Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

A network connects a number of digital devices. As well as these devices it requires:

A

-NIC/ network interface card
- Cabling or WAP/ wireless access point
- A router
- A hub or switch in some networks
- Standards and Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIC

A

Network interface card either installed or plugged into the computer. Most computers have them installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to connect a wired Vs wireless network

A

Wired: cabling
Wireless: WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Router purpose

A

Connect network to other networks like the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hub Vs Switch

A

Hub is “dumb” and sends messages down every wire

A switch has a processor which it uses to direct messages down the correct wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Standards

Protocols

A

Standards - shared methods

Protocols - standards for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are internet standards/protocols enforced

A

No one enforced them but it makes sense to follow them if they want to be connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LAN

A

Local area network- all computers on the same site , connections privately owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Wide Area Network - a collection of LANS. That communicate with each other eg. The internet

Joins devices remotely using public infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bus network type

A

One cable connects every node / device

All data is transmitted via said cable

  • cheap
  • slow
    -insecure
    -cable fail = total fail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Star network

A

Each device has it’s own cable. Seperately connected to a hub or switch which directs traffic

  • fast , large
  • greater privacy
  • more robust
  • expensive to set up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless network

A

No wired connections , every device uses a wireless adapter.
WAP at the centre , around 20m .

Devices can be portable
Every device needs an adapter
Signals could be inercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mesh network

A

Many routes through the network
No central hub

Most reliable form of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Peer to peer

A

All computers are equal

Cheap, slow , smaller capabilities/capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Client server networks

A

Server stores files for other computers (clients)

More data can be used more work can be done faster

if server has a fault the network fails
Needs technicians
Expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Client side processing

A

Work done by the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Server side processing

A

Work done by the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fat client pros and cons

A
  • works even if network down
  • less strain on server
  • more capable computers needed
  • need to buy more software
  • less control of clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Thin client pros and cons

A
  • cheaper computers
  • buy less software
  • control over clients
  • relies entirely on server
  • created more traffic as constantly communicating w server
20
Q

Print server

A

Connected to a shared printer and pass files through to it

21
Q

Mail server

A

Sent messages from one client to another

22
Q

Internet server

A

Store process and deliver requested info / web pages to users

23
Q

Name 3 network threats

A
  • hackers
    -malware
  • social engineering
24
Q

Virus

A

Creates copies of itself
Not a complete file, a short bit of code
Has an effect when copied into an executable file

When run the virus is executed and does harm

25
Q

Worm

A

Similar to a virus but is a complete file

Hidden in storage
Runs on its own and makes copies of itself

26
Q

Trojan

A

Looks like a desired file
When opened it infects PC with unwanted code

27
Q

4 examples of social engineering

A
  • tricks to get past security
  • get people to give you their password/ bank details
  • scammers and email hoaxes
  • phishing and pharming
28
Q

Spam

A

Emails sent to you without knowledge or consent often contain marketing

29
Q

Phishing

A

Fake email

30
Q

Pharming

A

Fake website

31
Q

Commercial reasons to need security

A

If a business exposed as having been hacked it looks bad

32
Q

Personal reasons to n ed security

A

Protect private data and personal devices from harm

33
Q

Legal reasons to have security

A

If a company is handling a clients sensitive data it must be secure

34
Q

Military and political reasons to have security

A

Secrets from One country want to be protected from spies from it’s enemy cohtty

35
Q

Virus checker

A

Anti malware software on pc

36
Q

Spam filter

A

Emails filtered out for suspected spam and put into separate folder

37
Q

Firewall

A

Monitors incoming / outgoing network traffic and decides the wether to allow or block traffic based on a defined set of security rules

Eg. Company may block certain sites

38
Q

Packet filtering

A

Type of firewall feature

Allows or drops data packets based on simple pre defined rules

39
Q

Proxy server

A

Ensures no malware is entering network, and no sensitive data is being shared to outside entities

40
Q

Internet

A

A huge mesh network based on shared protocols

Data is transmitted as packets that travel from node to node (packet switching)

41
Q

Internet adresses

A

Every internet connection has an IP address - a large number

These numbers are mapped to more useful word based addresses (URLS) using the domain name system (DNS)

Within a local network every individual device also has a MAC address set in the factory

42
Q

WORLD WIDE WEB

A

not the same as the internet!!!

Made up of web pages
Defined using protocols:
HTTP = hypertext transfer protocol
HTTPS= same but SECURED

43
Q

Internet protocols

A

TCP / transmission control protocol
IP / Internet Protocol
HTTP/ Hypertext transfer protocol
FTP/ file transfer protocol

44
Q

TCP/IP STACK

A

layers added in this order
- application layer: added by the software in used
- transport layer: split into packets w TCP
- Internet layer: address added w IP
- Link layer: passed through using MAC addresses

They are taken off in reverse order

45
Q

Search engines

A

A web crawler indexes all the pages it can reach

Stores web address plus key words

Use to run search engine

46
Q

Page ranking

A

As well as matching key words some sites have priority:
- recently updated
- lots of links to them
- links from high value sites
They will appear higher in the search engine list of links

47
Q

HTML

A

Hypertext Markup Language

A declarative language
Paired tags such as <b> and </b> are used to turn format features on and off