Computer Networks Flashcards

(117 cards)

1
Q

What is the term for sharing information and resources through linked computers?

A

Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the term for the thing and it’s configuration that manages the operations of the network interfaces?

A

Network software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is commonly classified based on the physical distance between components (geographic scope)?

A

Network types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the three major categories of network types

A

Personal area network (PAN)
Local Area network (LAN)
Wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of network is used for short-range communications, within a few feet, such as wireless headphones to a phone?

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of network consists of a collection of computers in a single building or complex?

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of network system kinks systems over a greater distance including machines on the other side of the world?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHat type of network design is freely circulated?

A

Open networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The internet is an example of what kind of network design?

A

Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the open collection of standards called that governs communication over the internet?

A

TCP/IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network design is controlled by third parties and may include license fees?

A

Proprietary network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the four types of network topology?

A

Bus, star, ring, Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of network topology connects machines to a common connection line?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most common type of network topology?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of network topology has a single machine as the central point to which all other machines connect?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of network topology connects machines directly to each other as peers?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of network topology connects every device device in a network to every other device enabling redundancy while introducing more traffic?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The bus topology became popular in the 90s when it was implemented under a set of standards known as what?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of topology is used in wireless communication where communication is carried out via radio broadcast to a central machine called the access point?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Networks rely on what to govern communication?

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using what allows vendors to build products for network applications that are compatible with products from other vendors?

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What method of process communication allows the activities or processes on different computers within a network to coordinate actions and complete tasks?

A

Interprocess communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The popular convention for interprocess communication is what where a request is made with something else satisfying the request? For example multiple computers printing on the same printer

A

Client/server model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In what interprocess model allows for processors to both request and provide service to each other? Instant messaging and interactive games are examples.

