NETWORKS Flashcards

1
Q

Define Router and its uses

A

A device that enables data to be sent between different types of networks. It can be connected through cables or wirelessly to connect a LAN to the internet.

It can be used for:

connecting networks and devices to the internet,
storing computer addresses,
routing data packets.
When a data packet is received, the router checks if the packet is intended for it or another network. The data packet is routed to the local switch/hub if it’s meant for its network. If not, the data packet is sent to the relevant router, which sends it to the relevant device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define NIC (Network Interface card)

A

These are needed to allow a device to connect to a network. Turns binary data into an electrical signal that allows network access. Usually integrated into the motherboard.
Each NIC is given a unique hardwired media access control (MAC) address.

Media access control (MAC) address: a number that uniquely identifies a device when connected to a network.

The first six hex digits identify the manufacturer’s code, and the next 6 identify the device’s serial number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Hubs

A

they are hardware devices that can have several other devices connected to them. They are used to connect devices together to form a local area network (LAN). It takes a data packet received by one of its ports and sends it to all relevant or irrelevant devices that are connected to it.
It is not very secure to broadcast data to all devices.
Unnecessary network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Switches

A

intelligent hubs. Used to connect devices to form a LAN. Unlike hubs, the switches store the MAC addresses of all devices on a lookup table. So, it only sends data to the relevant device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Differences and similarities between switch and Hub

A

Both are used to connect devices in LAN.
Both use data packets.
Hubs send data to every device on the network.
Switches send data to a relevant device only.
Switches have better security.
Switches use lookup tables to determine the destination for a data packet.
Switches use MAC addresses for relevant device locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Bridges

A

Devices that connect one LAN to another LAN that use the same protocol. Unlike routers, they can’t communicate with external networks, such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Comparison between bridges and routers

A

Bridges connect LANs together; routers connect various types of networks together.

Bridges scan MAC addresses while routers scan the IP addresses.
Both send out data in the form of data packets.

Bridges connect networks with the same protocol; routers can connect networks with different protocols.

The router uses routing tables to direct data packets, but bridges don’t.

Bridges have only two ports; routers have multiple ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the uses of Wifi and Bluetooth

A

Both are used for wireless communication between devices. They both use electromagnetic radiation as the carrier of data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the uses of Bluetooth

A

When transferring data between 2 or more devices that are very close together.
When the speed of data transmission isn’t crucial.
For low-bandwidth applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the uses of Wifi

A

Full-scale networks.
When the data transfer rate is crucial.
For uses where a higher range and better security are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the differences and Similarities between Bluetooth and Wifi

A

Bluetooth uses a transmission frequency of 2.4 GHz, whereas Wi-Fi uses a 2.4 – 5.0 GHz range.
Wi-Fi has a much faster data transfer rate.
Wi-Fi has a higher geographical range in which it is effective.
Bluetooth only allows up to 7 devices to be connected simultaneously, whereas the number of devices connected to a Wi-Fi network depends on the router/routers used.
Bluetooth uses key-matching encryption. However, Wi-Fi uses WPA (Wi-Fi protected access) and WEP (wireless equivalent privacy).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Cloud computing and its different types

A

This method is where data is stored on remote servers accessed online.

The three types of cloud storage are:

Public Cloud - The customer and the cloud storage provider are different companies.
Private Cloud - The customer and the cloud storage provider are a single organization.
Hybrid Cloud - Combines public and private cloud options and allows sensitive data to remain private while providing public cloud services for less sensitive information.
Cloud data is duplicated and stored on other servers to ensure availability during system failures, upgrades, and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages of Cloud Computing

A

Services can be scaled up or down according to changing requirements.

Cloud storage eliminates the need for a business to purchase expensive equipment for infrastructure and maintenance.

Readily available globally, allowing both remote working and data sharing.

Providers offer high levels of ensuring that services are always available.

It can offer an almost unlimited amount of storage.

A backup of the data from the cloud will allow full data recovery in case of incidents.

Files can be synced across multiple devices.

There is no need to carry storage devices around.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of Cloud Computing

A

A stable internet connection is always required.
Data storage in clouds may be vulnerable to security breaches.
The user depends on the storage provider for reliability and availability of services.
The services may become expensive as the amount of storage or bandwidth required increases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is internet and its characteristics

A

The Internet is a very large global network that consists of many other interconnected networks

The World Wide Web is a vast collection of web pages that can be accessed using a web browser.

The World Wide Web allows you to access information by using the internet
Characteristics:

It is an open network, meaning everyone can access the same resources and information as everybody else.

