IT Theory Part B Flashcards

revision for exam (32 cards)

1
Q

Name 5 wired connection methods

A

Cat 5
Coaxial
Fibre optic
VGA
HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 5 wireless connection methods

A

WIFI
Satellite Broadband
Microwave/Laser
Blue Tooth
WiFi Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 networks

A

Local Area network
Personal Area network
Wide area network
Virtual area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 advantages of WIRELESS methods

A

Easier to connect so you can give connection to many users
portability as signal is available anywhere( within range of router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 disadvantages of WIRELESS connections

A

signal diminishes over distance
usually have a smaller bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 Advantages of WIRED Connections

A

Usually have a larger bandwidth
faster transmission speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 Disadvantages of WIRED Connections

A

Restricts movement/ no mobility PC must be plugged in to use
Health and safety risks tripping hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LIMITATIONS of wireless laptops over old computers

A

Implementation- little downtime when replacing computers as data from old computer needs to be transferred
Security- will require higher security measures
Cost- must work within the budget of grant money provided and it may expensive to download new software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to keep files secure using a VPN

A

sender authentication- as you should only access from authorised devices
Digital Certificates- allows access without needing an administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 Advantages of LAN

A

Can share peripherals so it reduces costs
Able to share software applications and files between devices without having to use external methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does TCP stand for

A

Transmission control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Factory’s of installing a new network

A

User experience
Compatibility
Implementation
Timescales
Testing
Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 Advantages of A PAN

A
  • faster connection as fewer users are sharing the bandwidth
  • portability as you can establish a connection anywhere
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2 disadvantages of a PAN

A
  • cost implications of using cellular data as you have to top up if you run out
  • data transfer is slow so problems can arise when downloading larger files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2 Advantages of a VPN

A
  • improved privacy as all the traffic is kept inside the VPN tunnel
  • VPN allows secure remote connection online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to keep files secure using a VPN

A
  • it restricts access only to authorised users
  • must have a digital certificate
  • sender authentication as it only allows access from authorised devices
17
Q

what are 2 protocols that is used as basic communication for the internet

A

Transmission control protocol and Internet protocol

18
Q

What is HTTP

A

HyperText transfer protocol is used to allow web servers and browsers to transfer files over the internet

19
Q

what does HTTPS use that makes it more secure

A

Uses a public key cryptography to encrypt communications

20
Q

What is FTP and What is it used for

A

File transfer protocol is used to transfer files over a network

21
Q

What are 3 ways HTTPS keeps data secure during transmissions

A
  • It uses transport layer security protocol which provides extra layers of encryption
  • When a browser connects to a site it asks for a public key
  • when a browser connects to a site it also checks if it has a valid certificate
22
Q

What are the 3 email protocols

A

POP 3 is used to retrieve emails from the mail server
IMAP is used to receive emails and stores emails on a server
SMTP manages outgoing emails and is used for sending emails

23
Q

What is Codecs

A

Codecs is a program used to compress and decompress audio and video files as it reduces the space they take up on the disk

24
Q

What are the uses of Codecs when using VOIP

A
  • uses an algorithm
  • decoded
  • Determines quality
  • encrypting for security
25
What are the implications of using Codecs in a digital format
- Codecs is a piece of software - it is needed to view the video - It affects the quality of the video - if a video file is large Codecs will reduce and compress the file size
26
What are 2 protocols that are being used to ensure transactions over networks are kept safe
SECURE SOCKETS LAYER AND TRANSPORT LAYER SECURITY, SSL IS GRADUALLY BEING PHASED OUT AND REPLACED WITH TLS
27
What are the 2 types of compression
LOSSY COMPRESSION- REDUCES THE SIZE OF A FILE BUT DOES THIS BY LOSING SOME INFORMATION LOSSLESS COMPRESSION- WOULD BE USED FOR TEXTUAL DATA AS IT CAN BRING THE ORGINAL DATA BACK
28
What is bandwidth and latency
BANDWIDTH-THE AMOUNT OF DATA TRANSFERRED/TRANSMITTED FROM ONE POINT TO ANOTHER IN A PERIOD OF TIME LATENCY-THE TIME DELAY OR LAG EXPERIENCED BEFORE A COMPONENT RESPONDS TO AN INSTRUCTION
29
What factors affect bandwidth and latency
- AMOUNT OF USERS AND CONTENTION - AMOUNT OF DATA BEING TRANSMITTED - TYPE OF CONNECTION BEING USED - DISTANCE FROM NEAREST TELECOMMUNICATION EXCHANGE
30
Firewall protection
- USES SOFTWARE/ HARDWARE - MONITORS INCOMING/OUTGOING FILES/TRAFFIC AND PACKETS - CHECKS THE CONTENT BY ENFORCING A SET OF RULES - IT IDENTIFIES SUSPECT TRAFFIC - IT THEN DECIDES WHICH FILE AND TRAFFIC PACKETS ARE ALLOWED TO ENTER OR LEAVE
31
what are features of a strong password
- includes a mix of uppercase and lowercase characters - avoid using dictionary words - don't use personal or memorable information such as a pet's name - never use your username as a password
32
how does encryption work
- PRIVATE AND PUBLIC KEYS ARE GENERATED - SENDING AND RECIEVING COMPUTERS EXCHANGE PUBLIC KEYS - USES AN ALGORITHM - TO SCARMBLE AND MAKE UNREADABLE - TRANSMITTED TO THE RECIEVING CLIENT WITH A DECRYPTION KEY - RECIEVING CLIENT USES THE RECEIVING KEY TO UNSCRABLE AND DECRYPT THE DATA