Podcast
Questions and Answers
What is the main characteristic of a Local Area Network (LAN)?
What is the main characteristic of a Local Area Network (LAN)?
- Uses only satellite technology
- Covers a highly populated area
- Covers a restricted area, such as a building (correct)
- Covers a large geographical area
A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.
A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.
False (B)
What is the function of a server in a network?
What is the function of a server in a network?
Manages network resources such as storage, files, and peripherals.
A ______ enables a computer to connect with the file server and share data with other computers on the network.
A ______ enables a computer to connect with the file server and share data with other computers on the network.
Match the following network devices to their functions:
Match the following network devices to their functions:
Which of the following defines a foreign key?
Which of the following defines a foreign key?
Data duplication occurs when an attribute is stored multiple times across different tables.
Data duplication occurs when an attribute is stored multiple times across different tables.
What is the primary purpose of normalization in a database?
What is the primary purpose of normalization in a database?
A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.
A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.
Match the components of a data dictionary with their descriptions:
Match the components of a data dictionary with their descriptions:
What characteristic must a database possess to be considered in Second Normal Form (2NF)?
What characteristic must a database possess to be considered in Second Normal Form (2NF)?
Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.
Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.
What happens in Third Normal Form (3NF)?
What happens in Third Normal Form (3NF)?
In a relational database, each record in a table must be uniquely identified by a __________ key.
In a relational database, each record in a table must be uniquely identified by a __________ key.
What is a primary characteristic of Structured Query Language (SQL)?
What is a primary characteristic of Structured Query Language (SQL)?
What is the primary function of a repeater in network transmission?
What is the primary function of a repeater in network transmission?
A MAC address identifies the connection address of a computer on the Internet.
A MAC address identifies the connection address of a computer on the Internet.
What is the purpose of an IP address?
What is the purpose of an IP address?
In a __________ network, each node is connected to the central file server by its own cable.
In a __________ network, each node is connected to the central file server by its own cable.
Match the following network topologies with their characteristics:
Match the following network topologies with their characteristics:
Which layer of the OSI model is responsible for reassembling data packets at their destination?
Which layer of the OSI model is responsible for reassembling data packets at their destination?
A broken cable in a star network will stop all communication within the network.
A broken cable in a star network will stop all communication within the network.
What does CSMA/CD stand for?
What does CSMA/CD stand for?
The __________ layer of the OSI model converts data into a physical signal.
The __________ layer of the OSI model converts data into a physical signal.
Match the following communication protocols with their functions:
Match the following communication protocols with their functions:
What does the Presentation layer of the OSI model primarily do?
What does the Presentation layer of the OSI model primarily do?
In a peer-to-peer network, one computer has the authority to manage all resources.
In a peer-to-peer network, one computer has the authority to manage all resources.
What is the main advantage of using communication protocols?
What is the main advantage of using communication protocols?
A media converter allows two __________ types or protocols to connect with each other.
A media converter allows two __________ types or protocols to connect with each other.
What happens when two stations attempt to transmit simultaneously in a network?
What happens when two stations attempt to transmit simultaneously in a network?
A token in a token passing network accommodates multiple packets at once.
A token in a token passing network accommodates multiple packets at once.
What is the primary function of VoIP technology?
What is the primary function of VoIP technology?
The measure of the capacity of a communication channel is known as __________.
The measure of the capacity of a communication channel is known as __________.
Match each transmission media type with its description:
Match each transmission media type with its description:
Which method is NOT used for error detection in data transmission?
Which method is NOT used for error detection in data transmission?
A primary key uniquely identifies a record in a table.
A primary key uniquely identifies a record in a table.
What is the difference between a primary key and a foreign key?
What is the difference between a primary key and a foreign key?
Broadband refers to high-speed Internet access that is __________.
Broadband refers to high-speed Internet access that is __________.
Which of the following is a characteristic of a logical data model?
Which of the following is a characteristic of a logical data model?
