Networking Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which network topology connects each device to a central switch?

  • Bus topology
  • Mesh topology
  • Star topology (correct)
  • Ring topology

What is the primary function of a firewall in network security?

  • To provide faster internet speeds.
  • To control network traffic and ensure safe data transmission. (correct)
  • To assign IP addresses to devices on the network.
  • To store user files and enable sharing.

Which of the following best describes the purpose of a MAC address?

  • To manage user accounts and permissions.
  • To encrypt data transmitted over the network.
  • To route network traffic between different networks.
  • To uniquely identify a device on a network. (correct)

Which protocol is primarily used for secure communication with web servers?

<p>HTTPS (C)</p> Signup and view all the answers

What is the role of a router in a computer network?

<p>To connect different networks together. (C)</p> Signup and view all the answers

What is the main purpose of 'defragmentation' on a hard drive?

<p>To reorganize stored files for efficiency. (A)</p> Signup and view all the answers

Which of the following describes a 'data packet'?

<p>A small unit of data packaged for network transmission. (D)</p> Signup and view all the answers

What is the purpose of two-factor authentication?

<p>To provide an additional layer of security. (C)</p> Signup and view all the answers

What is the role of a 'terminator' in a network?

<p>To absorb signals and prevent reflection. (A)</p> Signup and view all the answers

Which type of network typically covers a small geographical area such as an office building?

<p>LAN (Local Area Network) (C)</p> Signup and view all the answers

Which software helps maintain the smooth functioning of a device?

<p>Utilities software (C)</p> Signup and view all the answers

What is the purpose of 'encryption' in data transmission?

<p>To convert information into a scrambled form for security. (B)</p> Signup and view all the answers

Which of the following is an example of biometric security?

<p>Fingerprint recognition (A)</p> Signup and view all the answers

What is the first step in designing your own network?

<p>Identifying the purpose of the network. (D)</p> Signup and view all the answers

What is the main purpose of a Network Operating System (NOS)?

<p>To manage network resources and enable file sharing. (D)</p> Signup and view all the answers

Which of the following is the MOST complete definition of 'scalability' in the context of network design?

<p>The capacity of a network to expand by adding more devices or services. (D)</p> Signup and view all the answers

What is the potential consequence of data packets 'colliding' on a network?

<p>Data loss or errors. (B)</p> Signup and view all the answers

Why is it important to build networks sustainably?

<p>To ensure it is easy to maintain in the future. (D)</p> Signup and view all the answers

Which of the following best describes a 'brute-force attack'?

<p>Trying multiple password combinations to gain unauthorized access. (A)</p> Signup and view all the answers

Which of the following is NOT a typical function of an operating system?

<p>Running a virus scan. (A)</p> Signup and view all the answers

Flashcards

Network

A collection of computing devices connected to each other, either by wires or wirelessly.

Data packet

Small unit of data that is packaged to be sent across a network.

Network topology

A diagram that shows how devices in a network are connected and the network hardware.

Local Area Network (LAN)

A network that covers a small geographical area, e.g., a single building.

Signup and view all the flashcards

Server

A powerful computer that provides services to a network, such as file storage, user management, and email access.

Signup and view all the flashcards

Internet Service Provider (ISP)

A company that provides internet access and network equipment for connecting LANs to WANs.

Signup and view all the flashcards

Router

A hardware device that connects networks together.

Signup and view all the flashcards

Network switch

A switch that connects devices to form a wired network.

Signup and view all the flashcards

Network interface card (NIC)

A component in every network-connected device, with a pre-programmed MAC address for identification.

Signup and view all the flashcards

MAC address

A unique number in a NIC that identifies each device on a network.

Signup and view all the flashcards

Wireless access point

A device that allows connections to a network via Wi-Fi.

Signup and view all the flashcards

File server

A server that stores users' files and enables sharing on a network.

Signup and view all the flashcards

Firewall

A security system that controls network traffic, ensuring safe data transmission.

Signup and view all the flashcards

Protocol

A set of rules for transferring data between devices.

Signup and view all the flashcards

IP address

A unique number assigned to a computer on a network.

Signup and view all the flashcards

Domain name

The part of a URL specifying an internet location, e.g., google.com.

Signup and view all the flashcards

Scalability

The capacity to expand a network by adding more devices.

Signup and view all the flashcards

Cyber-attack

An attempt to gain unauthorized access to a network to damage or steal data.

Signup and view all the flashcards

Operating system

Software that manages computer hardware and software, acting as an interface between users and the system.

Signup and view all the flashcards

Backup

Copying files to another location as a precaution.

