Networks Flashcards

(61 cards)

1
Q

Define Network

A

2 or more computers that are connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define stand-alone computer

A

When a computer is not connected to anything else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 advantages of a network

A
  • share files
  • share peripheral devices
  • Share Internet connection
  • users can communicate
  • access files more than one device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 disadvantages of a network

A
  • need a manager to run it
  • servers and cables are expensive
  • malware can spread easily
  • Security risk to data
  • Computers, run slower if a lot of data traveling through network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are standards

A

Software and hardware specifications that manufactures follow in order to make the devices compatible with other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

De Jure standard

A

These are standards that are regulated by official bodies EG form of HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

De Facto standards

A

Not regulated by officials, however used by popularity for eg, webpage font

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network protocol

A

Set of rules that allow computers to communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

7 types of networks

A
  • HTTP
    -HTTPS
    -FTP
    -SMTP
    -POP
    -IMAP
    -SSH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP?

A

Hyper text transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTPS?

A

More secure version of HTTP, has an encryption an authentication Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FTP?

A

Used for sending files between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP? And IP?

A

TCP- responsible for the breakdown of data into packets
IP- responsible for routing the data packets to the correct destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP?

A

If mail recipient is on a different domain, SMTP is used to forward the email on to the recipients mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POP

A

Post office protocol – after emails are retrieved. They are transferred to the local computer and then delete it from the server. Email cannot access on other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IMAP

A

Internet message access protocol Dash Chiefs emails from receivers email server but once download it email is retained on server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the World Wide Web?

A

Collection of webpages, and other files stored on Web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Purpose of domain names

A

Their names are given to website so the user does not have to remember the IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Different parts of the domain name

A

Top level domain and subdomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Benefit of having DNS system

A

Enables domain names to be entered by the user and converted to the IP address of the Web server of where it is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain how DNS system works

A

Request is for sent to DNS resolver, resolver checks cache to see if it holds the URL, if it does not, then it is passed to the TLD name server, this server also checks cache. If it cannot see it, it passes it onto authoritative name server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

LAN

A

Used to refer to a network that is formed when devices within the same building or site are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WAN

A

When two or more networks are connected over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Packets and data transmission

A

Data that is broken down into smaller, equal size parts that Is sent from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Data the packet contains
- payload - protocol - senders IP address - Receivers IP address - Packet sequence number - Number of packets -Check sum
26
Circuit switching
Temporary dedicated link between the source and destination, all data travels along the same dedicated path
27
TCP/ IP protocols stack
Complex set of requirements needed to transmit data from one device to another
28
Application layer
Select appropriate protocol for what application is being used
29
Transport layer
Responsible for establishing an end and connection
30
Network layer
Prepares a data for the Internet with IP address and destination IP address are added
31
Link layer
Physical connection between network devices, transport in the packets
32
Client – server
Powerful computer called server and a number of client computers that connect to it
33
Advantages of client/server
Easier to manage file security Easier to back up shared data Easier to install updates on all computers
34
Disadvantages of client/server
Expensive to set up Expensive to maintain Server is a single point of failure
35
Peer to peer
No central server, and all computers have a equivalent capabilities And access rights.
36
Advantages of peer to peer
Easy to maintain Specialist stuff not required Cheaper to set up
37
Disadvantages of peer to peer
Network is less secure Users manage their own back ups Difficult to maintain well ordered files
38
Malware
Code that is written with intent to frustrate Or harm, deleting files, corrupt files, encrypt files
39
Virus
Virus attaches itself to legitimate host program and activate when the program runs
40
Worm
Similar to virus, but does not require a host program to spread. They are self replicating.
41
Trojan
Disguised as a legitimate program and tricks, use it into executing it (payload is released and creates a back door)
42
Spyware
Leaks data from the computer system back to the creator of the software
43
Ransomware
Lock you out of your computer until you pay a ransom
44
Denial of service attack
Server is bombarded with multiple requests, causing server to become overwhelmed
45
Hackers
Somebody who deliberately gains unauthorized computer access
46
SQL injection
Designed to exploit vulnerabilities poorly coded database applications
47
Social engineering
Manipulation technique that exploits human error
48
Firewall
Monitors traffic coming in and out of the net work, can be implemented in both hardware and software, it can also block certain ports and inspect packets of data
49
Passwords
Prevent unauthorized access to a system
50
Anti – malware software
Performs a scan of a directory to detect and report malware, user can then remove malicious software, need to keep up-to-date
51
Proxy server
Set between device and firewall, provides anonymity to client and keeping their IP address hidden
52
Encryption
Turns playing text into an unreadable form
53
Network hardware
Hardware dedicated to set up a network
54
NIC(network, interface controller)
Responsible for collecting a device to an network
55
Switch
Received, analyzes and redirect signals
56
Hub
Repeat messages to all connected devices
57
Routers
When communication happens with two networks, the router determines the path
58
Modem
Modulates, electrical signals
59
Network access device
Makes it possible to connect to Internet
60
Transmission data
Copper cables or ethernet cables
61
Wireless access point
Provides bridge between wired network connection, and other wireless devices