ICT Revision Theory GCSE 1 0.0 / 5 ? ICTActs, Security and LegislationGCSEAQA Created by: IJM22Created on: 18-04-19 20:40 What is a network? Two or more computers, or other electronic devices, connected together so that they can exchange data 1 of 27 What are the disadvantages of using networks 1. The computer is vulnerable to hackers 2. easily be attacked by a virus 2 of 27 Which two ways are computers connected in a network? Servers and clients 3 of 27 What are servers? Special, powerful computers that provide ‘services’ to the client computers on the network. 4 of 27 What are clients? Normal computers that people sit at to get their work done. 5 of 27 What does LAN stand for? Local Area Network 6 of 27 What is LAN? Network confined to one building or site. 7 of 27 What is a wireless LAN A LAN that uses radio signals to connect computers instead of cables. 8 of 27 What is at the centre of a LAN? A wireless switch or router 9 of 27 What does WAN stand for? Wide Area Network 10 of 27 What is a WAN? A network that extends over a large area 11 of 27 How is a WAN created? By joining several LANs together 12 of 27 What is bluetooth? A wireless networking technology designed for very short-range connections 13 of 27 Any computer that needs to be connected to a network must have what? A Network Interface Card (NIC) 14 of 27 What is a hub? A device that connects a number of computers together to make a LAN 15 of 27 What is a switch? A device that connects a number of computers together to make a LAN 16 of 27 What is a router? A network device that connects together two or more networks 17 of 27 What is a proxy server? Acomputer setup to share a resource, usually an Internet connection 18 of 27 What is a bridge? A network device that typically links together two different parts of a LAN 19 of 27 What is a firewall? A device, or a piece of software that is placed between your computer and the rest of the network 20 of 27 What is the purpose of a firewall? To block unauthorised connections being made to your computer or LAN 21 of 27 Why are modems required? As modem converts from digital to analogue and from analogue to digital. 22 of 27 What is a intranet? Name given to a private network 23 of 27 What is a microprocessor? A small CPU built into a single 'chip' 24 of 27 Give 3 examples of microprocessor-controlled devices? 1.Games consoles 2. DVD players 3. MP3 players 25 of 27 What is Phishing? The sending of fraudulent e-mails that attempt to trick people into revealing details about their bank accounts, or other online accounts 26 of 27 What is spam? The name given to unsolicited e-mails (ones sent without being asked for). 27 of 27
Comments
No comments have yet been made