Networks Flashcards

1
Q

ASCII

A

American Standard Code for Information Interchange

the type of code that tells your keys what is being typed, offering 128 characters, with one bit per character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Software

A

enables the user to perform a specific task, for example a word processer allows storage of text and simple images and web browser displays web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attenuation

A

the loss of signal strength when transmitting signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Batch Processing

A

where large amounts of information are processed all at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bridge

A

a computer networking device that creates a single aggregate network from multiple communication networks or network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brouter

A

does the work of the bridge and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Buffer

A

a temporary memory area, which holds the data for the output hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Character

A

single character, eg a s d f g h j k l ; 1 5 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Character Set

A

a defined list of characters recognised by computer hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connectivity

A

methods for connecting devices to each other in order to transfer data, including cabling and wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data

A

a set of raw facts or figures with no apparent reason

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Device Drivers

A

manages the connection with a peripheral device, handles the different requests between a computer and a device, puts a device into sleep mode if it is idle for a specified time, can control multiple peripherals using the same protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disk Defragmentation

A

a process the reduces the amount of fragmentation on a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Name System

A

a distributed database that matches IP addresses to computer system resources, for example, to give a domain name google instead of 173.194.34.191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Space Hierarchical Structure

A

a way of representing the structure of URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic Host Configuration Protocol Server

A

a server that allocates IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EBCDIC

A

Extended Binary Coded Decimal Interchange Code

a method of character encoding that uses 8 bits instead of 7 bits like ASCII, and so is less efficient and isn’t used as much

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fibre Optic Cables

A

cables made of many optical fibres in plastic casing, transferring data signals in forms of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Full Duplex

A

allows more than one person to transmit data at one time, unlike half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Gateway

A

a piece of networking hardware used in telecommunications networks that allows data to follow from one discreet network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Half Duplex

A

same as walky-talkies, allows only one person to transmit data at a single time, despite all people bieng able to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hub

A

node that broadcasts to every computer or ethernet-based device connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Information

A

data which has been processed and given meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Integer

A

whole number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Interrupt

A

where a signal is sent that temporarily halts a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Internet

A

a global computer network providing information and communication facilities, consisting of many networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IP Address

A

Internet Protocol Address

an address allocated to a computer system on a network, used to uniquely identify systems on a network, allowing communication between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Kernels

A

the control centre of the operating system that deals with hardware operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

LAN

A

Local Area Network

used for small, localised networks, such as in homes and schools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Lossless Data

A

a way of compressing data without removing parts, such as ZIP files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Lossy Data

A

a way of compressing data by removing parts, permanently changing it

compression ratio = original file size / compressed file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

MAC Address

A

Media Access Control Address

a 12-digit hexadecimal number that is most often displayed with a colon or hyphen separating every two digits to make it easier to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Memory Management

A

the operating system allocates memory to each process, often using defragmentation, paging and segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Multiprogramming

A

when an operating system is multi-tasking and running several programs at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Network Interface Card

A

provides the computer with a connection to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Network Protocols

A

allows computers on a network to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Wi-Fi

A

wireless, two common standards are Bluetooth and 801.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

TCP

A

Transmission Control Protocol

popular communication protocol which is used for communicating over a network and divides any messages into a series of packets that are sent from source to destination where it gets reassembled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

IP

A

Internet Protocol

an addressing protocol that is often combined with TCP to use with a series of packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

HTTP

A

Hypertext Transfer Protocol

allows webpages to be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

HTTPS

A

Hypertext Transfer Protocol Secure

allows webpages to be shared securely

42
Q

POP3

A

Post Office Protocol 3

most commonly used for receiving e-mails over the internet

43
Q

SMTP

A

Single Mail Transfer Protocol

allows transmission of e-mails on a computer network

44
Q

IMAP

A

Internet Message Access Protocol

transfers e-mails between computer systems via the internet, generally used for retrieval and storage

45
Q

FTP

A

File Transfer Protocol

used for uploading files

46
Q

Node

A

any physical device connected to a network that is able to send, receive or forward information, such as computers, servers, routers and switches

47
Q

Octet

A

two groups of digits in a MAC address

48
Q

OSI Model

A

Open Systems Interconnection Model

has seven layers, explains how data is transferred

49
Q

Applications Layer

A

first part of the OSI model, tells the computer how the data is going to be used

50
Q

Presentation Layer

A

second part of the OSI model, tells the computer how the data is going to be read

51
Q

Session Layer

A

third part of the OSI model, says how the data is to be exchanged (half or full duplex)

52
Q

Transport Layer

A

fourth part of the OSI model, says how data is going to be transported, broken up, and then put back together

53
Q

Network Layer

A

fifth part of the OSI model, says how things are to be sent across eg traffic control, internet protocol, keeps addresses of different computers to each computer, decides which route the data takes

54
Q

Data Link Layer

A

sixth part of the OSI model, says how the data will be carried, e.g. how quickly

55
Q

Physical Layer

A

seventh part of the OSI model, the raw bit that streams over a physical medium, eg Bluetooth, Ethernet, USB

