Computer Networks Flashcards

1
Q

What is the term for sharing information and resources through linked computers?

A

Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the term for the thing and it’s configuration that manages the operations of the network interfaces?

A

Network software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is commonly classified based on the physical distance between components (geographic scope)?

A

Network types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the three major categories of network types

A

Personal area network (PAN)
Local Area network (LAN)
Wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of network is used for short-range communications, within a few feet, such as wireless headphones to a phone?

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of network consists of a collection of computers in a single building or complex?

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of network system kinks systems over a greater distance including machines on the other side of the world?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHat type of network design is freely circulated?

A

Open networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The internet is an example of what kind of network design?

A

Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the open collection of standards called that governs communication over the internet?

A

TCP/IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network design is controlled by third parties and may include license fees?

A

Proprietary network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the four types of network topology?

A

Bus, star, ring, Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of network topology connects machines to a common connection line?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most common type of network topology?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of network topology has a single machine as the central point to which all other machines connect?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of network topology connects machines directly to each other as peers?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of network topology connects every device device in a network to every other device enabling redundancy while introducing more traffic?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The bus topology became popular in the 90s when it was implemented under a set of standards known as what?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of topology is used in wireless communication where communication is carried out via radio broadcast to a central machine called the access point?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Networks rely on what to govern communication?

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using what allows vendors to build products for network applications that are compatible with products from other vendors?

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What method of process communication allows the activities or processes on different computers within a network to coordinate actions and complete tasks?

A

Interprocess communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The popular convention for interprocess communication is what where a request is made with something else satisfying the request? For example multiple computers printing on the same printer

A

Client/server model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In what interprocess model allows for processors to both request and provide service to each other? Instant messaging and interactive games are examples.

A

Peer-to-Peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which protocol operates without any centralized server and allows for numerous software clients to be used for access?

A

Gnutella protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the term for a system that executes software on more than one computer?

A

Distributed system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Name three types of distributed systems

A

Cluster computing, grid computing, cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of distributed system uses many independent computers to provide computation or services comparable to those of a larger machine?

A

Cluster computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of distributed system is more loosely couples than clusters but still work together to complete large tasks?

A

Grid computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What type of distributed system provides large pools of shared computers that can be allocated as needed.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the term for a component that carries data from one network to another?

A

Transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the two types of transmission media?

A

Wired and wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Both wired and wireless networks require what to transmit data?

A

Network media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Twisted pair cables, coaxial cables and optical fiber cables are common network media used in what?

A

Wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Radio waves, microwaves, and infrared waves are used in what?

A

Wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the most widely used type of transmissions media?

A

Twisted pair cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Name the two types of twisted pair cables

A

Unshielded twisted pair (UTP)
Shielded twisted pair (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What type of cable consists of two separately insulated copper wires wound around each other?

A

Shielded twisted pair (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is typically measured in megabits per second (Mbps) and gigabits per second (Gbps)?

A

Network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

One megabit is how many kilobits?

A

1000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the max bandwidth for CAT1?

A

1Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the max bandwidth for CAT2?

A

4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the max bandwidth for CAT3?

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the max bandwidth for CAT4?

A

16 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the max bandwidth for CAT5?

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the max bandwidth for CAT5e?

A

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the max bandwidth for CAT6?

A

10Gbps

48
Q

What is the max bandwidth for CAT7?

A

10 Gbps

49
Q

What is the term for the cable that is used in computer networks and to deliver cable TV services?

A

Coaxial Cables

50
Q

What has the bandwidth of 80times that of twisted wires?

A

Coaxial cables

51
Q

What is a signal with narrow frequency range on which data is superimposed and then transmitted?

A

Baseband

52
Q

What is considered higher quality transmission tech that can send data long distances at high speeds?

A

Broadband

53
Q

What uses the concept of reflection of light through a core made up of glass or plastic?l and can transmit large volumes of data at 20,000 times the bandwidth of twisted pair wires

A

Fiber-optic cable

54
Q

What uses electromagnetic waves of different frequencies such as infrared or radio waves to transmit data within a network with the use of Wi-Fi, Bluetooth or even near-field communication?

A

Wireless transmission

55
Q

LANs can be combined to create what?

A

WANs

56
Q

What extends the range of cabling types so connections can be made increasing the strength of the network signal?

A

Repeaters

57
Q

What can be used to connect different types of network and provide management of the message?

A

Bridges

58
Q

What is used on a LAN to reduce network traffic by management of network messages?

A

Switches

59
Q

What device makes the internet possible by managing traffic through known devices until the message reaches the correct address?

A

Router

60
Q

What began as a research project in the early 60s funded by DARPA (Defense Advanced Research Projects Agency)?

A

The internet

61
Q

DARPA helped to develop a method for linking what, allowing them to function as a single system unaffected by disasters degrading the performance of local components?

A

Multiple computer networks

62
Q

Individual networks comprising the internet are constructed and maintained by what?

A

ISPs

63
Q

ISPs are classified in what depending on the role they play in the overall internet structure?

A

Tiers

64
Q

What is at the top of the ISP hierarchy that consists of high-speed, high-capacity, international WANs that are typically operated by large communication companies?

A

Tier 1

65
Q

What ISPs are common and regional in scope that collectively provide the internet’s communication infrastructure?

