EDEXCEL GCSE Computer Science, Topic 4- Networks

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 23

flashcard set

Earn XP

Description and Tags

10th

24 Terms

1

RFID chips

________ can be fitted to all equipment so that an alert will be triggered if it is removed from the premises.

New cards
2

Transmission layer

________= splitting outgoing data into packets and numbering them, a header containing a sequence number and a checksum is added to each.

New cards
3

FTP

________ (File Transfer Protocol)= rules for transferring files between computers, often used for transferring those that are too large for email attachment.

New cards
4

Internet network layer

________= stripping addresses information from incoming packet headers.

New cards
5

SMTP

________ (Simple Mail Transfer Protocol)= rules for sending emails from client to server and server to server until it reaches its destination.

New cards
6

Low latency

________- cables have layers of protective covering making them less susceptible to interference.

New cards
7

Transport layer

________= checking incoming packets and sending a resend request for any that are damaged or lost.

New cards
8

Poor security

________- anyone within range can intercept transmissions.

New cards
9

Application layer

________= providing the interfaces and protocols needed by the user.

New cards
10

circuit television

Closed- ________ (CCTV) can be used to monitor the premises.

New cards
11

Copper wire

________ is susceptible to electrical interference while fibre optic is immune.

New cards
12

IMAP

________ (Internet Message Access Protocol)= unlike POP, messages do not need downloading, they can be read and stored on the message server.

New cards
13

Permissions

________ are the levels of access to files.

New cards
14

POP

________ (Post Office Protocol)= used by a client to retrieve emails from a mail server, all emails are downloaded when there is a connection between them and are deleted from the server once done so.

New cards
15

Fibre optic

________ is more efficient however it is a lot more expensive and fragile.

New cards
16

correct order

The receiving computer reassembles the packets into the ________ using the packet headers.

New cards
17

HTTP

________ (HyperText Transfer Protocol)= rules followed by a web browser and web server when requesting and supplying information.

New cards
18

payload

The ________ contains part of the data of the file that has been split and sent.

New cards
19

box penetration

Black ________ testing= the tester is given absolutely no information about the network and must try and breach its security.

New cards
20

Radio waves

________ transmit data through air.

New cards
21

WAN

A network of networks- one connects separate LANS

New cards
22

Domain name

Human friendly IP address eg: www.google.com is a lot easier to use than a string of numbers

New cards
23

Quickest

Routers direct packets through the cheapest route to the next router, what does cheapest mean?

New cards
24

Bluetooth, Zigbee, RFID & NFC

Wi-Fi is the most well-known and the oldest but there are others that have different uses, ranges and power requirements

New cards
robot