Section 4 Flashcards

1
Q

What is a computer network?

A

Two or more computing devices connected together in order to share resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give 3 advantages of computing networks

A

Share hardware eg. printers
Share software and software is likely to be cheaper (licences)
Easier to communicate
Data can be backed up on a server
Easy to share files
Security is good - users cannot see others’ files unlike on stand-alone machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 3 disadvantages of computer networks.

A

Purchasing the network cabling and file servers can be expensive.
Viruses can spread to other computers throughout a computer network
Managing a large network is complicated, requires training and a network manager usually needs to be employed.
If the file server breaks down, the files on the file server become inaccessible.
Danger of hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a LAN (Local Area Network)?

A

A network that covers a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a WAN (Wide Area Network)?

A

A network that covers a large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give 2 examples of a LAN (Local Area Network).

A

Examples of a LAN include; School network, router, local CCTV system. The hardware is typically privately owned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give 2 examples of a WAN (Wide Area Network).

A

Examples of a WAN include; the internet, ATM, mobile-phone network, GOS (Satnav). The biggest WAN in the world is the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are protocols?

A

Protocols deal with the rules that define how data is transmitted over a network. They ensure a standard, consistent functionality that allows the client and the server to understand each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a HTTP (Hypertext Transfer Protocol)?

A

Used to view a website using a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SMTP (Simple Mail Transfer Protocol)?

A

Used to send an e-mail from one mail server to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does IMAP stand for?

A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does FTP stand for?

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a IMAP (Internet Message Access Protocol)?

A

Used to download an e-mail to your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a FTP (File Transfer Protocol)?

A

Used to transmit a file from a client to a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Network topology?

A

The structure of the way that separate devices (nodes) are connected.
A network can be connected with wires, optical fibre or wirelessly, so that separate devices (also known as nodes) can communicate with one another and transfer data. The structure of the way the nodes are connect is called network topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the 4 types of network topology.

A

Bus, Ring, Star, Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Give a pro and a con of a bus topology.

A

Pros: Cheap and easy to install
Cons: Performance suffers as you add PCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give a pro and a con of a Ring topology.

A

Pros: Fast
Cons: If one line breaks, the whole network is affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give a pro and a con of a star topology.

A

Pros: Fast
Cons: Needs a lot of cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give a pro and a con if a mesh topology.

A

Pros: Has most redundancy
Cons: Expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the Internet?

A

A global computer network that connects networks and individual computers, and uses standardised communication protocols and data packets to provide a variety of information and communication facilities. It is a public network with open access. A web browser (e.g. Chrome) allows you to find and view websites on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the intranet?

A

Intranets operate in a similar way to the internet and although they are still networks, they are usually private and are used to send information securely and safely. Unlike the internet which is a global network accessible by all, access to an organisation’s intranet is restricted and only accessible to authorised users such as employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the Extranet?

A

An extranet is a private intranet that also allows access by selected parties that reside outside of the organisation. These parties, for example, may be customers, key stakeholders or clients. External users will have an authorisation level once they have successfully logged in which will determine which resources they may access. An example at a school could be parents being allowed access to a certain area to see their child’s reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Give 3 similarities between Internet/ intranet/ extranet.

A

They all use web-based technologies
They allow users to access information remotely
They all use client server architecture
They all use security measures such as authentication and encryption
They all promote and facilitate information and resource sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Give 3 differences between Internet/ intranet/ extranet.

A

The internet is a global network whereas an intranet/ extranet is a private network contained within an organisation.
The use of the internet covers a wide range of purposes whereas an intranet/ extranet is designed for specific users and purposes.
Much of the information is publicly available whereas an intranet/ extranet is not.
The internet is not owned solely by one person or organisation whereas intranets/ extranets are owned usually by the organisation.

30
Q

Name 5 network hardwares.

A

Hub
Switch
Routers
Bridge
Gateway
Modem
Repeater
Access Point

31
Q

What is a hub?

A

Hubs are simple devices to join computers in a network together.

32
Q

What is a switch?

A

Switches are like hubs but they are a bit more intelligent.

33
Q

What is a router?

A

Routers are several wires or wireless networks together.

34
Q

What is a bridge?

A

Connects two different LANs together

35
Q

What is a Gateway?

A

Allows a LAN to connect to other LANs to form a WAN.

36
Q

What is a modem?

