Podcast
Questions and Answers
What is the main characteristic of a Local Area Network (LAN)?
What is the main characteristic of a Local Area Network (LAN)?
A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.
A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.
False (B)
What is the function of a server in a network?
What is the function of a server in a network?
Manages network resources such as storage, files, and peripherals.
A ______ enables a computer to connect with the file server and share data with other computers on the network.
A ______ enables a computer to connect with the file server and share data with other computers on the network.
Signup and view all the answers
Match the following network devices to their functions:
Match the following network devices to their functions:
Signup and view all the answers
Which of the following defines a foreign key?
Which of the following defines a foreign key?
Signup and view all the answers
Data duplication occurs when an attribute is stored multiple times across different tables.
Data duplication occurs when an attribute is stored multiple times across different tables.
Signup and view all the answers
What is the primary purpose of normalization in a database?
What is the primary purpose of normalization in a database?
Signup and view all the answers
A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.
A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.
Signup and view all the answers
Match the components of a data dictionary with their descriptions:
Match the components of a data dictionary with their descriptions:
Signup and view all the answers
What characteristic must a database possess to be considered in Second Normal Form (2NF)?
What characteristic must a database possess to be considered in Second Normal Form (2NF)?
Signup and view all the answers
Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.
Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.
Signup and view all the answers
What happens in Third Normal Form (3NF)?
What happens in Third Normal Form (3NF)?
Signup and view all the answers
In a relational database, each record in a table must be uniquely identified by a __________ key.
In a relational database, each record in a table must be uniquely identified by a __________ key.
Signup and view all the answers
What is a primary characteristic of Structured Query Language (SQL)?
What is a primary characteristic of Structured Query Language (SQL)?
Signup and view all the answers
What is the primary function of a repeater in network transmission?
What is the primary function of a repeater in network transmission?
Signup and view all the answers
A MAC address identifies the connection address of a computer on the Internet.
A MAC address identifies the connection address of a computer on the Internet.
Signup and view all the answers
What is the purpose of an IP address?
What is the purpose of an IP address?
Signup and view all the answers
In a __________ network, each node is connected to the central file server by its own cable.
In a __________ network, each node is connected to the central file server by its own cable.
Signup and view all the answers
Match the following network topologies with their characteristics:
Match the following network topologies with their characteristics:
Signup and view all the answers
Which layer of the OSI model is responsible for reassembling data packets at their destination?
Which layer of the OSI model is responsible for reassembling data packets at their destination?
Signup and view all the answers
A broken cable in a star network will stop all communication within the network.
A broken cable in a star network will stop all communication within the network.
Signup and view all the answers
What does CSMA/CD stand for?
What does CSMA/CD stand for?
Signup and view all the answers
The __________ layer of the OSI model converts data into a physical signal.
The __________ layer of the OSI model converts data into a physical signal.
Signup and view all the answers
Match the following communication protocols with their functions:
Match the following communication protocols with their functions:
Signup and view all the answers
What does the Presentation layer of the OSI model primarily do?
What does the Presentation layer of the OSI model primarily do?
Signup and view all the answers
In a peer-to-peer network, one computer has the authority to manage all resources.
In a peer-to-peer network, one computer has the authority to manage all resources.
Signup and view all the answers
What is the main advantage of using communication protocols?
What is the main advantage of using communication protocols?
Signup and view all the answers
A media converter allows two __________ types or protocols to connect with each other.
A media converter allows two __________ types or protocols to connect with each other.
Signup and view all the answers
What happens when two stations attempt to transmit simultaneously in a network?
What happens when two stations attempt to transmit simultaneously in a network?
Signup and view all the answers
A token in a token passing network accommodates multiple packets at once.
A token in a token passing network accommodates multiple packets at once.
Signup and view all the answers
What is the primary function of VoIP technology?
What is the primary function of VoIP technology?
Signup and view all the answers
The measure of the capacity of a communication channel is known as __________.
