Computer Networks Basics
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a computer network and what are its basic components?

A computer network is two or more computers connected via software and hardware to communicate. The basic components include nodes such as computers, peripherals, and network devices like routers.

List two advantages and one disadvantage of having a computer network.

Advantages include sharing an Internet connection and sharing printers or files. A disadvantage is the setup time required.

Define bandwidth and throughput in the context of computer networks.

Bandwidth is the maximum speed at which data can be transmitted, while throughput is the actual speed at which data is transferred.

What is the difference between a LAN and a PAN?

<p>A LAN (Local Area Network) connects devices within a small geographic area, while a PAN (Personal Area Network) is used for communication among devices close to one person.</p> Signup and view all the answers

What considerations should be made before creating a home network?

<p>Considerations include the number of devices to connect, the type of Internet connection available, and security measures needed.</p> Signup and view all the answers

What distinguishes a client/server network from a peer-to-peer network?

<p>In a client/server network, clients request resources from a central server, while in a peer-to-peer network, each node communicates directly with all other nodes.</p> Signup and view all the answers

What is meant by backward compatibility in networking?

<p>Backward compatibility refers to the ability of current devices to support earlier standards alongside the latest standards.</p> Signup and view all the answers

What are the three types of wired transmission media mentioned?

<p>The three types are UTP cable, coaxial cable, and fiber-optic cable.</p> Signup and view all the answers

What is the role of a router in a network?

<p>A router transfers packets of data between two or more networks, facilitating communication across different network segments.</p> Signup and view all the answers

Why do home networks often use peer-to-peer (P2P) networking?

<p>Home networks use P2P networking because it allows nodes to directly communicate with each other without needing a central server.</p> Signup and view all the answers

What type of software do servers in client/server networks require?

<p>Servers in client/server networks require specialized network operating system (NOS) software.</p> Signup and view all the answers

What is one of the main reasons for setting up a network?

<p>One of the main reasons for setting up a network is to share an Internet connection.</p> Signup and view all the answers

What is the primary purpose of ransomware viruses?

<p>To encrypt files and demand payment for decryption.</p> Signup and view all the answers

How does a polymorphic virus avoid detection?

<p>By changing its code frequently.</p> Signup and view all the answers

What type of software is classified as malware?

<p>Software with malicious intent.</p> Signup and view all the answers

What is adware designed to do?

<p>Display unsponsored advertisements.</p> Signup and view all the answers

What is the main function of a spam filter?

<p>To sort out unwanted or junk e-mails.</p> Signup and view all the answers

Why are cookies used by websites?

<p>To track user interactions and website effectiveness.</p> Signup and view all the answers

What is social engineering in the context of computer security?

<p>Using social skills to trick individuals into revealing sensitive information.</p> Signup and view all the answers

What precaution should you take to avoid phishing attacks?

<p>Never reply to emails asking for personal information.</p> Signup and view all the answers

What is the difference between phishing and pharming?

<p>Phishing lures users to reveal information; pharming plants malicious code on the user's computer.</p> Signup and view all the answers

What is scareware and how does it exploit users?

<p>Scareware is malware that tricks users into believing their computer is infected to sell them fake removal tools.</p> Signup and view all the answers

What is the purpose of a firewall?

<p>A firewall protects computers from unauthorized access by filtering incoming and outgoing network traffic.</p> Signup and view all the answers

Name two companies that provide antivirus software.

<p>Symantec and Avast are two companies that offer antivirus software.</p> Signup and view all the answers

What is a virus signature?

<p>A virus signature is a unique code snippet associated with a specific computer virus.</p> Signup and view all the answers

How do drive-by downloads exploit operating system weaknesses?

<p>Drive-by downloads occur when malicious code is unintentionally downloaded from compromised web pages due to OS vulnerabilities.</p> Signup and view all the answers

What are the characteristics of a strong password?

<p>A strong password should be at least eight characters long and include uppercase, lowercase, numeric, and symbol characters.</p> Signup and view all the answers

What is the function of quarantining a virus?

<p>Quarantining isolates a virus in a secure area to prevent it from spreading to other files.</p> Signup and view all the answers

What is the role of packet filtering in a firewall?

