Category:IT Applications Chapter 1 Questions

Chapter 1 Test your Knowledge Questions:

1.      A network is a series of linked computers that are able to share data such as printers, internet access, modems and scanners. These computers all have the ability to “communicate” between one another, allowing the sending/receiving of files, messages and instructions.

2.      Groupware allows groups of people to work simultaneously on a project over the network. This system gives each user the changed to the file in “real time”

3.      The four main reasons to use a network are to allow for Resource sharing, Remote services, Data and information sharing in organisations and facilitating communications

4.      Gives the organisation the ability to share files and resources like printers to save money.

5.      Scanners, modems, internet access and files can all be shared across a network

6.      A remote ordering service can reduce costs for an organisation and improve the accuracy of their data processing

7.      There is only one version of the file being shared across the network, meaning any current updates to the file will be seen in real time to all the employees.

8.      A blog would be more appropriate than a wiki if you prefer to only share or edit the information yourself. It gives you the ability to block certain features of the site and you can secure it so only you can change data on the site.

9.      Wiki’s have the ability to block certain users IP addresses from their site. This allows for a clean, smooth running wiki with no nuisances modifying the site inappropriately

10.  A Thread is a set of information or a conversation relating to a certain topic. In example, it could be about Mustangs, on a car wiki.

11.  Facebook is an appropriate website that allows a user to share status updates, photos, videos and other information safely with friends.

12.  LAN is a local area network; it only applies to a network over a small geographical region. WAN is a wide area network, and can spread over multiple kilometres. But both share information equally.

13.  Not all network points are computers, hence the factors for printers, servers, scanners and other items that are not specifically “computers”.

14.  A client is a person or computer that accesses the data on a server or can change any data they require. A server sores all the data for clients to access, ranging from a small home to an entire workspace/organisation.

15.  A peer to peer network would work for a few computers as it saves money and time needed to set up the entire set. Although, this information must pass through each computer to reach its destination.

16.  Peer to peer networks have no server, all the information is stored on each of the clients PC’s, meaning, to find a particular file or folder, it’s not stored on a single location, therefore you must manually “search” for it through all the PC’s. To transfer messages too, it must pass through all the computers to reach the target PC, allowing others to read it.

17.  A switch is a device that stores addresses of each device down each wire leading from the switch. It connects multiple PC’s or servers together to form a network.

18.  An Intranet is a local based network that allows for clients within an organisation to access information securely. These tend to be un-accessible from outside sources, meaning that private information won’t get shared.

19.  To ensure compatibility within multiple PC’s and allow for a reasonable set of rules for each of the companies.

20.  There are four main types of protocols used on the internet, they are the FTP (file transfer protocol), the SMTP (simple mail transfer protocol), the POP3 (post office protocol) and the Http (hypertext transfer protocol). Each of these has a specific function on the web.

21.  Each of the Ethernet frames contains the destination node address, the sending node address and some data packaged inside

22.  The frame is first sent to the target address, and then when it is accepted, an acknowledgement is sent back to the organising computer, allowing for it to send the rest of the packets needed. If this is rejected, a request for a re-send is sent back to the organising computer.

23.  A collision occurs when the two computers believe the network is quiet, and then sends packets at the same time. If this occurs, they wait and send them again at a random time to try and re-attempt the connection

24.  Smaller packets give many more options to the network management software to enable load balancing.

25.  A Wi-Fi network uses an 802.11 wireless standard.

26.  Network operating systems control file access, managing print queues, keeping track of users through their User ID’s and passwords, authenticating access to network services and maintaining a log of network usage and problems

27.  There are three parts to a URL. This is the protocol used for the communication, the name of the server hosting the page and the name of the page being requested.

28.  Domain name servers are used to translate the server name into an IP address.

29.   The server serves the page in an html code to the web browser, using this information to create the viewable web page on the users screen.

30.  A proxy server can be used as a safeguard between the client and the rest of the internet; it can also act as a way to speed up network traffic by caching pages.

31.  A POP3 server stores messages. The SMTP sends the message to the POP3 to be held until the message is ready to be sent.

32.  A cross platform software uses an execution engine and compiler with libraries so that it runs identically on all machines

33.  A network interface card is used to connect a computer or a resource to a network by means of wires, radio waves, IR light waves or fibre-optic.

34.  Roaming is the process of moving from one network to another or moving around a network over wireless, therefore maintaining their connection.

35.  Café’s provide hotspots for the benefit of their customers. This will attract certain people to have coffee and work during lunch breaks, or after work etc.

36.  A router is a communications device that allows multiple LAN’s to connect over a wan, or to create a much larger LAN. A router also directs each packet it receives to the appropriate LAN it desires.

37.  A modem modulates the digital data it receives from the computer to and analogue signal it can sent over a telephone line

38.  This differs from the analogue system as both the ADSL connection and the computer use digital signals. This removes the un-needed process of conversion.

39.  Cat 5 Cables are better than cat 3 because they can carry up to 10 times the amount of data over a longer distance.

40.  Disadvantages of using a cat 5 cable are that only two of the pairs of wires are used to send data, whilst all the other pairs are used for receiving. This means that speeds are affected greatly and traffic can be an issue. Cat 5 is used in so many installations as it is reliable, cheap and effective in networks.

41.  Fibre optic is used to connect large buildings as it can contain an extremely high speed of information transfer within it and it can spread over a very long distance.

42.  Wireless networks are effective in areas where it is difficult to install cables or where users need the ability to move around the workplace. Wireless transmissions include microwaves, IR and satellite.

43.  Microwaves are disadvantaged in which they require a “line of sight” transmission. This means simply that it must have no obstructions to transfer data to a device.

44.  Radio transmissions can travel over a massive distance and sent a large amount of data. Infra-red can only send information to approximately 5 meters, although it is fast, it us useless for networks or communication. It will only be effective for TV remotes and close range printers.

45.  The range of the wireless network can vary, extending to greater than the organisations property. Meaning, others can access it if the organisation isn’t careful with security.

46.  The organisation should have the user’s change the passwords changed every week, allowing if there is any hackers, to no be in the network for very long as their access is changed momentarily.

47.  A firewall filters information that is being received into and organisations internal network. Any packet that is flagged “unwanted” is not allowed through by the firewall.

48.  Wireless networks should encrypt their signal with WPA or WPA2. This requires anyone who attempts to log on to the network to enter a specific password, locking out hackers or people willing to get “free Wi-Fi”.

49.  A network diagram is a schematic method of showing the physical connections of devices and communication lines in the network. This method is used in large networks to monitor exactly what is connected where and how.

50.  If the diagram were based on the building, it would be cumbersome and difficult to read/understand.