Networking-Textbook Flashcards

1
Q

define bit rate

A

this is a measure of transmission speed of data over a telecommunication line.

  • it measures how many bits can be transmitted in 1 second.
  • dial-up = 54k bps
  • fast= 1000 million bps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe WLAN

A

wireless local area network

-uses the wifi (wireless fidelity) standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

describe asynchronous

A
  • clocks are not synchronized at the beginning of transmission.
  • known as best effort transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

list in order of bandwidth

A
  • modem/dial up
  • ethernet
  • wireless
  • wireless-G
  • fast ethernet
  • wireless-N
  • gigabit Ethernet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data security features

A

A NOS protects the data and hardware from unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

advantage of proxy server

A
  • hide one’s IP address
  • increase efficiency- temporarily store images and text from different websites. acting as a cache of webpage.
  • view blocked websites
  • increase security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define protocols

A

is an agreement or standard on how data is to be exchanged over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe bus topology

A
  • the individual computers are connected to a central cable called central bus.
  • the server is also connected to the bus.
  • it is easy to add extra clients to the bus by tapping the cable and a new connection is added.
  • Disadvantage: the system is slow.
  • only 2 computers can exchange information with each other at any particular time.
  • if 2 computers want to exchange data, then the other computers must wait until their transaction is finished.

NB: the clients share a central cable, only 1 client can transmit data at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

compare grid computing to the use of supercomputers

A
  • grid is much more cost-effective.
  • supercomputers are manufactured in fewer quantities thus expensive.
  • can be done on conventional computer hardware and connecting them via a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

list the 3 networking layers

A
  • application layers
  • internet layers
  • hardware layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define TV cable

A

the same cable that supplies TV can be used to connect to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Modem

A

this is the hardware that handles the communication to the outside world.
- the modem is connected to the telephone line or cable YV line on one side and to the router on the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe ISDN

A

integrated services digital networks:

-faster than analogue dial-up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define proxy server

A

is a computer that acts as an intermediary between the user’s computer and internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define client

A

this is a computer program or computer that requests a service from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

describe how grid computing and distributed processing work

[Network distributed parallel processing

A
  • a special software program distributes the computation task over the network to the different computers.
  • the computers then work on their assigned task in parallel and send back the result to the central server.

NB: this is known as [network distributed parallel processing.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

list disadvantage of P2P networks

A
  • difficult admin

- security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

define timesharing

A

this is the sharing of the processing power of the mainframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

define firewall

A

is a computer with software that protects a LAN from the WAN. allowing certain data packet to pass through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PDA stands for ?

A

personal device assistant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

list ways to monitor user behavior on a network

A
  • key loggers
  • system performance monitors
  • surveillance software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Intellectual property issue:

A
  • networks make it easy to share and distribute copyrighted material, both legally and illegally.
  • the copyright owner either benefit from the possibilities or may be harmed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

describe synchronous

A
  • both senders and receivers possess an internal clock.

- clock run at same speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

define supercomputer

A

these are optimized for high computation speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

describe HTTP

A

hypertext transfer protocol

-specifies how a webpage should be transferred over a network so that it can be viewed by a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what does UPS stand for

A

uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define server

A

this is a central computer that is able to provide various services to the connected clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe redundant topology

A
  • 1 computer is connected to 1 or more computers.
  • if one computer is down due to maintenance, then the data will travel a different way to avoid the problem.
  • the internet can be considered to possess a redundant topology.
  • generally not used in LAN
  • requires alot of cables and 1 computer would then have to be connected to several other computers.

NB: there is no single central server. if one of the host breaks down, then the data is still able to travel a different route to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define WAN

A

networks that stretch over a large geographical area.

  • satellites and fibre optic cables are commonly employed here to connect different continents with each other.
  • example is internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

describe switch

A

more intelligent than hubs:
-able to learn for which computer the data is intended

advantage:
-reduces network traffic and increases network speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

define packet sniffer

A

is a program that monitors the data packets that pass over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Describe hub

A

is the least intelligent.