<p>Packet filtering enables a firewall to allow or block traffic based on predetermined security rules.</p> Signup and view all the answers

What does a biometric authentication device measure?

<p>A biometric authentication device measures unique personal characteristics, such as fingerprints or iris patterns.</p> Signup and view all the answers

Study Notes

Technology in Action - Chapter 7

  • Chapter 7 is about networking and connecting computing devices.
  • Learning objectives include describing computer networks and their pros and cons, explaining different network definitions, describing transmission media types, identifying basic network hardware, outlining network software, and summarizing broadband Internet access options.
  • A computer network connects two or more computers via software and hardware for communication.
  • A node is a device connected to a network. A node can be a computer, peripheral, or network device, such as a router.
  • Network benefits include sharing high-speed Internet connections, printers, peripheral devices, and files. Common communications are another benefit.
  • The major disadvantage of networks is the setup time.
  • Data transfer rate (bandwidth) is the maximum speed data travels.
  • Throughput is the actual speed data transfers.
  • Bandwidth and throughput are measured in Mbps (megabits per second) or Gbps (gigabits per second).
  • Networks are classified by distance: personal area network (PAN), local area network (LAN), home area network (HAN), metropolitan area network (MAN), and wide area network (WAN).
  • Networks are also classified by levels of administration: client/server networks and peer-to-peer (P2P) networks.
  • In a client/server network, a client computer requests resources from a server.
  • A peer-to-peer (P2P) network has nodes that communicate directly with each other.
  • Networks use protocols like Ethernet, developed by IEEE. The methods used by computers to communicate include wired networks (Wi-Fi, gigabit Ethernet [GbE]) and wired networks.
  • Networks require transmission media (cables or wireless technology) and special hardware for node communication.
  • Software enables network operation. Network adapters, network interface cards (NICs), modems, routers, and switches are essential network hardware. A modem turns digital signals into analog (and vice versa) for broadband connections.
  • Routers transfer data packets between networks, and switches route data within a network like traffic signals.
  • Network software, such as operating systems, is crucial for network operation and communication. Home networks are peer-to-peer (P2P) networks.
  • Client/server networks rely on centralized servers for communication.
  • Broadband Internet access, such as cable Internet, DSL, and fiber-optic service, is preferred to dial-up or cellular access.

Technology in Action - Chapter 9

  • Chapter 9 discusses securing digital data and devices.
  • Cybercrime is any criminal act primarily using a computer or network.
  • Cybercriminals perpetrate crimes through computers and networks. Four typical types of complaints are: FBI-related scams, identity theft, non-delivery/non-auction of merchandise, and advance-fee fraud. Other problems include hacking, child pornography, and blackmail.
  • Identity theft occurs when a criminal steals personal information. Identity theft includes behaviors like counterfeiting credit/debit cards creating new credit card accounts, changing addresses, getting medical services, and buying or reselling items in someone else's name.
  • Hacking is breaking into a computer system.
  • Hackers can be white-hat (ethical), black-hat. grey-hat, and include packet analyzers (sniffers) and keyloggers. -White-hat hackers use methods that assist in testing system security. Black-hat hackers break into systems to harm or illegally gain profits. Grey-hat hackers break into systems for their own expertise.
  • Packet analyzers intercept data packets sent across a network. Keyloggers record every keystroke on a computer. Trojan horses are malicious code disguised as useful programs. Backdoor programs and rootkits allow access to a computer without the user's knowledge.
  • Zombies are computers controlled by hackers. Denial-of-service attacks use zombie computers to overwhelm target systems to stop operation. A botnet is a network of zombie computers
  • Exploits are pieces of software used to find vulnerabilities in computer programs to access or control them from other points.
  • Computer Viruses are programs that attach to other programs and copy themselves into host files (to spread rapidly). Secondary objectives of viruses can range from displaying annoying messages to destroying data on the whole computer.
  • Virus types include boot-sector, logic, time bombs, worms, script/macro, email and encryption viruses.
  • Virus detection methods include polymorphic viruses (code changes periodically), multi-partite viruses (affect multiple file types), and stealth viruses (erase code and hide themselves).
  • Online annoyances include malware, adware, and spyware. Malware has a malicious intent; adware uses sponsored advertisements and spyware uses unwanted software downloads that runs in the background. Scareware attempts to convince victims something is wrong, luring them to pay to fix it.
  • Spam is unwanted e-mail that uses various tactics to minimize spam.
  • Cookies are small text files that help websites track behaviors on their website to improve performance.
  • Social engineering tricks people into revealing sensitive information, through fake scenarios. Phishing involves tricking people into giving information, phishing schemes frequently use email, while pharming utilizes code on a computer.