A

Tier 2

66
Q

What ISPs are typically independent internet sometimes called intranet operated by a single organization that supplies access to homes and businesses?

A

Tier 3

67
Q

What are devices used to connect to the access ISPs?

A

End systems or hosts

68
Q

Internet networking systems use what to assign a unique identifier to each computer in the network?

A

Addressing system

69
Q

What are the unique identifiers in the internet?

A

Internet protocol (IP) addresses

70
Q

IP version 4 used a what address pattern?

A

32-bit

71
Q

Today (IPv6) we use a what in addition to legacy IPv4 addresses?

A

128-bit address

72
Q

This nonprofit organization coordinates the internet’s operations, awards blocks of consecutively numbered IP address to ISPs

A

ICANN (Internet Corporation for Assigned Names and Numbers)

73
Q

ISPs assign a unique what to each machine in their region of authority?

A

IP address

74
Q

IPv4 addresses are typically written in what?

A

Dotted decimal notation

75
Q

IPv6 addresses are written in what?

A

Hexadecimal

76
Q

What is the suffix for a web address meaning commercial?

A

.com

77
Q

Government agencies use what at the end of the web addresses?

A

.gov

78
Q

Nonprofit organizations use what at the end of their websites?

A

.org

79
Q

Television stations use what at the end of their web addresses?

A

.tv

80
Q

What is the suffix at the end of web addresses called?

A

Top level domain (TLD)

81
Q

TLDs include two letter what to identify the location’s of organizations?

A

Country codes

82
Q

Every internet domain must be registered with what organization?

A

ICANN

83
Q

What is the term for rules, procedures and formats that govern the communication of multiple devices over a network?

A

Network protocols

84
Q

As web servers and browsers became more sophisticated, traditional networks became handled by webpages using what?

A

Hypertext Transfer Protocol (HTTP)

85
Q

Email communication is supported by basic network protocols known as what?

A

Simple Mail Transfer Protocol (SMTP)

86
Q

SMTP uses what to identify the recipient of the email and send messages over the internet?

A

Domain Name System (DNS) lookup

87
Q

Email is retrieved off the mail server using protocols like what?

A

POP3 (Post Office Protocol version 3)
IMAP (Internet Message Access Protocol)

88
Q

What is used for voice communication over the Internet?

A

Voice Over Internet Protocol (VoIP)

89
Q

What is the term for transporting audio and video data across the internet in near real time?

A

Streaming

90
Q

What do large scale streaming services use that are groups of servers distributed strategically over the internet that send copies of content to nearby users?

A

Content delivery networks (CDNs)

91
Q

What is the network technology called that enables an end user to connect to the closest server automatically?

A

Anycast

92
Q

In the late 1980s , who realized the potential of combining Internet technology with hypertext, leading to the World Wide Web

A

Time Berners-Lee

93
Q

What is the term for linked documents?

A

Hypertext

94
Q

What two things allow users to access hypertext pages?

A

Browsers and web servers

95
Q

What resides in the user’s machine that obtains the requested materials and presents then in an organized way

A

Browser

96
Q

What resides in the computer containing hypertext documents that transfers data?

A

Web server

97
Q

What is the term for the unique address given to each hypertext document on the WWW?

A

Uniform Resource Locator(URL)

98
Q

What 5 things does a URL include?

A

Protocol
Domain
Subdomains
Resource path ID
Name of the document

99
Q

What is the term used for a way to encode a document on the www?

A

Hypertext Markup Language(HTML)

100
Q

What are the special symbols used to describe how the document should appear on a display screen, what multimedia should accompany the document, etc?

A

Tags

101
Q

What generalized language provides a standardized style for designing notational systems representing data as text files?

A

Extensible Markup Language (XML)

102
Q

Blank emphasizes semantics, while blank focuses on the appearance

A

XML
HTML

103
Q

What network security risk is any software intentionally designed to cause damage?

A

Malicious Software (malware)

104
Q

Software that causes unintentional harm due to some deficiency is know as what?

A

Software bug

105
Q

What infects a computer by inserting itself into programs that already reside in the machine

A

Virus

106
Q

What is the term for the autonomous program that forwards copies of itself to other machines in a network?

A

Worm

107
Q

What resides in a computer, collecting information about the computer’s activities and reporting back to the instigator?

A

Spyware

108
Q

What technique is used to obtain private information by simply asking for it through email posing as a legitimate business?

A

Phishing

109
Q

What type of attack involves the process of overloading a computer with messages?

A

Denial-of-service (DOS)

110
Q

What type of attack intercepts data as it is traveling from the victim’s device?

A

Packet sniffing (man-in-the-middle)

111
Q

What type of attack uses all possible combinations of characters to learn a user’s passcode?

A

Brute force attack

112
Q

What is the term for the attack where the attacker users an application with a large text file with just words to identity a password?

A

Dictionary

113
Q

What type of attack involves trying to identify the hash value of a password and converting it back.

A

Rainbow

114
Q

What security protection block outgoing messages with certain destinations or block incoming messages from untrustworthy sources?

A

Firewall

115
Q

What is the term for the device that acts as an intermediary between a client and a server to protect the client from adverse actions of the server?

A

Proxy server

116
Q

What type of software defeats and removes viruses from the network?

A

Antivirus software

117
Q

What encodes information to keep it confidential even if the data is stolen?

A

Encryption