0% found this document useful (0 votes)
14 views18 pages

Revision Worksheet Answers

Wrksgt

Uploaded by

samarmo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views18 pages

Revision Worksheet Answers

Wrksgt

Uploaded by

samarmo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

ICT Revision Worksheet Answers Grade

Define the following terms

1. Network

A network is a collection of computers, servers, mainframes, network devices, peripherals, or


other devices connected to one another to allow the sharing of data and resources. Networks can
be private or public, depending on the accessibility and user permissions.

2. Types of Networks

LAN (Local Area Network)

A LAN is a network that connects computers and devices in a limited geographical area such as
a home, school, office building, or closely positioned group of buildings. LANs are typically
high-speed and use Ethernet cables or Wi-Fi for connectivity.

WAN (Wide Area Network)

A WAN covers a large geographic area, such as a city, country, or even global connections.
WANs are used to connect smaller networks, including LANs and MANs. The Internet is the
largest and most well-known example of a WAN.

WLAN (Wireless Local Area Network)

A WLAN is a LAN that uses wireless communication technology to connect devices within a
limited area. Wi-Fi is the most common type of WLAN technology, allowing devices to connect
to the network without physical cables.

MAN (Metropolitan Area Network)

A MAN is a network that spans a metropolitan area, such as a city or large campus. It is larger
than a LAN but smaller than a WAN and often used to connect multiple LANs within the same
geographic area.

PAN (Personal Area Network)

A PAN is a network for interconnecting devices centered around an individual person's


workspace. These devices typically include smartphones, tablets, and laptops. Bluetooth and
USB are common technologies used in PANs.

3. Wi-Fi
Wi-Fi is a wireless networking technology that allows devices such as computers, smartphones,
and other equipment to connect to the Internet or communicate with one another wirelessly
within a particular area. It uses radio waves to provide high-speed Internet and network
connections.

4. Bluetooth

Bluetooth is a short-range wireless technology standard used for exchanging data between fixed
and mobile devices over short distances using UHF radio waves. It is commonly used for
connecting peripherals such as keyboards, mice, and headphones to computers and mobile
devices.

5. Tethering

Tethering is the process of sharing a mobile device's internet connection with other devices. This
can be done over Wi-Fi, Bluetooth, or USB. For example, a smartphone can share its mobile data
connection with a laptop.

6. Internet

The Internet is a global network of interconnected computer networks that use the standard
Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks
that consists of millions of private, public, academic, business, and government networks.

7. Intranet

An intranet is a private network accessible only to an organization's staff. Often, an intranet is


used to provide employees with access to internal systems, resources, and applications. It uses
the same protocols as the Internet but is secured from unauthorized access.

8. Extranet

An extranet is a controlled private network that allows access to partners, vendors, and suppliers
or an authorized set of users outside of the organization. It is used to securely share part of a
business’s information or operations with external parties.

9. Cloud Computing

Cloud computing is the delivery of different services through the Internet, including data storage,
servers, databases, networking, and software. Instead of storing data on a local hard drive or on-
premises server, cloud-based storage makes it possible to save data to a remote database.

10. Encryption
Encryption is the process of converting data into a code to prevent unauthorized access. It
ensures that only authorized parties can decode and read the data, providing confidentiality and
security in communication and data storage.

11. Cloud Storage

Cloud storage is a model of computer data storage in which the digital data is stored in logical
pools, said to be "in the cloud." The physical storage spans multiple servers (sometimes in
multiple locations), and the physical environment is typically owned and managed by a hosting
company. Users access the stored data through the Internet.

b. Compare Wi-Fi and Bluetooth

1. Range:
o Wi-Fi: Typically covers a larger area, up to around 100 meters indoors and more
outdoors.
o Bluetooth: Designed for short-range communication, typically around 10 meters
but can extend up to 100 meters in some cases.
2. Data Transfer Speed:
o Wi-Fi: Generally faster, with speeds up to several Gbps depending on the Wi-Fi
standard (e.g., Wi-Fi 6).
o Bluetooth: Slower compared to Wi-Fi, with maximum speeds around 2 Mbps
(Bluetooth 5.0).
3. Power Consumption:
o Wi-Fi: Higher power consumption, suitable for devices with ample power
sources.
o Bluetooth: Lower power consumption, making it ideal for battery-operated
devices like wearables and headphones.

c. Compare Internet and Intranet

1. Scope:
o Internet: A global network connecting millions of private, public, academic,
business, and government networks.
o Intranet: A private network accessible only to an organization's staff, limited in
scope to internal communication and data sharing.
2. Access:
o Internet: Publicly accessible by anyone with an internet connection.
o Intranet: Restricted access, usually protected by firewalls and authentication
measures, only available to authorized users within the organization.
3. Purpose:
o Internet: Used for a wide variety of purposes including communication,
information sharing, entertainment, and commerce.
o Intranet: Primarily used for internal communication, collaboration, and
information sharing within an organization, enhancing productivity and
streamlining operations.

