IT Theory Part B Flashcards
revision for exam (32 cards)
Name 5 wired connection methods
Cat 5
Coaxial
Fibre optic
VGA
HDMI
Name 5 wireless connection methods
WIFI
Satellite Broadband
Microwave/Laser
Blue Tooth
WiFi Direct
4 networks
Local Area network
Personal Area network
Wide area network
Virtual area network
2 advantages of WIRELESS methods
Easier to connect so you can give connection to many users
portability as signal is available anywhere( within range of router)
2 disadvantages of WIRELESS connections
signal diminishes over distance
usually have a smaller bandwidth
2 Advantages of WIRED Connections
Usually have a larger bandwidth
faster transmission speeds
2 Disadvantages of WIRED Connections
Restricts movement/ no mobility PC must be plugged in to use
Health and safety risks tripping hazards
LIMITATIONS of wireless laptops over old computers
Implementation- little downtime when replacing computers as data from old computer needs to be transferred
Security- will require higher security measures
Cost- must work within the budget of grant money provided and it may expensive to download new software
How to keep files secure using a VPN
sender authentication- as you should only access from authorised devices
Digital Certificates- allows access without needing an administrator
2 Advantages of LAN
Can share peripherals so it reduces costs
Able to share software applications and files between devices without having to use external methods
What does TCP stand for
Transmission control Protocol
Factory’s of installing a new network
User experience
Compatibility
Implementation
Timescales
Testing
Security
2 Advantages of A PAN
- faster connection as fewer users are sharing the bandwidth
- portability as you can establish a connection anywhere
2 disadvantages of a PAN
- cost implications of using cellular data as you have to top up if you run out
- data transfer is slow so problems can arise when downloading larger files
2 Advantages of a VPN
- improved privacy as all the traffic is kept inside the VPN tunnel
- VPN allows secure remote connection online
How to keep files secure using a VPN
- it restricts access only to authorised users
- must have a digital certificate
- sender authentication as it only allows access from authorised devices
what are 2 protocols that is used as basic communication for the internet
Transmission control protocol and Internet protocol
What is HTTP
HyperText transfer protocol is used to allow web servers and browsers to transfer files over the internet
what does HTTPS use that makes it more secure
Uses a public key cryptography to encrypt communications
What is FTP and What is it used for
File transfer protocol is used to transfer files over a network
What are 3 ways HTTPS keeps data secure during transmissions
- It uses transport layer security protocol which provides extra layers of encryption
- When a browser connects to a site it asks for a public key
- when a browser connects to a site it also checks if it has a valid certificate
What are the 3 email protocols
POP 3 is used to retrieve emails from the mail server
IMAP is used to receive emails and stores emails on a server
SMTP manages outgoing emails and is used for sending emails
What is Codecs
Codecs is a program used to compress and decompress audio and video files as it reduces the space they take up on the disk
What are the uses of Codecs when using VOIP
- uses an algorithm
- decoded
- Determines quality
- encrypting for security