Computer Networks Overview
44 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main characteristic of a Local Area Network (LAN)?

  • Uses only satellite technology
  • Covers a highly populated area
  • Covers a restricted area, such as a building (correct)
  • Covers a large geographical area
  • A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.

    False (B)

    What is the function of a server in a network?

    Manages network resources such as storage, files, and peripherals.

    A ______ enables a computer to connect with the file server and share data with other computers on the network.

    <p>network card</p> Signup and view all the answers

    Match the following network devices to their functions:

    <p>Switched Hub = Connection point for nodes and checks destination addresses Repeater = Extends the range of signals Wireless Access Point = Connects wireless devices to a wired network Media Converter = Changes the form of a network signal</p> Signup and view all the answers

    Which of the following defines a foreign key?

    <p>A primary key in one entity appearing as a non-key in another entity (D)</p> Signup and view all the answers

    Data duplication occurs when an attribute is stored multiple times across different tables.

    <p>False (B)</p> Signup and view all the answers

    What is the primary purpose of normalization in a database?

    <p>To reduce redundancy and increase data integrity.</p> Signup and view all the answers

    A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.

    <p>referential</p> Signup and view all the answers

    Match the components of a data dictionary with their descriptions:

    <p>Field name = The name of the data attribute in a table Data type = The kind of data (e.g., integer, varchar) Field size = The maximum length of data that can be stored Validation rules = Rules to ensure data quality and integrity</p> Signup and view all the answers

    What characteristic must a database possess to be considered in Second Normal Form (2NF)?

    <p>It contains no partial key dependencies. (D)</p> Signup and view all the answers

    Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.

    <p>True (A)</p> Signup and view all the answers

    What happens in Third Normal Form (3NF)?

    <p>It eliminates non-key dependencies.</p> Signup and view all the answers

    In a relational database, each record in a table must be uniquely identified by a __________ key.

    <p>primary</p> Signup and view all the answers

    What is a primary characteristic of Structured Query Language (SQL)?

    <p>It is designed for creating and manipulating databases. (B)</p> Signup and view all the answers

    What is the primary function of a repeater in network transmission?

    <p>To regenerate or amplify weakened signals (A)</p> Signup and view all the answers

    A MAC address identifies the connection address of a computer on the Internet.

    <p>False (B)</p> Signup and view all the answers

    What is the purpose of an IP address?

    <p>To identify the connection address of a computer on the Internet.</p> Signup and view all the answers

    In a __________ network, each node is connected to the central file server by its own cable.

    <p>star</p> Signup and view all the answers

    Match the following network topologies with their characteristics:

    <p>Bus = Direct connection to a main cable Ring = Data travels in one direction only Star = Each node connects to a central server Peer-to-Peer = All computers have equal status</p> Signup and view all the answers

    Which layer of the OSI model is responsible for reassembling data packets at their destination?

    <p>Transport Layer (A)</p> Signup and view all the answers

    A broken cable in a star network will stop all communication within the network.

    <p>False (B)</p> Signup and view all the answers

    What does CSMA/CD stand for?

    <p>Carrier Sense Multiple Access with Collision Detection.</p> Signup and view all the answers

    The __________ layer of the OSI model converts data into a physical signal.

    <p>Physical</p> Signup and view all the answers

    Match the following communication protocols with their functions:

    <p>TCP = Handles file transfer and splits data into packets IP = Transfers packets of data from node to node Ethernet = Defines the networking protocol and physical connections OSI Model = A framework for understanding network communications layers</p> Signup and view all the answers

    What does the Presentation layer of the OSI model primarily do?

    <p>Converts data into the correct format (A)</p> Signup and view all the answers

    In a peer-to-peer network, one computer has the authority to manage all resources.

    <p>False (B)</p> Signup and view all the answers

    What is the main advantage of using communication protocols?

    <p>They allow devices from different manufacturers to communicate coherently.</p> Signup and view all the answers

    A media converter allows two __________ types or protocols to connect with each other.

    <p>dissimilar</p> Signup and view all the answers

    What happens when two stations attempt to transmit simultaneously in a network?

    <p>A collision occurs (D)</p> Signup and view all the answers

    A token in a token passing network accommodates multiple packets at once.

    <p>False (B)</p> Signup and view all the answers

    What is the primary function of VoIP technology?

