Computer Networks Overview
44 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of symmetric-key encryption?

  • To use different keys for encryption and decryption
  • To use the same key for both encryption and decryption (correct)
  • To allow multiple users to decrypt the same message
  • To enhance data transmission speed
  • What is the main purpose of an intranet?

  • To connect millions of computer systems globally
  • To provide extensive services such as email and file transfer
  • To allow remote access to a private network for external users
  • To facilitate communication and improve data sharing within a specific organization (correct)
  • What should you do to secure your wireless network upon setup?

  • Leave all security features enabled by default
  • Use a firewall on devices only
  • Create an open network for neighbors
  • Enable security features on the router or access point (correct)
  • What characterizes a Virtual Private Network (VPN)?

    <p>It connects multiple computer systems as if they were in a local network. (B)</p> Signup and view all the answers

    Which statement best describes the Internet of Things (IoT)?

    <p>It involves individual devices that can communicate and exchange data via the Internet. (D)</p> Signup and view all the answers

    Which of the following is a method to enhance network security?

    <p>Blocking access to wireless devices by MAC address (B)</p> Signup and view all the answers

    Which security feature is commonly associated with wireless routers?

    <p>WEP Wireless security (A)</p> Signup and view all the answers

    What defines an extranet?

    <p>A network that allows controlled access to specific users over the Internet. (D)</p> Signup and view all the answers

    How does a peer-to-peer (P2P) network function?

    <p>All systems in the network are both clients and servers, sharing resources directly. (C)</p> Signup and view all the answers

    What is a function of a router hardware firewall?

    <p>To protect your connection and block unwanted traffic (A)</p> Signup and view all the answers

    What is a defining feature of a Personal Area Network (PAN)?

    <p>It centers around an individual’s workspace and typically uses Bluetooth technology. (B)</p> Signup and view all the answers

    What method does NOT enhance the security of a wireless network?

    <p>Using a weak password for access (A)</p> Signup and view all the answers

    What aspect distinguishes the Internet from intranets and extranets?

    <p>The Internet is a decentralized global network connecting millions of systems. (C)</p> Signup and view all the answers

    What is the purpose of a PIN in network security?

    <p>To authenticate devices connecting to the network (D)</p> Signup and view all the answers

    In wireless networking, how do devices typically communicate?

    <p>Using radio transmissions without physical connections. (A)</p> Signup and view all the answers

    Which method can be used to prevent physical access to a network?

    <p>Shielding the building from electromagnetic interference (B)</p> Signup and view all the answers

    What is the primary function of a server in a computer network?

    <p>To provide services to clients (A)</p> Signup and view all the answers

    Which network device can identify which device is connected to which port?

    <p>Switch (D)</p> Signup and view all the answers

    What is typically a characteristic of a LAN?

    <p>Allows for high data transfer rates (C)</p> Signup and view all the answers

    What distinguishes a WLAN from a LAN?

    <p>WLAN allows for mobile devices to connect wirelessly (D)</p> Signup and view all the answers

    Which type of network uses logical partitioning to separate departments?

    <p>VLAN (C)</p> Signup and view all the answers

    What is an example of a WAN?

    <p>The Internet (C)</p> Signup and view all the answers

    Which device serves as an intermediary between multiple networks?

    <p>Router (C)</p> Signup and view all the answers

    What is a primary purpose of a Storage Area Network (SAN)?

    <p>To provide easy access to large storage devices for servers (B)</p> Signup and view all the answers

    Which of the following describes the function of a hub in a network?

    <p>Acts only as the central connection point for devices (C)</p> Signup and view all the answers

    What differentiates a client from a server in a network?

    <p>Clients request services from servers (C)</p> Signup and view all the answers

    Which of the following is NOT a potential health concern associated with extensive use of mobile devices and wireless networks?

    <p>Improved sleep quality (B)</p> Signup and view all the answers

    What is the primary purpose of a "Wireless Network Adapter" in a wireless network?

    <p>To enable devices to communicate wirelessly with the network (B)</p> Signup and view all the answers

    Which of the following software components helps a server automatically assign an IP address to a client device?