1. Modem

A modem (modulator-demodulator) is a hardware device that converts data from a digital format
suitable for communication with computer devices to a format suitable for transmission over
analog telecommunications circuits, such as phone lines or cable systems. It enables a computer
or other device to connect to the Internet by modulating digital data into an analog signal and
demodulating the incoming analog signal back into digital data.

2. Switch

A switch is a network device that connects multiple devices (such as computers, printers,
servers) within a local area network (LAN) and uses MAC addresses to forward data to the
correct destination. Switches operate at the data link layer (Layer 2) of the OSI model and can
improve network performance by reducing collisions and efficiently managing data traffic.

3. Router

A router is a networking device that connects different networks together and directs data
packets between them. It operates at the network layer (Layer 3) of the OSI model. Routers use
IP addresses to determine the best path for forwarding data across interconnected networks, such
as connecting a home or office network to the Internet.

4. NIC (Network Interface Card)

A NIC, or Network Interface Card, is a hardware component that allows a computer or other
device to connect to a network. It provides the necessary circuitry to communicate over wired or
wireless networks and is responsible for converting data from the device into a format suitable
for network transmission.

5. Bridge

A bridge is a network device that connects and filters traffic between two or more network
segments at the data link layer (Layer 2) of the OSI model. It helps to reduce traffic on a network
by dividing it into separate collision domains while still allowing communication between them.
Bridges use MAC addresses to forward data only to the segment where the destination device is
located, improving overall network performance.

Functions of Networking Devices

1. Modem
Function: A modem (modulator-demodulator) serves as a bridge between a digital device and an
analog transmission medium, such as a telephone line or cable system. It performs two main
functions:

 Modulation: Converts digital data from a computer or other digital device into an analog
signal that can be transmitted over analog media.
 Demodulation: Converts incoming analog signals back into digital data that the device
can process.

Modems are essential for connecting to the internet over traditional telephone lines (DSL), cable
systems, or other forms of analog communication channels.

2. Switch

Function: A switch is a network device that connects multiple devices within a local area
network (LAN) and intelligently directs data traffic based on MAC addresses. Its primary
functions include:

 Forwarding Data: Switches receive incoming data packets, read the destination MAC
address, and forward the packets only to the intended recipient device.
 Reducing Collisions: By providing dedicated communication paths, switches reduce
data collisions that occur in networks using shared media.
 Improving Network Performance: Switches segment network traffic, which reduces
congestion and increases overall network efficiency.

3. Router

Function: A router is a device that connects multiple networks and routes data packets between
them, typically using IP addresses. Key functions of a router include:

 Packet Forwarding: Routers determine the best path for data packets to reach their
destination across interconnected networks.
 Network Address Translation (NAT): Routers can map private IP addresses within a
local network to a public IP address for communication over the internet.
 Connecting Different Networks: Routers enable communication between different
networks, such as connecting a home or office network to the internet.
 Providing Security: Many routers offer built-in firewalls and other security features to
protect the network from external threats.

4. NIC (Network Interface Card)

Function: A NIC (Network Interface Card) allows a computer or other device to connect to a
network. Its functions include:

 Network Access: Provides the hardware interface to connect to wired (Ethernet) or


wireless (Wi-Fi) networks.
 Data Conversion: Converts data from the device into a format suitable for transmission
over the network and vice versa.
 Communication: Manages the transmission and reception of data packets over the
network, using protocols like Ethernet for wired connections or 802.11 for wireless
connections.