Echo checking requires the original sender to be involved in verifying data.
Echo checking requires the original sender to be involved in verifying data.
Describe the role of a checksum in data transmission.
Describe the role of a checksum in data transmission.
RFID uses __________ emitted from an RFID reader to activate the tag.
RFID uses __________ emitted from an RFID reader to activate the tag.
Which type of data transmission method uses very fine glass strands?
Which type of data transmission method uses very fine glass strands?
Match the error correction method to its description:
Match the error correction method to its description:
Flashcards
Local Area Network (LAN)
Local Area Network (LAN)
A computer network covering a small geographical area, like an office or building, typically using cabling or wireless technology.
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
A computer network spanning a city or metropolitan area, often using fiber optic or wireless technology.
Wide Area Network (WAN)
Wide Area Network (WAN)
A computer network spanning a wide geographical area, covering a country or even multiple countries, using various technologies like fiber optics, satellites, and undersea cables.
Network Card
Network Card
An electronic device in a computer that allows it to connect to a network, enabling data sharing and communication with other devices.
Signup and view all the flashcards
Server
Server
A central device in a network that manages and controls access to shared resources like files, printers, hardware, and software.
Signup and view all the flashcards
Attribute
Attribute
A field value that contains the entities for example (an actual value)
Signup and view all the flashcards
Entity
Entity
An object about which data is stored
Signup and view all the flashcards
Primary Key
Primary Key
Uniquely identifies a record in a table/tuple in an entity
Signup and view all the flashcards
Composite Key
Composite Key
Consists of more than one attribute which uniquely identify an entity occurrence
Signup and view all the flashcards
Foreign Key
Foreign Key
A primary key in one entity which appears as a non-key in another entity as a link
Signup and view all the flashcards
Referential Integrity
Referential Integrity
If a foreign key is used it must correspond to a valid/existing primary key
Signup and view all the flashcards
Data Duplication
Data Duplication
A (non-key) attribute is stored more than once in the database/table
Signup and view all the flashcards
Data Inconsistency
Data Inconsistency
An attribute for an entity has more than one value
Signup and view all the flashcards
First Normal Form (1NF)
First Normal Form (1NF)
A database is in 1NF if it contains no repeating groups.
Signup and view all the flashcards
Second Normal Form (2NF)
Second Normal Form (2NF)
A database is in 2NF if it is in 1NF and contains no partial key dependencies.
Signup and view all the flashcards
Repeater
Repeater
A device that regenerates or amplifies signals during network transmission. It's especially useful for long-distance communication, preventing signal weakening or distortion.
Signup and view all the flashcards
Wireless Access Point (WAP)
Wireless Access Point (WAP)
A device that allows Wi-Fi enabled devices to connect to a network. It typically connects to a router and provides wireless coverage to a specific area.
Signup and view all the flashcards
Media Converter
Media Converter
A device that enables communication between two different network media types or protocols. For example, it can connect a fiber optic cable to a copper cable.
Signup and view all the flashcards
MAC Address
MAC Address
A unique identifier assigned to each network interface card (NIC) on a local area network (LAN). It identifies the physical address of the device.
Signup and view all the flashcards
IP Address
IP Address
A unique numerical address assigned to each device connected to the internet. It identifies the device's location on the network.
Signup and view all the flashcards
Peer-to-peer network
Peer-to-peer network
A network where all computers have equal status. Each device can act as both a supplier and consumer of resources, with control over its own resource sharing.
Signup and view all the flashcards
Server-based network
Server-based network
A network with a central server managing resources and security. Multiple client devices rely on the server for access and data.
Signup and view all the flashcards
Bus network
Bus network
A network topology where all devices are connected to a single main cable. Data can travel in both directions.
Signup and view all the flashcards
Ring network
Ring network
A network topology where devices are connected in a circular loop. A token is passed from one device to the next, allowing only the token holder to transmit data. Data travels in one direction.
