• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back

What is a router?

A device that connects a network to the internet.

Name the devices used to connect multiple devices and their difference.

A hub and a switch. A hub transmits data to all computers on the network whereas a switch only sends the data to the client making data flow more efficient and safe.

What is bus topology and what is the difference between it and star topology?

In a bus topology, devices are connected to one main cable in series and ends are terminated using terminators. In star topology all devices are connected to one central hub or switch.

What is the name given to the topology in which each device is connected to two others and the 'last' device is connected to the 'first.'

Ring topology.


Additionally to know, data flows in one direction in ring topology therefore normally crosses at least one device before reaching the client.

Mention an advantage and disadvantage of bus topology.

Advantages:


Cheap as only minimal cabling is necessary.


It is easy to add or remove devices.




Disadvantages:


One failure will cause the whole network to fail.


Not efficient as data flows both ways and can collide


Not fully safe as data travels through other computers before reaching client.

Mention one advantage and one disadvantage of star topology.

Advantages:


A device failure won't cause total failure (excluding the hub/switch)


Data is safe as only client accesses it and efficient as there is minimal traffic on each cable.


Easy to add extra devices




Disadvantages:


Lots of cable can mean it is expensive.


Heavy dependence on central device, if it fails the whole network fails.

Mention one advantage and one disadvantage of ring topology.

Advantages:


Efficient as data only flows one way and normally there is only one batch of data allowed at a time.




Disadvantages:


One failure can cause the whole network to fail.


Not safe since devices apart from the client can see data on its way to the client.

What is an IP address and what is its usual format in a simple LAN?

IP address stands for Internet Protocol. This is a unique number assigned to a device or network to allow data to get to the correct destination. A network will have an IP address, but devices will also have an IP address to specify them within the network itself.


On a LAN the IP address is usually: 192.168.0.x

What is a MAC address and what is the difference between it and an IP address?

A MAC address is a unique number to identify the correct device. The difference is: an IP address for a device can change but a MAC address is 'burned' into network hardware therefore as long as the same network hardware is used, the device will have the same MAC address forever.

What are protocols?

Different types of communication that use different rules. Examples include HTTP (HyperText Transfer Protocol) which is used for websites and POP3 (Post Office Protocol Version 3) which is used for emails and applications like Outlook.

What is the term given to pieces of data sent across a network?

Packets. These contain the address of the device and instructions on how to reassemble them. If a packet is lost then another one can be sent instead of the whole chunk of data.

How does a password provide security?

It requires the owner or whoever has rights to the data or resource to be able to remember or store a string to access it. No one else should have access to this string therefore securing it for the intended client.

Explain user access levels.

These are rules that provide different abilities or privileges according to what type of user they are. For example, in a school students would be able to access basics such as the internet, certain file storage etc. Teachers on the other hand have the ability to control other computers and edit another's data as responsible.

What is encryption and how does it protect?

Encryption is a method in which data is changed to a format in which would not make sense or be of use to a user or computer without the algorithm with which it was made. This algorithm can be called the key. This means that without the key a hacker for example won't be able to use or understand the data even if they have accessed it. A computer with the key would be able to decrypt it and use the data.

What is acceptable use?

This is a policy, normally used in businesses and schools, which sets rules for users. For example, a worker may not access or edit another person's work without their permission.

What is the difference between backup and archive?

A backup is when a copy of the data is stored elsewhere safely so that in the case that the original is damaged or lost then the backup can be used to restore the data. On the other hand an archive is when data that is not used currently, but may be of use in the future is stored in a storage space that is not important. This data can then be taken if needed in the future.

What is a failover and what is disaster recovery?

A failover is a secondary device that will takeover and assume the primary device's role if the primary is to fail. Disaster recovery however is a policy of how a resource or data will be kept available in the event of a disaster such as flooding, earthquake or any other damage to the machines providing the data or resource.