Technology in Action - Chapter 10

  • Chapter 10 is about software programming, the processes of translating an algorithm into CPU-readable instructions, and related aspects of designing and testing these software systems.
  • Programming translates tasks into instructions that computers can process. Complex tasks require creative thought and human touch. Simple, but repetitive, tasks and tasks dealing with electronic information are well-suited for automated processing.
  • A career in software programming offers plentiful jobs, strong salaries, and opportunities for telework.
  • Programming is necessary to manage situations where current software does not exist or when a program needs to be created to work with existing software.
  • A programming language converts algorithms into computer-understandable instructions (1s and 0s).
  • The process of turning an algorithm into a programming language is called coding.
  • An algorithm is a series of steps for task completion. Algorithms use flowcharts, which use symbols to pictorially depict steps, decisions, and repetition to illustrate order of operations. Algorithms can use decision points, binary decisions to select one path of operation or another, and loops.
  • Top-down design breaks problems into simpler tasks. Object-oriented programming (OOP) analysis uses classes: base classes which define characteristics, and derived classes to build upon base classes, providing functionality and reusability
  • Compilation turns programming code into machine language, and interpreters translate the code line by line. Integrated Development Environments (IDEs) help programmers write and test code.
  • Debugging is fixing errors in programs. Logic errors (program runs but not correctly) and runtime errors (errors when the program runs) are two types of errors that require fixing.
  • Testing involves internal checks of a program by the people who design it; external testing sees how the program is used by others; and releasing the product to manufacturers (RTM).
  • Different programming languages serve different purposes, and appropriate selection relies on factors such as available resources, speed requirements, and the target application. Visual programming languages use graphical components to create the program.

Technology in Action - Chapter 11

  • Chapter 11 focuses on information systems and databases.
  • A database is a collection of related data that is stored, sorted, and organized. Advantages include efficient data management, sharing information, and ensuring data integrity (accuracy). Data integrity is crucial for accurate and reliable data in the database. -Relational Databases organize data into tables, linking related data. Relationships between tables include one-to-many, one-to-one, and many-to-many.
  • A Database Management System (DBMS) is software that allows a computer to function as a database. It performs operations such as storing, viewing, adding, deleting, modifying, querying, and outputting data.
  • Data in a DBMS is stored in fields, records, and tables. Fields are categories of data, records are related groups of fields, and tables are groups of related records. Different field data-types include Short Text, Long Text, Numbers, Large Numbers, Currency, Dates/Times, Yes/No, Calculated fields, OLE Objects, and Hyperlinks.
  • Field properties define field data such as field size limits, default values, and labels for fields.
  • Data validation ensures only correct data is entered into the database using techniques such as Range Check, Field Constraint, Completeness Check, Consistency Check, an Alphabetic/Numeric Check.
  • Viewing and sorting data gives users options for ascending or descending order.
  • Extraction data using filtering and querying returns matching records from databases.
  • Outputting information involves reports. Transferring data into other programs is another form of outputting database data. Data warehousing stores and analyzes data to find patterns. Data mining is a method that is used to analyze data to identify trends and patterns. The goal is to help businesses predict customer behavior. Data mining uses anomaly detection, association grouping, classification, clustering, estimation, and visualization methods to process data

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Computer Networks PDF

Description

This quiz explores fundamental concepts of computer networks, including their components, advantages, and disadvantages. It covers terms like bandwidth, types of networks, and the functionality of various networking equipment. Additionally, it touches on network security aspects such as malware and spam filtering.

Use Quizgecko on...
Browser
Browser