Podcast
Questions and Answers
What is the main characteristic of a Local Area Network (LAN)?
What is the main characteristic of a Local Area Network (LAN)?
- Uses only satellite technology
- Covers a highly populated area
- Covers a restricted area, such as a building (correct)
- Covers a large geographical area
A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.
A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.
False (B)
What is the function of a server in a network?
What is the function of a server in a network?
Manages network resources such as storage, files, and peripherals.
A ______ enables a computer to connect with the file server and share data with other computers on the network.
A ______ enables a computer to connect with the file server and share data with other computers on the network.
Match the following network devices to their functions:
Match the following network devices to their functions:
Which of the following defines a foreign key?
Which of the following defines a foreign key?
Data duplication occurs when an attribute is stored multiple times across different tables.
Data duplication occurs when an attribute is stored multiple times across different tables.
What is the primary purpose of normalization in a database?
What is the primary purpose of normalization in a database?
A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.
A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.
Match the components of a data dictionary with their descriptions:
Match the components of a data dictionary with their descriptions:
What characteristic must a database possess to be considered in Second Normal Form (2NF)?
What characteristic must a database possess to be considered in Second Normal Form (2NF)?
Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.
Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.
What happens in Third Normal Form (3NF)?
What happens in Third Normal Form (3NF)?
In a relational database, each record in a table must be uniquely identified by a __________ key.
In a relational database, each record in a table must be uniquely identified by a __________ key.
What is a primary characteristic of Structured Query Language (SQL)?
What is a primary characteristic of Structured Query Language (SQL)?
What is the primary function of a repeater in network transmission?
What is the primary function of a repeater in network transmission?
A MAC address identifies the connection address of a computer on the Internet.
A MAC address identifies the connection address of a computer on the Internet.
What is the purpose of an IP address?
What is the purpose of an IP address?
In a __________ network, each node is connected to the central file server by its own cable.
In a __________ network, each node is connected to the central file server by its own cable.
Match the following network topologies with their characteristics:
Match the following network topologies with their characteristics:
Which layer of the OSI model is responsible for reassembling data packets at their destination?
Which layer of the OSI model is responsible for reassembling data packets at their destination?
A broken cable in a star network will stop all communication within the network.
A broken cable in a star network will stop all communication within the network.
What does CSMA/CD stand for?
What does CSMA/CD stand for?
The __________ layer of the OSI model converts data into a physical signal.
The __________ layer of the OSI model converts data into a physical signal.
Match the following communication protocols with their functions:
Match the following communication protocols with their functions:
What does the Presentation layer of the OSI model primarily do?
What does the Presentation layer of the OSI model primarily do?
In a peer-to-peer network, one computer has the authority to manage all resources.
In a peer-to-peer network, one computer has the authority to manage all resources.
What is the main advantage of using communication protocols?
What is the main advantage of using communication protocols?
A media converter allows two __________ types or protocols to connect with each other.
A media converter allows two __________ types or protocols to connect with each other.
What happens when two stations attempt to transmit simultaneously in a network?
What happens when two stations attempt to transmit simultaneously in a network?
A token in a token passing network accommodates multiple packets at once.
A token in a token passing network accommodates multiple packets at once.
What is the primary function of VoIP technology?
What is the primary function of VoIP technology?
The measure of the capacity of a communication channel is known as __________.
The measure of the capacity of a communication channel is known as __________.
Match each transmission media type with its description:
Match each transmission media type with its description:
Which method is NOT used for error detection in data transmission?
Which method is NOT used for error detection in data transmission?
A primary key uniquely identifies a record in a table.
A primary key uniquely identifies a record in a table.
What is the difference between a primary key and a foreign key?
What is the difference between a primary key and a foreign key?
Broadband refers to high-speed Internet access that is __________.
Broadband refers to high-speed Internet access that is __________.
Which of the following is a characteristic of a logical data model?
Which of the following is a characteristic of a logical data model?
Echo checking requires the original sender to be involved in verifying data.
Echo checking requires the original sender to be involved in verifying data.
Describe the role of a checksum in data transmission.
Describe the role of a checksum in data transmission.
RFID uses __________ emitted from an RFID reader to activate the tag.
RFID uses __________ emitted from an RFID reader to activate the tag.
Which type of data transmission method uses very fine glass strands?
Which type of data transmission method uses very fine glass strands?
Match the error correction method to its description:
Match the error correction method to its description:
Flashcards
Local Area Network (LAN)
Local Area Network (LAN)
A computer network covering a small geographical area, like an office or building, typically using cabling or wireless technology.
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
A computer network spanning a city or metropolitan area, often using fiber optic or wireless technology.
Wide Area Network (WAN)
Wide Area Network (WAN)
A computer network spanning a wide geographical area, covering a country or even multiple countries, using various technologies like fiber optics, satellites, and undersea cables.