Signup and view all the flashcards
Star network
Star network
A network topology with a central server connected to each device via individual cables. All communication within the network passes through the server.
Signup and view all the flashcards
Communication protocol
Communication protocol
A set of rules that govern communication between different devices, ensuring they understand and interpret data correctly
Signup and view all the flashcards
Open System Interconnection (OSI) Model
Open System Interconnection (OSI) Model
A model that divides network communication into seven distinct layers, each responsible for specific tasks, ensuring smooth and organized data flow.
Signup and view all the flashcards
Application layer
Application layer
The layer in the OSI model responsible for presenting information and data to the end user. It interacts with the Presentation layer and handles user interface functions.
Signup and view all the flashcards
Presentation layer
Presentation layer
The layer in the OSI model responsible for data formatting and presentation. It converts information into the correct formats for transmission and handles encryption and compression.
Signup and view all the flashcards
Session layer
Session layer
The layer in the OSI model responsible for managing communication sessions. It establishes connections for communication and maintains the flow of data.
Signup and view all the flashcards
Transport layer
Transport layer
The layer in the OSI model responsible for dividing data into packets and ensuring their reliable delivery. It also handles packet reassembly at the destination.
Signup and view all the flashcards
Network layer
Network layer
The layer in the OSI model responsible for routing data packets through the network. It determines the best path and adds addresses to each packet.
Signup and view all the flashcards
Data Link layer
Data Link layer
The layer in the OSI model responsible for error detection and correction, data block synchronization, and converting packets into bits for transmission. It interacts with the Physical layer.
Signup and view all the flashcards
Physical layer
Physical layer
The layer in the OSI model responsible for converting data into electrical or optical signals for transmission over the physical medium. It interacts with the Data Link layer.
Signup and view all the flashcards
Transmission Control Protocol/Internet Protocol (TCP/IP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
A suite of protocols that defines how data is packaged, sent, and received on the internet. TCP handles file transfer and packet segmentation, while IP manages packet routing.
Signup and view all the flashcards
Ethernet
Ethernet
A networking protocol that defines the rules and physical connections for communication on a network. It covers the Physical and Transport layers of the OSI Model.
Signup and view all the flashcards
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
A set of rules that handle network collisions, where two devices try to transmit simultaneously. Ethernet networks use CSMA/CD to detect and resolve collisions.
Signup and view all the flashcards
Token
Token
A carrier for a packet that travels around a network, preventing packet collisions and ensuring orderly data transmission.
Signup and view all the flashcards
Collision Detection
Collision Detection
The process of detecting and resolving conflicts when two or more devices attempt to transmit data simultaneously on a shared network.
Signup and view all the flashcards
Bluetooth
Bluetooth
A short-range wireless communication technology that allows devices to connect and exchange data over a limited distance, typically within 10 meters.
Signup and view all the flashcards
Wi-Fi
Wi-Fi
A type of wireless technology using radio waves enabling computers to connect to a local area network (LAN) within a limited range, often 60-90 meters.
Signup and view all the flashcards
Bandwidth
Bandwidth
The range of frequencies or data rates available on a communication channel, determining the amount of data that can be transferred per unit of time.
Signup and view all the flashcards
Broadband
Broadband
High-speed internet access that is always connected, capable of handling multiple signals and data types simultaneously.
Signup and view all the flashcards
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
Transmission of voice calls over computer networks, converting analog voice signals into digital data packets.
Signup and view all the flashcards
Radio-Frequency Identification (RFID)
Radio-Frequency Identification (RFID)
A small tag containing a microchip storing data, activated by radio waves emitted from a reader. The tag transmits data back to the reader, enabling identification and tracking.
Signup and view all the flashcards
Fiber Optic
Fiber Optic
A method of data transmission using thin strands of glass to transmit light pulses at high speeds over long distances, providing secure and interference-free communication.
Signup and view all the flashcards
Metal Cable
Metal Cable
A method of data transmission using different types of copper cabling to transmit electrical signals over shorter distances. Examples include coaxial cable and twisted pair.