56
Q

Operating System

A

software that runs in the background of a computer system and acts as an interface between the user and the important applications, its five functions being human computer interface, memory management, multiprogramming, file management and real-time processing

57
Q

Packet

A

a collection of data that is transmitted over a packet-switched network. These are provided to a network for delivery to a specified location. Each packet of data is redirected by a computer system along the network until it arrives at its destination. Data may be split into several packets. When all packets have arrived, the data is a reassembled. Packets include source address, destination address, information which enables data to be reassembled in its original form, tracking information, the data itself and a checksum

58
Q

Source Address

A

part of a packet, explains where the data has come from

59
Q

Destination Address

A

part of a packet, explains where the data needs to go

60
Q

Checksum

A

checks the data has not been corrupted, usually an extra 1 or 0

61
Q

Packet Switching

A

the process of delivering packets from one computer system to another, such as a switch or router

62
Q

Pages

A

equally-sized blocks that memory can be split into, which can be allocated to processes

63
Q

Printer Spooling

A

a small application that provides a waiting system until the data can catch up

64
Q

Protocol

A

an agreed-upon format that allows two devices to communicate, protcols may include handshaking, how the sending device will indicate it has finished sending, how the receiving device will indicate it has finished receiving, the type of error checking to be used, agreement on the data compression method to be used

65
Q

Handshaking

A

where two devices establish their readiness to communicate

66
Q

Protocol Stacks

A

a set of network protocol layers that work together

67
Q

Real Number

A

number with or without a fraction

68
Q

Real Time Processing

A

where something is processed as you do it, such as when you are typing into a word document

69
Q

Float

A

number with a fraction

70
Q

Repeater

A

a device which reduces problems caused by signal attenuation

71
Q

Router

A

a networking device that forwards data packets between computer networks and performs the traffic directing functions on the internet.

72
Q

Routing

A

the name given to the method of selecting paths along which packets are sent on a computer network

73
Q

Static Routing

A

where data travels to its destination along a pre-set path, straightforward to implement, but if lots of data is using that path, transmission can take longer

74
Q

Dynamic Routing

A

where data packets can take different routes. This is more complex to implement, but means congested parts of the network can be avoided, meaning data transmission can be completed more quickly

75
Q

Routing Table

A

used to store corresponding IP addresses with MAC addresses, and is stored and updated as necessary

76
Q

Runnable Program

A

a program that cannot be run at the current time as there is not enough memory

77
Q

Running Program

A

a program running at the current time

78
Q

Scheduling

A

determines how processes are run and swapped, where the operating system may choose the shortest job first or the one with the longest waiting time first, is managed by the operating system and is very important for efficient and fair processing of all processes

79
Q

Searching Algorithms

A

a computer uses searching algorithms to search for a value in a given list

80
Q

Binary Search

A

a more efficient way of soring that only works on sorted lists which starts by finding the middle item and comparing it to the value it is searching for; if the middle value is smaller than the value it is searching for then the first half of the list is removed, including the middle value. If the new middle value is larger than the value it is searching for then the top half of the list is removed, including the middle value. This process is repeated until the value is found

81
Q

Linear Search

A

goes through each item in an algorithm one by one until it finds the one it is looking for, then it stops the search after potentially going through every item in the list

82
Q

Segmentation

A

splitting memory and allocating it to processes

83
Q

Sorting Algorithm

A

something a computer uses to set unordered lists and values

84
Q

Bubble Sort

A

works by working through a list, comparing pairs and values and swapping them if they are in the wrong order. Is simple to implement but is very inefficient.

85
Q

Merge Sort

A

works by splitting the lists into individual values and gradually merging them to form bigger lists until they are all in one sorted list. Is one of the most efficient when used with both big and small lists.

86
Q

Standards

A

manufactured following sets of rules, agreed amounts of data loss

87
Q

String

A

more than one character, can be shortened to str

88
Q

Switch

A

similar to a hub, but is able to tell which device it needs to broadcast data to

89
Q

Topology

A

a way in which network devices are arranged

90
Q

Bus Topology

A

in which computers are arranged in a line, with wires connecting them to each other, also known as a daisy chain

91
Q

Hybrid Topology

A

a combination between the different topologies, in which each devices is connected in at least two ways to other devices

92
Q

Ring Topology

A

where devices are arranged in a ring, with wires connecting them to each other

93
Q

Star Topology

A

where devices are each individually connected to a central hub or switch

94
Q

Unicode

A

a sixteen-bit character set with 65536 characters available, allowing it enough characters for any writing system. This is the standard character set and is used by all major web browsers and applications. It uses more storage than ASCII, with two bits per character.

95
Q

Utility

A

a program that is installed in a system alongside the operating system to perform a limited range of functions

96
Q

Waiting Program

A

a program that could potentially run at the current time as there is enough memory but isn’t being run

97
Q

WAN

A

Wide Area Network

connects devices but extends across a large geographical distance such as a leased telecommunications network

98
Q

Web Browser

A

an application used to access websites and render their HTML code to allow viewing

99
Q

WLAN

A

Wireless Local Area Network

100
Q

WAP

A

Wireless Access Point

an access point is a device that creates a wireless local area network, normally wireless