  • has 1 input port and several output ports.
  • data that arrives at the input port is simply copied and distributed to all of its output ports.

disadvantage:

  • generates unnecessary network traffic.
  • cause network to slow down.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Describe routers

A

most complex devices:

-interpret the IP address of the computer and make sure that the data is forwarded to the correct port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Advantage of networks:

Easier system maintenance

A

an admin is able to perform centralized system maintenance and can install updates over the network without having to access each client computer individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what can a network policy include?

A
  • archiving
  • disaster recovery
  • network usage
  • redundancy specifications
  • failover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

define network topology

A

This is the arrangement of the computers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

list things that causes network failure

A
  • Network overload
  • viruses and worms
  • hard disk failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what does SAN stand for?

A

storage area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

describe FTP

A

file transfer protocol

-used by programs designed for uploading and downloading files from a file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

data integrity;

A
  • data stored on databases can be modified by several people. These people can access the database over a network
  • how can this data be protected from accidental or deliberate modification?
  • modified medical data, eg, can have serious negative consequences for the patients.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which was the first network that covered a wider geographical area?

A

APRANET

1983

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

List the general moral imperatives

A
  • contribute to society and human wellbeing
  • avoid harm to others
  • be honest and trustworthy
  • be fair and take action not to discriminate.
  • honour property rights, including copyrights and patent.
  • give proper credit for intellectual property
  • respect the privacy of others
  • honour confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

describe wireless

A

the advantage:

- it is independent from a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Access and authentication

A
  • which user has what rights?
  • what are the various users allowed and not allowed to do?
  • if unauthorized users have access to the resources of the network, then there is the danger that the data stored on the servers of the network can be either modified or passed on to other people.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

define collision

A

when more than one computer send data at the time

- the computers had to resend their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

list the features of NOS:

A
  • user management
  • permission management
  • allows data access
  • allows hardware access
  • data security features
  • backup features
  • remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

data is sent over the network in ?

A

packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

describe star topology

A
  • clients are connected to a central server.
  • if 2 clients want to exchange data, then the data must be passed through the central server.
  • if the central server fails, no clients are able to communicate with each other.
  • if a new computer needs to be connected to the server, then a separate cable connection is required.

NB : the clients can communicate with each other only through the central server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

describe POP3

A

post office protocol 3

-used when receiving emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Disadvantage of networks

Intellectual property

A

This relates to issues of software licensing.

the organization must have the licences to install the software on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Describe a web host

A

this is a computer that stores the websites of different companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Define Peer to Peer [P2P]

A

this is a highly decentralized network.
-each host connected to the network serves both as a client and as a server, hence different computers can exchange data directly with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

what does TLS stand for?

A

transport layer security

60
Q

who create the SETI@home

A

by Space sciences laboratory of university of California
- search for extraterrestrial intelligence
-

62
Q

define dumb terminals

A

these are terminals that do not perform any computing themselves but rather they are composed of a keyboard and a monitor connected over a cable to the mainframe.

  • each terminal receives a certain amount of computation time.
  • cannot communicate with other terminals unless going through the mainframe.
63
Q

Describe analogue dial-up

A

connection established over regular telephone line to the ISP.

disadvantage:

  • slow
  • cannot use internet and phone at same time.
64
Q

Define host

A

this can be a client or a server,

but is generally used to describe servers that provide certain services to the network.

65
Q

Disadvantage of networks:

Control

A

there is a possible loss of control over data.
users may compromise the integrity of the data by modifying files if the access allowed by the user has not been configured properly.

66
Q

Disadvantage of networks:

Security

A

a range of security threats [unauthorized access, worms or viruses] must be handled appropriately.

67
Q

define BNC adaptors

A

these are cables belonging to an older ethernet standard.

-Bayonet Neill concelman

68
Q

Define router

A

is a piece of hardware that is needed if more than 1 computer should have access to the internet.

69
Q

Allows hardware access

A

A NOS allows users to access hardware, such as printers and scanners, which are connected to the network.

70
Q

what does RAID stand for ?

A

redundant array of inexpensive disks

71
Q

define extranet

A

these are extensions of an intranet.

