Topic 1 Flashcards

1
Q

What is a server?

A

Servers are computers that provide information to end devices.

Servers respond to requests from clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the Client - Server relationship.

A

Clients are computers that send requests to the servers to retrieve information.

This relationship is fundamental to network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an end device?

A

End devices are where a message originates from or where it is received.

Examples include computers, laptops, and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three examples of end devices.

A
  • Computers
  • Laptops
  • Printers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two functions of an intermediary network device?

A
  • Connect end devices to the network
  • Determine the path that the messages take through the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some examples of intermediary devices you must pass through to access the internet.

A
  • Router
  • LAN switches
  • Wireless routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the first type of transmission media used by networks.

A

Metal wires within cables: Data is encoded in electrical impulses.

This type of media is commonly used in traditional wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the second type of transmission media used by networks.

A

Fiber-optic cable: Data is encoded into pulses of light.

Fiber-optic cables provide high-speed data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the third type of transmission media used by networks.

A

Wireless transmission: Data is encoded through specific frequencies of electromagnetic waves.

This allows for mobility and flexibility in network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is physical topology?

A

Diagrams illustrate the physical location of intermediary devices and cable installation.

It focuses on the physical layout of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is logical topology?

A

Diagrams illustrate devices, ports, and the addressing scheme of the network.

It focuses on how data flows within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the Internet.

A

Worldwide collection of interconnected LAN’s and WAN’s.

The Internet enables global communication and data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an intranet?

A

A private collection of LAN’s and WAN’s accessible only to the organization’s members or others with authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an extranet?

A

Provides secure access for individuals who work for a different organization that need access to data on their networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List six Internet access technologies used for home/small office.

A
  • FTTP/FTTH
  • Cable
  • DSL
  • Cellular
  • Satellite
  • Dial-up telephone
17
Q

What is the difference between a traditional dedicated network and a converged network?

A

Traditional networks use different technologies with different set of rules and standards; converged networks deliver data, voice, and video over the same infrastructure using the same set of rules and standards.

18
Q

List three characteristics of a Fault Tolerant Network.

A
  • Redundancy
  • Limits the impact of failure
  • Fault detection and monitoring
19
Q

How is QoS used to make congested networks more efficient?

A

It ensures that priorities are matched with the type of communication and its importance to the organization and manages the flow of data and voice traffic.

20
Q

What are the three goals of network data security?

A
  • Confidentiality: only intended recipients can read the data
  • Integrity: assurance that the data has not been altered during transmission
  • Availability: assurance of timely and reliable access to data for authorized users