Connectivity

?
  • Created by: JH1010
  • Created on: 18-10-15 10:31
Benefits of a LAN
Share internet connection, share files, share peripherals
1 of 31
Role of the router
Give each device an internal IP address so the router knows where to send the data
2 of 31
What is needed to connect the computers to the network
NIC (Network Interface Card) or Wi-Fi dongle
3 of 31
Benefits of Cable connection
Very fast, secure, no interferance
4 of 31
Drawbacks of a cable connection
Room must have socket to connect device, cables must be run throughout the house which makes it expensive,
5 of 31
Benefits of wireless connection
Only need wireless router, easy to set up and less expensive
6 of 31
Drawbacks of wireless connection
Slower, less secure, connection can be interfered with
7 of 31
What is powerline?
A connection which uses existing power wiring as a framework to carry data
8 of 31
Ways of securing wireless networks
Changing default admin password, MAC filtering, encryption, stop broadcasting SSID, turn off router when not in use, reducing transmitter power
9 of 31
Ways of combining technologies
Wi-Fi, Bluetooth, USB, Ethernet, HDMI
10 of 31
What is bandwidth?
Bandwidth determines the volume of data that can travel through a connection at once (BPS)
11 of 31
What is latency?
The delay between a bit leaving one device and arriving at another (milliseconds)
12 of 31
How does bandwidth and latency affect a user's experience?
High bandwidth is needed and low latency is needed for a good experience
13 of 31
Wi-Fi benefits
Good range, fast, widely available
14 of 31
Wi-Fi drawbacks
Hackers sometimes set up fake hotspots putting user's details at risk, annot use if not in range of an access point
15 of 31
Mobile Broadband benefits
Greater coverage than Wi-Fi, More secure than Wi-fi as data is encrypted
16 of 31
Mobile Broadband drawbacks
Have to pay and have to pay roaming charges if abroad, downloads limited, lower bandwidth than Wi-Fi
17 of 31
What is a peer-to-peer network?
When digital devices communicate wirelessly with each other, directly, without the need for a transmitter
18 of 31
What is two examples of a peer-to-peer network?
Wi-Fi direct: use Wi-Fi without a wireless access point. Bluetooth: connect up to 8 devices and low power so does not interfere with other devices
19 of 31
What is VOIP?
Rules used to transmit audio messages over the internet. Allows user to make free voice calls
20 of 31
What is SMTP?
Simple Mail Transfer Protocol which transfers the email from the sender's email client to the receiver's email client
21 of 31
Describe the difference between POP3 and IMAP?
POP3 is the protocol which downloads the email to the receiver's computer and then deletes it from the server. IMAP keeps the email on the server so it can be viewed anywhere using the internet.
22 of 31
What is HTTP?
Hypertext Transfer Protocol used by the WWW. Your browser uses it to request the files it needs from the web server to show the web page on our computer
23 of 31
Why is HTTPS different?
HTTPS is more secure as the data is encrypted. Method: 1. Browser checks site's digital certificate 2. Web server and browser determine the encryption type 3. Browser and web server send unique codes to use when sending information 4. Files are sent
24 of 31
What is remote access? How can it be prevented?
Computer is visible to billions of other when connected to the internet, and some computer may try to gain access to yours. A firewall is a software used to permit or block connections between your computer and other computers.
25 of 31
What is a virus? What precautions can you take against viruses?
A virus is a program designed to cause other computer programs to malfunction or stop working. You can install anti-virus software, run regular scans of files, only download from trusted websites, and only open emails from trusted senders
26 of 31
How can you prevent people intercepting data? Why is people intercepting data a problem?
Encryption can used as unauthorised receivers will not be able to read the information. It is a problem because someone could us the data to commit fraud
27 of 31
Give 3 ways of preventing illegal access
Use authentication. Require users to have a username and password. A captcha test.
28 of 31
How can you make a password strong?
Use numbers, upper case and lower case letters and punctuation marks
29 of 31
How can you prevent physical access to data?
Set up the lock function on your computer
30 of 31
How can you prevent theft of equipment?
Use locks and chains to fix equipment to desks, and put locks on windows and doors
31 of 31

Other cards in this set

Card 2

Front

Role of the router

Back

Give each device an internal IP address so the router knows where to send the data

Card 3

Front

What is needed to connect the computers to the network

Back

Preview of the front of card 3

Card 4

Front

Benefits of Cable connection

Back

Preview of the front of card 4

Card 5

Front

Drawbacks of a cable connection

Back

Preview of the front of card 5
View more cards

Comments

Fnt1klo3

Report

Good!

Ashley Hamilton

Report

spelling mistake on card 15 on the back

Similar ICT resources:

See all ICT resources »See all Communications resources »