S5 Networks Flashcards

1
Q

What is a computer network?

A

A group of interconnected computers that can share data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of using a computer network?

A

-Resource Sharing, such as printers and files.
-Rapid sharing and updating of data.
-Reduces the need for duplicate hardware and software, cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the disadvantages of using a computer network?

A

-Security Risks: Increased vulnerability to hacking and data breaches.
- Maintenance Costs: Ongoing costs for network maintenance and updates.
- Dependency: Reliance on the network can lead to disruptions if the network fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the main types of computer network.

A

The main types are: Personal Area Network (PAN): Covers a small area, typically within a single person’s workspace, using Bluetooth. Local Area Network (LAN): Covers a small geographical area, like a school or office, and is often owned by a single organization. Wide Area Network (WAN): Covers a large geographical area, such as a city or country, and includes the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between wired and wireless networks?

A

Wired networks use physical cables (e.g., Ethernet cables) to connect devices, offering faster and more reliable connections. Wireless networks use radio waves to connect devices, providing more flexibility and ease of access but potentially lower speeds and higher security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of wireless networks compared to wired networks?

A

Advantages of wireless networks: Flexibility: Devices can be moved around without losing connection. Ease of installation: No need for extensive cabling, which can be more convenient. Accessibility: Can easily connect multiple devices, making it ideal for public areas or homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of wireless networks compared to wired networks?

A

Disadvantages of wireless networks: Security: Wireless networks are more susceptible to hacking and unauthorized access. Interference: Other devices or physical obstructions can cause signal interference. Speed and Reliability: Generally, wireless connections can be slower and less reliable than wired ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network topology?

A

A network topology is the arrangement of different elements (nodes, links, etc.) in a computer network. Common topologies include star, bus, and ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the star topology.

A

In a star topology, all nodes are connected to a central hub. If one connection fails, it doesn’t affect the rest of the network. It’s easy to manage and troubleshoot but requires more cabling and a central hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the pros and cons of star topology?

A

Pros: Easy to install and manage. Failure of one node doesn’t affect the rest of the network. Good performance with many devices. Cons: If the central hub fails, the whole network is affected. Requires more cabling than some other topologies, which can be expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the bus topology.

A

In a bus topology, all devices share a single central cable, called the bus or backbone. Data sent from one device travels along the bus until it reaches its destination. It’s easy to set up but can be slow and difficult to troubleshoot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the pros and cons of bus topology?

A

Pros: Easy to install and extend. Requires less cabling than star topology. Cons: If the central bus fails, the whole network is affected. Can be difficult to troubleshoot. Performance issues with heavy traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a network protocol?

A

A network protocol is a set of rules and conventions for communication between network devices. Examples include Ethernet, Wi-Fi, TCP/IP, HTTP, and FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of network security?

A

Network security aims to protect data and resources from unauthorized access, misuse, or theft. Methods include authentication, encryption, firewalls, and MAC address filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do we need network security?

A

We need network security to: Protect sensitive information from unauthorized access and breaches. Ensure the integrity of data, preventing unauthorized modifications. Maintain the availability of network services, preventing disruptions from attacks. Safeguard personal and financial information, reducing the risk of identity theft and fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the methods of network security?

A

Authentication: Verifies the identity of users before allowing access to the network. Methods include passwords, biometrics, and two-factor authentication. Encryption: Converts data into a code to prevent unauthorized access. Firewalls: Monitors and controls incoming and outgoing network traffic based on predetermined security rules. MAC Address Filtering: Controls access to the network by specifying which devices are allowed to connect based on their unique MAC addresses. Intrusion Detection Systems (IDS): Monitors network traffic for suspicious activity and alerts administrators of potential threats. Virtual Private Networks (VPNs): Creates a secure connection over the internet, allowing remote users to access the network securely.

17
Q

What is encryption?

A

Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that even if data is intercepted, it cannot be read without the decryption key.

18
Q

What is a firewall?

A

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to block unauthorized access while permitting legitimate communications.

19
Q

What is a MAC address?

A

A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communications on the physical network segment. It’s used to identify devices within a network.

20
Q

What is the difference between TCP and UDP?

A

TCP (Transmission Control Protocol) is connection-oriented and ensures reliable data transmission with error-checking and retransmission of lost packets. UDP (User Datagram Protocol) is connectionless and does not guarantee delivery, making it faster but less reliable.

21
Q

What is HTTP and HTTPS?

A

HTTP (Hypertext Transfer Protocol) is used for transmitting web pages on the internet. HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP that includes encryption for secure communication.

22
Q

What is Ethernet and its purpose?

A

Ethernet is a widely used network technology for wired networks. It connects devices in a LAN using cables and provides reliable, high-speed data transfer.

23
Q

What is Wi-Fi and its purpose?

A

Wi-Fi is a technology that allows devices to connect to a network wirelessly using radio waves. It’s commonly used in homes, offices, and public places to provide internet access without physical cables.

24
Q

What is TCP and its purpose?

A

TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol used for transmitting data over a network. It ensures data is delivered accurately and in order, by establishing a connection and checking for errors.

25
Q

What is UDP and its purpose?

A

UDP (User Datagram Protocol) is a connectionless protocol used for transmitting data where speed is critical, such as in video streaming or online gaming. It does not guarantee delivery, making it faster but less reliable than TCP.

26
Q

What is IP and its purpose?

A

IP (Internet Protocol) is responsible for addressing and routing data packets between devices on a network. It ensures that data sent from one device reaches the correct destination.

27
Q

What is FTP and its purpose?

A

FTP (File Transfer Protocol) is used to transfer files between a client and a server over a network. It’s commonly used for uploading and downloading files to and from websites and servers.

28
Q

What is SMTP and its purpose?

A

SMTP (Simple Mail Transfer Protocol) is used for sending emails between servers. It’s the protocol responsible for the transmission of outgoing email messages.

29
Q

What is IMAP and its purpose?

A

IMAP (Internet Message Access Protocol) is used for accessing and managing emails on a server. It allows users to view and organize their emails without downloading them, keeping messages stored on the server.