5. Bridge

Function: A bridge is a device that connects and filters traffic between two or more network
segments, operating at the data link layer (Layer 2) of the OSI model. Its functions include:

 Connecting Network Segments: Bridges link multiple LAN segments, making them
function as a single LAN.
 Filtering Traffic: Bridges analyze incoming data frames and make forwarding decisions
based on MAC addresses, only sending frames to the appropriate segment.
 Reducing Traffic: By dividing a network into segments, bridges reduce the amount of
traffic on each segment, improving overall network performance and reducing collisions.
 Learning: Bridges build a table of MAC addresses to learn which devices are on which
segments, improving their efficiency over time.

1. Advantages and Disadvantages of Cloud Computing for a Business

Advantages:

1. Cost Efficiency: Cloud computing eliminates the need for large capital expenditures on
hardware and software, as businesses can pay for cloud services on a subscription or pay-
as-you-go basis.
2. Scalability: Businesses can easily scale their computing resources up or down based on
their needs, allowing for flexibility and better management of resources.
3. Accessibility and Collaboration: Cloud services enable employees to access data and
applications from anywhere with an internet connection, facilitating remote work and
collaboration.

Disadvantages:

1. Security and Privacy Concerns: Storing sensitive data on third-party servers can raise
concerns about data breaches and loss of control over data privacy.
2. Downtime and Reliability: Dependence on internet connectivity and cloud service
providers can result in downtime and service interruptions, impacting business
operations.
3. Compliance and Legal Issues: Businesses may face challenges in meeting regulatory
requirements for data storage and protection when using cloud services, especially if data
is stored in different jurisdictions.

2. Advantages and Disadvantages of Cloud Storage

Advantages:
1. Cost Savings: Cloud storage reduces the need for investing in and maintaining physical
storage hardware, lowering overall IT costs.
2. Data Accessibility: Users can access stored data from any location with an internet
connection, enhancing flexibility and productivity.
3. Automatic Backups and Disaster Recovery: Cloud storage services often include
automatic backups and disaster recovery options, ensuring data integrity and availability.

Disadvantages:

1. Security Risks: Storing data in the cloud introduces risks of unauthorized access, data
breaches, and potential loss of sensitive information.
2. Dependency on Internet Connectivity: Access to data is dependent on internet
availability, which can be a drawback in areas with unreliable connectivity.
3. Limited Control: Businesses may have limited control over the infrastructure and data
management practices of the cloud storage provider, which can lead to concerns about
data governance and compliance.

3. Network Security and Methods to Secure the Network

Network Security: Network security refers to the policies, practices, and technologies designed
to protect the integrity, confidentiality, and availability of data and resources on a computer
network from unauthorized access, misuse, or cyber attacks.

Methods to Secure the Network:

1. Firewalls: Implementing hardware and software firewalls to monitor and control


incoming and outgoing network traffic based on predetermined security rules.
2. Intrusion Detection and Prevention Systems (IDPS): Using IDPS to detect and prevent
potential threats by monitoring network traffic for suspicious activities.
3. Encryption: Encrypting data transmitted over the network to ensure that it is unreadable
to unauthorized users.
4. Virtual Private Networks (VPNs): Establishing VPNs to create secure, encrypted
connections over public networks, providing remote users with secure access to the
internal network.
5. Access Control: Implementing strong access control measures, including multi-factor
authentication (MFA) and role-based access control (RBAC), to restrict network access
to authorized users.
6. Patch Management: Regularly updating and patching software and firmware to fix
vulnerabilities and protect against exploits.
7. Security Policies and Training: Developing and enforcing comprehensive security
policies and providing regular training to employees on best security practices and threat
awareness.
8. Network Segmentation: Dividing the network into smaller, isolated segments to limit
the spread of potential threats and restrict access to sensitive data.

4. Malware and Types


Malware: Malware, short for malicious software, is software designed to infiltrate, damage, or
disable computers and networks without the user's consent. It can steal data, spy on user activity,
or cause other harmful effects.

Types of Malware:

1. Viruses: Malware that attaches itself to legitimate programs and replicates itself to
spread to other programs or files.
2. Worms: Self-replicating malware that spreads independently from one computer to
another without needing to attach to a host program.
3. Trojan Horses: Malware disguised as legitimate software that, once executed, can steal
data or provide unauthorized access to the system.
4. Spyware: Malware that secretly monitors user activity and collects personal information
without the user's knowledge.
5. Ransomware: Malware that encrypts the victim's data and demands a ransom payment
for the decryption key.
6. Adware: Malware that automatically displays or downloads advertising material, often in
the form of unwanted pop-ups.
7. Rootkits: Malware that grants unauthorized users access to a computer system while
hiding its presence and activities.

