Section 4: Computer Networks Flashcards

1
Q

Describe a router and its purpose

A

A router is a network device that connects together two or more networks.
It’s usually used to join a home or business network (LAN) to the Internet (WAN).
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to computers on the LAN.
The LAN connection might be wireless (WiFi), making the device a wireless router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the use of WIFI in networks

A

+Uses radio signals (WiFi) to connect computers instead of cables.
+At the centre of the WLAN is a wireless switch or router used for sending and receiving data to the computers.
+WLANs are more difficult to make secure since other people can also try to connect to the wireless network.
–> Use passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the use of Bluetooth in networks

A

+Bluetooth is a wireless networking technology designed for very short-range connections
+ Get rid of all cables and peripherals
+Bluetooth devices contain small, low-power radio transmitters and receivers. When devices are in range of other Bluetooth devices, they detect each other and can be ‘paired’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define LAN

A

Local Area Network (LAN) is a network confined to one building or site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how to set up a small network

A

Buying hardware:
+ Switches / hubs - to link devices together
+Network cables to connect devices to the switch, etc.
+A separate wireless access point to allow wireless devices to join the network
+A router to connect your LAN to the Internet (WAN)
+A firewall to protect your network from hackers
+Server(s) to manage network functions such as network security, network file storage, shared resources (such as printers)
Organise:
+Set up an account with an Internet Service Provider (ISP)
+Get an Internet connection installed from the ISP to your location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is user ID and Password? What is their purpose?

A

-It’s the most common way of data protection.
This method identifies you as an authorised user.
User ID is the name of your account, password is the secret code that only the user knows.
–> Reduce the risks of outsiders getting into the system.
-A password is a set of secret numbers and/or letters which match with a username to grant access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define WAN and give characteristics

A

Wide Area Network (WAN) is a network that extends over a large area.
A WAN is often created by joining several LANs together
eg: The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Wireless Local Area Network and give characteristics

A

A wireless LAN (WLAN) is a LAN that uses radio signals (WiFi) to connect computers instead of cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe characteristics and common use of Intranet

A

Private Network that provide similar services to the Internet.
Used for:
+ Viewing internal web pages.
+ Emailing and instant messages between people within a group.
+ Sharing internal documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Internet? Why do we use it?

A
The Internet is made up of millions networks brought together, forming a vast "inter-network". 
Used to:
\+ View webpages on WWW
\+ Shari files.
\+ Emails
\+ Listen to streamed music/video
\+ Play interactive games
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a hub?

A

Hub is a hardware devices that connects multiple computers together to share data packages to make a LAN.
When it receives a message, it send data to any other computers in the network –> not secure.
Used in the center of a Star network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a switch?

A

A device that connects computers together to make a LAN.
More intelligent than the hub because when it receives a message, it addresses the recipient and send it to the specific computer –> more secure but more $

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a bridge?

A

A network device that links two different parts of a LAN. ( links 2 networks not 2 computers)
Different from router since router links LAN to a WAN, Bridge only connects 2 LANs to make it act as a single LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a proxy servers?

A

A computer setup to share resource, usually an Internet connection.
Computer visit web pages –> proxy server –> ISP –> web pages.
Usually used instead of router because we can add additional software like antivirus, web filtering…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is encryption?

A

Encryption is the process of converting information into a form that is meaningless to anyone except holders of a ‘key’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the advantages and disadvantages of common networks, such as Internet

A

Pros:

  • For many people in the modern day world the internet has replaced all other research methods.
  • Allowing that you own a credit card, you can buy or sell virtually anything, or book tickets onlines.
  • There are countless methods of communicating through common networks: Blogs, social networkings…
  • Over the internet you can share programs, downloads, files and software.

Cons:

  • To access the internet or any other common network you need the proper resources. –> COSTLY
  • If you go ‘shopping’ online there’s a possibility that your credit card number could get in the wrong hands. Personal info can be stolen and accessed unauthorisedly.
  • Spam continues to be a problem on the internet and is slowly increasing. You become vulnerable to hackers and virus’ can be spread, putting you computer at great risk.
17
Q

Some features of email?

A

Electronic mail or email is a means of sending messages, text, and computer files between computers via the Internet.
Messages are sent digitally from one person to another.
Each email user has an unique address

18
Q

Define and describe a fax machine

A
  • A fax Literally makes a copy of your documents and send it to the receiver as a hard copy.
  • Each fax has a telephone number
19
Q

Ad/disad of email

A
Ad:
- Little training needed
- Free to send
- Images can be attached
- Usually received very quickly 
Dis:
- Spamming ( 2/3 of all mails)
- Viruses 
- Email scams 
- Must have access to Internet
20
Q

Ad/disad of fax machine

A

Ad:
- As long as it’s switched on, the messages can be sent
- Inexpensive
- Allow extract copies of a handwritten information to be transmitted without it being prepared in a special way
- Little training
Disad:
- Dial wrong number -> Wrong recipients.
- Have same telephone number as telephone -> When it’s in use you cant use the telephone
- Quality is often poor

21
Q

Define and describe tele/video conferencing

A

Allow people in different locations can talk and see each other’s live images
Need the applications, an User ID to create a group

22
Q

Ad/disads of video conferencing

A

Ad:
- No need to spend money and time to travelling
- View each other at the same time -> Contribute and give out ideas just like a FACE TO FACE conference
- Excellent way of keeping in touch with the family
Disad:
- Even w/ fast internet connection, -> still a slight delay between responses.
- Hardware breaks down, can’t attend the meeting
-Different time zone -> inconvenient -> stay up late, wake up early ..

23
Q

Why is security needed?

A

It ensures privacy, data integrity and preventing computer crimes

24
Q

Physical safeguards

A
  • Access control: Lock the ICT room using codes, srtipe cards -> Only those who are allowed can enter
  • Access monitoring: CCTV cameras
  • Data security: Regular backups (mayb in another location)
  • Protect hardware from fire, floods, disasters and THEFTS
25
Q

Software safeguards

A
  • USernames and passwords
  • Access permission: Access limited to the minimum number of ppl who need it.
  • File-level passwords
  • Virus scanner
  • Firewall
  • Transaction logs -> track alterations to the ICT systems
  • Data encryption