A

Connects networks to the internet, but via a telephone line (making them largely obsolete).

37
Q

What is a repeater?

A

Amplifies or regenerates the signal it receives before transmitting it so it can travel longer distances.

38
Q

What is an access point?

A

Allows networked devices to join the wireless network.

39
Q

Cyber-security hackers do what?

A

They hijack a computer system, which can lead to data and information being stolen.

40
Q

What is Malware (malicious software)?

A

Installed on a computer system and collects information about users without their knowledge.

41
Q

Give 3 types of malware.

A

Rootkit
Spyware
Trojan horse
Virus
Worms

42
Q

What is a rootkit?

A

Designed to remotely access or control a computer system without being detected.

43
Q

What is spyware?

A

Hidden from the user and difficult to detect. It is often secretly installed on a user’s PC without their knowledge.

44
Q

What is a Trojan horse?

A

A stand-alone malicious program designed to give full control of an infected PC to another PC.

45
Q

What is a virus?

A

A program that replicates itself and spreads from computer to computer.

46
Q

What are worms?

A

A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole.

47
Q

A hacker is someone who…

A

… manages to gain access to a computer system without permission.
They’ll identify any weaknesses in the network’s security and exploit them.

48
Q

When a hacker finds a weakly protected IP address, they can…

A

… gain access to the network using the digital address of one of the workstations.

49
Q

What is packet sniffing used for?

A

Monitoring network traffic. It intercepts and logs traffic through the host’s computer network interface and then analyses it.

50
Q

Do packet sniffers work on wires or wireless networks?

A

They work on BOTH wired and wireless.

51
Q

Network managers use the information that packet sniffing produces to…

A

… manage the network e.g. to diagnose performance problems.

52
Q

What can hackers use packet sniffing for?

A

Spying on traffic flowing within the system.

53
Q

Connectivity includes…

A

any interface for the transmission of data, either through wired or wireless communications.

54
Q

What are the numbers for WIFI?

A

802.11

55
Q

What are the numbers for Bluetooth?

A

802.15.1

56
Q

What is WIFI?

A

A communication technology that makes use of radio waves in order to connect to a LAN.

57
Q

What is Bluetooth?

A

A type of radio communication and networking protocol combined. Devices close to each other can exchange data without the need for a physical connection.

58
Q

Give an example of Bluetooth

A

Hands-free driving
Wireless headphones/ speakers

59
Q

Give an example of WIFI:

A

Connecting wireless devices to a network
Connecting to the internet

60
Q

What is 3G (Medium range wireless connection)?

A

Transfers signals over a network of phone towers, before being transmitted to the phone by the nearest tower.

61
Q

What is 4G (Medium range wireless connection)?

A

Works in a similar way to 3G. But, data transfer is much quicker. Download speeds and browsing is much better.

62
Q

What is 5G (Medium range wireless connection)?

A

The fifth generation of cellular technology. Works in the same way as previous versions, and is even faster with the promise of stable downloads, streaming and connectivity.

63
Q

Give two examples of long range wireless connections.

A

Microwaves
Satellite

64
Q

How do microwaves work?

A

Use high frequency beams of radio waves to transmit data between locations up to several miles apart as long as there are no obstacles to reflect of absorb the beam.
It provides high-speed wireless connection and sends signals between satellites around the Earth.

65
Q

How do satellites work?

A

Used to transmit program video, voice or data signals almost anywhere on Earth, no matter how remote the location. There is a line of sight propagation path from a ground station to the communication satellite (called an uplink) and down to a ground station (called a downlink).

66
Q

Give 4 cable connections

A

Ethernet
USB
Micro USB
USB-C

67
Q

What is Ethernet?

A

A way of physically connecting computer and other network devices on a LAN.

68
Q

Why is Ethernet good?

A

Reliable and fast method of data transmission and is well-suited for fixed networks rather than mobile devices.

69
Q

Give 3 examples of USB;

A

Mice
Keyboards
Printers
Scanners
Media devices
External hard drives
Flash drives

70
Q

Micro USB is used with devices such as… (give 2)

A

Digital cameras
GPS devices
Video game controllers

71
Q

Describe Micro USB shape?

A

Smaller than standard USB with a round top and a flat bottom.

72
Q

USB-C connections aren’t as common as USBs, but they are already used in slim laptops, android phones and video games controllers. They are likely to become the normal within…

A

5-10 years