Wired & Wireless Networks, Protocols & Layers (OCR GCSE Computer Science)

Flashcards

1/56

Enjoying Flashcards?
Tell us what you think

Cards in this collection (56)

  • What is a wired network?

    A wired network is a network where physical cables are used to join devices together and transmit data.

  • What is Ethernet?

    Ethernet is a wired networking standard to carry electrical signals between devices.

  • Why is Ethernet considered a standard?

    Ethernet is considered a standard because it is used by most manufacturers to allow compatibility with other devices.

  • What is a wireless network?

    A wireless network is a network where connections are made using radio waves to transmit data through the air.

  • Define Wi-Fi?

    Wireless fidelity (Wi-Fi) is a common standard for wireless networks.

  • What is an advantage of using Wi-Fi?

    An advantage of using Wi-Fi is portability - devices can easily move around since the connection is wireless and not limited by cables.

  • What is Bluetooth?

    Bluetooth is another common standard for wireless networks.

  • True of False?

    Headphones and game controllers would typically connect using bluetooth.

    True.

    Bluetooth is typically used for a direct connection between two devices such as headphones, controllers, keyboards & mice.

  • True or False?

    Wired networks are more secure than wireless networks.

    True.

    Wired networks are more secure than wireless networks.

  • Define the term portability in the context of networks.

    Portability is the ease of moving devices around, with wireless networks having higher portability than wired networks.

  • What is encryption?

    Encryption is a method of scrambling data before being transmitted across a network to protect the contents from unauthorised access.

  • True or False?

    Encryption is more important on wired networks.

    False.

    While encryption is important on both wired and wireless networks, it's even more critical on wireless networks due to the data being transmitted over radio waves, making it easy to intercept

  • True or False?

    Wireless networks are identified by a 'Service Set Identifier' (SSID)

    True.

    Wireless networks are identified by a 'Service Set Identifier' (SSID) which along with a password is used to create a 'master key'

  • True or False?

    Encryption is more important on wired networks than on wireless networks.

    False.

    Encryption is even more critical on wireless networks due to the data being transmitted over radio waves, making it easy to intercept.

  • Why should a bank use encryption?

    A bank should use encryption so that customer data cannot be understood if intercepted and only authorised users can access customers' confidential information.

  • True or False?

    Wired networks are encrypted in a very similar way to a wireless network?

    True.

    Wired networks are encrypted in a very similar way to a wireless network, using a master key to encrypt data and the same key to decrypt data.

  • Define the term Cipher Text (in the context of encryption).

    Cipher Text is the scrambled data after being encrypted using the Master Key before being transmitted across a network.

  • What is an IP address?

    An IP (Internet Protocol) address is a unique identifier given to devices which communicate over the Internet (WAN).

  • Describe the format of an IP address(IPv4 ).

    An IPv4 address is represented as 4 blocks of decimal numbers between 0 and 255, separated by periods (e.g., 192.168.0.1).

    Each block represents 1 byte (8 bits), so the entire address is 32 bits long.

  • What is the difference between IPv4 and IPv6 addresses?

    An IPv4 address is represented as 4 blocks of denary numbers between 0 and 255, separated by full stops.

    An IPv6 address is represented as 8 blocks of 4 hexadecimal digits, separated by colons.

  • What is a MAC address?

    A MAC (Media Access Control) address is a unique identifier given to devices which communicate over a local area network (LAN).

  • True or False?

    MAC addresses are dynamic and can change.

    False.

    MAC addresses are static and can never change.

  • Describe the format of a MAC address.

    A MAC address is represented as 12 hexadecimal digits (48 bits), usually grouped in pairs, with the first three pairs being the manufacturer ID number (OUI) and the last three pairs being the serial number of the network interface card (NIC).

  • True or False?

    IP addresses are used to communicate on a WAN/Internet, while MAC addresses are used to communicate on a LAN.

    True.

    IP addresses are used to communicate on a WAN/Internet.

    MAC addresses are used to communicate on a LAN.

  • What are the differences between IP addresses and MAC addresses?

    Mac addresses are in hexadecimal whilst IP addresses are in denary

    Mac addresses are static whilst IP addresses are dynamic

  • What is a standard in computing?

