GSCE computer studdies (edexel) - unit 4 (networks)

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards
Computer Network
Computers connected together for the purpose of sharing information and resources
2
New cards
why are computers connected in a network
enable communication for every business, entertainment, and research purpose
3
New cards
examples of computer networks
The internet, online search, email, audio and video sharing, online commerce, live-streaming, and social networks
4
New cards
LAN network
Local Access network, 2 or more linked computers in a small area
5
New cards
WAN Network
Wide area network covers a large geographical area, such as a country or the world, and typically consists of several smaller networks; the Internet is the world's largest WAN
6
New cards
structure of internet
a global network of interconnencted networks that communicate using a common set of standards and protocols.
7
New cards
IP Address (Internet Protocol Address)
A unique number identifying every computer on the Internet (like 197.123.22.240)
8
New cards
Routers
special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next
9
New cards
Wired Connected Network
Network which has a stable connection and faster traffic speed. Therefore has good signal.
10
New cards
wireless connection
Uses radio signals, infrared technology, or satellite transmissions. no wires
11
New cards
what are network speeds measured in
bits
12
New cards
calculating file transfer time
transfer time = file size / bandwith
13
New cards
Ethernet
a system for connecting a number of computer systems to form a local area network(LAN), with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
14
New cards
Wi-Fi
Wireless local area network that uses radio signals to transmit data
15
New cards
HTTP
HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
16
New cards
Email Protocols
POP3, IMAP, SMTP
17
New cards
4 layer TCP/IP model
Application Layer (where network applications operate)
18
New cards
Transport Layer (set up data transfer between two hosts)
19
New cards
Network Layer (packages data for transmission, routes packets across network)
20
New cards
Data Link Layer (network hardware operate here - physical layer)
21
New cards
Bus Topology
A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
22
New cards
Mesh Topology
every computer connects to every other computer; no central connecting device is needed
23
New cards
Star Topology
A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)
24
New cards
Network Security
A subset of communications security; the protection of voice and data networking components, connections, and content.
25
New cards
ethical hackers (white hats)
use expertise to shore up computer system defenses
26
New cards
data theft
Removing data from a computer without authorization.
27
New cards
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
28
New cards
IP spoofing
when an intruder uses another site's IP address to masquerade as that other site
29
New cards
Symmetric Encryption
the same key is used to encode and decode
30
New cards
asymmetric encryption
two keys are used; one key encodes the message, and the other key decodes the message
31
New cards
Penetration Testing
A test by an outsider to actually exploit any weaknesses in systems that are vulnerable.
32
New cards
Access Control
A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it.
33
New cards
Firewalls
software to prevent unauthorized users