    <p>DHCP (B)</p> Signup and view all the answers

    Which of the following is NOT considered a hardware device associated with a wireless network?

    <p>Web Browser (B)</p> Signup and view all the answers

    Which of the following best describes the purpose of a "Wireless Repeater" in a wireless network?

    <p>To amplify and extend the range of the wireless signal (A)</p> Signup and view all the answers

    Which of the following options is a potential disadvantage of using mobile devices and wireless networks?

    <p>Social isolation and reduced face-to-face interaction (B)</p> Signup and view all the answers

    Which of the following is NOT considered a type of security software used to protect a network?

    <p>Web browser (C)</p> Signup and view all the answers

    What is the primary function of a software firewall in a network?

    <p>To detect and prevent unauthorized or malicious access to the network (C)</p> Signup and view all the answers

    What is the primary characteristic of Wi-Fi that makes it suitable for home use?

    <p>It has a small transmitting radius, usually less than 20m. (C)</p> Signup and view all the answers

    Which generation of mobile telecommunication technology introduced features like video calls and mobile TV?

    <p>3G (B)</p> Signup and view all the answers

    What is a key feature of 4G technology regarding communication?

    <p>It prioritizes IP-based communication. (B)</p> Signup and view all the answers

    Which characteristic differentiates 5G from previous generations?

    <p>5G is also known as the Tactile Internet. (C)</p> Signup and view all the answers

    What does WiMAX provide that distinguishes it from traditional Wi-Fi networks?

    <p>Connectivity in remote and isolated areas. (B)</p> Signup and view all the answers

    What is one of the major vulnerabilities of wireless networks compared to wired networks?

    <p>They are more susceptible to unauthorized access. (C)</p> Signup and view all the answers

    What role does encryption serve in wireless network security?

    <p>Protects data from unauthorized access. (C)</p> Signup and view all the answers

    Which feature is NOT true regarding 4G LTE technology?

    <p>It includes support for traditional circuit telephony services. (C)</p> Signup and view all the answers

    Which of the following is a feature of wireless sensor networks?

    <p>They measure data for environmental or physical parameters. (A)</p> Signup and view all the answers

    In which scenario would Wi-Fi not be the preferred network type?

    <p>In isolated regions needing internet access. (C)</p> Signup and view all the answers

    Flashcards

    Intranet

    A private network using standard protocols for communication within an organization.

    Internet

    A global WAN connecting millions of computers providing various services.

    Internet of Things (IoT)

    A network of devices that connect to the Internet and communicate data.

    Extranet

    A network allowing controlled Internet access to specific users for a LAN.

    Signup and view all the flashcards

    VPN

    A network connecting remote clients as if they were within a LAN.

    Signup and view all the flashcards

    PAN

    A network connecting devices around an individual, often using Bluetooth.

    Signup and view all the flashcards

    Peer-to-Peer (P2P)

    A decentralized network where all computers act as both clients and servers.

    Signup and view all the flashcards

    Wireless Networking

    Communication between devices through radio transmissions without physical connections.

    Signup and view all the flashcards

    Radiofrequency fields

    Waves emitted by mobile devices that can cause tissue heating.

    Signup and view all the flashcards

    Dynamic Host Configuration Protocol (DHCP)

    Protocol that automatically assigns IP addresses to client devices.

    Signup and view all the flashcards

    Wireless Access Point (WAP)

    Device that connects wireless devices to a network.

    Signup and view all the flashcards

    Mobile device health concerns

    Issues like brain tumors and hypersensitivity due to extensive device use.

    Signup and view all the flashcards

    Wireless network adapter (NIC)

    Device needed for each device to connect to a wireless network.

    Signup and view all the flashcards

    Software firewall

    System that regulates data flow in and out of a network or PC.

    Signup and view all the flashcards

    Node

    Any device that connects to the Internet, like PCs or tablets.

    Signup and view all the flashcards

    Ethernet over power line

    Uses electrical wires to transmit Ethernet signals to wireless devices.