Network Card
Network Card
Signup and view all the flashcards
Server
Server
Signup and view all the flashcards
Attribute
Attribute
Signup and view all the flashcards
Entity
Entity
Signup and view all the flashcards
Primary Key
Primary Key
Signup and view all the flashcards
Composite Key
Composite Key
Signup and view all the flashcards
Foreign Key
Foreign Key
Signup and view all the flashcards
Referential Integrity
Referential Integrity
Signup and view all the flashcards
Data Duplication
Data Duplication
Signup and view all the flashcards
Data Inconsistency
Data Inconsistency
Signup and view all the flashcards
First Normal Form (1NF)
First Normal Form (1NF)
Signup and view all the flashcards
Second Normal Form (2NF)
Second Normal Form (2NF)
Signup and view all the flashcards
Repeater
Repeater
Signup and view all the flashcards
Wireless Access Point (WAP)
Wireless Access Point (WAP)
Signup and view all the flashcards
Media Converter
Media Converter
Signup and view all the flashcards
MAC Address
MAC Address
Signup and view all the flashcards
IP Address
IP Address
Signup and view all the flashcards
Peer-to-peer network
Peer-to-peer network
Signup and view all the flashcards
Server-based network
Server-based network
Signup and view all the flashcards
Bus network
Bus network
Signup and view all the flashcards
Ring network
Ring network
Signup and view all the flashcards
Star network
Star network
Signup and view all the flashcards
Communication protocol
Communication protocol
Signup and view all the flashcards
Open System Interconnection (OSI) Model
Open System Interconnection (OSI) Model
Signup and view all the flashcards
Application layer
Application layer
Signup and view all the flashcards
Presentation layer
Presentation layer
Signup and view all the flashcards
Session layer
Session layer
Signup and view all the flashcards
Transport layer
Transport layer
Signup and view all the flashcards
Network layer
Network layer
Signup and view all the flashcards
Data Link layer
Data Link layer
Signup and view all the flashcards
Physical layer
Physical layer
Signup and view all the flashcards
Transmission Control Protocol/Internet Protocol (TCP/IP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
Signup and view all the flashcards
Ethernet
Ethernet
Signup and view all the flashcards
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Signup and view all the flashcards
Token
Token
Signup and view all the flashcards
Collision Detection
Collision Detection
Signup and view all the flashcards
Bluetooth
Bluetooth
Signup and view all the flashcards
Wi-Fi
Wi-Fi
Signup and view all the flashcards
Bandwidth
Bandwidth
Signup and view all the flashcards
Broadband
Broadband
Signup and view all the flashcards
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
Signup and view all the flashcards
Radio-Frequency Identification (RFID)
Radio-Frequency Identification (RFID)
Signup and view all the flashcards
Fiber Optic
Fiber Optic
Signup and view all the flashcards
Metal Cable
Metal Cable
Signup and view all the flashcards
Wireless
Wireless
Signup and view all the flashcards
Parity Bits
Parity Bits
Signup and view all the flashcards
Checksums
Checksums
Signup and view all the flashcards
Echo Checking
Echo Checking
Signup and view all the flashcards
Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC)
Signup and view all the flashcards
Relational Database
Relational Database
Signup and view all the flashcards
Logical Data Model
Logical Data Model
Signup and view all the flashcards
Physical Data Model
Physical Data Model
Signup and view all the flashcards
Study Notes
Network Scope
- Local Area Network (LAN): Covers a limited area like an office or building. Uses cabling or wireless technology.
- Metropolitan Area Network (MAN): Covers a populated area or community. Employs fiber optic or wireless technology.
- Wide Area Network (WAN): Spans a large geographical area, potentially a country or more. Uses fiber optic, public phone systems, communication satellites, or undersea cables.
Network Components and Their Purpose
- Network Card: An electronic device allowing a computer to connect to a file server and share data with other network computers. Often built into the motherboard.
- Server: Manages network resources like storage, files, hardware devices, peripherals (printers), communications, email, and web services.
- Switched Hub: A connection point for nodes. It examines data packet destinations, forwarding packets to their intended recipients.
- Repeater: Regenerates or amplifies signals that weaken or distort during network transmission, especially over long distances.
- Wireless Access Point (WAP): Enables Wi-Fi enabled devices to connect to a network, typically through a router. Used in Wi-Fi hotspots.
- Media Converter: Allows dissimilar media types (e.g., fiber optic to copper cable) or protocols to connect.
- MAC Address: Identifies the unique physical address of a computer's network interface card (NIC) on a LAN.
- IP Address: Identifies a computer's connection address on the internet.
IP and MAC Addresses
- MAC Address: Uniquely identifies a computer's network interface card (NIC).
- IP Address: Identifies the computer's connection on the internet.