People from all over the world can communicate with each other in real-time.

Available to anyone who has a suitable device and access to any one of the interconnected networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Intranet and its characteristics

A

Usually private and are used to send information securely and safely.

Access to an organization’s Intranet is restricted and only accessible to authorized users such as employees.

Intranets have many advantages over the internet, such as:
better bandwidth than the internet,
data is kept within the organization,
less chance of hacking and attacks,
administrators can manage access to external sites and links.
Characteristics:

A private network that is accessible to employees within a company or organization.
Usually behind a firewall to ensure security.
Allows for document sharing and the use of collaboration tools between users.
It can be customized to meet the specific requirements of the business.
Users will require a username and password to access the Intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Extranet

A

Private Intranet that also allows access by selected parties that reside outside of the organization. These parties, for example, maybe customers, key stakeholders or clients.
Users will have an authorization level once they have successfully logged in, which will determine which resources they may access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Similarites between intranet extranet internet

A

They are all web-based technologies
They allow users to access information remotely
They all use client-server architecture
They all use security measures such as authentication and encryption
They all promote and facilitate information and resource sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Differences between intranet extranet and internet

A

The internet is a global network, whereas an intranet/extranet is a private network contained within an organization
The use of the internet covers a wide range of purposes, whereas an intranet/extranet is designed for specific users and purposes.
Much information is publicly available, whereas an intranet/extranet is not.
The Internet is not owned solely by one person or organization, whereas the organization usually owns intranets/extranets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is LAN (Local Area Network)

A

Local Area Network (LAN): networks usually contained within a single building or small geographical location. It is made up of hubs and/or switches, which will connect several devices together. One hub or switch commonly connects to a router, allowing LAN connectivity to other outside networks such as the Internet.

21
Q

Advantages of LAN

A

Allows centralized management of updates, backups and software installations.
Can secure its devices with the use of firewalls, antivirus software and other security features to prevent unauthorized access.
A LAN allows users on the network to share resources such as printers and other peripherals.

22
Q

Disadvantages of LAN

A

The network may not function correctly in case of hardware failure.
They are more prone to attacks than standalone computers.
Data and peripheral accessing can be slow, based on network traffic.
LAN networks require maintenance to ensure the software is up-to-date.

23
Q

What is WLAN

A

Local Area Networks allow devices to connect wirelessly rather than using physical cables. Wireless Access Points (WAPs) are connected to an existing wired network, which provides wireless connectivity. Support a vast range of devices, such as smartphones and laptops, are very popular in public areas such as shopping malls.

24
Q

Advantages of WLAN

A

Allows users to connect anywhere in the range of a Wireless Access Point (WAP).
They can be used in various indoor and outdoor environments, making them highly flexible.
As the requirements change, additional WAPs can be added relatively easily.
Printer access can be given to wireless devices.

25
Q

Disadvantages of WLAN

A

The strength of their signals can be affected by obstacles such as walls.
Speeds can be affected by high-traffic areas.
It can sustain interference from other devices which can affect performance and connectivity.
Can be vulnerable to security threats due to signal interception.

26
Q

Define WAN

A

Wide Area Networks (WAN): is formed by several LANs connected through a router. It is expensive. However, it comes with a more enhanced security. Additional hardware is needed for a WAN: Routers, modems, and proxy servers.

27
Q

Advantages of WAN

A

Provide the ability to connect geographically dispersed locations, such as offices in different cities or countries.
Offer the flexibility to scale up or down based on the organisation’s needs.
Administrators can monitor and manage the network infrastructure from a single location.

28
Q

Disadvantages of WAN

A

Setting up and maintaining a WAN can be expensive, especially compared to LANs.
Cover larger distances and rely on public networks or leased lines, which can introduce latency and affect performance.
WANs are subject to the reliability and availability of external service providers.

29
Q

Define Hacking

A

Hacking: Unauthorized access given to the computer. This can lead to identity theft or the misuse of personal information.

30
Q

Define Phishing

A

Phishing: Phishing involves getting sensitive information, such as usernames, passwords, and credit card details, for malicious reasons by mimicking a reliable webpage on the network

31
Q

Define Pharming

A

Pharming: This is malicious code installed on a user’s computer or a web server; the code will redirect the user to a fake website without their knowledge (the user doesn’t have to take any action, unlike phishing).

32
Q

Define Viruses

A

Program code that replicates (copies itself) to delete or corrupt files and cause the computer to malfunction

33
Q

Define Zero login

A

A security concept that eliminates traditional login methods, such as usernames and passwords, using biometrics or other authentication factors for seamless and password-less access.

