2017 Final Exam Flashcards

1
Q

Expand and describe the following type of networks.
i. LAN [2 marks]
ii. WLAN [2 marks]
iii. MAN
iv. WAN

A

-Local area network. a wired network that consists of a switch and network devices in limited geographical area.

-Wireless local area network. connects multiple wireless devices an uses an access point.

-Metropolitan area network. a network that spans a city.

-wide area network. a network that spans a large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Differentiate Peer-to-peer and client/server networks

A

In a client/server network, clients request and servers provide. Think of it like a restaurant - you (client) order (request) and the kitchen (server) prepares your food.

In a peer-to-peer network, all devices act as both clients and servers, sharing resources directly. Imagine classmates sharing files directly with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differentiate Bandwidth and Latency.

A

Bandwidth is like the size of a pipe - how much data can flow through at once.

Latency is the speed of the water in the pipe - how long it takes for data to travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A physical topology defines the way in which computers, printers, and other devices are
connected to a network. Discuss the following LAN physical technologies.
i. Bus [3 marks]
ii. Ring [3 marks]
iii. Star

A

i. Bus: Think Christmas lights - all devices on one cable, failure at one point can disrupt the whole network.

ii. Ring: Devices in a closed loop, data travels in one direction, failure of one device can break the entire ring.

iii. Star: Devices connect to a central hub/switch, failure of one device doesn’t affect others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Virtual Private Network (VPN)

A

– A method of
connecting to a network such as a company
network across an unsecure network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give two examples of where VPN technology should be used?

A

Public Wi-Fi: Use a VPN on public Wi-Fi to encrypt your internet traffic and protect your data from snooping.

Remote Work: Use a VPN for secure remote access to a company network, allowing you to access files and resources as if you were in the office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

i. List three (3) types of printers that you know.
State at least one (1) advantage and one (1) disadvantages of each type of printers from
part (ii)

A

Three types of printers:

Inkjet - Good for photos, affordable, lower print volume.

Laser - Faster printing, higher print volume, toner expensive.

3D printer. 3D printers allow for creating complex and custom objects with design freedom.
3D printing can be slow and the materials used can be expensive compared to traditional printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State three tools that are used for printer performance optimisation.

A

Print Spooler Settings

Print Driver Updates

Print Monitoring Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile devices use touchscreens to allow users to physically interact with the screen and
type on a virtual keyboard. List and describe the two types of touch screens available.
[6 marks

A

Resistive: Imagine two thin layers touching - needs pressure to register a touch. Works with various objects (stylus, gloves). Downside: Less responsive and clear.

Capacitive: Think responding to your finger’s electricity. Offers smoother touch and sharper image. Downside: May not work with styluses or wet fingers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List any three (3) mobile device parts that are field-replaceable.

A

Battery , simcard and microSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State any four (4) advantages of using of using Flash memory storage (SSD)

A

Faster loading, boot times.
More durable, shock resistant.
Better battery life.
Quieter operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Overclocking?

A

Overclocking is pushing a computer component (like CPU) to run faster than its designed speed, for potentially better performance at the risk of instability or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List three components that when building or assembling a computer should have the
same form factor

A

Case
Motherboard
Power Supply (PSU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ElectroStatic Discharge (ESD?

A

Quick flow of electricity when two objects touch with different charges. Damages electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List any three (3) ways in which one can prevent Electrostatic discharge (ESD) Damage.

A

Ground yourself: Touch metal or wear a strap to zap yourself, not your PC parts!
Anti-static zone: Use mats & bags to prevent static from building up in the first place.
Careful handling: Avoid touching delicate parts directly - they’re ESD magnets!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List two (2) connectors used to connect external peripherals to a PC.

A

USB , HDMI

17
Q

Describe the functions of the following networks devices:
i. Switch [2 marks]
ii. Router [2 marks]
iii. Wireless Access Point

A

A switch - Ethernet switches record MAC addresses for each device
connected to the switch. Directs data traffic to the specific device it’s meant for.

Router - connetcts networks. Use an IP address to forward traffic to other networks.