Network Types
- Server-Based Network: A server manages resources and security. Multiple client computers (or "dumb terminals") request resources from the server.
- Peer-to-Peer Network: All computers have equal status; each computer supplies and consumes resources. Each computer controls shared resource access.
Network Topologies
- Bus Network: All nodes connect directly to a main cable (backbone). Data travels in both directions.
- Ring Network: Each node connects to two adjacent nodes. A token passes data in one direction only; this prevents collisions.
- Star Network: A central file server connects all nodes via their own cables. The file server controls all network communication.
Communication Protocols
- Communication Protocol: Set of rules enabling coherent device communication.
- Advantages of Communication Protocols: Manufacturers can connect devices, and users have more choices in devices.
- TCP/IP: Dictates information packaging and delivery. TCP handles file transfer and packet allocation; IP handles packet transfer between nodes using IP addresses.
- Ethernet: Defines networking protocol and physical connections, covering the physical and transport layers.
- CSMA/CD: Rules for device responses when two devices try to use a data channel simultaneously (collision). Standard ethernet uses CSMA/CD for physical traffic monitoring.
- Token Passing: A token carries data across a ring network, preventing collisions.
- Wi-Fi: Connects wireless devices to a network (e.g., within a hotspot) over a short distance. Can be open or requires a password.
- Bluetooth: Enables device connection if both are Bluetooth enabled, requiring pairing if needed.
- VoIP: Enables telephone calls via computer networks, converting analog to digital data packets. Supports real-time, two-way conversations.
- RFID: Tags containing data are activated by radio waves from a reader, transferring that data back to the reader. Tags can be active or passive.
Bandwidth and Broadband
- Bandwidth: Capacity of a communication channel, measured in Hz or transmission rates (e.g., kbps).
- Broadband: High-speed, always-on internet access. Commonly uses DSL, coaxial, or fiber optic technologies. Bandwidth greater than 3 kHz (often >300 MHz).
Transmission Media
- Fiber Optic: Uses glass strands to transmit light beams at high speed over long distances; secure and interference-free.
- Metal Cable: Uses copper cabling for shorter distances. Types include coaxial, twisted pair, and unshielded twisted pair; shielding prevents interference. Relatively less secure than other methods, as data can potentially be intercepted. Wireless: A range of radio-based data transmission methods, including Bluetooth for short distance, Wi-Fi to connect to a LAN.
- Wireless: Data transmission via radio waves.
Data Transmission Error Detection/correction
- Parity Bits: A bit that ensures the sum of all bits (including parity) is odd (odd parity) or even (even parity). Simple detection, but isn't always effective at correcting errors or detecting errors with even numbers of affected bits.
- Checksums: Algorithm applied to a data block to generate a checksum. The checksum is added with the data block and then recalculated later to see if it changed.
- Echo Checking: Data is sent back to the sender, and compared for differences to determine if retransmission is needed.
- CRC (Cyclic Redundancy Check): Fixed number (hashing algorithm) used to divide the data block to calculate a checksum. If checksum is incorrect, a source of the error is detected.
Relational Databases
- Relational Database: Multiple tables linked by relationships using primary keys to uniquely identify records and foreign keys to link tables.
Logical vs Physical Data Models
- Logical Data Model: Designed during database design; not software-specific; identifies entities, relationships, attributes, primary and foreign keys.
- Physical Data Model: Created during implementation, specifying table structures, column names, data types, keys, and validation rules.
Database Terminology
- Attribute: Value of an entity (e.g., name, value).
- Entity: Object described in a database (ex: person, place).
- Primary Key: Uniquely identifies a record in a table.
- Composite Key: Multiple attributes used to identify a unique record.
- Foreign Key: Primary key from one table, used as non-key attribute in another to link tables.
- Referential Integrity: Foreign keys must correspond to valid primary keys.
- Data Duplication: An attribute repeated multiple times in the database.
- Data Inconsistency: An attribute has multiple values for an entity.
Database Normalization
- First Normal Form (1NF): No repeating groups.
- Second Normal Form (2NF): In 1NF and no partial key dependencies.
- Third Normal Form (3NF): In 2NF and no non-key dependencies.
Data Dictionary
- Data Dictionary: Contains information about database data: attribute names, data types, sizes, formats, default values, tables, keys, validation rules, indices, input masks.
SQL and QBE
- SQL (Structured Query Language): Programming language used for database creation, access, and manipulation.
- QBE (Query By Example): Graphical method for database querying. User constructs queries using examples, resulting in SQL-based code.
- Comparison: SQL requires technical knowledge to create databases and generate queries; QBE requires less technical skill.
Normalization Advantages/Disadvantages
- Advantages: Reduced redundancy, increased data integrity and consistency.
- Disadvantages: Increased complexity in database design.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.