    <p>To allow telephone calls over computer networks.</p> Signup and view all the answers

    The measure of the capacity of a communication channel is known as __________.

    <p>bandwidth</p> Signup and view all the answers

    Match each transmission media type with its description:

    <p>Fibre Optic = Transmits data using modulated light beams Metal Cable = Transmits electrical signals over short distances Wireless = Uses radio waves for data transmission Bluetooth = Connects devices over short ranges using low power</p> Signup and view all the answers

    Which method is NOT used for error detection in data transmission?

    <p>Binary Tree Checking (C)</p> Signup and view all the answers

    A primary key uniquely identifies a record in a table.

    <p>True (A)</p> Signup and view all the answers

    What is the difference between a primary key and a foreign key?

    <p>A primary key uniquely identifies a record, while a foreign key links one table to another.</p> Signup and view all the answers

    Broadband refers to high-speed Internet access that is __________.

    <p>always on</p> Signup and view all the answers

    Which of the following is a characteristic of a logical data model?

    <p>Identifies entities and relationships (B)</p> Signup and view all the answers

    Echo checking requires the original sender to be involved in verifying data.

    <p>True (A)</p> Signup and view all the answers

    Describe the role of a checksum in data transmission.

    <p>A checksum is an error detection method that checks whether data has been corrupted during transfer.</p> Signup and view all the answers

    RFID uses __________ emitted from an RFID reader to activate the tag.

    <p>radio waves</p> Signup and view all the answers

    Which type of data transmission method uses very fine glass strands?

    <p>Fibre Optic (B)</p> Signup and view all the answers

    Match the error correction method to its description:

    <p>Parity bits = Detects error presence but not correction Checksums = Validates data integrity during transfer Echo Checking = Sends data back to the original sender for verification Cyclic Redundancy Check = Uses division for error detection and correction</p> Signup and view all the answers

    Study Notes

    Network Scope

    • Local Area Network (LAN): Covers a limited area like an office or building. Uses cabling or wireless technology.
    • Metropolitan Area Network (MAN): Covers a populated area or community. Employs fiber optic or wireless technology.
    • Wide Area Network (WAN): Spans a large geographical area, potentially a country or more. Uses fiber optic, public phone systems, communication satellites, or undersea cables.

    Network Components and Their Purpose

    • Network Card: An electronic device allowing a computer to connect to a file server and share data with other network computers. Often built into the motherboard.
    • Server: Manages network resources like storage, files, hardware devices, peripherals (printers), communications, email, and web services.
    • Switched Hub: A connection point for nodes. It examines data packet destinations, forwarding packets to their intended recipients.
    • Repeater: Regenerates or amplifies signals that weaken or distort during network transmission, especially over long distances.
    • Wireless Access Point (WAP): Enables Wi-Fi enabled devices to connect to a network, typically through a router. Used in Wi-Fi hotspots.
    • Media Converter: Allows dissimilar media types (e.g., fiber optic to copper cable) or protocols to connect.
    • MAC Address: Identifies the unique physical address of a computer's network interface card (NIC) on a LAN.
    • IP Address: Identifies a computer's connection address on the internet.

    IP and MAC Addresses

    • MAC Address: Uniquely identifies a computer's network interface card (NIC).
    • IP Address: Identifies the computer's connection on the internet.

    Network Types

    • Server-Based Network: A server manages resources and security. Multiple client computers (or "dumb terminals") request resources from the server.
    • Peer-to-Peer Network: All computers have equal status; each computer supplies and consumes resources. Each computer controls shared resource access.

    Network Topologies

    • Bus Network: All nodes connect directly to a main cable (backbone). Data travels in both directions.
    • Ring Network: Each node connects to two adjacent nodes. A token passes data in one direction only; this prevents collisions.
    • Star Network: A central file server connects all nodes via their own cables. The file server controls all network communication.

