Connectivity

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Connectivity | digital communication and networks

Study online at quizlet.com/_95abxo

1. What are the 4 1) Satellite - GPS, TV, military, satellite 7. How does digital signals sent from a transmitter on earth
main types of phones, TV radio/DAB work directly to a receiver on earth.
digital 2) Broadcast - Radio channels, TV DAB provides more radio stations and can
communication 3) Wired - Networking, connecting also carry text and data which could
and examples of peripherals include: the time, name of station & song
use 4) Wireless - Networking, connecting name
peripherals
8. What are some HDMI - video connections
2. What are the · Pros: there are so many satellites, so the types of wired S/PDIF - Digital audio communication
pros and cons of system is always available communications Mini jack - Headphones
GPS · Cons: satellites signals can't pass through (5) USB - Data transfer (USB 2.0, 3.0, USB - C)
solid material so want work in areas with Ethernet - Networking (Cat5e cables)
lots of buildings
9. What are the 1) Wi-Fi
3. How does GPS main 5 types of 2) Bluetooth
work wireless 3) 3G & 4G
communication? 4) Infra-red
5) NFC
10. What is Wi-Fi a facility allowing computers,
smartphones, or other devices to
connect to the Internet or communicate
with one another wirelessly within a
particular area.
Also a form of connecting devices to a
network
11. What is It lets devices connect over a short
Bluetooth distance, Bluetooth devices must be
A GPS receiver determines a three- paired with each other to communicate,
dimensional position in space by Bluetooth can only transfer small files
calculating multiple distances from at e.g. speakers, mice, headphones,
least four satellites. keyboards
4. How does The signal from a transmitter is 12. What is 3G and Mobile broadband provide internet
satellite TV transmitted into space where it's picked 4G when Wi-Fi is not available.
work up by the satellite's receiver dish orbiting 5G is faster than 4G which is faster than
Earth. 3G
The satellite transmits the signal back to
13. What is Infra- Signals don't carry much data and
Earth in a different direction where it is
red transfer is slow. Only works at a short
received by a satellite dish on the
range.
ground.
Transmitters must have line of sight with
Then sends it to a set top box which
receiver used in TV remote controls
decodes the signal and converts it to
video to play onto the TV. 14. What is NFC Uses proximity chips. Can be used in
(near field payment cards for NFC wireless
5. What are the 2 1) Analogue/digital signals by analogue
communication)? payments. Only works in very small
types of signals and digital signals (1/0s)
ranges/distances
broadcast 2) Digital radio (DAB)
communication
6. How do Transmitters are based on Earth and
broadcast transmit digital/analogue signals directly
communications to an antenna which sends the received
with signal through a wire to the TV which
analogue/digital converts it to images and audio
signals work
15. What is the Wifi 23. What are the 8 Cost
range, Range - further factors that are Safety
bandwidth, Bandwidth - higher considered Speed
power, security Power - Higher when Stability
and Security - Higher comparing Portability
connectivity of Can connect multiple devices wired and Mess
Wi-Fi simultaneously wireless Security
compared to communications Maintenance
bluetooth
24. What are the - Faster speed of data transfer
16. What is a a group of connected computers advantages of - More secure
network wired - Less affected by interference
communications
17. What are the 4 1) Local area network (LAN)
over wireless
types of 2) Wide Area Network (WAN)
(3)
network 3) Personal Area Network (PAN)
4) Tethering 25. What are the - Cables are more expensive
disadvantages - Risk of tripping over cables
18. What is a LAN connects digital devices in a small
of wired signals - Not portable
geographic area usually in one building e.g.
over wireless - Lots of cables looks untidy
school, office
(5) - Cables can get damaged
19. What is a WAN connects devices spread out over a large
26. What are the - No need to buy cables (cheaper)
geographic area e.g. the internet
advantages of - No health risks
20. What is a PAN A network for interconnecting devices wireless signals - Portable
centered on an individual person's over wired (5) - Clean/tidy
workspace. - No maintenance issues
when a PAN uses wireless connectivity, it is
27. What are the - Slower speed of data transfer
called a Wireless Personal Area Network
disadvantages - More affected by interference
(WPAN) eg: a smart watch connected to a
of wireless - Less secure - easier to intercept
smartphone which is connected to a laptop
signals over
21. What is connecting a host device such as a wired (3)
tethering smartphone that uses mobile broadband
28. What is the The number of bits that can be carried in
connection with one or more other devices
bandwidth 1 second like the discharge of a water
which enables the connected devices to
pipe
share the host mobile broadband
connection (smartphone) for example: 29. How does - A higher bandwidth means more data
creating hotspots to share internet bandwidth can be transferred every second,
impact user - so downloads are faster, / lots of data
22. State and 1) Transfer method → cables can carry
experience can be transferred in a short time
explain the 4 more bandwidth (bits / second) than
- which is important to gamers
factors wireless methods
influencing the 2) Interference → (other) electromagnetic 30. How does When streaming a video a portion of the
speed of data signals can interfere and disrupt wired streaming work video data is stored temporarily into a
transfer and wireless signals buffer zone in memory (RAM), the video
3) Blockages → walls and furniture reduce is played from the data in the buffer
the strength of wireless signals which zone, as the video plays, data that has
reduces available bandwidth. already played is deleted to make space
4) Distance → The strength of a wired or in the buffer for new data to be
wireless signal is reduced as distance is downloaded so it too can be played and
increased. deleted, this cycle repeats until the video
is finished playing.
31. What are the 1) Don't have to wait for downloading
advantages of before playing
streaming over 2) Doesn't use up secondary/local storage
downloading (2) space