72
Q

who created folding@home

A

by stanford university

  • since 2009, 400000 computers
  • 4.51 million participated.
  • project focused on biochemistry
72
Q

Define WLAN

A
  • Wireless local area network
  • are connected using radio transmission and not with cables.
  • the clients connect to the network over so called hotspots or accept point.
75
Q

define data centres

A

is a facility that contains a collection of several powerful computers.

76
Q

Advantage of networks:

Easy sharing of data

A

A central server provides the data to the clients and different users can login to the server to retrieve the required data.

76
Q

describe the use of screen savers

A
  • Volunteers can install a screen saver on their computer which then becomes active when the user does not use the computer.
  • the screen saver loads calculations from a server and sends back the results.
  • this way, users can lend some of their CPU power to scientific projects.
78
Q

Define central router

A

a device which controls the flow of data and prevents collision

79
Q

Computer networks are composed of?

A

2 or more computers connected together.

-networks allow for data exchange.

80
Q

describe glass fibre

A

or fibre optic

  • the signals are transmitted using light over glass fibre optic cables.
  • very fast.
  • very expensive
81
Q

How does computers communicate?

A

by using TCP/IP [transmission control protocol/ internet protocol] to communicate with each other

83
Q

list network security problems

A
  • hacking
  • Denial of service attack (DOS)
  • Network sniffing
  • Phreaking
  • phishing
  • cracking
  • malware
84
Q

User management

A

system admin can assign different permissions to the different users of the network.
-special utility programs help in maintaining an overview of the users and their associated rights.

86
Q

Describe ring topology

A
  • there is no single central server since the computers are connected in a ring shape.
  • data is passed on in one direction only.
  • 1 computer is configured as a server but several servers may exist within the ring, each one configured to perform a different function.

NB: the data is passed in a circle until it reaches the destination computer.

87
Q

what does SSL stand for?

A

secure socket layer, encryption methods that are commonly used to encrypt websites.

88
Q

What is a network operating system? NOS

A

this is an operating system that is specifically designed to operate and manage computer networks.

89
Q

data security:

A
  • how can data stored on a network be protected from accidental loss?
  • system admins need to make backups of the data.
90
Q

list advantage of client-server

A
  • centralized

- control

91
Q

disadvantage of Grid computing

A
  • the network connection can become a bottleneck and substantially slow down the whole task
  • not suitable for all types of calculations and a careful cost-benefit analysis must be done before selecting a particular hardware solution.
  • requires volunteers willing to participate in the project.
91
Q

Define Network cables

A

-ethernet cables in which a computer can use to connect to the router to access the internet.

91
Q

Define Intranet

A

is a network that belongs to one particular organization.

92
Q

Mainframes and supercomputers both follow ?

A

the philosophy of centralization

92
Q

Define internet

A

this is a worldwide network of interconnected computers.

93
Q

define grid computing and distributed processing

A

these are examples of extremely decentralized computing.

- the computer network itself essentially becomes the supercomputer.

93
Q

Define LAN

A

these are networks that extend over a limited geographical area

  • fast data transfer rate
  • administrated by a person who has full control over the network.
93
Q

Describe bluetooth

A

this is also a wireless standard. bluetooth works over short distances.

95
Q

describe HTTPS

A

secure hypertext transfer protocol

-uses encryption to make data transmission more secure.

96
Q

Allows data access

A

A NOS allows users to access data stored on a server.

98
Q

Advantage of networks:

Centralized management of software

A

system administrators have to install software only once onto the central server.
the clients can then use the software right away.

98
Q

NCSA Mosaic web browser released in?

A

1993

100
Q

what can reduce the reliability of the computer hardware and increase the risk of fire?

A

dust and dirt.

101
Q

list the 2 notable examples in which grid computing is in active use.

A
  • The project SETI@home [University of California]

- The project folding@home [conducted by stanford university]

101
Q

ISP offers different methods of connecting to the Internet, as it also depends on?

A

the geographic location and the general infrastructure of the area.

101
Q

Define Cloud computing

A

is a general term that describe a collection of services that are provided over the internet by a company to its customers.

103
Q

define ethernet

A

this is one of several ways to connect a computer to a network.

  • it relies on copper wires for transmitting the data.
  • originally, computers were connected to a central copper cable.
105
Q

define audit trail

A

a log file which stores the activities of the users.

