ERP.pdf
Document Details
Uploaded by Deleted User
Tags
Full Transcript
PART 1a - IDENTIFICATION Identify what is being referred by the statement and write your answer in the Answer Key. 1. Connects computers within a limited geographical area such as a home, office, or a group of adjacent buildings. Local Area Networks (LAN) 2. Spans a large geographical area, linki...
PART 1a - IDENTIFICATION Identify what is being referred by the statement and write your answer in the Answer Key. 1. Connects computers within a limited geographical area such as a home, office, or a group of adjacent buildings. Local Area Networks (LAN) 2. Spans a large geographical area, linking networks across cities, countries, or even continents. Wide Area Networks (WAN) 3. Cover a larger area than LANS but are confined within the limits of a city or metropolitan area. They are often employed by Internet Service Providers (ISPs) to offer services to their clients in the same city. Metropolitan Area Networks (MAN): 4. Cater to individual users within a small range, typically a few meters around the user. For instance, the Bluetooth network connecting your smartphone, wireless headphones, and smartwatch. Personal Area Networks (PAN) 5. Technology that establishes a secure network connection over a public network, such as the Internet. It allows users to securely access a private network and share data remotely through public networks. Virtual Private Networks (VPN): A VPN 6. Refers to the arrangement or the pattern in which network devices (nodes) are connected to each other. The design and topology can greatly impact the network's robustness, scalability, and overall performance. Network topology 7. Is marked by all devices connecting directly to a central node or a hub. This central hub acts as a repeater, forwarding data received from any node to all other nodes in the network. The failure of one device doesn't cripple the network, but if the central hub fails, all communication breaks down. Star Topology 8. Each device (or node) connects to exactly two other devices, forming a circular network pathway. Information, in this case, can travel in one direction or both, passing through each device until it reaches its destination. However, the failure of a single device can disrupt the entire network. Ring Topology 9. All devices share a common communication line or cable, known as a bus. Data from the source computer travels in both directions to its destination. While this topology is easy to install and requires less cable, a fault or disruption in the main cable can bring down the entire network. Bus Topology 10. A unique setup where each node is interconnected to every other node in the network. This design provides high redundancy. If one path becomes unavailable, data can traverse through another path to reach the destination. However, this setup requires more cabling, making it more expensive and complex to implement. Mesh Topology 11.A hybrid topology, combining the characteristics of star and bus topologies. It contains root nodes (typically servers), from which connection hierarchically descends in a tree- like pattern to other network devices. A break in the connection can isolate a whole section of the network. Tree Topology 12. Pivotal devices that connect multiple networks and channel network traffic efficiently between them. If you consider your home network, the router acts as the linchpin connecting your home network (a LAN) to the vast expanse of the Internet (a WAN). Routers 13. Serve as connection points for devices on a network. They receive incoming data packets and redistribute them to the correct destination based on the packet's MAC (Media Access Control) address - a unique identifier for network interfaces. Switches 14. Robust computers engineered to deliver services to other devices (known as clients) within the network. These services can range from website hosting and email services to file storage and more. Servers 15. These are computing devices such as your personal computer, laptop, or smartphone that request and utilize services provided by servers. Clients can be thin (performing only basic tasks like input/output) or thick (handling more complex operations), depending on the workload they handle. Clients 16. A hardware component that enables a device to connect to a network. Whether wired or wireless, and translates the data produced by the computer into a format suitable for network transmission. Network Interface Cards (NIC) 17. Ethernet cables or Fiber Optic cables, provide a physical medium for devices to communicate in a network. In contrast, wireless networking relies on radio waves, eliminating the need for physical cables. Network Cables 18. Is an umbrella term used to describe a wide range of software that streamlines the operations, design, monitoring, and implementation of computer networks. Network software 19. A fundamental element for any networking system. It helps administrators and security personnel reduce network complexities, and manage, monitor, and better control network traffic. Network software 20. Plays a crucial role in managing a network infrastructure and simplifying IT operations by facilitating communication, security, content, and data sharing. Network software 21. Allows administrators to add or remove users from the network. This is particularly useful when hiring or relieving. User management 22. Lets administrators decide the location of data storage and control user access to that data. File management 23. Enables users to enjoy uninterrupted access to network resources. Access 24. A system that assist administrators in looking after security and preventing data breaches. Network security systems 25. Refers to the applications and services running on the network. It is a program that conveys network information, the status of the network, and the network requirements for particular resource availability and application. Application layer 26. These lies at the center of the architecture and is one of the most important components of the three layers. You could call it the