34
Q

Define Biometric Recognition

A

These authentication methods use unique physical or behavioural characteristics, such as fingerprints, iris scans, or voice recognition, to verify a person’s identity.

35
Q

Define Magnetic Stripes

A

These are authentication features on cards storing data magnetically. They enable secure identification and authorization by containing encoded information that magnetic stripe readers can read.

36
Q

Define Smart Cards

A

Smart cards are portable devices with integrated circuits to store and process data. They are used for authentication, identification, and secure transactions in various applications such as banking, telecommunications, and access control.

37
Q

Define Physical Tokens

A

It is a type of authentication that takes the shape of a solid object. The user demonstrates ownership of the token through interaction with a login system. Physical tokens have embedded clocks that create one-time passwords (OTPs) when a PIN and other authentication information are entered.

38
Q

Define Electric Tokens

A

Tokens are applications that users install on their hardware, such as smartphones. Say a person wants to access a website on a tablet computer. To access this website, users must first authenticate themselves using electronic tokens. The user has already set up the electronic token app with their smartphone. The user launches the app on their smartphone when the website asks them to verify their identity. The program creates an OTP that is only good for a short period of time.

39
Q

Explain Anti Malware Software

A

Anti-malware software is designed to protect devices against viruses and malicious software. It has 3 primary purposes: detect, prevent and remove malicious software. It is installed onto a computer system and will operate in the background.
Standard features of Anti-Malware software include the following:

Comparing the scanned files against an extensive database of known threats
Real-time scanning
Regular updates to gather an up-to-date list of known threats
Quarantine of infected files
Quarantining files allows threats to be automatically deleted.
Allows the user to determine if the file is a legitimate threat and not a false positive

40
Q

Explain Vidoe Conferencing

A

It is a form of audio and video communication. It serves as a stand-in for face-to-face meetings between several persons who may reside abroad or in another region of the country. It utilizes a network in some way and is done in real-time.
The basic hardware includes:

webcams,
large monitors/television screens,
microphones,
speakers.
The software used are:

Webcam and microphone software drivers
CODEC (coder and de-coder)
Echo cancellation software

41
Q

Advantages of Vidoe Conferencing

A

It is much easier to access important documents or bring in ‘experts’ at key parts of the conference.
It is possible to hold conferences at short notice.
Reduced travelling costs.
There is no need to pay for hotel accommodation or venue hire.
Reduces the cost of taking people away from work for two or three days to travel.
Using video conferencing is better than having delegates travel to potentially unsafe places

42
Q

Disadvantages of Vidoe Conferencing

A

Potential time lag in responses/delays when talking.
Images can jerk.
It is very expensive to set up in the first place.
Problems if the delegates live in different countries with large time zone differences.
Requires IT knowledge to some extent.
It’s not the best for people who consider travelling a job perk.
Completely reliant on stable internet connections.

43
Q

Explain Audio Conferencing

A

Meetings held using audio (sound) technology are called audio conferencing. The normal telephone network can be used for audio conferencing, frequently called a phone conference.
The hardware required is:

a computer (with built-in microphones and speakers)
external microphone and/or speakers
an internet phone
a standard phone.

44
Q

Advantages of Audio Conferencing

A

Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as transportation, accommodation, and meals.
Saves time by eliminating travel time and allowing meetings to be scheduled and conducted quickly.

45
Q

Disadvantages of Audio Conferencing

A

Lacks the visual aspect of face-to-face meetings, which can hinder communication.
It can limit interaction and engagement compared to in-person or video conferencing.
Heavily relies on technology, and technical issues such as poor audio quality, background noise, or connectivity problems are common.

46
Q

Define Web Conferencing

A

Web conferencing, often known as webinars or webcasts, makes use of the Internet to enable conference calls. This system makes use of numerous computers that are interconnected over the internet. It operates in real-time, just like video conferencing, and enables the following meeting types:

» business meetings to discuss new ideas

» presentations

» online education or training.

47
Q

Advantages of Web Conferencing

A

Allows participants to see each other through video, providing a more immersive and engaging experience than audio conferencing.
Often offer screen sharing capabilities, enabling participants to share presentations, documents, or other visual content in real-time.
Often provide features like chat, polling, hand raising, and Q&A sessions, fostering interactivity and engagement among participants.

48
Q

Disadvantages of Audio Conferencing

A

Heavily relies on internet connectivity and technical infrastructure.
They can be susceptible to distractions and multitasking.
It often has various features and settings that participants need to familiarize themselves with, especially if they are new to the platform.