Edit Game
LS3 NETWORKS
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   20  Close
Explain how a virtual private network (VPN) allows a travelling salesperson to connect securely to their company’s network
1.Tunnelling protocols 2.Encryption protocols 3.The use of gateways;
Explain how compression of data may lead to negative consequences
Some compression methods (lossy) discard data; Decompression will not return the complete file,if original is lost no recovery
Explain why the speed of data transmission across a network can vary.
Different parts of network use different media; Network congestion; Packets may take different routes; The receiver may be busy; Physical size of the network;
Explain WiMAX
Worldwide Interoperability for Microwave Access • Designed for large distance high speed internet access
What is Wi-Fi
•Wireless Fidelity Used in laptops/mobile devices to connect wirelessly to home network Allows relatively slow to fast data transmissions (depending on the vers
Any 5 methods of Network security
Authentication, Firewalls, Encryption ,Physical security ,WPA/WPA2
Explain Packet switching
describes the type of network in which relatively small units of data called packets are routed through a n/w based on the destination address contained in pack
List out the 3 types of Guided/ Wired transmission media.
1.Twisted pair (Shielded (STP) and Unshielded (UTP)) 2. Coaxial cables 3. Fiber optics
What are the functions of Protocols
1.Data Integrity 2.Manage flow control 3.Prevent deadlock 4.Manage congestion 5.Error checking
List the different layers of OSI Model
Application layer,Presentation layer,Session layer,Transport layer,Network layer, Datalink layer and Physical layer
What is VLAN
virtual LAN is a logical group of workstations,servers and network devices that appear to be on same LAN despite their geo distri for security,traffic mgmt.
Explain VPN
Virtual Private Network gives privacy online .EX:Business ,organisations ,Govts etc. Data is encrypted and decrypted. It provides extra server for security.
Explain how the use of MAC address can improve security.
The Media access control address identifies a specific device (network card/controller).It prevents unauthorised access by providing extra layer to authenticat
Outline the purpose of MAR in CPU
The Memory Address Register holds the memory location of data/instructions that need to be accessed(read/write)(fetch/store)
Explain why Protocols are used in Network communication
Protocols are a set of rules so that both sender and receiver are using same formats/methods to enable successful communication without errors.
Explain how data is transmitted by Packet switching
A message /data is broken into a number of parts which are sent independently over the optimum route for each packet.The individual parts are reassembled at des
Identify 2 Characteristics of a PAN
1.It is a smallest type of network. 2.It consits of connected devices in close proximity to the individual using them. 3.It is connected via Bluetooth /wireless
Identify any two features of a Peer to Peer(P2P) network.
1.Resources are more widely available. 2.Supports file sharing for collaborative work 3.No central server
Define the term Extranet
A controlled private network allowing customers, vendors, suppliers and businesses to gain info about a specific company without granting access to entireorgn e
What is a Datapacket
A packet is a bit of data that is sent for transmission over the digital network with a format.It has data and address.