TYPES OF NETWORK Flashcards

1
Q

Networking that uses cable and wires to connect devices.

A

Wired Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is one of the most popular forms of wired networking, connecting devices to a local area network (LAN) or the internet using cables (often CAT5e or CAT6). It provides dependable, fast connectivity.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fiber optic connections, which provide incredibly high capacity and long-distance communication, convey data via light signals. They are frequently used in data centers and for high-speed internet backbones.

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cable television and high-speed internet connections frequently employ coaxial wires. Their bandwidth and signal quality are both good.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to a computer network that makes use of Radio Frequency (RF) connections between nodes in the network.

A

Wireless Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices may connect wirelessly to the internet or a local network without the need for physical wires. In businesses, residences, and public spaces, it is extensively utilized.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A short-range wireless technology called Bluetooth is used to link items like headphones, keyboards, and cellphones.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Permits wireless short-range communication between devices, which is frequently used for data transmission and contactless payments.

A

NFC (Near Field Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These wireless communication protocols are intended for low-power, low-data-rate uses, such as Internet of Things (IoT) and smart homes.

A

Zigbee and Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network technologies including 3G, 4G LTE, and 5G give mobile devices wireless internet connection. Data speed and coverage areas vary between them.

A

Cellular Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet connection in remote or rural locations where wired or cellular networks would not be accessible is made possible by this technology, which makes use of satellites circling the Earth.

A

Satellite Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Devices connect with one another directly in P2P networks without the need of a central server. This kind of networking is frequently utilized for decentralized apps and file sharing.

A

Peer-to-Peer (P2P) Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Establish private, secure connections across a public network, often the internet. In order to provide remote access to private networks and safeguard the privacy of data, they are frequently utilized.

A

Virtual Private Networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Connecting to resources and services housed in the cloud includes cloud networking. It enables remote access to data and apps for both organizations and people.

A

Cloud Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A networking strategy that divides the data plane, which sends data packets, from the control plane, which controls network traffic. More flexibility and control over network resources are provided by it.

A

Software-Defined Networking (SDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machines, sensors, and control systems are connected via industrial networks in manufacturing and automation environments. Examples include Profibus, Modbus, and Ethernet/IP.

A

Industrial Networking

17
Q

Provide limited access to the public whereas intranets are internal networks that are only accessible by members of the company. They serve as a platform for cooperation and internal communication.

A

Intranet and Extranet

18
Q

Become increasingly important as our reliance on computers has grown. Understanding topics such as encryption, firewalls, and best practices for safe computing is critical for safeguarding personal and sensitive data.

A

Security and Privacy

19
Q

Refers to the policies and procedures used to guard against unwanted access, assaults, and damage to computer networks, systems, and data.

A

Cybersecurity

20
Q

Implementing firewalls to filter network traffic and prevent malicious access.

21
Q

Using antivirus programs to detect and remove malware.

A
  • Antivirus Software
22
Q

Encrypting sensitive data to make it unreadable to unauthorized users.

A
  • Encryption
23
Q

Implementing strong user authentication and authorization systems.

A
  • Access Controls
24
Q

Having plans in place to address and recover from security breaches.

A
  • Incident Response
25
includes defending physical assets, data centers, and equipment from damage or theft in addition to protecting against digital threats.
Physical security
26
Protecting the confidentiality, integrity, and availability of information, including trade secrets, customer data, and proprietary information.
Information Security
27
Ensuring the safety of data during transmission across networks, preventing eavesdropping or data interception.
Network Security
28
refers to individuals' control over their personal information and how it is collected, used, shared, and stored by organizations and institutions.
Data privacy
29
Obtaining explicit permission from individuals before collecting their data.
Consent
30
Collecting only the necessary data and nothing more.
Data Minimization
31
Informing individuals about data practices and policies.
Transparency
32
Allowing individuals to access and correct their data.
Access and Correction
33
Safeguarding data against breaches and unauthorized access.
Data Protection
34
Concerns related to online activities, including browsing habits, social media usage, and online purchases. Online privacy tools like virtual private networks (VPNs) and browser privacy settings help protect online privacy.
Online Privacy
35
The balance between government surveillance for security purposes and protecting citizens' privacy rights is a complex issue that continues to evolve.
Surveillance and Government Privacy