
  • Good security as the user would need to physically plug their computer into the network with a cable
  • Should not experience interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give two benefits of using a wireless network in the home.

A
  • Cheaper
  • No building work needed to routing cables through the house
  • Can access the network from anywhere in the house
  • Can carry device from room to room and stay connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State what piece of equipment needs to be connected to the modem in order to share the connection over a wireless network

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State two ways to secure a wireless network.

A
  • Use a form of encryption
  • Change default passwords on the router
  • MAC address filtering
  • Stop the router broadcasting its SSID
  • Reduce transmitter power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain why it is important to secure a wireless network.

A

Wireless networks need to be secured otherwise other people can access your network and use your Internet connection or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What ways can you transfer images from a camera to a netbook?

A
  • Bluetooth
  • Inserting an SD card from camera into netbook
  • USB cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Bandwidth?

A

The amount of data that can fit through an Internet connection. You can compare it to a 10 lane motorway which can fit more cars on it than a 4 lane motorway. Bandwidth is measured in bits per second (bps). This indicates the number of bits of information that can fit down the line in one second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Latency?

A

The time delay between the moment something is initiated and the moment it becomes detectable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does peer-to-peer networks mean?

A

This is when digital devices communicate wirelessly with each other directly without the need for transmitter between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which communication protocol is used to make telephone calls?

A

VoIP (Voice over Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which communication protocols are used when sending and receiving messages?

A
  • SMTP (Simple Message Transfer Protocol) - used when email is sent from the sender
  • POP3 (Post Office Protocol) - used to read the email when the email is downloaded from the server and can be read offline
  • IMAP (Internet Message Access Protocol) - the email is read on the mail server and can only be accessed when the computer has an internet connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between HTTP and HTTPS?

A

Hyper Text Transfer Protocol (HTTP) is the protocol of the World Wide Web (WWW) and is used to ask the web server to send the files needed to show the web page. The Hyper Text Transfer protocol over SSL (Secure Sockets Layer) or HTTPS transfers the data encrypted so that it cannot be read by anyone except the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain why firewalls are used by people when accessing the Internet.

A

A firewall is used to stop (or allow) data transmission to stop malicious sites from accessing data on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data can be encrypted when it is sent to other people over the Internet. Explain how encryption helps keep data secure.

A

Encryption randomises / encodes the data and the data needs to be decoded so that unauthorised users cannot access the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Firewall?

A

A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.

17
Q

What does Biometric mean?

A

An automated method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice.

18
Q

Describe one biometric method that can be used to authenticate a person’s identity when they are trying to enter a building or log on to a computer system.

A

You could use a fingerprint scanner that reads a person’s fingerprint and checks whether or not there is a computer account or file in the system for that fingerprint.

Iris recognition or other biometric methods would be acceptable but you must include a description in the answer.

19
Q

What is an IP address?

A

The IP (Internet Protocol) address is the personal address of your computer (just like your home address), so that servers know where to send the information you have requested.