The measure of the capacity of a communication channel is known as __________.
Signup and view all the answers
Match each transmission media type with its description:
Match each transmission media type with its description:
Signup and view all the answers
Which method is NOT used for error detection in data transmission?
Which method is NOT used for error detection in data transmission?
Signup and view all the answers
A primary key uniquely identifies a record in a table.
A primary key uniquely identifies a record in a table.
Signup and view all the answers
What is the difference between a primary key and a foreign key?
What is the difference between a primary key and a foreign key?
Signup and view all the answers
Broadband refers to high-speed Internet access that is __________.
Broadband refers to high-speed Internet access that is __________.
Signup and view all the answers
Which of the following is a characteristic of a logical data model?
Which of the following is a characteristic of a logical data model?
Signup and view all the answers
Echo checking requires the original sender to be involved in verifying data.
Echo checking requires the original sender to be involved in verifying data.
Signup and view all the answers
Describe the role of a checksum in data transmission.
Describe the role of a checksum in data transmission.
Signup and view all the answers
RFID uses __________ emitted from an RFID reader to activate the tag.
RFID uses __________ emitted from an RFID reader to activate the tag.
Signup and view all the answers
Which type of data transmission method uses very fine glass strands?
Which type of data transmission method uses very fine glass strands?
Signup and view all the answers
Match the error correction method to its description:
Match the error correction method to its description:
Signup and view all the answers
Study Notes
Network Scope
- Local Area Network (LAN): Covers a limited area like an office or building. Uses cabling or wireless technology.
- Metropolitan Area Network (MAN): Covers a populated area or community. Employs fiber optic or wireless technology.
- Wide Area Network (WAN): Spans a large geographical area, potentially a country or more. Uses fiber optic, public phone systems, communication satellites, or undersea cables.
Network Components and Their Purpose
- Network Card: An electronic device allowing a computer to connect to a file server and share data with other network computers. Often built into the motherboard.
- Server: Manages network resources like storage, files, hardware devices, peripherals (printers), communications, email, and web services.
- Switched Hub: A connection point for nodes. It examines data packet destinations, forwarding packets to their intended recipients.
- Repeater: Regenerates or amplifies signals that weaken or distort during network transmission, especially over long distances.
- Wireless Access Point (WAP): Enables Wi-Fi enabled devices to connect to a network, typically through a router. Used in Wi-Fi hotspots.
- Media Converter: Allows dissimilar media types (e.g., fiber optic to copper cable) or protocols to connect.
- MAC Address: Identifies the unique physical address of a computer's network interface card (NIC) on a LAN.
- IP Address: Identifies a computer's connection address on the internet.
IP and MAC Addresses
- MAC Address: Uniquely identifies a computer's network interface card (NIC).
- IP Address: Identifies the computer's connection on the internet.
Network Types
- Server-Based Network: A server manages resources and security. Multiple client computers (or "dumb terminals") request resources from the server.
- Peer-to-Peer Network: All computers have equal status; each computer supplies and consumes resources. Each computer controls shared resource access.
Network Topologies
- Bus Network: All nodes connect directly to a main cable (backbone). Data travels in both directions.
- Ring Network: Each node connects to two adjacent nodes. A token passes data in one direction only; this prevents collisions.
- Star Network: A central file server connects all nodes via their own cables. The file server controls all network communication.
Communication Protocols
- Communication Protocol: Set of rules enabling coherent device communication.
- Advantages of Communication Protocols: Manufacturers can connect devices, and users have more choices in devices.
- TCP/IP: Dictates information packaging and delivery. TCP handles file transfer and packet allocation; IP handles packet transfer between nodes using IP addresses.
- Ethernet: Defines networking protocol and physical connections, covering the physical and transport layers.
- CSMA/CD: Rules for device responses when two devices try to use a data channel simultaneously (collision). Standard ethernet uses CSMA/CD for physical traffic monitoring.