5. Anti-Malware and Its Role

Anti-Malware: Anti-malware software is designed to detect, prevent, and remove malicious


software from computer systems and networks. It encompasses a range of tools and techniques to
protect against various types of malware.

Role of Anti-Malware in Protecting Data and Network:

 Detection: Anti-malware scans files, applications, and network traffic for known and
potential threats using signature-based and heuristic analysis.
 Prevention: Anti-malware provides real-time protection by blocking malicious activities
and preventing malware from being installed or executed.
 Removal: Anti-malware identifies and removes detected malware, cleaning infected files
and restoring system integrity.
 Updates: Anti-malware software regularly updates its virus definitions and threat
databases to protect against the latest malware strains.
 Monitoring: Anti-malware continuously monitors the system for suspicious behavior,
helping to identify and mitigate threats before they cause significant damage.
 User Education: Many anti-malware solutions offer user education and alerts to raise
awareness about potential threats and safe computing practices.

Purpose of Various Types of Malware

i. Virus
Purpose: A virus is designed to attach itself to legitimate programs or files and replicate itself
when the host is executed. Its main purposes include:

 Disruption: Causing harm to systems by corrupting or destroying data, affecting the


performance, or crashing the system.
 Replication: Spreading itself to other programs and systems to maximize its reach and
potential damage.
 Payload Execution: Delivering additional malicious payloads such as stealing sensitive
information, creating backdoors, or launching further attacks.

j. Worm

Purpose: A worm is a type of malware that self-replicates and spreads independently without
needing a host program. Its main purposes include:

 Propagation: Rapidly spreading across networks to infect as many devices as possible,


exploiting vulnerabilities in network security.
 Resource Exhaustion: Consuming system and network resources, leading to degraded
performance or denial of service.
 Payload Delivery: Similar to viruses, worms can carry payloads that perform malicious
activities like data theft, unauthorized access, or further infections.

k. Trojan

Purpose: A Trojan, or Trojan horse, disguises itself as a legitimate program to trick users into
installing it. Once executed, it performs malicious activities. Its main purposes include:

 Data Theft: Stealing sensitive information such as passwords, credit card details, or
personal data.
 Remote Access: Providing attackers with unauthorized access to the infected system,
allowing them to control it remotely.
 System Damage: Corrupting or deleting files, installing additional malware, or causing
other harm to the system.

l. Spyware

Purpose: Spyware is designed to secretly monitor and collect information about a user's
activities without their knowledge. Its main purposes include:

 Data Collection: Gathering personal information, browsing habits, login credentials, and
other sensitive data.
 Surveillance: Tracking user behavior and transmitting the collected data to a remote
attacker.
 Intrusion: Often used by attackers to gather intelligence for further malicious activities,
such as identity theft or financial fraud.

m. Adware
Purpose: Adware is designed to automatically display or download advertising material, often in
the form of unwanted pop-ups or banners. Its main purposes include:

 Revenue Generation: Generating revenue for the attacker through advertising


impressions, clicks, or installations.
 User Annoyance: Distracting and frustrating users with intrusive ads, potentially leading
to decreased productivity or user experience.
 Data Collection: Sometimes adware collects data on user behavior and preferences to
target ads more effectively or sell the information to third parties.

Audio-Video Conferencing

Audio-video conferencing is a technology that enables individuals or groups to communicate


with each other in real-time using both audio and video signals. Participants can see and hear
each other regardless of their geographical locations, facilitating more interactive and effective
communication compared to audio-only calls.

1. Three Advantages of Video Conferencing

1. Improved Communication:
o Video conferencing allows participants to see non-verbal cues such as body
language and facial expressions, which can enhance understanding and reduce
misunderstandings.
2. Cost Savings:
o Reduces the need for travel, saving time and money associated with
transportation, accommodation, and other travel-related expenses.
3. Enhanced Collaboration:
o Facilitates real-time collaboration and decision-making among team members,
regardless of their locations, through features like screen sharing, virtual
whiteboards, and document sharing.

