Computer Networks and Security Basics
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a computer network?

  • A combination of hardware and software that sends data from one computer to another. (correct)
  • A combination of only software components that send data from one computer to another.
  • A combination of only hardware components that sends data from one computer to another.
  • A group of people working together to share data.
  • What is a major application of computer networks?

  • Listening to music
  • Sharing of resources such as printers (correct)
  • Playing video games
  • Watching movies
  • What is a benefit of computer networks?

  • Decreased speed
  • Improved security (correct)
  • Reduced security
  • Increased cost
  • What is a disadvantage of computer networks?

    <p>High cost of installation</p> Signup and view all the answers

    What is a key criterion for a computer network?

    <p>Performance</p> Signup and view all the answers

    What is a factor that affects the performance of a computer network?

    <p>The transmission medium</p> Signup and view all the answers

    What is the primary concern of security in a computer network?

    <p>Preventing unauthorized access to data</p> Signup and view all the answers

    What is another factor that affects the performance of a computer network?

    <p>The number of people on the network at a time</p> Signup and view all the answers

    What is usually measured to determine the reliability of a network?

    <p>The frequency of failure and recovery time</p> Signup and view all the answers

    What is a link in the context of computer networks?

    <p>A communication pathway for transferring data</p> Signup and view all the answers

    What is a characteristic of a point-to-point connection?

    <p>There is a dedicated link between two devices</p> Signup and view all the answers

    What is the term used to describe the way devices are connected in a network?

    <p>Network topology</p> Signup and view all the answers

    What type of network topology has a dedicated point-to-point link between every two devices?

    <p>Mesh topology</p> Signup and view all the answers

    What is the central device in a star topology?

    <p>Any of the above</p> Signup and view all the answers

    What is a common feature of multipoint connections?

    <p>Multiple devices share a common link</p> Signup and view all the answers

    What is the term used to describe a device in a network?

    <p>Node</p> Signup and view all the answers

    What is the primary purpose of installing a Wide Area Network (WAN)?

    <p>To connect devices that are at widely separated locations</p> Signup and view all the answers

    What is a characteristic of a Personal Area Network (PAN)?

    <p>It enables communication among personal devices</p> Signup and view all the answers

    What is a characteristic of a Campus Area Network (CAN)?

    <p>It is made up of an interconnection of LAN with limited geographical area</p> Signup and view all the answers

    What type of technology does a Metropolitan Area Network (MAN) use?

    <p>Similar technology as LAN</p> Signup and view all the answers

    What is the typical use of a Wide Area Network (WAN)?

    <p>To transfer large blocks of data between its users</p> Signup and view all the answers

    What is the advantage of using the phone network for a Wide Area Network (WAN)?

    <p>It is cheaper and more efficient</p> Signup and view all the answers

    What is a characteristic of a Wide Area Network (WAN)?

    <p>It is used to connect devices at widely separated locations</p> Signup and view all the answers

    What is a characteristic of different types of topologies?

    <p>They can be used in different types of networks</p> Signup and view all the answers

    What is the type of topology where all devices are connected to a single cable?

    <p>Bus topology</p> Signup and view all the answers

    What is the characteristic of a unidirectional ring in a ring topology?

    <p>Data is transferred in one direction</p> Signup and view all the answers

    What is the main advantage of a unidirectional ring in a ring topology?

    <p>Reduces the chances of collisions</p> Signup and view all the answers

    What is the type of network that operates over a small physical area such as an office or a group of buildings?

    <p>LAN</p> Signup and view all the answers

    What is the main advantage of a LAN?

    <p>Easy to design and troubleshoot</p> Signup and view all the answers

    How are machines connected in a LAN?

    <p>All machines are connected to a single cable</p> Signup and view all the answers

    What is the main characteristic of a bus topology?

    <p>Each device is connected to a bus cable by drop lines and connectors</p> Signup and view all the answers

    What is the classification of networks based on their geography?

    <p>By geography</p> Signup and view all the answers

    How does a user typically run malware on their device?

    <p>By opening a malicious email attachment</p> Signup and view all the answers

    What is the primary function of a worm?

    <p>To self-replicate and infect other computers</p> Signup and view all the answers

    How do trojan horses typically disguise themselves?

    <p>As legitimate applications and software</p> Signup and view all the answers

    What is the primary goal of phishing attacks?