Wireless Access Point- provide
access to a wireless network for a limited
range.

18
Q

Define a Repeater.

A

aka an extender. they regenerate the signal so it can be sent further.

19
Q

Define a Hub.

A

receives data on one port and sends to all other ports.

20
Q

Define a bridge

A

divides a network into two or more segments and tracks which device is on each segment.

20
Q

State 4 Security Devices

A

Firewalls
Intrusion Detection System
Intrusion Prevention System
Universal Threat Management

21
Q

Define th following below;
-Firewalls
-Intrusion Detection System
-Intrusion Prevention System
-Universal Threat Management

A

-Firewalls protect data and devices and data connected to a network.

-IDS = monitors traffic and is a passive system.

IPS= acyively monitors traffic and takes action when needed.

-Universal Threat Management= its an all in one security appliance. can contain features like firewalls , IDS/IPS and additional security services asginst spyware.

22
Q

List any two (2) operating system used in mobile devices

A

Android and iOS

23
Q

The Troubleshooting requires an organized and logical approach to problems with
computers and other components. Briefly state and explain the six (6) steps of the
troubleshooting process. [12 marks]

A

identify the problem. e.g technician asks for question.

  1. establish a theory of a probable cause. e.g device is power is off.
  2. test the theory to determine the cause. e,g ensure the device is powered on.
  3. establish a plan of action to resolve the problem and implement the solution. e.g if solution is not achieved ask help from internt search or other technicians.
  4. verify full system functionality and if applicable implement preventative measures. e.g reboot the computer.
  5. document findings , actions and outcomes. e.g discuss the solution implemented with the computer.
24
Q

State and explain any four (4) roles of the operating system[8 marks]

A
25
Q

What 5 factors would you consider when selecting a proper operating system for a
customer? [5 marks]

A

Needs & Software: What tasks will they use it for? Does it require specific software (Windows-only,

Mac-only)?
Hardware: Is their computer compatible with the OS (e.g., RAM, processor requirements)?
User Experience: Are they comfortable with a certain interface (Mac's simplicity vs. Windows' flexibility)?
Cost & Support: Is the OS free (Linux) or paid (Windows)? Is IT support readily available?
Security: How important is virus and malware protection (e.g., reputation of Windows vs. Mac)?
26
Q

What is DHCP server?

A

Dynamic host configuration protocol server. it automatically provides an IP adress to network hosts and provides a way to manage those adresses.

27
Q

Describe who the ping command in computer network.

A

Ping is a network tool used to test if a device is reachable on a network. It sends a signal and waits for a response, like a digital tap on the shoulder to see if someone’s there.

28
Q

Differentiate between a Domain and Work Group in relation to computer networks

A

Domain: Centralized control, ideal for businesses with many users and security needs. Like a kingdom with a king (domain controller) managing everything.

Workgroup: Simpler setup for small networks, less secure. Like a group of friends sharing resources loosely.

29
Q

What are the two (2) disadvantages of sharing a directly connected printer from a
computer?

A

The computer sharing the printer must always be powered on for others to print.

PC Busy = Print Slow: Shared PC juggles tasks, print jobs might be slower.

30
Q

A Passcode Lock secures a device and puts it in a power-saving state. Explain any four (4)
common types of passcode locks. [8 marks]

A

PIN:

A short numerical code (e.g., 4-digit or 6-digit) for simple and quick access.

Pattern: A visual path drawn on the screen with your finger in a specific sequence.

Password: A combination of letters, numbers, and symbols, offering more complexity.

Fingerprint Scan: Uses your unique fingerprint for secure and convenient unlocking.

31
Q

Explain what is Rooting (Android) and Jailbreaking (iOS). [2 marks]

A

Rooting (Android): Grants “root” access, giving you permission to modify the operating system, install restricted apps, and deeply customize your device.

Jailbreaking (iOS): Bypasses restrictions set by Apple, allowing installation of unauthorized apps and customization options not officially available.
32
Q

In the correct order, list the seven (7) OSI reference model layers. [7 marks]

A

Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer

33
Q
A