2017 Final Exam Flashcards
(34 cards)
Expand and describe the following type of networks.
i. LAN [2 marks]
ii. WLAN [2 marks]
iii. MAN
iv. WAN
-Local area network. a wired network that consists of a switch and network devices in limited geographical area.
-Wireless local area network. connects multiple wireless devices an uses an access point.
-Metropolitan area network. a network that spans a city.
-wide area network. a network that spans a large geographical area.
Differentiate Peer-to-peer and client/server networks
In a client/server network, clients request and servers provide. Think of it like a restaurant - you (client) order (request) and the kitchen (server) prepares your food.
In a peer-to-peer network, all devices act as both clients and servers, sharing resources directly. Imagine classmates sharing files directly with each other.
Differentiate Bandwidth and Latency.
Bandwidth is like the size of a pipe - how much data can flow through at once.
Latency is the speed of the water in the pipe - how long it takes for data to travel.
A physical topology defines the way in which computers, printers, and other devices are
connected to a network. Discuss the following LAN physical technologies.
i. Bus [3 marks]
ii. Ring [3 marks]
iii. Star
i. Bus: Think Christmas lights - all devices on one cable, failure at one point can disrupt the whole network.
ii. Ring: Devices in a closed loop, data travels in one direction, failure of one device can break the entire ring.
iii. Star: Devices connect to a central hub/switch, failure of one device doesn’t affect others.
What is Virtual Private Network (VPN)
– A method of
connecting to a network such as a company
network across an unsecure network
Give two examples of where VPN technology should be used?
Public Wi-Fi: Use a VPN on public Wi-Fi to encrypt your internet traffic and protect your data from snooping.
Remote Work: Use a VPN for secure remote access to a company network, allowing you to access files and resources as if you were in the office.
i. List three (3) types of printers that you know.
State at least one (1) advantage and one (1) disadvantages of each type of printers from
part (ii)
Three types of printers:
Inkjet - Good for photos, affordable, lower print volume.
Laser - Faster printing, higher print volume, toner expensive.
3D printer. 3D printers allow for creating complex and custom objects with design freedom.
3D printing can be slow and the materials used can be expensive compared to traditional printing.
State three tools that are used for printer performance optimisation.
Print Spooler Settings
Print Driver Updates
Print Monitoring Tools
Mobile devices use touchscreens to allow users to physically interact with the screen and
type on a virtual keyboard. List and describe the two types of touch screens available.
[6 marks
Resistive: Imagine two thin layers touching - needs pressure to register a touch. Works with various objects (stylus, gloves). Downside: Less responsive and clear.
Capacitive: Think responding to your finger’s electricity. Offers smoother touch and sharper image. Downside: May not work with styluses or wet fingers.
List any three (3) mobile device parts that are field-replaceable.
Battery , simcard and microSD
State any four (4) advantages of using of using Flash memory storage (SSD)
Faster loading, boot times.
More durable, shock resistant.
Better battery life.
Quieter operation.
What is Overclocking?
Overclocking is pushing a computer component (like CPU) to run faster than its designed speed, for potentially better performance at the risk of instability or damage.
List three components that when building or assembling a computer should have the
same form factor
Case
Motherboard
Power Supply (PSU)
What is ElectroStatic Discharge (ESD?
Quick flow of electricity when two objects touch with different charges. Damages electronics.
List any three (3) ways in which one can prevent Electrostatic discharge (ESD) Damage.
Ground yourself: Touch metal or wear a strap to zap yourself, not your PC parts!
Anti-static zone: Use mats & bags to prevent static from building up in the first place.
Careful handling: Avoid touching delicate parts directly - they’re ESD magnets!
List two (2) connectors used to connect external peripherals to a PC.
USB , HDMI
Describe the functions of the following networks devices:
i. Switch [2 marks]
ii. Router [2 marks]
iii. Wireless Access Point
A switch - Ethernet switches record MAC addresses for each device
connected to the switch. Directs data traffic to the specific device it’s meant for.
Router - connetcts networks. Use an IP address to forward traffic to other networks.
Wireless Access Point- provide
access to a wireless network for a limited
range.
Define a Repeater.
aka an extender. they regenerate the signal so it can be sent further.
Define a Hub.
receives data on one port and sends to all other ports.
Define a bridge
divides a network into two or more segments and tracks which device is on each segment.
State 4 Security Devices
Firewalls
Intrusion Detection System
Intrusion Prevention System
Universal Threat Management
Define th following below;
-Firewalls
-Intrusion Detection System
-Intrusion Prevention System
-Universal Threat Management
-Firewalls protect data and devices and data connected to a network.
-IDS = monitors traffic and is a passive system.
IPS= acyively monitors traffic and takes action when needed.
-Universal Threat Management= its an all in one security appliance. can contain features like firewalls , IDS/IPS and additional security services asginst spyware.
List any two (2) operating system used in mobile devices
Android and iOS
The Troubleshooting requires an organized and logical approach to problems with
computers and other components. Briefly state and explain the six (6) steps of the
troubleshooting process. [12 marks]
identify the problem. e.g technician asks for question.
- establish a theory of a probable cause. e.g device is power is off.
- test the theory to determine the cause. e,g ensure the device is powered on.
- establish a plan of action to resolve the problem and implement the solution. e.g if solution is not achieved ask help from internt search or other technicians.
- verify full system functionality and if applicable implement preventative measures. e.g reboot the computer.
- document findings , actions and outcomes. e.g discuss the solution implemented with the computer.