Signup and view all the flashcards
Wireless
Wireless
A method of data transmission using radio waves to transmit data between devices without physical cables. Examples include Bluetooth and Wi-Fi.
Signup and view all the flashcards
Parity Bits
Parity Bits
A method of detecting errors in data transmission by appending a parity bit to each byte. The parity bit reflects whether the number of 1 bits in the byte is odd or even.
Signup and view all the flashcards
Checksums
Checksums
A method of error detection by calculating a checksum value from a block of data and appending it to the block. The checksum is recalculated upon reception, and any mismatch indicates an error.
Signup and view all the flashcards
Echo Checking
Echo Checking
A method of error detection and correction where the receiver sends back a copy of the received data to the sender for comparison. Any discrepancy triggers retransmission of the original data.
Signup and view all the flashcards
Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC)
A method of error detection and correction using a mathematical algorithm to calculate a checksum, called a CRC, for a block of data. Any discrepancy in the CRC upon reception indicates an error.
Signup and view all the flashcards
Relational Database
Relational Database
A type of database organized as a collection of tables linked together through relationships. Data is structured in rows (records) and columns (attributes), and relationships are established using primary and foreign keys.
Signup and view all the flashcards
Logical Data Model
Logical Data Model
A data model that describes the logical structure of a database independently from the underlying software implementation. It defines entities, relationships, attributes, and primary/foreign keys.
Signup and view all the flashcards
Physical Data Model
Physical Data Model
A data model that specifies the physical implementation of a database, including details like tables, columns, data types, and storage mechanisms.
Signup and view all the flashcardsStudy Notes
Network Scope
- Local Area Network (LAN): Covers a limited area like an office or building. Uses cabling or wireless technology.
- Metropolitan Area Network (MAN): Covers a populated area or community. Employs fiber optic or wireless technology.
- Wide Area Network (WAN): Spans a large geographical area, potentially a country or more. Uses fiber optic, public phone systems, communication satellites, or undersea cables.
Network Components and Their Purpose
- Network Card: An electronic device allowing a computer to connect to a file server and share data with other network computers. Often built into the motherboard.
- Server: Manages network resources like storage, files, hardware devices, peripherals (printers), communications, email, and web services.
- Switched Hub: A connection point for nodes. It examines data packet destinations, forwarding packets to their intended recipients.
- Repeater: Regenerates or amplifies signals that weaken or distort during network transmission, especially over long distances.
- Wireless Access Point (WAP): Enables Wi-Fi enabled devices to connect to a network, typically through a router. Used in Wi-Fi hotspots.
- Media Converter: Allows dissimilar media types (e.g., fiber optic to copper cable) or protocols to connect.
- MAC Address: Identifies the unique physical address of a computer's network interface card (NIC) on a LAN.
- IP Address: Identifies a computer's connection address on the internet.
IP and MAC Addresses
- MAC Address: Uniquely identifies a computer's network interface card (NIC).
- IP Address: Identifies the computer's connection on the internet.
Network Types
- Server-Based Network: A server manages resources and security. Multiple client computers (or "dumb terminals") request resources from the server.
- Peer-to-Peer Network: All computers have equal status; each computer supplies and consumes resources. Each computer controls shared resource access.
Network Topologies
- Bus Network: All nodes connect directly to a main cable (backbone). Data travels in both directions.
- Ring Network: Each node connects to two adjacent nodes. A token passes data in one direction only; this prevents collisions.
- Star Network: A central file server connects all nodes via their own cables. The file server controls all network communication.
Communication Protocols
- Communication Protocol: Set of rules enabling coherent device communication.
- Advantages of Communication Protocols: Manufacturers can connect devices, and users have more choices in devices.
- TCP/IP: Dictates information packaging and delivery. TCP handles file transfer and packet allocation; IP handles packet transfer between nodes using IP addresses.
