compsci ish

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

A controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet is called?

D) extranet

2
New cards

The physical or logical arrangement of a network is called the _.

C) Topology

3
New cards

Which of the following is a main advantage of network layering?

B) Allows modular development and troubleshooting

4
New cards

Why is communication over networks broken down into different layers in the OSI model?

B) To allow each layer to handle a specific function

5
New cards

What is a data packet?

B) A small unit of data that is used in network communication

6
New cards

Why are protocols necessary in computer networks?

B) To help different devices to communicate with and understand each other

7
New cards

What is the difference between lossy and lossless data compression?

B) Lossy results in permanent deletion, lossless can recover data compression

8
New cards

Which of the following statements about wireless transmission is CORRECT?

C) It eliminates the need for physical cabling infrastructure

9
New cards

Which switching method breaks data into smaller units and sends them separately?

C) Packet Switching

10
New cards

What's an advantage of wireless networks?

a) Convenience of mobility(very mobile)

11
New cards

Which of the following combinations best describes the hardware and software components needed to successfully connect a PC to a wireless network?

C) Network adapter (hardware), Driver (software)

12
New cards

What best describes how Peer-to-Peer networking works?

B) Devices connect directly to each other to share data, often after discovering peers through a central server.

13
New cards

What is a characteristic of wireless Wi-Fi?

c) Operates at different frequencies mostly

14
New cards

What makes one wireless network more secure than another?

B) on the encryption used and whether there are strong passwords or firewalls

15
New cards

Which of the following is more commonly seen in wireless connection(as opposed to wired)?

A) Satellite

16
New cards

When consistent data flow and minimal external interference are critical, which is a key advantage of a wired network over a wireless one?

A) Lower susceptibility to signal interference

17
New cards

Which of the following pairs a network security method with it's correct disadvantage?

A) Firewall - Can block unauthorized access but cannot prevent attacks from inside the network

18
New cards

Which statement best describes the differences between transmission media?

B) Fiber optic cables provide high-speed and secure transmission but are more costly and harder to install.

19
New cards

Which of the following best explains how data is transmitted using packet switching?

C) Data is divided into packets that may take different routes to the destination and are reassembled in order.

20
New cards

Which Cable uses light to send data?

C) Fiber Optic

21
New cards

How is communication over networks typically organized in a layered architecture?

B) By dividing the communication process into distinct layers, each with specific functions and protocols.

22
New cards

Which of the following are layers within the OSI model? (select all that apply)

A, B, D) Transport, Network, Session

23
New cards

What is the primary purpose of the OSI model in networking?

C) To standardize communication functions into layers

24
New cards

What are protocols?

C) Define actions/ Rules for data transmission

25
New cards

Why are protocols necessary in computer networks?

B) To help different devices to communicate with and understand each other

26
New cards

For internet packetized data, what are the three elements of communication?

D) Preparation, Transmission, Delivery

27
New cards

How is lossless and lossy compression different?

A) Lossless keeps all original data while lossy losses some data

28
New cards

What is one main characteristic of a wireless network?

B) It uses radio waves to transmit data

29
New cards

Which of the following best describes the purpose of a firewall in network security?

B) To monitor and block unauthorized access to or from a private network

30
New cards

Which of the following is an advantage of using firewalls for network security?

C) Firewalls can block unauthorized access from external sources

31
New cards

Which of the following are advantages of Packet Switching? Choose ALL that apply.

A, C) It is more flexible in routing packets over multiple shared links, More robust – packets are resettable in the case of problems

32
New cards

What's a deadlock?

D) When two or more processes are unable to proceed because each are waiting for the other to release a resource

33
New cards

What is the function of a VPN?

B) A VPN encrypts your internet traffic and hides your IP address

34
New cards

Which of the following best describes a peer-to-peer (P2P) network architecture?

B) Each device can act as both a client and a server

35
New cards

What is a benefit of a VPN?

A) It protects your data by encrypting your connection

36
New cards

Which of the following best describes the key hardware and software components of a wireless network?

B) Router, wireless access point, and network management software

37
New cards

What best describes a Virtual Private Network?

C) A secure network connection that allows users to access a private network over a public one

38
New cards

What is a primary reason for dividing communication over a network into layers, as in the OSI model?

B) To allow interoperability between different systems through standardized interface

39
New cards

Which of the following correctly defines "protocol" and "data packet"?

B) A protocol is a set of transmission rules, and a data packet is a unit of data.

40
New cards

When transmitting data across a network, why might lossless compression be preferred over lossy compression?

B) Lossless compression ensures that all original data can be restored after transmission.

41
New cards

What is a characteristic that differentiates wireless networks and wired networks?

Wired networks use metals like copper and silver, while Wireless networks generally use EMF waves (radio frequencies specifically).

42
New cards

Which of the following is an aspect of packet switching?

Packets travel independently through static routes.

43
New cards

Which of the following is true about Wimax?

B) Cheap method for providing internet over a large area

44
New cards

What Is MAC address?

C.) A unique Hardware identifier hard-coded into a device's network interface.

45
New cards

Which of the following network security methods is most effective for encrypting wireless network traffic and is widely recommended today?

B) WPA2

46
New cards
Which of the following is an aspect of packet switching?
Packets travel independently through static routes.