106
Q

Back up features

A

A NOS comes with utility programs that assist in making periodic backups of the data stored on the server.

107
Q

list software licensing model

A
  • single-user
  • multi-user
  • concurrent licence
  • network licence
  • site licence
108
Q

Describe Wimax

A

Worldwide interoperability for microwave access.

-phone networks [digicel]

109
Q

list advantages of P2P networks

A
  • simplicity
  • no central system admin is needed
  • data sharing
110
Q

privacy issues

A
  • it is possible to monitor the actions of users over a network
  • this monitoring can infringe on a person’s right to privacy
111
Q

list things that make networks more secure

A
  • login/password
  • biometrics
  • physical access control
  • encryption
  • installation of firewalls
112
Q

List different types of servers

A
  • Mail server - stores emails until they are retrieved by the user.
  • Web server- stores websites to be viewed by the public
  • File server- Stores files to be accessed by authorized users of a LAN
  • Video server- Stores videos files to be viewed by the clients of the LAN. Video servers are sometimes used to make videos available to skls and universities.
114
Q

Client-server architecture is strongly?

A

centralized

  • a number of different clients are connected to a powerful central server.
  • if 2 clients want to exchange data with each other, then they must go through the central server.
  • can be configured to handle printing, file storage, emails.

NB: if the central server breaks down, then the clients are isolated and without a connection

114
Q

define ADSL

A

asynchronous digital subscriber line
- a regular telephone is used to transmit a digital signal.

advantage:

  • possible to use internet and telephone at the same time.
  • fast transmission speed.

disadvantage:

  • speed depends on distance to the next telephone station
  • ADSL not available everywhere.
114
Q

Remote access:

A

this features allows users to operate a computer over the network just as if they were sitting in front of the remote computer.
-remote access can also refer to the simple accessing of data stored on a server, such as the uploading and downloading of files.

115
Q

what does TCP and IP stand for ?

A

transmission control protocol

internet protocol

115
Q

define baud rate

A

represents the number of electrical impulses that are sent over a line.

115
Q

define bandwidth

A

is a measure of the frequency spectrum that is used to transmit data over a network.

ethernet=broadband
dialup= narrowband.

116
Q

the computer is located in a large room in which they can be ?

A

maintained and managed

116
Q

Network card.

A

a device in which a computer can use to have network functionality

116
Q

What does VLAN stand for

A

virtual local area network.

116
Q

Define VLAN

A

this is a software solution that divides up a computer network into several subnetworks, without requiring extensive rewiring.

116
Q

Define WWW

A

this is one of the area of application in which hypertext documents can be sent over the internet.

117
Q

Define mainframe computers

A

these are primarily designed to store and process large quantities of data

  • designed to be highly reliable
  • possible to exchange computer parts without having to shut down the system.
118
Q

the proxy server is unable to hide blocked servers from ISPs

A

FALSE

119
Q

_____ is a network security problem that refers to illegal and criminal activities. it can also refer to the copy protection of a piece of software.

A

cracking

120
Q

networks can fail due to _______as they can be programmed to spread so quickly that the network become congested.

A

malware

121
Q

________ _________ programs can be used to spy on login or password combinations

A

keystroke monitoring

122
Q

________ is a measure of the frequency spectrum that is used to transmit data over a network. it determines how much data can be transferred per unit time

A

bandwidth

123
Q

a _____ _____ is a computer that acts as an intermediary between the users’ computer and the internet. all internet traffic is routed through it before it reaches the user’s computer.

A

proxy server

124
Q

a ___ ____ is also known as a “server farm”

A

data centre.

125
Q

This method of security only allows certain users access to certain computer.

A

physical access control

126
Q

___ ____ is used for employee monitoring purposes and for surveillance. it keeps a detailed log of the activities of a user

A

audit trail

127
Q

ISPs have performance monitoring software to determine whether customers are using the internet in an unacceptable manner

A

true

128
Q

SSL and TLS are _____ methods used to secure websites

A

encryption

129
Q

a network can fail due to ___ ___, which is too many people trying to access a server at the same time.

A

network overload.

130
Q

the data on a network is sent as a continuous stream

A

false