2. Three Technical Issues a User Can Face During Video Conferencing

1. Connectivity Issues:
o Poor internet connection can lead to dropped calls, lag, and buffering, affecting
the quality of the video conference.
2. Hardware Malfunctions:
o Problems with cameras, microphones, or speakers can disrupt communication.
This includes issues like low-quality video, poor audio clarity, or total hardware
failure.
3. Software Compatibility:
o Incompatibility between different video conferencing software or outdated
software versions can lead to problems in connecting, sharing screens, or using
other collaborative features.

3. Equipment Required for a Web Conference/Video Conference


1. Computer or Mobile Device:
o A computer (desktop or laptop) or mobile device (tablet or smartphone) with
sufficient processing power and memory.
2. High-Speed Internet Connection:
o A reliable broadband connection to ensure smooth video and audio transmission.
3. Webcam:
o An integrated or external camera to capture video. High-definition webcams are
preferred for better image quality.
4. Microphone and Speakers/Headset:
o Built-in or external microphones and speakers for clear audio input and output. A
headset with a microphone can reduce background noise and improve audio
quality.
5. Video Conferencing Software:
o Applications such as Zoom, Microsoft Teams, Google Meet, Skype, or similar
platforms that support video conferencing functionalities.
6. Monitor or Screen:
o A screen to display video feeds and shared content. Dual monitors can enhance
the conferencing experience by allowing more screen space for participants and
shared materials.
7. Optional Accessories:
o Lighting: Proper lighting to ensure clear visibility. Ring lights or desk lamps can
help improve video quality.
o Document Camera: For sharing physical documents or items during the
conference.
o Green Screen: To use virtual backgrounds without visual disturbances.

Firewall

Definition: A firewall is a network security device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. Its primary
purpose is to establish a barrier between a trusted internal network and untrusted external
networks, such as the Internet, to prevent unauthorized access and potential threats.

Functions:

 Traffic Filtering: Allows or blocks traffic based on IP addresses, port numbers,


protocols, and specific rules set by the network administrator.
 Access Control: Restricts access to network resources by defining who can access what
and under what conditions.
 Monitoring and Logging: Keeps track of network traffic and records logs for analysis
and auditing purposes.

Authentication
Definition: Authentication is the process of verifying the identity of a user, device, or entity
before granting access to a system, network, or resource. It ensures that only authorized
individuals or entities can access sensitive information or perform actions within a system.

Types of Authentication:

 Password-Based: Uses a secret word or phrase known only to the user.


 Two-Factor Authentication (2FA): Combines two different forms of authentication,
such as a password and a verification code sent to a mobile device.
 Biometric: Uses unique biological characteristics, such as fingerprints, facial
recognition, or iris scans.
 Token-Based: Uses a physical or digital token that generates a unique code for access.

Encryption and Decryption

Encryption: Definition: Encryption is the process of converting plaintext data into an encoded
format called ciphertext, which is unreadable without a decryption key. It is used to protect
sensitive information from unauthorized access during storage or transmission.

Purpose:

 Data Protection: Ensures that sensitive data remains confidential and secure from
unauthorized access.
 Secure Communication: Protects data being transmitted over networks, such as the
Internet, from eavesdropping and interception.

Types of Encryption:

 Symmetric Encryption: Uses a single key for both encryption and decryption. Examples
include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).
 Asymmetric Encryption: Uses a pair of keys—a public key for encryption and a private
key for decryption. Examples include RSA (Rivest-Shamir-Adleman) and ECC (Elliptic
Curve Cryptography).

Decryption: Definition: Decryption is the process of converting encrypted data (ciphertext)


back into its original format (plaintext) using a decryption key. This process makes the data
readable and accessible to authorized users.

Purpose:

 Data Access: Allows authorized users to access and read the protected information.
 Secure Data Recovery: Ensures that encrypted data can be converted back to its original
form when needed, maintaining its usability.

Difference Between Hub and Switch

Hub:
 Function: A hub is a basic networking device that connects multiple Ethernet devices,
making them act as a single network segment.
 Operation: Operates at the physical layer (Layer 1) of the OSI model.
 Data Transmission: Uses broadcasting to send data packets to all connected devices
regardless of the destination, leading to potential network collisions.
 Efficiency: Less efficient due to broadcasting and collision issues.
 Bandwidth Sharing: Shared bandwidth among all connected devices, resulting in
reduced performance with more devices.
 Intelligence: Lacks intelligence to direct data to specific devices.