32. What are the 1) Requires internet 41. How are iP IP addresses can be assigned by a network
disadvantages of 2) Buffering if low bandwidth addresses admin or be dynamically allocated using a
streaming (2) assigned server running dynamic host configuration
protocol
33. What are the 1) Can play anytime even without
advantages of internet 42. What is a MAC addresses are universally unique
downloading (2) 2) No buffering MAC address given to network interface cards (NIC),
however other computers can disguise with
34. What are the 1) Uses up local storage which is
another MAC address by spoofing to
disadvantages of limited
bypass a firewall and get access to a
downloading (3) 2) Have to wait for whole file to
network ( unauthorized access )
download before playing
3) Copyright issues if sharing 43. What is a · a name that helps users identify a
device name computer on a network, they are not used
35. What is latency The time taken to send data between
and how is it by computers to communicate to together
devices e.g. 300ms
used in as they are not always unique
36. What is the impact In online gaming, if the latency is identifying a
of latency on user high e.g. 900ms , the game will lag device on a
by 900ms and seem unresponsive to network
the players commands,
44. What are the Cat5e cables are used for ethernet
when watching live TV high latency
types and connections to connect devices on a
would mean a delay in real time
characteristics network, these cables can transfer data at
events and the video playback.
of the 10Mbit/s , 100 Mbit/s or up to 1 Gbit/s, Cat6
37. What is a network allows a computer to communicate different cables can be used to transfer data at 10
operating system on a network e.g. Windows 10, Mac Cat5e Gbit/s however they are more expensive
OS, Linux provides additional (ethernet )
38. What is the Passing usernames and passwords cables
additional (account details) to a server to check 45. What is the Fiber optic cables transfer data at 40 Gbit/s
functionality of when a user logs on, data transfer over many kilometers without affecting
network OS over separating users accounts and speed of fiber signal quality using light and glass cables,
standalone systems making sure users cannot access optics however, fiber optic cables are expensive -
other files, they are used in under ocean wires.
Providing access to shared
46. What is a This is the point which a wireless enabled
peripherals and network resources
wireless device connects to a wired network
like printers
access point
39. What are the 3 ways 1) iP address
47. What is a · stores addresses of all devices connected
devices are 2) MAC address
router and its so it can forward network traffic to its
identified on 3) Device name
function destination using the quickest route.
networks
It can act as a gateway from a LAN to a
40. What is an iP IP address → (internet protocol) WAN
address and what unique address that networked
48. What is a · connects 2 different types of network e.g.
are the 2 types of iP devices use to send data to each
gateway LAN to a WAN through a router
address other 2 types:
1) iPv4 → four groups of upto 3 49. What is a used to amplify a signal in a network so its
numbers separated by full stops eg: booster range can be extended
192.168.1.1 replaced by IPv6 because
50. What is a · connects devices in a network with ports,
all unique addresses were used up
switch in a the switch makes sure that data sent by any
2) iPv6 → There are many more
network device gets to the correct device on the
possible combinations of IPv6
network
numbers than IPv4 to support
increasing connected devices 51. What are the 1) Authentication server
5 types of 2) Print server
servers on a 3) File server
network 4) Application server
5) Web server
52. What is the · checks usernames and passwords, when a 61. How does a There is a white and black list of URLs, in
function of an user logs in they are given an electronic filter the whitelist are websites the user is
application certificate that allows them partial access software allowed to visit, in the blacklist are
server on a to resources work websites the user is blocked from visiting if
network a user searches for any URL in the blacklist
the page is blocked/prevented from
53. What is the · manages multiple printers at a time
viewing if the result's not in the black / white
function of a dealing with print requests from client
list the user will be allowed to view the
print server computers so that printers are not
webpage
on a network overloaded with requests.
62. What do share their resources but do not access
54. What is the · allow users access to shared & private
computers in servers
function of a storage
a peer to
file server on
peer network
a network
do
55. What is the · provide clients with (shared) applications
63. What are the · Access to shared peripherals
function of an that can be run directly from the server
5 benefits of · Access to shared storage and data
application
using LANS · Flexible access (access from any device
server
on a network)
56. What is the · processes requests for data made via · Communications (sending messages and
function of a hypertext transfer protocol (HTTPS). files on the network to other computers)
web server · Shared access to the internet (NOT
on a network STORAGE)
57. What does an · to connect to the internet, users need to 64. What are the 1) Control of user access rights
ISP (internet subscribe to an ISP, ISPs provide advantages 2) Centralized administration
service connections to the infrastructure that forms of using 3) Centralized backup
provider) the internet, ISP provides a web server to client server 4) Shared software
provider host/store website networks 5) Shared storage and files
58. What is a web a software application for retrieving and 6) Roaming profiles (hot desks)
browser presenting information resources on the 65. How do client user access rights - some users can be
World Wide Web. server LAN's given access to resources while others can
59. How does a · Users enter keywords into a search engine allow control be restricted
search engine that describe the info they want to see of user centralized administration - resources and
work and the engine compares that keyword access rights user accounts can be managed by
with the closest match in its database of and administrators.
web pages centralized
and returns the closest results administration