Signup and view all the flashcards

Study Notes

  • Network refers to a collection of computing devices connected by wired or wireless means.
  • Data consists of raw facts and figures.
  • A data packet is a small unit of data prepared for network transmission.
  • Sustainability is achieved when a network is easy to maintain long-term.
  • Equipment is fit for purpose when it is well-designed for its intended use.
  • An active internet connection provides a working link to the internet.
  • High bandwidth connections allow for rapid data transfer.
  • Interference occurs when signals disrupt data transmissions.
  • Network topology is a diagram showing the layout and connections of network devices.

Network Types

  • A Personal Area Network (PAN) covers a small area, connecting devices to a smartphone or computer.
  • A Local Area Network (LAN) operates within a limited area, such as a building.
  • A server is a powerful computer offering services like file storage and user management.
  • A Wide Area Network (WAN) spans a large geographical area, like a city or country.
  • An Internet Service Provider (ISP) offers internet access and equipment to connect LANs to WANs.

Network Hardware

  • Hardware includes physical computer components like processors and storage.
  • A router connects different networks.
  • A network switch creates a wired network by connecting devices.
  • Every network-connected device has a Network Interface Card (NIC) with a unique MAC address.
  • A MAC address uniquely identifies a device on a network via its NIC.
  • A wireless access point enables Wi-Fi connections to a network.
  • A file server stores and shares users' files on a network.
  • A firewall is a security system that manages network traffic to ensure data safety.
  • Network traffic is the amount of data moving through a network.
  • A terminator absorbs signals at the end of a network cable to prevent signal reflection.
  • Colliding occurs when data packets interfere with each other, leading to errors.
  • Ring topology connects devices in a circular manner.
  • Star topology connects each device to a central switch.

Protocols and Addressing

  • A protocol is a set of rules for data transfer between devices.
  • Transmission Control Protocol/Internet Protocol (TCP/IP) enables data transfer.
  • An IP address is a unique identifier assigned to a computer on a network.
  • Hypertext Transfer Protocol (HTTP) governs communication with web servers.
  • Hypertext Transfer Protocol Secure (HTTPS) enhances the security of HTTP with encryption.
  • A domain name is part of a URL that specifies an internet location.
  • Scalability is the ability to add more devices to a network.
  • A cyber-attack attempts to gain unauthorized network access for malicious purposes.
  • An administrator account has full control to change settings and manage users.
  • Cloud computing uses internet servers for computing services.
  • Online storage services store files on remote servers.
  • A Network Operating System (NOS) provides network management tools.
  • An operating system manages computer hardware and software, interfacing with users.
  • Utilities software maintains device functionality.
  • Software consists of programs that instruct a computer.
  • A device driver operates hardware connected to a computer.
  • Defragmentation reorganizes stored files for efficiency.
  • A hard disk drive is a removable storage device.
  • User management involves adding or removing users from a network.
  • Virus scanning checks files for malicious software.
  • Backup copies files to another location for safety.
  • Encryption converts information into a secure, unreadable format.
  • Connecting remotely means accessing a network from another location via the internet.

Data and Security

  • A bit is a binary digit, represented as 0 or 1.
  • Binary data is data represented using 0s and 1s.
  • A hacker attempts to gain unauthorized access to a system.
  • Parity-checking is a method for error detection.
  • A byte is a unit of data consisting of 8 bits.
  • A parity bit is added to data for error detection.
  • A dataset is a collection of related data.
  • A table arranges data in rows and columns.
  • A character is a single letter, digit, or symbol.
  • A brute-force attack attempts to guess passwords through multiple combinations.
  • Two-factor authentication requires two verification steps for login.
  • Fingerprint recognition identifies users based on their fingerprints.
  • Facial recognition authenticates users by matching facial images.
  • Authentication is the process of verifying user details.
  • Plaintext is unencrypted, readable text.
  • Artificial Intelligence (AI) allows systems to learn and adapt.
  • Machine learning enables computers to improve performance over time.
  • A two-dimensional parity check is used to identify data errors.
  • A parity byte is added to data for validation.
  • A block is a sequence of 0s and 1s.
  • A command line is a text-based interface for operating systems.
  • A Graphical User Interface (GUI) provides a visual interface for software interaction.
  • Bus topology connects all devices via a central cable.
  • Biometric security uses physical attributes for authentication.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

LAN Network Topology Patterns Quiz
10 questions
Networking Concepts Quiz - Chapter Overview
45 questions
Networking: LANs, Topologies, Ethernet
43 questions
Use Quizgecko on...
Browser
Browser