IT Theory Part B Flashcards
revision for exam
Name 5 wired connection methods
Cat 5
Coaxial
Fibre optic
VGA
HDMI
Name 5 wireless connection methods
WIFI
Satellite Broadband
Microwave/Laser
Blue Tooth
WiFi Direct
4 networks
Local Area network
Personal Area network
Wide area network
Virtual area network
2 advantages of WIRELESS methods
Easier to connect so you can give connection to many users
portability as signal is available anywhere( within range of router)
2 disadvantages of WIRELESS connections
signal diminishes over distance
usually have a smaller bandwidth
2 Advantages of WIRED Connections
Usually have a larger bandwidth
faster transmission speeds
2 Disadvantages of WIRED Connections
Restricts movement/ no mobility PC must be plugged in to use
Health and safety risks tripping hazards
LIMITATIONS of wireless laptops over old computers
Implementation- little downtime when replacing computers as data from old computer needs to be transferred
Security- will require higher security measures
Cost- must work within the budget of grant money provided and it may expensive to download new software
How to keep files secure using a VPN
sender authentication- as you should only access from authorised devices
Digital Certificates- allows access without needing an administrator
2 Advantages of LAN
Can share peripherals so it reduces costs
Able to share software applications and files between devices without having to use external methods
What does TCP stand for
Transmission control Protocol
Factory’s of installing a new network
User experience
Compatibility
Implementation
Timescales
Testing
Security
2 Advantages of A PAN
- faster connection as fewer users are sharing the bandwidth
- portability as you can establish a connection anywhere
2 disadvantages of a PAN
- cost implications of using cellular data as you have to top up if you run out
- data transfer is slow so problems can arise when downloading larger files
2 Advantages of a VPN
- improved privacy as all the traffic is kept inside the VPN tunnel
- VPN allows secure remote connection online
How to keep files secure using a VPN
- it restricts access only to authorised users
- must have a digital certificate
- sender authentication as it only allows access from authorised devices
what are 2 protocols that is used as basic communication for the internet
Transmission control protocol and Internet protocol
What is HTTP
HyperText transfer protocol is used to allow web servers and browsers to transfer files over the internet
what does HTTPS use that makes it more secure
Uses a public key cryptography to encrypt communications
What is FTP and What is it used for
File transfer protocol is used to transfer files over a network
What are 3 ways HTTPS keeps data secure during transmissions
- It uses transport layer security protocol which provides extra layers of encryption
- When a browser connects to a site it asks for a public key
- when a browser connects to a site it also checks if it has a valid certificate
What are the 3 email protocols
POP 3 is used to retrieve emails from the mail server
IMAP is used to receive emails and stores emails on a server
SMTP manages outgoing emails and is used for sending emails
What is Codecs
Codecs is a program used to compress and decompress audio and video files as it reduces the space they take up on the disk
What are the uses of Codecs when using VOIP
- uses an algorithm
- decoded
- Determines quality
- encrypting for security
What are the implications of using Codecs in a digital format
- Codecs is a piece of software
- it is needed to view the video
- It affects the quality of the video
- if a video file is large Codecs will reduce and compress the file size
What are 2 protocols that are being used to ensure transactions over networks are kept safe
SECURE SOCKETS LAYER AND TRANSPORT LAYER SECURITY, SSL IS GRADUALLY BEING PHASED OUT AND REPLACED WITH TLS
What are the 2 types of compression
LOSSY COMPRESSION- REDUCES THE SIZE OF A FILE BUT DOES THIS BY LOSING SOME INFORMATION
LOSSLESS COMPRESSION- WOULD BE USED FOR TEXTUAL DATA AS IT CAN BRING THE ORGINAL DATA BACK
What is bandwidth and latency
BANDWIDTH-THE AMOUNT OF DATA TRANSFERRED/TRANSMITTED FROM ONE POINT TO ANOTHER IN A PERIOD OF TIME
LATENCY-THE TIME DELAY OR LAG EXPERIENCED BEFORE A COMPONENT RESPONDS TO AN INSTRUCTION
What factors affect bandwidth and latency
- AMOUNT OF USERS AND CONTENTION
- AMOUNT OF DATA BEING TRANSMITTED
- TYPE OF CONNECTION BEING USED
- DISTANCE FROM NEAREST TELECOMMUNICATION EXCHANGE
Firewall protection
- USES SOFTWARE/ HARDWARE
- MONITORS INCOMING/OUTGOING FILES/TRAFFIC AND PACKETS
- CHECKS THE CONTENT BY ENFORCING A SET OF RULES
- IT IDENTIFIES SUSPECT TRAFFIC
- IT THEN DECIDES WHICH FILE AND TRAFFIC PACKETS ARE ALLOWED TO ENTER OR LEAVE
what are features of a strong password
- includes a mix of uppercase and lowercase characters
- avoid using dictionary words
- don’t use personal or memorable information such as a pet’s name
- never use your username as a password
how does encryption work
- PRIVATE AND PUBLIC KEYS ARE GENERATED
- SENDING AND RECIEVING COMPUTERS EXCHANGE PUBLIC KEYS
- USES AN ALGORITHM
- TO SCARMBLE AND MAKE UNREADABLE
- TRANSMITTED TO THE RECIEVING CLIENT WITH A DECRYPTION KEY
- RECIEVING CLIENT USES THE RECEIVING KEY TO UNSCRABLE AND DECRYPT THE DATA