A

Peer-to-Peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which protocol operates without any centralized server and allows for numerous software clients to be used for access?
Gnutella protocol
26
What is the term for a system that executes software on more than one computer?
Distributed system
27
Name three types of distributed systems
Cluster computing, grid computing, cloud computing
28
What type of distributed system uses many independent computers to provide computation or services comparable to those of a larger machine?
Cluster computing
29
What type of distributed system is more loosely couples than clusters but still work together to complete large tasks?
Grid computing
30
What type of distributed system provides large pools of shared computers that can be allocated as needed.
Cloud computing
31
What is the term for a component that carries data from one network to another?
Transmission media
32
What are the two types of transmission media?
Wired and wireless
33
Both wired and wireless networks require what to transmit data?
Network media
34
Twisted pair cables, coaxial cables and optical fiber cables are common network media used in what?
Wired networks
35
Radio waves, microwaves, and infrared waves are used in what?
Wireless networks
36
What is the most widely used type of transmissions media?
Twisted pair cables
37
Name the two types of twisted pair cables
Unshielded twisted pair (UTP) Shielded twisted pair (STP)
38
What type of cable consists of two separately insulated copper wires wound around each other?
Shielded twisted pair (STP)
39
What is typically measured in megabits per second (Mbps) and gigabits per second (Gbps)?
Network bandwidth
40
One megabit is how many kilobits?
1000
41
What is the max bandwidth for CAT1?
1Mbps
42
What is the max bandwidth for CAT2?
4 Mbps
43
What is the max bandwidth for CAT3?
10 Mbps
44
What is the max bandwidth for CAT4?
16 Mbps
45
What is the max bandwidth for CAT5?
100 Mbps
46
What is the max bandwidth for CAT5e?
1 Gbps
47
What is the max bandwidth for CAT6?
10Gbps
48
What is the max bandwidth for CAT7?
10 Gbps
49
What is the term for the cable that is used in computer networks and to deliver cable TV services?
Coaxial Cables
50
What has the bandwidth of 80times that of twisted wires?
Coaxial cables
51
What is a signal with narrow frequency range on which data is superimposed and then transmitted?
Baseband
52
What is considered higher quality transmission tech that can send data long distances at high speeds?
Broadband
53
What uses the concept of reflection of light through a core made up of glass or plastic?l and can transmit large volumes of data at 20,000 times the bandwidth of twisted pair wires
Fiber-optic cable
54
What uses electromagnetic waves of different frequencies such as infrared or radio waves to transmit data within a network with the use of Wi-Fi, Bluetooth or even near-field communication?
Wireless transmission
55
LANs can be combined to create what?
WANs
56
What extends the range of cabling types so connections can be made increasing the strength of the network signal?
Repeaters
57
What can be used to connect different types of network and provide management of the message?
Bridges
58
What is used on a LAN to reduce network traffic by management of network messages?
Switches
59
What device makes the internet possible by managing traffic through known devices until the message reaches the correct address?
Router
60
What began as a research project in the early 60s funded by DARPA (Defense Advanced Research Projects Agency)?
The internet
61
DARPA helped to develop a method for linking what, allowing them to function as a single system unaffected by disasters degrading the performance of local components?
Multiple computer networks
62
Individual networks comprising the internet are constructed and maintained by what?
ISPs
63
ISPs are classified in what depending on the role they play in the overall internet structure?
Tiers
64
What is at the top of the ISP hierarchy that consists of high-speed, high-capacity, international WANs that are typically operated by large communication companies?
Tier 1
65
What ISPs are common and regional in scope that collectively provide the internet’s communication infrastructure?
Tier 2
66
What ISPs are typically independent internet sometimes called intranet operated by a single organization that supplies access to homes and businesses?
Tier 3
67
What are devices used to connect to the access ISPs?
End systems or hosts
68
Internet networking systems use what to assign a unique identifier to each computer in the network?
Addressing system
69
What are the unique identifiers in the internet?
Internet protocol (IP) addresses
70
IP version 4 used a what address pattern?
32-bit
71
Today (IPv6) we use a what in addition to legacy IPv4 addresses?
128-bit address
72
This nonprofit organization coordinates the internet’s operations, awards blocks of consecutively numbered IP address to ISPs
ICANN (Internet Corporation for Assigned Names and Numbers)
73
ISPs assign a unique what to each machine in their region of authority?
IP address
74
IPv4 addresses are typically written in what?
Dotted decimal notation
75
IPv6 addresses are written in what?
Hexadecimal
76
What is the suffix for a web address meaning commercial?
.com
77
Government agencies use what at the end of the web addresses?
.gov
78
Nonprofit organizations use what at the end of their websites?
.org
79
Television stations use what at the end of their web addresses?
.tv
80
What is the suffix at the end of web addresses called?
Top level domain (TLD)
81
TLDs include two letter what to identify the location’s of organizations?
Country codes
82
Every internet domain must be registered with what organization?
ICANN
83
What is the term for rules, procedures and formats that govern the communication of multiple devices over a network?
Network protocols
84
As web servers and browsers became more sophisticated, traditional networks became handled by webpages using what?
Hypertext Transfer Protocol (HTTP)
85
Email communication is supported by basic network protocols known as what?
Simple Mail Transfer Protocol (SMTP)
86
SMTP uses what to identify the recipient of the email and send messages over the internet?
Domain Name System (DNS) lookup
87
Email is retrieved off the mail server using protocols like what?
POP3 (Post Office Protocol version 3) IMAP (Internet Message Access Protocol)
88
What is used for voice communication over the Internet?
Voice Over Internet Protocol (VoIP)
89
What is the term for transporting audio and video data across the internet in near real time?
Streaming
90
What do large scale streaming services use that are groups of servers distributed strategically over the internet that send copies of content to nearby users?
Content delivery networks (CDNs)
91
What is the network technology called that enables an end user to connect to the closest server automatically?
Anycast
92
In the late 1980s , who realized the potential of combining Internet technology with hypertext, leading to the World Wide Web
Time Berners-Lee
93
What is the term for linked documents?
Hypertext
94
What two things allow users to access hypertext pages?
Browsers and web servers
95
What resides in the user’s machine that obtains the requested materials and presents then in an organized way
Browser
96
What resides in the computer containing hypertext documents that transfers data?
Web server
97
What is the term for the unique address given to each hypertext document on the WWW?
Uniform Resource Locator(URL)
98
What 5 things does a URL include?
Protocol Domain Subdomains Resource path ID Name of the document
99
What is the term used for a way to encode a document on the www?
Hypertext Markup Language(HTML)
100
What are the special symbols used to describe how the document should appear on a display screen, what multimedia should accompany the document, etc?
Tags
101
What generalized language provides a standardized style for designing notational systems representing data as text files?
Extensible Markup Language (XML)
102
Blank emphasizes semantics, while blank focuses on the appearance
XML HTML
103
What network security risk is any software intentionally designed to cause damage?
Malicious Software (malware)
104
Software that causes unintentional harm due to some deficiency is know as what?
Software bug
105
What infects a computer by inserting itself into programs that already reside in the machine
Virus
106
What is the term for the autonomous program that forwards copies of itself to other machines in a network?
Worm
107
What resides in a computer, collecting information about the computer’s activities and reporting back to the instigator?
Spyware
108
What technique is used to obtain private information by simply asking for it through email posing as a legitimate business?
Phishing
109
What type of attack involves the process of overloading a computer with messages?
Denial-of-service (DOS)
110
What type of attack intercepts data as it is traveling from the victim’s device?
Packet sniffing (man-in-the-middle)
111
What type of attack uses all possible combinations of characters to learn a user’s passcode?
Brute force attack
112
What is the term for the attack where the attacker users an application with a large text file with just words to identity a password?
Dictionary
113
What type of attack involves trying to identify the hash value of a password and converting it back.
Rainbow
114
What security protection block outgoing messages with certain destinations or block incoming messages from untrustworthy sources?
Firewall
115
What is the term for the device that acts as an intermediary between a client and a server to protect the client from adverse actions of the server?
Proxy server
116
What type of software defeats and removes viruses from the network?
Antivirus software
117
What encodes information to keep it confidential even if the data is stolen?
Encryption