Networks Flashcards

1
Q

ASCII

A

American Standard Code for Information Interchange

the type of code that tells your keys what is being typed, offering 128 characters, with one bit per character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Software

A

enables the user to perform a specific task, for example a word processer allows storage of text and simple images and web browser displays web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attenuation

A

the loss of signal strength when transmitting signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Batch Processing

A

where large amounts of information are processed all at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bridge

A

a computer networking device that creates a single aggregate network from multiple communication networks or network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brouter

A

does the work of the bridge and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Buffer

A

a temporary memory area, which holds the data for the output hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Character

A

single character, eg a s d f g h j k l ; 1 5 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Character Set

A

a defined list of characters recognised by computer hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connectivity

A

methods for connecting devices to each other in order to transfer data, including cabling and wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data

A

a set of raw facts or figures with no apparent reason

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Device Drivers

A

manages the connection with a peripheral device, handles the different requests between a computer and a device, puts a device into sleep mode if it is idle for a specified time, can control multiple peripherals using the same protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disk Defragmentation

A

a process the reduces the amount of fragmentation on a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Name System

A

a distributed database that matches IP addresses to computer system resources, for example, to give a domain name google instead of 173.194.34.191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Space Hierarchical Structure

A

a way of representing the structure of URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic Host Configuration Protocol Server

A

a server that allocates IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EBCDIC

A

Extended Binary Coded Decimal Interchange Code

a method of character encoding that uses 8 bits instead of 7 bits like ASCII, and so is less efficient and isn’t used as much

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fibre Optic Cables

A

cables made of many optical fibres in plastic casing, transferring data signals in forms of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Full Duplex

A

allows more than one person to transmit data at one time, unlike half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Gateway

A

a piece of networking hardware used in telecommunications networks that allows data to follow from one discreet network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Half Duplex

A

same as walky-talkies, allows only one person to transmit data at a single time, despite all people bieng able to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hub

A

node that broadcasts to every computer or ethernet-based device connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Information

A

data which has been processed and given meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Integer