    Signup and view all the flashcards

    Computer Network

    A group of connected computer systems that can communicate and exchange data.

    Signup and view all the flashcards

    Server

    A computer system or software that provides services to other computers on a network.

    Signup and view all the flashcards

    Client

    A computer system or software that requests services from a server.

    Signup and view all the flashcards

    Hub

    A device that connects multiple computers on a single network using ports.

    Signup and view all the flashcards

    Switch

    A networking device that connects devices on a local area network and directs data to the appropriate device.

    Signup and view all the flashcards

    Router

    A device that connects multiple networks and facilitates data exchange between them.

    Signup and view all the flashcards

    Symmetric-key encryption

    A method of encryption where the same key is used for both encryption and decryption.

    Signup and view all the flashcards

    Public-key encryption

    An encryption method that uses a public key for encryption and a private key for decryption.

    Signup and view all the flashcards

    Wireless Access Security

    The security measures applied when setting up a wireless network to prevent unauthorized access.

    Signup and view all the flashcards

    WEP

    Wired Equivalent Privacy, an older wireless security protocol that is now considered insecure.

    Signup and view all the flashcards

    WPA/WPA2

    Wi-Fi Protected Access; stronger wireless security protocols compared to WEP.

    Signup and view all the flashcards

    MAC address blocking

    A method to restrict access to a wireless network by allowing or denying specific devices based on their MAC addresses.

    Signup and view all the flashcards

    WPS (Wireless Protected Setup)

    A network security standard that allows users to easily secure a wireless home network.

    Signup and view all the flashcards

    Encryption software

    Software used to encode sensitive information before sending it over the Internet to secure it from unauthorized access.

    Signup and view all the flashcards

    Wi-Fi

    A wireless network technology used for connecting devices to the internet.

    Signup and view all the flashcards

    1G

    The first generation of mobile technology that utilized analog transmission.

    Signup and view all the flashcards

    3G

    Third generation mobile networking, supporting faster data and features like GPS and video calls.

    Signup and view all the flashcards

    4G

    Fourth generation mobile technology with high-speed internet access up to 1 Gbit/s.

    Signup and view all the flashcards

    5G

    Fifth generation mobile network known for very high speeds and low latency.

    Signup and view all the flashcards

    LTE

    Long Term Evolution; a standard for high-speed wireless communication.

    Signup and view all the flashcards

    WiMax

    Worldwide Interoperability for Microwave Access, providing high-speed internet over large distances.

    Signup and view all the flashcards

    Wireless Sensor Network

    A network of sensors linked wirelessly to monitor environments or physical conditions.

    Signup and view all the flashcards

    Encryption

    A method to protect data by converting it into a secure format during transmission.

    Signup and view all the flashcards

    Network Vulnerability

    The susceptibility of networks to unauthorized access or attacks.

    Signup and view all the flashcards

    Study Notes

    Computer Networks

    • A computer network is comprised of two or more computer systems that are connected and able to communicate and exchange data.
    • This connection can be wired or wireless.

    Server

    • A server can be a computer system or software application.
    • It provides services to other connected computer systems on the network.
    • It can manage file storage and sharing.

    Client

    • A client can be a computer system or software application.
    • It requests a service from a server.
    • It's part of the same network as the server.

    Hub

    • A hub does not share its own resources.
    • It receives requests from other computers and forwards them to the appropriate computer network component.
    • It's a fundamental component in constructing a computer network.

    Switch

    • A switch connects devices on a single network.
    • It determines the device connected to each port.
    • Data is transmitted to the exact port and network device, avoiding sending data to other devices.

    Router

    • A router is more sophisticated than both hubs and switches.
    • It connects multiple networks.
    • It facilitates efficient data exchange between network devices from different networks.

    Types of Networks

    LAN (Local Area Network)

    • Connects computer systems within a limited geographical area (e.g., a room, home, office).
    • Has high data transfer rates between connected computer systems.
    • Allows sharing of peripheral devices.
    • Eliminates the need to have separate devices for each computer.
    • Wired LANs use Ethernet cabling. LANs can be wired or wireless.