brain of the whole system. Also called the controller or the control plane, this layer also includes the network control software and the network operating system within it. It is the entity in charge of receiving requirements from the applications and translating the same to the network components. The control of the infrastructure layer or the data plane devices is also done via the controller. In simple terms, the control layer is the intermediary that facilitates communication between the top and bottom layers through APIs interfaces. Control layer 27. Also called the data plane, consists of the actual network devices (both physical and virtual) that reside in this layer. They are primarily responsible for moving or forwarding the data packets after receiving due instructions from the control layer. In simple terms, the data plane in the network architecture components physically handles user traffic based on the commands received by the controller. Infrastructure layer 28. Allows businesses to utilize a standard interface that manages countless databases between users or clients. It serves as a good manager of access between various departments or essential communities within an organization. Network storage software 29. Enables better management of such information and is an optimal solution to reduce costs while ensuring that the data is being protected. However, as a word of caution, archive software does not function the same way as regular standard backups. Hence, it is always recommended to ensure that the archived data doesn't need to be accessed soon. Data archiving software 30. Is the more hassle-free and effective way to perform continuous updates across devices and systems in an organization. Patch management software 31.It monitors and connects the various security solutions within a network. Specific software is ideal for large networks as it effortlessly links throughout locations and provides credible browser-based live and recorded footage to an organization. Security Surveillance Software 32. Operates from a centralized server room or hub and is not connected to any hardware. Greater visibility of the network infrastructure as well as regular tracking and monitoring of essential metrics. Asset Management Software 33. The software provides an interface that enables easy monitoring of any deployment or data movement between the hardware and databases within the network. It also ensures mandatory checks on compatibility when any data is being moved between regular backups and archives, thereby significantly reducing the chances of data loss. Deployment and Migration Software 34. Primary function is to monitor, manage, and troubleshoot any hurdles in network performance across the whole device infrastructure. While a network monitoring software might have some basic options plugged in to troubleshoot, network management software is equipped to manipulate and modify network performance for the better. Network Management Software 35. Refers to the hardware and software that enable network connectivity and communication between users, devices, apps, the internet, and more. Network Infrastructure 36. Is the broader collection of fundamental components that work cohesively to run an IT network and is a critical part of an organization's IT infrastructure. Network Infrastructure 37.Is the hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network. It provides the communication path and services between users, processes, applications, services and external networks/the internet. Network Infrastructure 38. This layer represents the physical devices and media in the network. It involves the transfer of raw, unstructured data over physical medium like cables or through the air in the case of wireless networks. Physical Layer 39. This layer is responsible for defining a common way of interpreting these signals, so network devices can communicate. It provides node-to-node data transfer and also detects and corrects errors that may occur in the Physical Layer. Data Link Layer 40. It is responsible for packet forwarding, including routing through different routers in the network. It manages network connections and implements packet handling rules. Network Layer 41. This layer ensures reliable data transmission. It provides error-checking mechanisms and data flow controls. Protocols like TCP and UDP operate at this layer. Transport Layer 42. It manages communication sessions, i.e., continuous exchanges of information in the form of multiple back- and-forth transmissions between two nodes. Session Layer 43. It translates data between the network format and the format the application accepts. This layer is also responsible for data encryption and decryption, compression, and translation. Presentation Layer 44. The topmost layer of the OSI model is where network applications and user processes reside. This layer interacts with software applications that implement a communicating component. Protocols like HTTP, FTP, and SMTP operate at this layer. Application Layer 45. A computer system that provides services to other computers on a network. It typically has more powerful hardware components, such as a faster processor, more RAM, and larger storage capacity, to handle the demands of multiple users simultaneously. Server 46. Servers share resources like files, storage space, and processing power with other computers in a network. Resource Sharing 47. They provide a centralized point for managing network resources and security. Centralized Management 48. Servers host applications and services that can be accessed by multiple users. Application Hosting 49. Deliver web pages to clients over the internet. Web Servers 50. Store and manage files for access by other computers. File Servers 51. Store and manage large amounts of data. Database Servers 52. Handle email messages, including sending, receiving, and storing them. Mail Servers 53. Run applications and provide services to clients. Application Servers 54. Is a technology that combines multiple hard drives into a single logical storage unit, improving