60. What is the · prevents users from accessing 66. How do client User data is protected from being lost
function of inappropriate information. server LAN's because backups are automated for all
filter software Most commonly used in schools e.g. euwest allow users
securly. Admins can add sites to black & centralized
white list backup
67. How do client Shared storage - Sharing storage means that
server LAN's users can make files available to others, file
allow access permission can be set for individual files
to shared (allowing users to read only or read and
storage and write)
shared Shared software - Application servers can
software provide access to shared software
68. How do client ability to log on to any computer in an
server LAN's office and keep their settings and files, this
allow access allows the user to work from any computer
to roaming in the network
profiles
69. What are the 9 1) Logins and passwords 76. What is a VPN Virtual Private network provides access to a
methods used 2) Firewalls and private LAN in a remote location data sent
to secure data 3) Encryption (symmetric & public key), why/when is it using a VPN is encrypted. VPN uses:
on networks WEP and WPA used · Access their employers network when
4) VPN working from home
5) File access rights · Avoid local restrictions on sites
6) Transactional logs (geolocation rights managements eg:
7) Backups watching a show not available in your
country)
70. How do logins Users can log on to computers on network
· making secure payments
and passwords with the correct login details otherwise
· prevent surveillance of their web activity
secure data on users cannot access the network or its
networks resources 77. How do file aka file permissions can be set for
(authentication An authentication server checks whether access rights individual files, folders or whole drives and
server) a user's password matches up so they can used to allow individual users to: read or read and
access network resources. A user only secure data write the file/folder/C:
needs authentication once to access all on a network
resources.
78. How are all network activity recorded here, can
71. How do used at the gateway of a network (router / transactional help identify which computers have been
firewalls modem) controls network traffic into and logs used to accessed allows administrators to identify
secure data on out of a network, by comparing MAC secure data suspicious activity that could be a threat to
networks addresses with a database of allowed on a network data or security
MAC addresses firewalls prevent
79. How do copy of a file(s) usually stored on a
unauthorized users from entering and
backups different storage device to original file
accessing a networks resources.
secure data
72. What is scrambles information into an alternative on a network
encryption form that requires a key or password to
decrypt the information
73. What is · Symmetric key encryption → uses the
symmetric key same key on both ends (transmitting and
encryption receiving data) it is less secure as it uses 1
and public key key which hackers can find easily
encryption ·Public key encryption → uses 2
mathematically different bu related keys
at both ends, one key is used to encrypt
and 1 to decrypt.
74. What is the A method of encrypting wireless signals. It
Wireless uses symmetric key encryption with the
encryption same key for every transfer, so less
protocol secure
(WEP)
75. What is Wi-Fi - designed to provide better encryption
Protected than WEP, WPA generates a new key for
Access each device on the network, new keys are
(WPA)? provided for each packet of data sent.
(Public key encryption)

You might also like