- Ethernet: Defines networking protocol and physical connections, covering the physical and transport layers.
- CSMA/CD: Rules for device responses when two devices try to use a data channel simultaneously (collision). Standard ethernet uses CSMA/CD for physical traffic monitoring.
- Token Passing: A token carries data across a ring network, preventing collisions.
- Wi-Fi: Connects wireless devices to a network (e.g., within a hotspot) over a short distance. Can be open or requires a password.
- Bluetooth: Enables device connection if both are Bluetooth enabled, requiring pairing if needed.
- VoIP: Enables telephone calls via computer networks, converting analog to digital data packets. Supports real-time, two-way conversations.
- RFID: Tags containing data are activated by radio waves from a reader, transferring that data back to the reader. Tags can be active or passive.
Bandwidth and Broadband
- Bandwidth: Capacity of a communication channel, measured in Hz or transmission rates (e.g., kbps).
- Broadband: High-speed, always-on internet access. Commonly uses DSL, coaxial, or fiber optic technologies. Bandwidth greater than 3 kHz (often >300 MHz).
Transmission Media
- Fiber Optic: Uses glass strands to transmit light beams at high speed over long distances; secure and interference-free.
- Metal Cable: Uses copper cabling for shorter distances. Types include coaxial, twisted pair, and unshielded twisted pair; shielding prevents interference. Relatively less secure than other methods, as data can potentially be intercepted. Wireless: A range of radio-based data transmission methods, including Bluetooth for short distance, Wi-Fi to connect to a LAN.
- Wireless: Data transmission via radio waves.
Data Transmission Error Detection/correction
- Parity Bits: A bit that ensures the sum of all bits (including parity) is odd (odd parity) or even (even parity). Simple detection, but isn't always effective at correcting errors or detecting errors with even numbers of affected bits.
- Checksums: Algorithm applied to a data block to generate a checksum. The checksum is added with the data block and then recalculated later to see if it changed.
- Echo Checking: Data is sent back to the sender, and compared for differences to determine if retransmission is needed.
- CRC (Cyclic Redundancy Check): Fixed number (hashing algorithm) used to divide the data block to calculate a checksum. If checksum is incorrect, a source of the error is detected.
Relational Databases
- Relational Database: Multiple tables linked by relationships using primary keys to uniquely identify records and foreign keys to link tables.
Logical vs Physical Data Models
- Logical Data Model: Designed during database design; not software-specific; identifies entities, relationships, attributes, primary and foreign keys.
- Physical Data Model: Created during implementation, specifying table structures, column names, data types, keys, and validation rules.
Database Terminology
- Attribute: Value of an entity (e.g., name, value).
- Entity: Object described in a database (ex: person, place).
- Primary Key: Uniquely identifies a record in a table.
- Composite Key: Multiple attributes used to identify a unique record.
- Foreign Key: Primary key from one table, used as non-key attribute in another to link tables.
- Referential Integrity: Foreign keys must correspond to valid primary keys.
- Data Duplication: An attribute repeated multiple times in the database.
- Data Inconsistency: An attribute has multiple values for an entity.
Database Normalization
- First Normal Form (1NF): No repeating groups.
- Second Normal Form (2NF): In 1NF and no partial key dependencies.
- Third Normal Form (3NF): In 2NF and no non-key dependencies.
Data Dictionary
- Data Dictionary: Contains information about database data: attribute names, data types, sizes, formats, default values, tables, keys, validation rules, indices, input masks.
SQL and QBE
- SQL (Structured Query Language): Programming language used for database creation, access, and manipulation.
- QBE (Query By Example): Graphical method for database querying. User constructs queries using examples, resulting in SQL-based code.
- Comparison: SQL requires technical knowledge to create databases and generate queries; QBE requires less technical skill.
Normalization Advantages/Disadvantages
- Advantages: Reduced redundancy, increased data integrity and consistency.
- Disadvantages: Increased complexity in database design.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.