performance, reliability, or both. RAID: Redundant Array of Independent/Inexpensive Disks 55. Data is stripped across multiple drives, improving performance but offering no redundancy. RAID 0 (Stripping) 56. Data is mirrored across multiple drives, providing high redundancy but no performance improvement. RAID 1 (Mirroring) 57. Data is striped across multiple drives, with parity information stored on one drive. This provides redundancy and improved performance. RAID 5 (Block-level stripping with parity) 58. Similar to RAID 5, but with two parity drives, providing higher redundancy but lower performance. RAID 6 (Block-level stripping with double parity) 59. Combines mirroring and striping for both redundancy and performance. RAID 10 (RAID 1 + RAID 0) 60. Is a technology that allows a single physical server to emulate multiple virtual servers, each running its own operating system and applications. Server Virtualization PART 1b - MULTIPLE CHOICE - Encircle the correct answer 1. What is a computer network? a. A single computer used for personal tasks b. A group of interconnected nodes or computing devices that exchange data and resources c. A device used to print documents d. A software application for managing files 2. Which topology connects all devices to a central hub? a. Ring Topology b. Bus Topology c. Star Topology d. Mesh Topology 3. What does a router do in a network? a. Processes and stores data b. Connects multiple networks and channels network traffic c. Provides a user interface d. Acts as a firewall 4. Which network type spans a large geographical area? a. LAN b. PAN c. MAN d. WAN 5. What is the primary function of network software? a. To design hardware components b. To streamline operations, design, monitoring, and implementation of networks c. To create websites d. To print documents 6. Which layer of the OSI model is responsible for reliable data transmission? a. Physical Layer b. Data Link Layer c. Transport Layer d. Network Layer 7. What is a Local Area Network (LAN)? a. A network that spans multiple continents b. A network that connects computers within a limited geographical area c. A network that connects individual devices within a few meters d. A network that provides secure connections over the internet 8. Which device forwards data packets based on MAC addresses? a. Router b. Switch c. Modem d. Hub 9. What is a Virtual Private Network (VPN)? a. A physical network connecting devices b. A secure network connection over a public network c. A type of LAN d. A network device 10. What does a Network Interface Card (NIC) do? a. Stores data b. Enables a device to connect to a network c. Acts as a central hub d. Processes network requests 11. What is the main characteristic of a Mesh Topology? a. All devices connect to a single central hub b. Each device connects to exactly two other devices c. All devices share a common communication line d. Each node is interconnected to every other node 12. What is the main function of a server in a network? a. To request services from other devices b. To deliver services to other devices c. To print documents d. To act as a firewall 13. What type of network is typically used within a city? a. PAN b. WAN c. MAN d. LAN 14. Which OSI model layer manages communication sessions? a. Presentation Layer b. Session Layer c. Transport Layer d. Application Layer 15. What is the defining feature of a Bus Topology? a. All devices connect to a central hub b. Devices are interconnected in a mesh pattern c. All devices share a common communication line d. Devices connect in a circular pathway 16. What is the role of the Control Layer in network software? a. To physically handle user traffic b. To provide a user interface c. To receive requirements from applications and translate them to network components d. To store data 17. Which device is essential for wireless communication in a network? a. Ethernet Cable b. Router c. Switch d. Network Interface Card 18. What is a Personal Area Network (PAN)? a. A network that connects computers within a limited geographical area b. A network that spans a large geographical area c. A network that provides secure connections over the internet d. A network catering to individual users within a small range 19. What is the function of network storage software? a. To provide an interface for monitoring deployments b. To manage countless databases between users or clients c. To encrypt and decrypt data d. To handle user traffic 20. Which network type offers high redundancy and multiple paths for data transmission? a. Ring Topology b. Mesh Topology c. Bus Topology d. Star Topology 21. What is the primary function of a server in a network? a. To play video games b. To provide services to other computers c. To browse the internet d. To store personal files 22. Which type of server delivers web pages to clients over the internet? a. File Server b. Database Server c. Web Server d. Mail Server 23. What is a key benefit of using a RAID system? a. Increased gaming performance b. Improved data redundancy and fault tolerance c. Reduced need for network security d. Decreased power consumption 24. Which RAID level provides the highest performance but no redundancy? a. RAID 1 b. RAID 5 c. RAID 0 d. RAID 10 25. What type of memory is most commonly used in modern servers? a. DDR2 b. DDR3 c. DDR4 d. DDR5 26. Which component in a server is responsible for executing instructions? a. RAM b. NIC c. CPU d. PSU 27. Which of the following is a benefit of server virtualization? a. Increased hardware costs b. Improved resource utilization c. Decreased flexibility d. Reduced fault tolerance 28. What is a hypervisor? a. A type of server b. A software that creates and manages virtual machines c. A storage device d. A network interface card 29. Which type of hypervisor runs directly on the physical hardware of a server? a. Type 1 b. Type 2 c. Туре 3 d. Type 4 30. What is the key characteristic of a Type 2 hypervisor? a. Runs directly on the hardware b. Requires an underlying operating system c. Provides the highest level of performance d. Suitable for large-scale enterprise applications