Networks Flashcards

1
Q

What is the purpose of a Router

A
  1. Stores IP addresses of devices connected to it.
  2. Reads the packet header
  3. Takes the recipient address
  4. Compares it against other addresses stored in the routing table.
  5. Sends data packet to the device with destination address
  6. Using the quickest route.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are firewalls available in mobile devices

A

NO!!!!!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requirements to connect to the Internet

A
  1. ISP
  2. IP address
  3. Web Browser
  4. Router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Intranet

A

This is a network that uses internet protocols and is owned by a private organization. It can also only be accessed by authorized individuals of that particular organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages and Disadvantages of Virtual Meetings over face-to-face.

A

Advantages:
+ Meetings can be held in short notice
+ People do not have to travel, reducing travelling time.
+ People do not have to travel, reducing travelling costs and rent costs for meeting space.

Disadvantages:

  • Can be affected by technical difficulties like : loss of internet connection
  • Cannot share physical documents and sign them.
  • Can get distracted because it is online
  • Reduces face-to-face interaction, which makes the meetings less interactive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Components of a wired or wireless network

A
  1. Cables (ethernet, Fiber Optic)
  2. WAP (Wireless Access Points)
  3. Switch
  4. Gateway
  5. Router
  6. Booster
  7. Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Factors needed for users to connect to and use the Internet

A
  1. ISP
  2. Search Engine
  3. Web Browser
  4. Filter Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages and Disadvantages of using a LAN network

A

Advantages:
+ Shared access to peripherals, reducing costs of peripherals.
+ Shared access to storage
+ Shared access to the Internet, reducing the need to get internet service for each and every computer.
+ Can easily communicate with each other on the network, using : Instant Messaging, email software

Disadvantages:

  • Expensive to set up
  • Can affect all devices connected in the network, if one device in the network gets affected by malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the features of a network operating system

A
  1. Ability to send usernames and passwords to authentication server for authentication
  2. Ability to share network resources like : shared peripherals or shared storage
  3. Ability to separate user accounts to stop users from using other’s data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a MAC address

A

This is a universally unique identifier that is given to the NIC of a device by the NIC manufacturer.

MAC addresses are used to connected devices to networks that use ethernet, Wi-Fi or blue tooth.

A MAC address is made out of 6 pairs of hexadecimal letters. The first 3 pairs are to uniquely identify the NIC manufacturer and the last 3 pairs are to uniquely identify the NIC of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the uses of a MAC address

A
  1. Restricting or allowing devices into a network using MAC address filtering in a firewall to only allow whitelisted MAC addresses to enter into the network.
  2. Identifying a device on a network, which is used by hotspots to see what devices are trying to go over the limit of time.
  3. MAC addresses can be used to track devices on a network by seeing which devices are using which WAP in the network, using their MAC address.
  4. They can also be used to assign a static or dynamic IP address because devices do not have an IP address without connecting to the Network, but they do have a MAC address. Therefore, to uniquely identify the device to the DHCP server or network admin, it uses a MAC address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Hotspot

A

A place in a building with a computer system that has an access point that allows people with a wireless computer or blue-tooth enabled mobile phones to connect to it and use services like the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are device names not used for data transmission

A

Because device names are not unique in the network. Therefore, this can cause file conflicts and network traffic collision, causing corruption of files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are servers

A

Servers are types of computers that can connect to a network and have their resources shared with other client computers and provide services to them. Ex: shared printers, shared file access, shared applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of servers

A
  1. Applications servers
  2. File servers
  3. Print servers
  4. Web servers
  5. Authentication servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ISPs

A

ISP stands for Internet Service Provider. These companies provide access to the telecommunications infrastructure that proms the framework for the Internet.

Commercial ISPs can charge the user with a fee in order to provide internet access.

But some ISPs do not charge fees to the user as part of community scheme. Ex : in malls, in parks.

17
Q

What are web browsers

A

These are types of software that allow the user to access content and webpages stored in web servers connected to the Internet.

They also allow the user to connect to other systems connected to the Internet but not connected to the www. Ex: ftp servers.

18
Q

How does a search engine work

A

A search engine compares the keywords that a user has entered to database of website URLs and content and returns the user with the most relevant websites.

19
Q

How does filter software work

A

When a user tries to access a website. The URL of the website is compared against a black list and a white list. If the website URL is in the black list, the user is denied access to the website. If the website URL is in the whitelist, the user is granted access to the website.

20
Q

What are the advantages of client server networks

A
  1. Control of user access rights:
    - Network administrators are able to allow users to access certain resources in the network Ex: networked printers, and prevent them from accessing other resources. Ex: administrative files.
  2. Centralized administration:
    - This means that accounts and administration can be managed centrally by a network administrator, ensuring that support is provided by people who have an overview of the network and not by people who do not, causing problems for themselves and others.
  3. Centralized backup:
    - This allows backups to be automated, making sure that backups are more likely to occur than if a human was requested to do the backup.
  4. Roaming profiles:
    - This is when users are able to log into the network from any computer and see their settings, files and programs. This means that users are able to use any client computer connected to the Network.
  5. shared storage:
    - This allows users to access data that can be stored centrally and accessed by people in the network. File permissions can also be set to allow users to read only or read and write to individual files, folders or drives.
21
Q

How do you secure data on a network, including the network

A
  1. Logins and passwords
  2. Firewalls
  3. Encryption
  4. WEP / WPA
  5. VPN
  6. Transaction logs
  7. Backups
  8. File Access Rights
22
Q

What are data packets

A

A unit of data packaged to travel across the network

23
Q

What are the uses of a VPN

A
  1. To connect to office network using a secure connection, when working from home.
  2. For secure payments
  3. To access geo-restricted content.
  4. Prevent surveillance of browsing activity
24
Q

How can teachers and students use intranets

A

Teachers:

  • To access and update student’s data
  • To share educational resources with other teacher and students
  • To update notice boards with new events
  • For administration of students

Students:

  • Access data that has been uploaded by teachers
  • Download and submit assignments.
  • Area to access notice boards.
25
Q

What are the precautions that someone can take in order to protect their password.

A
  1. Do not tell anyone your password
  2. Do not write down your password
  3. Change you password regularly
  4. Do not click on remember my password
  5. Don’t use the same password in multiple accounts.
26
Q

What are the advantages and disadvantages of using Fiber Optic Cables

A

Advantages:
+ They can carry data faster than normal copper cables.
+ They can carry data at a longer range than copper cables without signal loss
+ They are more reliable and more stable because they are less affected by interference than copper cables.

Disadvantages:

  • Very expensive to purchase
  • Less durable compared to copper cabling
  • Difficult to install
27
Q

What is the meaning of Authenticate

A

This is the process to verify that a person is permitted to enter a particular network or an organized event

28
Q

Ways of reducing the spread of viruses

A
  1. Do not download any attachments from senders of emails that you do not trust.
  2. Do not download any software from untrustworthy sites.
  3. Do not insert any portable storage device given to you by strangers into digital devices.
  4. Install hardware and software firewalls.
  5. Enable browser security
29
Q

How does a network enable users to work together on a certain projects

A
  1. By storing data in a central location that is accessible by everyone.
  2. Having access to the same software version to avoid any compatibility issues.
  3. Can use team working software to manage multiple access.
  4. Can use network messaging systems to provide comments securely.
30
Q

How to check if a website is secure

A
  1. Check if the Website URL starts with HTTPS
  2. Check if there is a locked green padlock
  3. Check if the website URL matches the expectations.
31
Q

What is geo-location rights management

A

This is when the user’s location is used to restrict the user’s access to certain services available online.