Switch:

 Function: A switch is a more advanced device that connects multiple devices within a
local area network (LAN) and uses MAC addresses to forward data to the correct
destination.
 Operation: Operates at the data link layer (Layer 2) and sometimes at the network layer
(Layer 3) of the OSI model.
 Data Transmission: Sends data packets only to the intended recipient device, reducing
collisions and improving efficiency.
 Efficiency: More efficient due to reduced collisions and intelligent data forwarding.
 Bandwidth Sharing: Provides dedicated bandwidth to each connected device, enhancing
performance.
 Intelligence: Can learn and store MAC addresses, allowing it to make informed
forwarding decisions.

Six Different Authentication Methods

1. Password-Based Authentication:
o Users provide a secret password to verify their identity.
2. Two-Factor Authentication (2FA):
o Combines two different methods, typically something the user knows (password)
and something they have (verification code sent to a mobile device).
3. Biometric Authentication:
o Uses unique biological characteristics, such as fingerprints, facial recognition, or
iris scans, to verify identity.
4. Token-Based Authentication:
o Involves the use of a physical or digital token that generates a unique code for
access.
5. Certificate-Based Authentication:
o Uses digital certificates issued by a trusted Certificate Authority (CA) to
authenticate users or devices.
6. Single Sign-On (SSO):
o Allows users to authenticate once and gain access to multiple systems or
applications without needing to log in again.

Difference Between Webcast and Webinar


Webcast: Definition: A webcast is a one-way broadcast of audio and/or video content over the
internet to a large audience.

 Interactivity: Generally lacks interactivity; viewers can watch and listen but cannot
interact with the presenter in real-time.
 Purpose: Often used for live streaming events, presentations, or broadcasts to
disseminate information to a wide audience.
 Audience Size: Suitable for reaching large audiences, sometimes thousands of viewers
simultaneously.
 Engagement: Limited engagement, typically involves passive viewing.

Webinar:

 Definition: A webinar (web seminar) is an interactive, web-based seminar or


presentation that allows real-time interaction between the presenter and participants.
 Interactivity: Highly interactive; participants can ask questions, respond to polls, and
engage in discussions during the session.
 Purpose: Used for educational purposes, training sessions, workshops, and collaborative
meetings where audience participation is essential.
 Audience Size: Generally targets smaller, more focused audiences compared to
webcasts, though they can still accommodate large groups.
 Engagement: High level of engagement, with features like Q&A sessions, chat, and
interactive polls.

Three Rules of a Strong Password

1. Length and Complexity:


o A strong password should be at least 12-16 characters long and include a mix of
uppercase and lowercase letters, numbers, and special characters (e.g., @, #, $,
%). This complexity makes it harder for attackers to guess or brute-force the
password.
2. Avoid Common Words and Phrases:
o Avoid using easily guessable words, phrases, or patterns such as "password,"
"123456," or "qwerty." Instead, use a combination of unrelated words or a
passphrase that is easy to remember but hard to guess (e.g., "BlueSky!Rain$7&").
3. Unique Passwords for Different Accounts:
o Use different passwords for different accounts. If one account is compromised,
using unique passwords prevents attackers from accessing other accounts.
Consider using a password manager to keep track of multiple strong passwords.

Benefits of Cloud Computing for a Business

1. Cost Efficiency:
o Reduces the need for large capital expenditures on hardware, software, and IT
infrastructure. Businesses can pay for what they use on a subscription or pay-as-
you-go basis.
2. Scalability and Flexibility:
o Allows businesses to scale their IT resources up or down based on demand. This
flexibility supports business growth and can accommodate varying workloads
without the need for physical upgrades.
3. Accessibility and Collaboration:
o Enables employees to access data and applications from anywhere with an
internet connection, fostering remote work and enhancing collaboration across
geographically dispersed teams.

Definition of Protocol

Protocol: A protocol is a set of rules and conventions that govern the communication between
devices on a network. Protocols ensure that data is transmitted accurately and efficiently between
devices.

Important Internet Protocols:

1. HTTP (HyperText Transfer Protocol):


o The foundation of data communication on the web, used for transmitting web
pages.
2. HTTPS (HTTP Secure):
o A secure version of HTTP that encrypts data for secure communication.
3. FTP (File Transfer Protocol):
o Used for transferring files between a client and a server on a network.
4. TCP/IP (Transmission Control Protocol/Internet Protocol):
o The fundamental protocol suite for the internet, responsible for ensuring reliable
communication.
5. SMTP (Simple Mail Transfer Protocol):
o Used for sending and receiving email.
6. DNS (Domain Name System):
o Translates domain names into IP addresses, allowing users to access websites
using human-readable names.