    A computing standard is a set of guidelines that when used with different hardware and software allows them to work with each other (compatibility) and allow data exchange (interoperability).

  • True or False?

    Ethernet is an example of a standard in computing.

    True.

    Ethernet is one of many examples of standards in computing

  • True or False?

    HTML is an example of a standard in computing.

    True.

    HTML - A standard for creating websites that allows them to be viewed on the World Wide Web (WWW) using web browser software.

  • True or False?

    Layers are an example of a standard in computing.

    False.

    Layers are a division of network functionality.

  • True or False?

    USB is an example of a standard in computing.

    True.

    USB is a standard that defines the physical connector used for connecting peripheral devices to computers.

  • True or false?

    Wi-Fi is an example of a standard in computing.

    True.

    Wi-Fi is a standard that allows wireless devices to communicate on a local area network (LAN).

  • True or False?

    Standards in computing promote compatibility and interoperability between different hardware and software.

    True.

    Standards in computing promote compatibility and interoperability between different hardware and software.

  • Define the term compatibility (in the context of standards in computing).

    Compatibility is the ability of different hardware and software to work with each other when following the same standard.

  • Define the term interoperability (in the context of standards in computing).

    Interoperability is the ability of different hardware and software to exchange data with each other when following the same standard.

  • True or False?

    Countries that use different plug sockets is an example of not using standards.

    True.

    Countries that use different plug sockets and devices that use different charger cables are examples of where standards are not used.

  • What is a protocol?

    A protocol is a set of rules that govern communication on a network.

  • True or false?

    Protocols and standards are the same.

    False.

    Standards outline the broad guidelines.

    Protocols focus on specific procedures and rules.

  • What is TCP/IP?

    TCP/IP is two protocols, transmission control protocol (TCP) and internet protocol (IP) that combined allow communication over the internet (WAN).

  • State the role of TCP (in the context of TCP/IP).

    TCP is responsible for making sure communication between two routers is error free.

  • State the role of IP (in the context of TCP/IP).

    IP is responsible for making sure data is delivered to the right device on a wide area network (WAN).

  • What is HTTP?

    Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website viewing.

  • What is HTTPS?

    HTTPS works in the same way as HTTP but with an added layer of security. All data sent and received using HTTPS is encrypted.

  • True or false?

    A bank would use the HTTP protocol to allow users to log in to their system.

    False.

    HTTPS is used as it is secure to protect sensitive information such as passwords, financial information and personal data.

  • Define FTP?

    File Transfer Protocol (FTP) allows sending and receiving files between computers.

  • Define SMTP?

    Simple Mail Transfer Protocol (SMTP) is a protocol that allows communication between an email sender and the email server, and between different email servers using the internet.

  • Define POP?

    Post Office Protocol (POP) is a protocol for downloading emails to a device from an email server. Once the email has been retrieved it is removed from the server.

  • Define IMAP?

    Internet Message Access Protocol (IMAP) is a protocol for downloading emails to a device from an email server. Once the email has been retrieved, a copy is retained on the mail server.

  • State an advantage of POP

    An advantage of POP is that it frees up storage space on email servers and is faster on slow connections.

  • State an advantage of IMAP.

    An advantage of IMAP is that you can view and manage emails from any device with internet access, and changes made on one device are synchronised on all connected devices.

  • Define layer.

    A layer is a division of network functionality. The network is divided into layers as it reduces the complexity

  • Give an advantage of using layers.

    Layers are self-contained which makes managing, repairing and upgrading easier as each layer can be worked on independent of other layers.

  • True or False?

    Layers allow for focus on specific parts of a protocol without affecting other layers.

    True.

    Layers allow for focus on specific parts of a protocol without affecting other layers.

  • True or False?

    Layers promote interoperability between hardware and software

    True.

    Layers promote data exchange (interoperability) between hardware and software.

  • Define the term Self-contained (in the context of layers).

    Self-contained means each layer can be worked on independently without affecting other layers.

  • True or False?

    Layers increase the complexity of network protocols.

    False.

    Dividing network tasks into layers reduces the complexity and makes each layer more manageable.

  • Define the term interoperability (in the context of layers).

    Interoperability is the ability of different hardware and software to exchange data, which is promoted by using layers in protocols.