Networks Flashcards

1
Q

Client

A

A client on the other hand is a computer that has software that enables it to send requests to the server for a particular service. e.g. your computer has a web browser that enables you to access email over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host

A

A host computer is any device that has an IP adddress -an address used to send and receive data in a network .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server

A

Aserveris a computer program or a device that provides functionality for other programs or devices, called “clients”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mainframe computer

A

A mainframe is a large computer which is used for calculatiions dealing with a huge amount of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Super computer

A

A supercomputer is a powerful computer which is used for processing data at fastest possible speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocol

A

In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethernet

A

A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Grid computing

A

Grid computing usually consists of one main computer that distributes information and tasks to a group of networked computers to accomplish a common goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distributed processing

A

Distributed processing is a phrase used to refer to a variety of computer systems that use more than one computer (or processor) to run an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Peer to peer network

A

In a peer to peer network or connected computers are considered both clients and servers and there is no central server .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hubs

A

A network hub is a device that allows multiple computers to communicate with each other over a network meanwhile broadcast all incoming data to all active ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud computing

A

Clouds are giant servers placed around the world where you can store, edit and share information. Most companies today work on clouds as it is more efficient than small local servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VLAN

A

1) A virtual LAN is a network that covers a wide geographical area and connects computers as if they were in the same building
A VLAN allows a network of computers and users to communicate in a stimulated environment as if they exist in a single LAN.
This is usually used for companies that have multiple offices around the world but still need to be connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LAN

A

local area networkis computer network that connects computers in a limited area for example it could be a residence, school, office building, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAN

A

Ametropolitan area network(MAN) is a computernetworkthat interconnects users with computer resources in a geographicareaor region larger than that covered by even a large localarea network(LAN) but smaller than theareacovered by a widearea network(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WAN

A

WAN This is a network that covers a wide geographical area such as the internet .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WLAN

A

1) A wireless local area network is a network that covers a small geographical area, say one building but many if not all devices connected to each other through wireless communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

INTRANET

A

“Intra” means “internal” or “within,” so an Intranet is an internal or private network that can only be accessed within the confines of a company, university, or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CLOUD COMPUTING

A

Clouds are giant servers placed around the world where you can store, edit and share information. Most companies today work on clouds as it is more efficient than small local servers.

20
Q

Synchronous

A

Synchronous signals are sent and received at the same speed while asynchronous is the opposite. ex CHAT ROOMS

21
Q

Asynchronous

A

Asynchronous are sent and received at different times. An example of asynchronous communication could be emailed.

22
Q

BIT RATE

A

The number of bits that are encoded per second. It therefor shows the speed at which information can be transferred in a certain amount of time.

23
Q

SWITCH

A

A switch is a device used in networks that takes data and learns the connection of the machine and will send messages addressed to that machine specifically to there from them on with the help of the IP address .

24
Q

HUB

A

A hub is a devise use in networks .It takes data and sends to multiple ports because it cant destinguish which one to send.

25
Q

ROUTER

A

Each machine on the network is assigned a local Ip address and any information sent to the router is specifically sent to the machine on the ip address VIA WIRED OR WIRELESS SIGNALS

26
Q

EXTRANET

A

An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business’s information or operations with suppliers, vendors, partners, customers, or other businesses.

27
Q

ISP

A

Your Internet service provider is the company that provides you with your Internet connection. For example, your ISP may be Comcast, Time Warner, or whatever other company you’re paying each month.

28
Q

FIREWALL

A

Filters incoming and outgoing network traffic. Blocks all traffic that doesn’t meet set of rules.

29
Q

PHYSICAL SECURITY

A

It is used to secure networks so that unauthorized people can not hack or access any facilities. For example, you can have security guards and locks.

30
Q

ELECTRONIC SECURITY

A

It is used to secure networks so that unauthorized people can not hack or access any facilities. For example, you can have security guards and locks.

31
Q

NODES

A

Nodes are basically devices on a network.

32
Q

MODEM

A

A modem is a device that converts digital signals into analog signals to send over the cloud.

33
Q

INTERNET PROTOCOL

A

IP address help identify devices and the networks where they are located.

34
Q

NIC

A

Network Interface cards allows devices (computers) to connect to networks via wires or wireless signals.

35
Q

SPEED OF INTERNET

A

ALWAYS MEASURED IN BITS PER SECOND

36
Q

DATA TRANSFERRED OVER INTERNET

A

ALWAYS MEASURED IN BYTES

37
Q

BIT

A

Bit is the smallest information computer can understand , its either 0 or 1.

38
Q

BYTE

A

1 BYTE=1 BIT

39
Q

WIFI

A

A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area

40
Q

WIMAX

A

WiMAX is a wireless communications standard designed for creating metropolitan area networks (MANs).
• It is similar to theWi-Fistandard, but supports a far greater range of coverage.

41
Q

OPTICAL FIBER

A

Fiber-optic communicationis a method of transmitting information from one place to another by sending pulses oflightthrough anoptical fiber.

42
Q

VPN

A

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.

43
Q

INTERNET

A

TheInternetis the global system of interconnectedcomputer networksthat use theInternet protocol suite(TCP/IP) to link billions of devices worldwide.

44
Q

Define computer networks?

A

A computer network consists of two or more computers that are connected together. The main purpose of this connection is to share resources such as hardware, software and data.

45
Q

Why do we need to secure our networks?

A

It is necessary to secure our network because:
Nowadays we entrust much of our lives and livelihoods to computers
Computers and not entirely dependable, safe, or secure
This why, the major goal of computer network security is to lower the risk of having unauthorised access to our computers and/or information and protect valuable assets.
Computer network security is concerned with the protection of hardware, software, information system, data and network communicating channels.

46
Q

How are computer networks at risk?

A

Networks are vulnerable to failure and can face multiple threats. For example, failure of hardware might cause an alarm system to stop working, which might allow, for example, the unauthorised physical access to the server room. Also, threats can be caused by nature or by humans, such as a fire destroying the network or an intentional cyber attack by malicious individuals or groups such as hackers, cyber terrorists or state-supported spies and information warriors.

47
Q

What are the security measures needed to protect a network ?

A
Technical controls which include hardware and software controls (such as passwords, encryption, network protocols, firewalls, intrusion detection systems, network traffic flow regulator, biometrics).
Policies and procedures (agreements that advise people to act in a specific way such as laws, copyrights, contracts, and regulations).
Physical controls (guards, walls, security cameras, back up data).

Remember: The best security is the multi-layer security that includes multiple security measures at the same time.