A

whole number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Interrupt
where a signal is sent that temporarily halts a program
26
Internet
a global computer network providing information and communication facilities, consisting of many networks
27
IP Address
Internet Protocol Address an address allocated to a computer system on a network, used to uniquely identify systems on a network, allowing communication between them
28
Kernels
the control centre of the operating system that deals with hardware operations
29
LAN
Local Area Network used for small, localised networks, such as in homes and schools
30
Lossless Data
a way of compressing data without removing parts, such as ZIP files
31
Lossy Data
a way of compressing data by removing parts, permanently changing it compression ratio = original file size / compressed file size
32
MAC Address
Media Access Control Address a 12-digit hexadecimal number that is most often displayed with a colon or hyphen separating every two digits to make it easier to read
33
Memory Management
the operating system allocates memory to each process, often using defragmentation, paging and segmentation
34
Multiprogramming
when an operating system is multi-tasking and running several programs at once
35
Network Interface Card
provides the computer with a connection to the network
36
Network Protocols
allows computers on a network to communicate
37
Wi-Fi
wireless, two common standards are Bluetooth and 801.11
38
TCP
Transmission Control Protocol popular communication protocol which is used for communicating over a network and divides any messages into a series of packets that are sent from source to destination where it gets reassembled
39
IP
Internet Protocol an addressing protocol that is often combined with TCP to use with a series of packets
40
HTTP
Hypertext Transfer Protocol allows webpages to be shared
41
HTTPS
Hypertext Transfer Protocol Secure allows webpages to be shared securely
42
POP3
Post Office Protocol 3 most commonly used for receiving e-mails over the internet
43
SMTP
Single Mail Transfer Protocol allows transmission of e-mails on a computer network
44
IMAP
Internet Message Access Protocol transfers e-mails between computer systems via the internet, generally used for retrieval and storage
45
FTP
File Transfer Protocol used for uploading files
46
Node
any physical device connected to a network that is able to send, receive or forward information, such as computers, servers, routers and switches
47
Octet
two groups of digits in a MAC address
48
OSI Model
Open Systems Interconnection Model has seven layers, explains how data is transferred
49
Applications Layer
first part of the OSI model, tells the computer how the data is going to be used
50
Presentation Layer
second part of the OSI model, tells the computer how the data is going to be read
51
Session Layer
third part of the OSI model, says how the data is to be exchanged (half or full duplex)
52
Transport Layer
fourth part of the OSI model, says how data is going to be transported, broken up, and then put back together
53
Network Layer
fifth part of the OSI model, says how things are to be sent across eg traffic control, internet protocol, keeps addresses of different computers to each computer, decides which route the data takes
54
Data Link Layer
sixth part of the OSI model, says how the data will be carried, e.g. how quickly
55
Physical Layer
seventh part of the OSI model, the raw bit that streams over a physical medium, eg Bluetooth, Ethernet, USB
56
Operating System
software that runs in the background of a computer system and acts as an interface between the user and the important applications, its five functions being human computer interface, memory management, multiprogramming, file management and real-time processing
57
Packet
a collection of data that is transmitted over a packet-switched network. These are provided to a network for delivery to a specified location. Each packet of data is redirected by a computer system along the network until it arrives at its destination. Data may be split into several packets. When all packets have arrived, the data is a reassembled. Packets include source address, destination address, information which enables data to be reassembled in its original form, tracking information, the data itself and a checksum
58
Source Address
part of a packet, explains where the data has come from
59
Destination Address
part of a packet, explains where the data needs to go
60
Checksum
checks the data has not been corrupted, usually an extra 1 or 0
61
Packet Switching
the process of delivering packets from one computer system to another, such as a switch or router
62
Pages
equally-sized blocks that memory can be split into, which can be allocated to processes
63
Printer Spooling
a small application that provides a waiting system until the data can catch up
64
Protocol
an agreed-upon format that allows two devices to communicate, protcols may include handshaking, how the sending device will indicate it has finished sending, how the receiving device will indicate it has finished receiving, the type of error checking to be used, agreement on the data compression method to be used
65
Handshaking
where two devices establish their readiness to communicate
66
Protocol Stacks
a set of network protocol layers that work together
67
Real Number
number with or without a fraction
68
Real Time Processing
where something is processed as you do it, such as when you are typing into a word document
69
Float
number with a fraction
70
Repeater
a device which reduces problems caused by signal attenuation
71
Router
a networking device that forwards data packets between computer networks and performs the traffic directing functions on the internet.
72
Routing
the name given to the method of selecting paths along which packets are sent on a computer network
73
Static Routing
where data travels to its destination along a pre-set path, straightforward to implement, but if lots of data is using that path, transmission can take longer
74
Dynamic Routing
where data packets can take different routes. This is more complex to implement, but means congested parts of the network can be avoided, meaning data transmission can be completed more quickly
75
Routing Table
used to store corresponding IP addresses with MAC addresses, and is stored and updated as necessary
76
Runnable Program
a program that cannot be run at the current time as there is not enough memory
77
Running Program
a program running at the current time
78
Scheduling
determines how processes are run and swapped, where the operating system may choose the shortest job first or the one with the longest waiting time first, is managed by the operating system and is very important for efficient and fair processing of all processes
79
Searching Algorithms
a computer uses searching algorithms to search for a value in a given list
80
Binary Search
a more efficient way of soring that only works on sorted lists which starts by finding the middle item and comparing it to the value it is searching for; if the middle value is smaller than the value it is searching for then the first half of the list is removed, including the middle value. If the new middle value is larger than the value it is searching for then the top half of the list is removed, including the middle value. This process is repeated until the value is found
81
Linear Search
goes through each item in an algorithm one by one until it finds the one it is looking for, then it stops the search after potentially going through every item in the list
82
Segmentation
splitting memory and allocating it to processes
83
Sorting Algorithm
something a computer uses to set unordered lists and values
84
Bubble Sort
works by working through a list, comparing pairs and values and swapping them if they are in the wrong order. Is simple to implement but is very inefficient.
85
Merge Sort
works by splitting the lists into individual values and gradually merging them to form bigger lists until they are all in one sorted list. Is one of the most efficient when used with both big and small lists.
86
Standards
manufactured following sets of rules, agreed amounts of data loss
87
String
more than one character, can be shortened to str
88
Switch
similar to a hub, but is able to tell which device it needs to broadcast data to
89
Topology
a way in which network devices are arranged
90
Bus Topology
in which computers are arranged in a line, with wires connecting them to each other, also known as a daisy chain
91
Hybrid Topology
a combination between the different topologies, in which each devices is connected in at least two ways to other devices
92
Ring Topology
where devices are arranged in a ring, with wires connecting them to each other
93
Star Topology
where devices are each individually connected to a central hub or switch
94
Unicode
a sixteen-bit character set with 65536 characters available, allowing it enough characters for any writing system. This is the standard character set and is used by all major web browsers and applications. It uses more storage than ASCII, with two bits per character.
95
Utility
a program that is installed in a system alongside the operating system to perform a limited range of functions
96
Waiting Program
a program that could potentially run at the current time as there is enough memory but isn’t being run
97
WAN
Wide Area Network connects devices but extends across a large geographical distance such as a leased telecommunications network
98
Web Browser
an application used to access websites and render their HTML code to allow viewing
99
WLAN
Wireless Local Area Network
100
WAP
Wireless Access Point an access point is a device that creates a wireless local area network, normally wireless