    Communication Protocols

    • Communication Protocol: Set of rules enabling coherent device communication.
    • Advantages of Communication Protocols: Manufacturers can connect devices, and users have more choices in devices.
    • TCP/IP: Dictates information packaging and delivery. TCP handles file transfer and packet allocation; IP handles packet transfer between nodes using IP addresses.
    • Ethernet: Defines networking protocol and physical connections, covering the physical and transport layers.
    • CSMA/CD: Rules for device responses when two devices try to use a data channel simultaneously (collision). Standard ethernet uses CSMA/CD for physical traffic monitoring.
    • Token Passing: A token carries data across a ring network, preventing collisions.
    • Wi-Fi: Connects wireless devices to a network (e.g., within a hotspot) over a short distance. Can be open or requires a password.
    • Bluetooth: Enables device connection if both are Bluetooth enabled, requiring pairing if needed.
    • VoIP: Enables telephone calls via computer networks, converting analog to digital data packets. Supports real-time, two-way conversations.
    • RFID: Tags containing data are activated by radio waves from a reader, transferring that data back to the reader. Tags can be active or passive.

    Bandwidth and Broadband

    • Bandwidth: Capacity of a communication channel, measured in Hz or transmission rates (e.g., kbps).
    • Broadband: High-speed, always-on internet access. Commonly uses DSL, coaxial, or fiber optic technologies. Bandwidth greater than 3 kHz (often >300 MHz).

    Transmission Media

    • Fiber Optic: Uses glass strands to transmit light beams at high speed over long distances; secure and interference-free.
    • Metal Cable: Uses copper cabling for shorter distances. Types include coaxial, twisted pair, and unshielded twisted pair; shielding prevents interference. Relatively less secure than other methods, as data can potentially be intercepted. Wireless: A range of radio-based data transmission methods, including Bluetooth for short distance, Wi-Fi to connect to a LAN.
    • Wireless: Data transmission via radio waves.

    Data Transmission Error Detection/correction

    • Parity Bits: A bit that ensures the sum of all bits (including parity) is odd (odd parity) or even (even parity). Simple detection, but isn't always effective at correcting errors or detecting errors with even numbers of affected bits.
    • Checksums: Algorithm applied to a data block to generate a checksum. The checksum is added with the data block and then recalculated later to see if it changed.
    • Echo Checking: Data is sent back to the sender, and compared for differences to determine if retransmission is needed.
    • CRC (Cyclic Redundancy Check): Fixed number (hashing algorithm) used to divide the data block to calculate a checksum. If checksum is incorrect, a source of the error is detected.

    Relational Databases

    • Relational Database: Multiple tables linked by relationships using primary keys to uniquely identify records and foreign keys to link tables.

    Logical vs Physical Data Models

    • Logical Data Model: Designed during database design; not software-specific; identifies entities, relationships, attributes, primary and foreign keys.
    • Physical Data Model: Created during implementation, specifying table structures, column names, data types, keys, and validation rules.

    Database Terminology

    • Attribute: Value of an entity (e.g., name, value).
    • Entity: Object described in a database (ex: person, place).
    • Primary Key: Uniquely identifies a record in a table.
    • Composite Key: Multiple attributes used to identify a unique record.
    • Foreign Key: Primary key from one table, used as non-key attribute in another to link tables.
    • Referential Integrity: Foreign keys must correspond to valid primary keys.
    • Data Duplication: An attribute repeated multiple times in the database.
    • Data Inconsistency: An attribute has multiple values for an entity.

    Database Normalization

    • First Normal Form (1NF): No repeating groups.
    • Second Normal Form (2NF): In 1NF and no partial key dependencies.
    • Third Normal Form (3NF): In 2NF and no non-key dependencies.

    Data Dictionary

    • Data Dictionary: Contains information about database data: attribute names, data types, sizes, formats, default values, tables, keys, validation rules, indices, input masks.

    SQL and QBE

    • SQL (Structured Query Language): Programming language used for database creation, access, and manipulation.
    • QBE (Query By Example): Graphical method for database querying. User constructs queries using examples, resulting in SQL-based code.
    • Comparison: SQL requires technical knowledge to create databases and generate queries; QBE requires less technical skill.

    Normalization Advantages/Disadvantages

    • Advantages: Reduced redundancy, increased data integrity and consistency.
    • Disadvantages: Increased complexity in database design.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of different types of computer networks, including LAN, MAN, and WAN. Additionally, explore various network components and their functions. This quiz will help solidify your understanding of fundamental networking concepts.

    More Like This

    Test Your Knowledge
    5 questions

    Test Your Knowledge

    ResilientStrait avatar
    ResilientStrait
    Networks: Overview and Types
    29 questions
    Use Quizgecko on...
    Browser
    Browser