Chapter 24: Network Fundamentals. Question 1 A Network is a simply: A Group of Two or More...

Post on 18-Jan-2016

228 views 6 download

Tags:

Transcript of Chapter 24: Network Fundamentals. Question 1 A Network is a simply: A Group of Two or More...

Chapter 24:Network Fundamentals

Question 1

• A Network is a simply:

A Group of Two or More Computers Linked Together

Question 2

• A Network allows users to:

I. Share Software Applications

II.Share Hardware Devices (Printers, Scanners, etc.)

Question 3

• Different Types of networks transfer data. A computer network can transfer a variety of data including ______, _____, _____, and audio files.

TextImagesVideo

Question 4

• A telephone network such as the PSTN, which stands for _____ _____ _____ _____, supports phone services and is a collection of interconnected _____ and _____ voice-oriented systems.

Public Switched Telephone NetworkCommercialGovernment Owned

Question 4 (cont.)

• _____, _____, and standard telephones are supported through this network.

Digital

Mobile

Question 5

• The biggest network of all is the _____. The most profound change is in regard to _____.

Internet

Electronic Mail (e-mail)

Question 6

• Benefits of Networks include:

I. Information Sharing

II.Collaborative Environment

III.Hardware Sharing

IV.Software Sharing

V.Enhanced Communication

Question 7

• Data security and the _____ to _____ access is a primary weakness with many networks.

Vulnerability

Unauthorized

Question 7 (cont.)

• The security of a computer network is challenged everyday by _____, _____, computer hackers, and _____ attacks.

Equipment MalfunctionsSystem FailuresVirus

Question 8

• Equipment malfunctions and system failures are caused by a number of factors including: _____, such as floods or storms, _____, or electrical disturbances such as a _____ or a blackout.

Natural DisastersFiresBrownout

Question 9

• Server Malfunctions or failures mean users _____ lose access to network functions such as _____, drives, and _____.

TemporarilyPrintersInformation

Question 10

• _____ are people who break into computer systems to _____ services and _____ security information such as credit card numbers, _____, test data, and even _____ security information.

Question 10 (cont.)

• They can also _____ data or create _____ and other malicious software that can _____ shared files.

DeleteVirusesSabotage

Question 11

• The following are some of the other disadvantages of networks:

a)Individual Loss of Autonomy

b)Malicious Code

c)Network Faults

d)Setup and Management Costs

e)E-mail is Not Necessarily Private

Individual Loss of Autonomy

• Examples include:

Controlling which software programs are accessible

Keeping a record of how the computer is used

What sites are accessed

Malicious Code

• Networks are more vulnerable than stand-alone computers to viruses, worms, Trojan horses, E-mail bombs, and spyware.

Network Faults

• Network equipment problems can result in loss of data or resources.

Setup and Management Costs

• Setting up a network requires an investment in hardware and software

• Requires care and attention of at least one IT professional

E-mail Is Not Necessarily Private

• Messages travel through a number of systems and networks and provide opportunities for others to intercept or read the messages. Junk e-mail can also become a problem.

Question 12

• A _____ system is not vulnerable to many of these risks since it does not share _____ with other computers.

Standalone

Interconnection

Question 13

• The client is a _____ program such as __________.

Software

Internet Explorer

Question 14

• The server is _____ and can be one of many types of servers such as a _____ server, a _____ server, and FTP server, an _____ server, or a _____ server.

Question 14 (cont.)

• When you access the internet using a browser, the browser is the _____ and is used to access any _____ server (_____) in the world.

ClientAccessibleComputer

Question 14 (cont.)

• This access enables the server and the client to _____ _____ and other resources such as _____ or _____ storage devices.

ShareFilesPrintersExternal

Question 15

• __________ are high end programs designed to provide network _____ and include special functions for connecting computers and other _____ in a network.

Server Operating SystemsControlDevices

Question 16

• Three popular operating systems include _____, _____, and _____/_____.

Microsoft Windows

Apple’s Macintosh

Unix/Linux

Question 16 (cont.)

• Client access to the server can be through: _____ or _____ computers, _____ devices, _____ systems, and other similar electronic devices.

Question 17 and 18

• What do the following acronyms “LAN” and “WAN” stand for?

LAN – Local Area Network

WAN – Wide Area Network

Question 19

• Most LANs connect _____, _____, and other devices such as _____ and _____ in a _____ geographic area such as an office building, a school or home.

Question 20

• Each device on a network is called a _____ and shares _____ such as a printer, _____, and other hardware.

Node

Resources

Programs

Question 21

• A WLAN is a _____ network and must contain some type of _____ device such as a _____ card, _____ card, _____ card, a _____ network adapter or other built in wireless capability.

