"Asynchronous Transmission is the transmission of data intermittently between devices without the use of an external clock signal."
2
New cards
"Explain Parallel Transmission."
"Parallel Transmission is the transmission of data through multiple channels, allowing for several bits to be transmitted at a time."
3
New cards
"Define Serial Transmission."
"Serial Transmission is the transmission of data through a single channel, transmitting one bit at a time."
4
New cards
"What is a Start Bit in asynchronous transmission?"
"A Start Bit is the bit used to indicate the beginning of a unit of data in asynchronous transmission."
5
New cards
"What is a Stop Bit in asynchronous transmission?"
"A Stop Bit is the bit used to indicate the end of a unit of data in asynchronous transmission."
6
New cards
"Describe Synchronous Transmission."
"Synchronous Transmission is the transmission of data as a continuous stream between devices whose time signals are synchronized via a common clock."
7
New cards
"Define Bandwidth."
"Bandwidth is the range of frequencies at which data can be transmitted through a channel, measured in Hertz."
8
New cards
"Explain Baud Rate."
"Baud Rate is the number of symbol changes, waveform changes, or signaling events across a channel per unit time."
9
New cards
"What is Bit Rate?"
"Bit Rate is the number of bits transmitted per unit time."
10
New cards
"Describe Latency in communication."
"Latency is the time delay between the transmitter sending the data and the recipient receiving the data."
11
New cards
"Define Protocol in the context of data transmission."
"A Protocol is a common set of rules followed during data transmission over a network to minimize inconsistencies."
12
New cards
"Describe Logical Bus Topology."
"A network arrangement where every host computer is connected to a single main data cable."
13
New cards
"Explain Physical Star Topology."
"A network arrangement where every host computer has a dedicated connection to a central hub computer or switch."
14
New cards
"Define Client-Server Network."
"A type of network organization where networked computers (clients) connect to one or more powerful central computers (servers) that handle service requests and have resources."
15
New cards
"How does a Peer-to-Peer Network function?"
"In a Peer-to-Peer Network, networked computers are connected to each other with equal status and share resources and workloads without any central server."
16
New cards
"What is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)?"
"A wireless protocol where computers attempt to avoid interference or collision in the channel by transmitting data only after the channel is sensed to be idle."
17
New cards
"Explain the purpose of a Media Access Control Address (MAC)."
"A hardware identification number assigned to network interface cards used to uniquely identify a device on a network for communication purposes."
18
New cards
"Describe the Request to Send/ Clear to Send (RTS/CTS) protocol."
"A protocol to prevent data collision during transmission on a wireless network, involving the transmitter sending a RTS to the receiver, and the receiver sending a CTS back to confirm it is idle."
19
New cards
"What is a Service Set Identifier (SSID)?"
"A local 32 character identifier for a group of wireless network devices, used to identify the network as a whole."
20
New cards
"Define Wi-Fi."
"A wireless local area network that is based on international standards."
21
New cards
"Explain Wi-Fi Protected Access (WPA/WPA2)."
"A security certification program that secures wireless networks by encrypting transmitted data."
22
New cards
"What is the function of a Wireless Network Adapter?"
"A physical device that allows a computer system to connect to a wireless network."
23
New cards
"Describe the function of a Domain Name Server (DNS) System."
"A DNS System is a hierarchical and decentralized naming system for computer systems connected to the Internet, containing the IP addresses of all domain names."
24
New cards
"Explain what a Fully Qualified Domain Name (FQDN) is."
"An FQDN is a domain name that specifies the exact location of a domain within the Domain Name Server System hierarchy."
25
New cards
"Define what a Gateway is in networking."
"A Gateway is a device that allows data to flow from one network to another."
26
New cards
"How does the Internet function as a network?"
"The Internet is a global network of computer systems that communicate using the Transmission Control Protocol/Internet Protocol (TCP/IP)."
27
New cards
"Identify the role of Internet Registries."
"Internet Registries are organizations responsible for the allocation and distribution of domain names and IP addresses."
28
New cards
"What is an IP Address?"
"An IP Address is a numerical address assigned to any device communicating via Internet Protocol on a network, identifying its host and location."
29
New cards
"Describe what a Packet is in networking."
"A Packet is a block of data that is transmitted over a network."
30
New cards
"Explain the concept of Packet Switching."
"Packet Switching is a method for sending data over a network by breaking data into several packets that are sent independently and reassembled at the destination."