- Token Passing: A token carries data across a ring network, preventing collisions.
- Wi-Fi: Connects wireless devices to a network (e.g., within a hotspot) over a short distance. Can be open or requires a password.
- Bluetooth: Enables device connection if both are Bluetooth enabled, requiring pairing if needed.
- VoIP: Enables telephone calls via computer networks, converting analog to digital data packets. Supports real-time, two-way conversations.
- RFID: Tags containing data are activated by radio waves from a reader, transferring that data back to the reader. Tags can be active or passive.
Bandwidth and Broadband
- Bandwidth: Capacity of a communication channel, measured in Hz or transmission rates (e.g., kbps).
- Broadband: High-speed, always-on internet access. Commonly uses DSL, coaxial, or fiber optic technologies. Bandwidth greater than 3 kHz (often >300 MHz).
Transmission Media
- Fiber Optic: Uses glass strands to transmit light beams at high speed over long distances; secure and interference-free.
- Metal Cable: Uses copper cabling for shorter distances. Types include coaxial, twisted pair, and unshielded twisted pair; shielding prevents interference. Relatively less secure than other methods, as data can potentially be intercepted. Wireless: A range of radio-based data transmission methods, including Bluetooth for short distance, Wi-Fi to connect to a LAN.
- Wireless: Data transmission via radio waves.
Data Transmission Error Detection/correction
- Parity Bits: A bit that ensures the sum of all bits (including parity) is odd (odd parity) or even (even parity). Simple detection, but isn't always effective at correcting errors or detecting errors with even numbers of affected bits.
- Checksums: Algorithm applied to a data block to generate a checksum. The checksum is added with the data block and then recalculated later to see if it changed.
- Echo Checking: Data is sent back to the sender, and compared for differences to determine if retransmission is needed.
- CRC (Cyclic Redundancy Check): Fixed number (hashing algorithm) used to divide the data block to calculate a checksum. If checksum is incorrect, a source of the error is detected.
Relational Databases
- Relational Database: Multiple tables linked by relationships using primary keys to uniquely identify records and foreign keys to link tables.
Logical vs Physical Data Models
- Logical Data Model: Designed during database design; not software-specific; identifies entities, relationships, attributes, primary and foreign keys.
- Physical Data Model: Created during implementation, specifying table structures, column names, data types, keys, and validation rules.
Database Terminology
- Attribute: Value of an entity (e.g., name, value).
- Entity: Object described in a database (ex: person, place).
- Primary Key: Uniquely identifies a record in a table.
- Composite Key: Multiple attributes used to identify a unique record.
- Foreign Key: Primary key from one table, used as non-key attribute in another to link tables.
- Referential Integrity: Foreign keys must correspond to valid primary keys.
- Data Duplication: An attribute repeated multiple times in the database.
- Data Inconsistency: An attribute has multiple values for an entity.
Database Normalization
- First Normal Form (1NF): No repeating groups.
- Second Normal Form (2NF): In 1NF and no partial key dependencies.
- Third Normal Form (3NF): In 2NF and no non-key dependencies.
Data Dictionary
- Data Dictionary: Contains information about database data: attribute names, data types, sizes, formats, default values, tables, keys, validation rules, indices, input masks.
SQL and QBE
- SQL (Structured Query Language): Programming language used for database creation, access, and manipulation.
- QBE (Query By Example): Graphical method for database querying. User constructs queries using examples, resulting in SQL-based code.
- Comparison: SQL requires technical knowledge to create databases and generate queries; QBE requires less technical skill.
Normalization Advantages/Disadvantages
- Advantages: Reduced redundancy, increased data integrity and consistency.
- Disadvantages: Increased complexity in database design.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of different types of computer networks, including LAN, MAN, and WAN. Additionally, explore various network components and their functions. This quiz will help solidify your understanding of fundamental networking concepts.