    <p>To steal sensitive information, such as passwords and credit card numbers</p> Signup and view all the answers

    How do worms often enter a device?

    <p>Through a vulnerable network application</p> Signup and view all the answers

    What is a characteristic of trojan horses?

    <p>They compromise user security upon execution</p> Signup and view all the answers

    What is a common tactic used in phishing attacks?

    <p>Creating a sense of urgency</p> Signup and view all the answers

    What is a key difference between a worm and a trojan horse?

    <p>A worm self-replicates, while a trojan horse does not</p> Signup and view all the answers

    Study Notes

    Computer Networks

    • A computer network is a combination of hardware and software that sends data between computers.
    • It can be defined as two or more computers connected to share and exchange data.
    • Hardware includes physical components that carry data or signals, while software provides instructions for network services.

    Applications of Computer Networks

    • Sharing resources like printers and expensive software
    • Communicating between computers
    • Exchanging data and information among users
    • Sharing information over geographically wide areas

    Benefits of Computer Networks

    • Increased speed
    • Reduced cost
    • Improved security
    • Centralized software management
    • Electronic mail
    • Flexible access

    Disadvantages of Computer Networks

    • High installation cost
    • Requires time for administration
    • Server failure
    • Cable faults

    Performance, Security, and Reliability of Computer Networks

    • Performance is measured by transit time and response time
    • Performance can be affected by the number of users, transmission medium, and other factors
    • Security deals with preventing unauthorized access, updates, or data damage
    • Reliability is measured by frequency of failure, recovery time, and network robustness

    Types of Computer Networks

    • Point-to-point connection: dedicated link between two devices
    • Multipoint connection: shared link between multiple devices

    Network Topology

    • Refers to the way devices are connected
    • Types of topologies: mesh, star, bus, and ring

    Mesh Topology

    • Each device has a dedicated point-to-point link to all other devices
    • Direct connection between every two devices

    Star Topology

    • Each device has a dedicated point-to-point link to a central controller
    • No direct link between devices

    Bus Topology

    • One long cable (bus) connects all devices
    • Multipoint connection
    • Devices connected to bus using drop lines and connectors

    Ring Topology

    • Each device connected to two other devices on either side
    • Data transmitted in one direction along the ring
    • Reduces chances of collisions and increases speed of data transmission

    Classification of Networks by Geography

    • PAN (Personal Area Network): organized around an individual
    • LAN (Local Area Network): designed for small physical areas
    • MAN (Metropolitan Area Network): in between LAN and WAN technology
    • WAN (Wide Area Network): spans large distances

    Local Area Network (LAN)

    • Designed for small physical areas like offices or groups of buildings
    • Easy to design and troubleshoot
    • Exchange of information and sharing of resources becomes easy

    Wide Area Network (WAN)

    • Used when computers are at widely separated locations
    • Communication between users established using leased telephone lines, satellite links, and similar channels
    • Cheaper and more efficient to use phone network for links

    Personal Area Network (PAN)

    • Organized around an individual
    • Consists of mobile computer, cell phone, or personal digital assistant
    • Enables communication among devices and connects to digital networks and the internet

    Campus Area Network (CAN)

    • Interconnection of LANs with limited geographical area
    • Network equipment almost entirely owned by campus owner

    Metropolitan Area Network (MAN)

    • In between LAN and WAN technology
    • Covers entire cities

    Malware

    • Definition: software designed to harm or exploit a computer system
    • Types: worms, trojan horses, phishing

    Worms

    • Can enter a device without explicit user interaction
    • Self-replicate and infect other computers while remaining active on infected systems

    Trojan Horses

    • Disguise themselves as legitimate applications and software
    • Compromise user security upon execution
    • Often appear as utilities, games, or antivirus programs

    Phishing

    • Fraudulent practice of sending emails to induce individuals to reveal personal information
    • Often involves pretending to be a trusted entity and creating a sense of urgency

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the fundamentals of computer networks, malware, and current trends in computing. It includes topics such as the definition of a network, hardware and software components, and data exchange.

    More Like This

    Computer Networks &amp; Security Quiz
    10 questions
    Network Security and Types of Malware
    10 questions
    Computer Security Threats
    8 questions
    Use Quizgecko on...
    Browser
    Browser