31
New cards
"What is the purpose of Routers in a network?"
"Routers are devices used to direct packets being transmitted between networks."
32
New cards
"Define a Uniform Resource Locator (URL)."
"A URL is a reference to a resource on the internet that locates and retrieves it."
33
New cards
"Describe the function of Firewalls in network security."
"Firewalls are security checkpoint applications that monitor incoming and outgoing network traffic to prevent unauthorized access between networks."
34
New cards
"Explain Asymmetric Encryption."
"Asymmetric Encryption is an encryption technique that uses a public key to encrypt data, which can only be decrypted by a paired private key known only to the recipient."
35
New cards
"Describe symmetric encryption."
"Symmetric encryption is an encryption technique where the same key is used to encrypt and decrypt data, requiring the transfer of a copy of the key between both parties."
36
New cards
"Explain the purpose of a digital certificate."
"A digital certificate is an electronic document that proves ownership of a public key, thereby authenticating the identity of the holder."
37
New cards
"Define a digital signature."
"A digital signature is a mathematical scheme that produces a unique signature, verifying the authenticity of encrypted digital messages."
38
New cards
"How does a Trojan operate in computing?"
"A Trojan is a type of malware that hides within another file, misleading the user about its true intent."
39
New cards
"What is the function of a virus in computer systems?"
"A virus is a program that attaches itself to another computer file, infecting the system by replicating itself and inserting its code into other files."
40
New cards
"Describe the characteristics of a worm in the context of malware."
"A worm is a standalone virus capable of spreading and infecting a computer without being attached to a file."
41
New cards
"Explain the role of TCP/IP ports in networking."
"TCP/IP ports serve as communication endpoints that address a service on a network, representing services or applications."
42
New cards
"What is the function of sockets in network communication?"
"Sockets are software endpoints for sending and receiving data across a network."
43
New cards
"Define the TCP/IP stack."
"The TCP/IP stack is a suite of networking protocols that allows networked computers to communicate, consisting of four connected layers through which incoming and outgoing data packets are passed."
44
New cards
"Describe the function of an email server."
"An email server is a computer system on a network designated to handle emails being sent and received by other computers on the network."
45
New cards
"What is the purpose of the File Transfer Protocol (FTP)?"
"FTP is a protocol used for downloading or uploading files from a computer system."
46
New cards
"Explain the Hyper Text Transfer Protocol (HTTP)."
"HTTP is a protocol used to fetch, render, and transmit webpages."
47
New cards
"How does Hyper Text Transfer Protocol Secure (HTTPS) differ from HTTP?"
"HTTPS is an encrypted version of HTTP, providing a secure communication channel over a computer network."
48
New cards
"Define Post Office Protocol version 3 (POP3)."
"POP3 is an application-layer internet standard protocol used for retrieving emails from a server."
49
New cards
"Describe the purpose of the Simple Mail Transfer Protocol (SMTP)."
"SMTP is an internet standard communication protocol used for sending emails."
50
New cards
"Explain the function of a Web Browser."
"A Web Browser is an application software used to view webpages that a computer system has requested from a web server."
51
New cards
"Define Secure Shell (SSH)."
"SSH is a cryptographic network protocol for secure remote access to computers."
52
New cards
"How does a Web Server operate?"
"A Web Server is a computer system on a network designated to handle web requests through HTTP(S)."
53
New cards
"What is the role of the Host Identifier in an IP address?"
"The Host Identifier is a series of bits that form part of the IP address, uniquely identifying the computer on the network."
54
New cards
"Describe the function of a Network Identifier in an IP address."
"The Network Identifier is a series of bits that form part of the IP address, identifying the network the computer is connected to."
55
New cards
"Explain what Subnets are in networking."
"Subnets are smaller networks that form a subset of a whole network."
56
New cards
"Define Non-Routable IP Address."
"A Non-Routable IP Address is a private IP address used for a device on a private network, hidden behind a router or firewall."
57
New cards
"What is a Routable IP Address?"
"A Routable IP Address is a public IP address that is registered under the DNS."
58
New cards
"Describe the Dynamic Host Configuration Protocol (DHCP)."
"DHCP is a protocol for allocating unique dynamic IP addresses for computers on a local network when they attempt to connect to the internet."
59
New cards
"Explain the process of Network Address Translation (NAT)."
"NAT is the process of mapping a private IP address to a public IP address by modifying address information in the packet header when the packet is sent through the router."