    WAN (Wide Area Network)

    • Connects computer systems spread over a large geographical area (e.g., the internet).
    • Allows individuals, businesses, and governments to conduct their daily activities regardless of location.

    WLAN (Wireless LAN)

    • Similar to LAN but uses a wireless connection method, allowing mobile devices and laptops to be connected as they move around.
    • Common method is Wi-Fi.
    • Often less secure than wired networks.

    Client-Server Mode

    • A single computer system acts as a server.
    • The server provides services to clients on the network.

    VLAN (Virtual LAN)

    • Allows partitioning of a LAN into logical separate networks.
    • More secure than a basic LAN.

    SAN (Storage Area Network)

    • Designed for efficient storage management.
    • Connects storage devices (like large hard drives) to server systems.

    Intranet

    • A group of private computer networks used within a specific organization (e.g., company, school).
    • Used for facilitating communication and sharing data within the organization.

    Internet

    • A global WAN connecting many computer systems.
    • Provides various services like the World Wide Web (WWW), email, and file transfer.
    • It's decentralized in design.
    • Internet of Things (IoT) uses devices that connect to the internet and have the capacity to communicate and exchange data.

    Extranet

    • A network that utilizes the internet to provide controlled access to specific users.

    VPN

    • Virtual Private Network.
    • Allows remote users to connect to the network.

    PAN (Personal Area Network)

    • Used for connecting devices in a personal workspace (e.g., Bluetooth).

    Peer-to-Peer (P2P)

    • A network model where every device acts as both a client and server.
    • Resources are distributed among the devices.

    Wireless Networking

    • All wireless devices communicate through radio transmissions.
    • Examples include cell phones, cordless keyboards, local area networks (LANs).

    Advantages and Disadvantages of Wireless Networks

    • Advantages include ease of set up, flexibility, and convenience.
    • Disadvantages include susceptibility to interference, potential security risks, and variability in speed compared to wired networks.

    Health Concerns

    • Excessive use of mobile devices and wireless networks can lead to health issues (e.g., tissue heating, brain tumors).
    • These networks use radiofrequency fields which require consideration.

    Hardware Needed for Wireless Networking

    • Modem: Allows connection to the internet.
    • Wireless Network Adapter (NIC): An adapter for each device that is connected to a wireless network.

    Software Needed for Wireless Networking

    • Dynamic Host Configuration Protocol (DHCP): Automatically assigns IP addresses.
    • Service Set Identifier (SSID): Used to differentiate one WLAN from another.

    Security

    • Security software: Protects from unauthorized access using various methods, like access controls, firewalls, and antivirus, anti-malware etc.

    Wireless Access Protocols

    • WAP (Wireless Application Protocol): Used to access information over mobile wireless networks.
    • Wi-Fi: Often used for small-scale networks.

    Generations of Wireless Communication

    • 1G: Uses analog transmission.
    • 2G: More secure than 1G and offers more digital data.
    • 3G: Offers better data transfer rates and includes video calls and mobile TV.
    • 4G (including LTE): Provides high-speed data transfer for use with cars, buses etc.
    • 5G: Supports high-speed, high-capacity communication requirements and is an evolving technology.

    Network Protocols

    • Protocols govern how computers connect to each other, enabling information to be exchanged and processed efficiently.

    Specific Protocols Mentioned (from the document)

    • WiMax
    • Ethernet
    • DHCP

    Security Methods for Wireless Networks

    • Passwords: Essential for secure access.
    • Antivirus: Essential protection for all systems.
    • Firewall software: To control network access.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Computer Network Concepts PDF

    Description

    This quiz covers the fundamental concepts of computer networks, including the roles of servers, clients, hubs, switches, and routers. Test your understanding of how these components interact in a networked environment. Ideal for those studying the basics of network architecture.

    More Like This

    Quiz sur les réseaux informatiques
    10 questions
    Basic Components of a Network
    11 questions
    Network Components and Servers Overview
    5 questions
    Use Quizgecko on...
    Browser
    Browser