Question 22

• A WAN covers a _____ geographic area and can contain communication links across _____, _____, or _____. The communication area might be as large as a _____, _____, or even the world.

Question 23

• The largest WAN is the _____.

Internet

Question 24

• Most WAN consist of two or more _____ and are connected by _____.

I. LANs

II.Routers

Question 25

• Communication channels include: _____, _____ _____, _____, microwaves or any combination.

I. Telephone Systems

II.Fiber Optics

III.Satellites

Question 26

• In a client/server network one or more computers on the network act as a ____ which manages ______. A ____ server manages the printer. It is often a high-speed computer with considerable _____ space.

I. Server

II.Network Resources

III.Print

IV.Storage

Question 26 (cont.)

• All the computers on the network are called ____. They share the server resources and other peripheral devices such as ____, ____, and ____.

I. Clients

II.Hubs

III.Firewalls

IV.Routers

Question 27

• A hub is _______?

I. A small, simple, inexpensive device that joins multiple computers together.

Question 28

• Users access the server through a _____ and _____.

I. User Name

II.Password

Question 29

• In a peer-to-peer network all computers are ____. People on the network determine what files on their computer to ____ with others on the network. It is easier to manage and to set up.

I. Equal

II.Share

Question 30

• Intranet is:

I. Designed for the exclusive use of people within an organization. Documents such as handbooks and employee manuals, newsletters, employment forms, and other relevant company documents are stored on the intranet server.

Question 31

• Extranet is:

I. Similar to Intranet, but it allows specific users outside of the organization to access internal information systems.

Question 32

• Internet is:

I. A worldwide system composed of thousands of smaller networks. The global network allows computers worldwide to connect and exchange information.

Question 33

• Which are two of the most popular components of the internet?

I. World Wide Web

II.Electronic Mail (E-mail)

Question 34

• In addition to the server and the client, two other categories of network hardware include:

I. Communication Devices

II.Devices that connect the network cabling and amplify signal

Question 35

• What is a modem? What is it’s purpose?

I. Converts analog signals to digital and vice versa. This device enables a computer to transmit voice data over telephone lines.

1960’s – Modem speeds around 300 bps (bits per second)

Today – Standard modems transmit 56 Kbps (kilobits per second) and some can transfer up to 8 Mbps (megabits per second)

Question 36

• What is a cable modem? What is it’s purpose?

I. Uses coaxial cable (television cable) to send and receive data. Speeds range from 30-40 Mbps.

Question 37

• What is a DSL? What is it’s purpose?

I. Digital Subscriber Line provides for transfer of information to a computer at a high speed bandwidth over ordinary copper telephone lines. Carries voice and Data.

Question 38

• What is a T-1 line? What is it’s purpose?

I. Runs on Fiber Optic telephone line. It can be used for data transfer on a network or to provide phone service for a commercial building.

Question 39

• What is broadband? What is it’s purpose?

I. High speed internet access. It is used to get information fast!

Question 40

• What is a WISP? What is it’s purpose?• Wireless Internet Service Provider.

Provides connection to internet without a cable. To connect devices wirelessly, the following components are needed:

A notebook computer or other device capable of connecting wirelessly

An internal wireless adapter or a USB port for connecting an external adapter

A high speed, wireless Internet access plan “Sniffer” software, used to locate hot spots.

Question 41

• The best way to protect data is to _____ _____ access to it. This responsibility is given to the network _____ and security _____.

I. Effectively

II.Control

III.Administrators

IV.Personnel

Question 42

• The most common form of restricting access to data is the use of _____. These should be changed _____ so that people who no longer need access are _____ out.

I. Passwords

II.Frequently

III.Locked

Question 43

• Smart passwords include _____, _____, and _____.

I. Upper and Lower Case letters

II.Combination of Numbers and Letters

III.Punctuation

A good example of a secure password would be: FeRn12crEEk!

Question 44

• Most password protection is broken by people who gain access through a shared password or lost “__________” than by anyone guessing your secret code.

I. Cheat Sheet

Question 45

• Never give out your password. Other security measures include:

I. Electronic Identification Cards to gain building access

II.Firewalls

III.Anti-Virus Software

IV.Proxy Server

Proxy Server? What’s That?

• A proxy server acts as a medium between people who request server access (known as clients) and the server. A client would request access. The request would go to the proxy server, which would determine whether access could be granted according to its filters.

Question 46

• When planning for security, use the following guidelines:

I. Institute a selective hiring process

II.Regularly back-up data and store offsite

III.Biometric security measures (fingerprint and retina/iris scanners, voice pattern recognition software, etc.)

What is Wi-Fi?

• What is Wi-Fi?

A mechanism for connecting wireless devices