IT Theory Part B Flashcards

revision for exam

1
Q

Name 5 wired connection methods

A

Cat 5
Coaxial
Fibre optic
VGA
HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 5 wireless connection methods

A

WIFI
Satellite Broadband
Microwave/Laser
Blue Tooth
WiFi Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 networks

A

Local Area network
Personal Area network
Wide area network
Virtual area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 advantages of WIRELESS methods

A

Easier to connect so you can give connection to many users
portability as signal is available anywhere( within range of router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 disadvantages of WIRELESS connections

A

signal diminishes over distance
usually have a smaller bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 Advantages of WIRED Connections

A

Usually have a larger bandwidth
faster transmission speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 Disadvantages of WIRED Connections

A

Restricts movement/ no mobility PC must be plugged in to use
Health and safety risks tripping hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LIMITATIONS of wireless laptops over old computers

A

Implementation- little downtime when replacing computers as data from old computer needs to be transferred
Security- will require higher security measures
Cost- must work within the budget of grant money provided and it may expensive to download new software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to keep files secure using a VPN

A

sender authentication- as you should only access from authorised devices
Digital Certificates- allows access without needing an administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 Advantages of LAN

A

Can share peripherals so it reduces costs
Able to share software applications and files between devices without having to use external methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does TCP stand for

A

Transmission control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Factory’s of installing a new network

A

User experience
Compatibility
Implementation
Timescales
Testing
Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 Advantages of A PAN

A
  • faster connection as fewer users are sharing the bandwidth
  • portability as you can establish a connection anywhere
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2 disadvantages of a PAN

A
  • cost implications of using cellular data as you have to top up if you run out
  • data transfer is slow so problems can arise when downloading larger files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2 Advantages of a VPN

A
  • improved privacy as all the traffic is kept inside the VPN tunnel
  • VPN allows secure remote connection online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to keep files secure using a VPN

A
  • it restricts access only to authorised users
  • must have a digital certificate
  • sender authentication as it only allows access from authorised devices
17
Q

what are 2 protocols that is used as basic communication for the internet

A

Transmission control protocol and Internet protocol

18
Q

What is HTTP

A

HyperText transfer protocol is used to allow web servers and browsers to transfer files over the internet

19
Q

what does HTTPS use that makes it more secure

A

Uses a public key cryptography to encrypt communications

20
Q

What is FTP and What is it used for

A

File transfer protocol is used to transfer files over a network

21
Q

What are 3 ways HTTPS keeps data secure during transmissions

A
  • It uses transport layer security protocol which provides extra layers of encryption
  • When a browser connects to a site it asks for a public key
  • when a browser connects to a site it also checks if it has a valid certificate
22
Q

What are the 3 email protocols

A

POP 3 is used to retrieve emails from the mail server
IMAP is used to receive emails and stores emails on a server
SMTP manages outgoing emails and is used for sending emails

23
Q

What is Codecs

A

Codecs is a program used to compress and decompress audio and video files as it reduces the space they take up on the disk

24
Q

What are the uses of Codecs when using VOIP

A
  • uses an algorithm
  • decoded
  • Determines quality
  • encrypting for security
25
Q

What are the implications of using Codecs in a digital format

A
  • Codecs is a piece of software
  • it is needed to view the video
  • It affects the quality of the video
  • if a video file is large Codecs will reduce and compress the file size
26
Q

What are 2 protocols that are being used to ensure transactions over networks are kept safe

A

SECURE SOCKETS LAYER AND TRANSPORT LAYER SECURITY, SSL IS GRADUALLY BEING PHASED OUT AND REPLACED WITH TLS

27
Q

What are the 2 types of compression

A

LOSSY COMPRESSION- REDUCES THE SIZE OF A FILE BUT DOES THIS BY LOSING SOME INFORMATION
LOSSLESS COMPRESSION- WOULD BE USED FOR TEXTUAL DATA AS IT CAN BRING THE ORGINAL DATA BACK

28
Q

What is bandwidth and latency

A

BANDWIDTH-THE AMOUNT OF DATA TRANSFERRED/TRANSMITTED FROM ONE POINT TO ANOTHER IN A PERIOD OF TIME
LATENCY-THE TIME DELAY OR LAG EXPERIENCED BEFORE A COMPONENT RESPONDS TO AN INSTRUCTION

29
Q

What factors affect bandwidth and latency

A
  • AMOUNT OF USERS AND CONTENTION
  • AMOUNT OF DATA BEING TRANSMITTED
  • TYPE OF CONNECTION BEING USED
  • DISTANCE FROM NEAREST TELECOMMUNICATION EXCHANGE
30
Q

Firewall protection

A
  • USES SOFTWARE/ HARDWARE
  • MONITORS INCOMING/OUTGOING FILES/TRAFFIC AND PACKETS
  • CHECKS THE CONTENT BY ENFORCING A SET OF RULES
  • IT IDENTIFIES SUSPECT TRAFFIC
  • IT THEN DECIDES WHICH FILE AND TRAFFIC PACKETS ARE ALLOWED TO ENTER OR LEAVE
31
Q

what are features of a strong password

A
  • includes a mix of uppercase and lowercase characters
  • avoid using dictionary words
  • don’t use personal or memorable information such as a pet’s name
  • never use your username as a password
32
Q

how does encryption work

A
  • PRIVATE AND PUBLIC KEYS ARE GENERATED
  • SENDING AND RECIEVING COMPUTERS EXCHANGE PUBLIC KEYS
  • USES AN ALGORITHM
  • TO SCARMBLE AND MAKE UNREADABLE
  • TRANSMITTED TO THE RECIEVING CLIENT WITH A DECRYPTION KEY
  • RECIEVING CLIENT USES THE RECEIVING KEY TO UNSCRABLE AND DECRYPT THE DATA