Definition of Topology

Topology: Network topology refers to the arrangement of different elements (links, nodes, etc.)
in a computer network. It defines the layout of a network and how different nodes are
interconnected.

Comparison of Wired and Wireless Networks

Wired Network:

 Reliability: Generally more reliable and stable connections with consistent speeds.
 Security: More secure as physical access to the network cable is required.
 Speed: Typically faster due to direct connections without interference.
 Installation: Requires physical cabling, which can be cumbersome and expensive to
install.

Wireless Network:

 Flexibility: Greater flexibility and mobility, allowing users to connect from anywhere
within the network range.
 Installation: Easier and cheaper to set up as it does not require extensive cabling.
 Speed: Can be slower and more prone to interference from other wireless devices and
physical obstructions.
 Security: More vulnerable to security threats like eavesdropping and unauthorized access
if not properly secured.

Three Advantages of Local Area Network (LAN)

1. Resource Sharing:
o Enables multiple users to share resources such as printers, files, and internet
connections, reducing costs and increasing efficiency.
2. Data Security and Management:
o Easier to implement security measures and data management policies within a
confined network environment, ensuring better protection and control over data.
3. Improved Communication:
o Facilitates quick and efficient communication between users within the same
organization, supporting collaboration and information sharing.

Three Advantages of VPN

1. Enhanced Security:
o Encrypts internet connections, protecting data from eavesdropping, hacking, and
other cyber threats, especially on public Wi-Fi networks.
2. Remote Access:
o Allows remote employees to securely access the company's internal network and
resources from anywhere, supporting remote work and business continuity.
3. Anonymity and Privacy:
o Masks the user's IP address and location, enhancing online privacy and allowing
access to geo-restricted content without exposing personal information.

4o
15. Explain the purpose of NIC. 16. Draw the following diagrams a. Local area network in an
ICT Lab. b. Wide area network c. Two local area networks connected by a bridge.
ChatGPT

Purpose of NIC (Network Interface Card)

Network Interface Card (NIC): A NIC, also known as a network adapter, is a hardware
component that allows a computer or other device to connect to a network. It can be either an
expansion card that fits into a computer's motherboard or integrated directly into the
motherboard itself.

Purpose:

1. Network Connectivity:
o Provides a physical interface for connecting a computer to a wired or wireless
network, enabling communication with other devices on the network.
2. Data Transmission:
o Facilitates the sending and receiving of data over the network by converting
digital data from the computer into signals that can be transmitted over the
network medium (e.g., Ethernet cables, Wi-Fi).
3. Network Addressing:
o Each NIC has a unique MAC (Media Access Control) address that identifies the
device on the network, ensuring accurate data delivery and reception.

a. Local Area Network (LAN) in an ICT Lab

 Components: PCs, a switch, printer, and server.


 Configuration: All devices are connected to a central switch. The switch allows for
efficient communication and resource sharing within the lab.

b. Wide Area Network (WAN)

 Components: Two office locations, routers, and the internet.


 Configuration: Each office has its own local network connected to a router. The routers
connect through the internet, forming a WAN that allows communication between the
two offices.

c. Two Local Area Networks Connected by a Bridge

 Components: Two switches, PCs, and a bridge.


 Configuration: Each LAN has a switch that connects multiple PCs. The bridge connects
the two LANs, allowing devices in one LAN to communicate with devices in the other
LAN.

1. LAN: Local Area Network


2. WAN: Wide Area Network
3. WLAN: Wireless Local Area Network
4. PAN: Personal Area Network
5. MAN: Metropolitan Area Network
6. VPN: Virtual Private Network
7. VOIP: Voice Over Internet Protocol
8. HTTP: HyperText Transfer Protocol
9. HTTPS: HyperText Transfer Protocol Secure
10. NIC: Network Interface Card
11. RFID: Radio Frequency Identification
12. Wi-Fi: Wireless Fidelity
13. MAC: Media Access Control
14. MODEM: Modulator-Demodulator
15. ADC: Analog to Digital Converter
16. DAC: Digital to Analog Converter
17. NFC: Near Field Communication

You might also like