TYPES OF NETWORK Flashcards

1
Q

Networking that uses cable and wires to connect devices.

A

Wired Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is one of the most popular forms of wired networking, connecting devices to a local area network (LAN) or the internet using cables (often CAT5e or CAT6). It provides dependable, fast connectivity.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fiber optic connections, which provide incredibly high capacity and long-distance communication, convey data via light signals. They are frequently used in data centers and for high-speed internet backbones.

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cable television and high-speed internet connections frequently employ coaxial wires. Their bandwidth and signal quality are both good.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to a computer network that makes use of Radio Frequency (RF) connections between nodes in the network.

A

Wireless Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices may connect wirelessly to the internet or a local network without the need for physical wires. In businesses, residences, and public spaces, it is extensively utilized.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A short-range wireless technology called Bluetooth is used to link items like headphones, keyboards, and cellphones.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Permits wireless short-range communication between devices, which is frequently used for data transmission and contactless payments.

A

NFC (Near Field Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These wireless communication protocols are intended for low-power, low-data-rate uses, such as Internet of Things (IoT) and smart homes.

A

Zigbee and Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network technologies including 3G, 4G LTE, and 5G give mobile devices wireless internet connection. Data speed and coverage areas vary between them.

A

Cellular Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet connection in remote or rural locations where wired or cellular networks would not be accessible is made possible by this technology, which makes use of satellites circling the Earth.

A

Satellite Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Devices connect with one another directly in P2P networks without the need of a central server. This kind of networking is frequently utilized for decentralized apps and file sharing.

A

Peer-to-Peer (P2P) Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Establish private, secure connections across a public network, often the internet. In order to provide remote access to private networks and safeguard the privacy of data, they are frequently utilized.

A

Virtual Private Networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Connecting to resources and services housed in the cloud includes cloud networking. It enables remote access to data and apps for both organizations and people.

A

Cloud Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A networking strategy that divides the data plane, which sends data packets, from the control plane, which controls network traffic. More flexibility and control over network resources are provided by it.

A

Software-Defined Networking (SDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machines, sensors, and control systems are connected via industrial networks in manufacturing and automation environments. Examples include Profibus, Modbus, and Ethernet/IP.

A

Industrial Networking

17
Q

Provide limited access to the public whereas intranets are internal networks that are only accessible by members of the company. They serve as a platform for cooperation and internal communication.

A

Intranet and Extranet

18
Q

Become increasingly important as our reliance on computers has grown. Understanding topics such as encryption, firewalls, and best practices for safe computing is critical for safeguarding personal and sensitive data.

A

Security and Privacy

19
Q

Refers to the policies and procedures used to guard against unwanted access, assaults, and damage to computer networks, systems, and data.

A

Cybersecurity

20
Q

Implementing firewalls to filter network traffic and prevent malicious access.

A
  • Firewalls
21
Q

Using antivirus programs to detect and remove malware.

A
  • Antivirus Software
22
Q

Encrypting sensitive data to make it unreadable to unauthorized users.

A
  • Encryption
23
Q

Implementing strong user authentication and authorization systems.

A
  • Access Controls
24
Q

Having plans in place to address and recover from security breaches.

A
  • Incident Response
25
Q

includes defending physical assets, data centers, and equipment from damage or theft in addition to protecting against digital threats.

A

Physical security

26
Q

Protecting the confidentiality, integrity, and availability of information, including trade secrets, customer data, and proprietary information.

A

Information Security

27
Q

Ensuring the safety of data during transmission across networks, preventing eavesdropping or data interception.

A

Network Security

28
Q

refers to individuals’ control over their personal information and how it is collected, used, shared, and stored by organizations and institutions.

A

Data privacy

29
Q

Obtaining explicit permission from individuals before collecting their data.

A

Consent

30
Q

Collecting only the necessary data and nothing more.

A

Data Minimization

31
Q

Informing individuals about data practices and policies.

A

Transparency

32
Q

Allowing individuals to access and correct their data.

A

Access and Correction

33
Q

Safeguarding data against breaches and unauthorized access.

A

Data Protection

34
Q

Concerns related to online activities, including browsing habits, social media usage, and online purchases. Online privacy tools like virtual private networks (VPNs) and browser privacy settings help protect online privacy.

A

Online Privacy

35
Q

The balance between government surveillance for security purposes and protecting citizens’ privacy rights is a complex issue that continues to evolve.

A

Surveillance and Government Privacy