Revision Worksheet Answers
Revision Worksheet Answers
1. Network
2. Types of Networks
A LAN is a network that connects computers and devices in a limited geographical area such as
a home, school, office building, or closely positioned group of buildings. LANs are typically
high-speed and use Ethernet cables or Wi-Fi for connectivity.
A WAN covers a large geographic area, such as a city, country, or even global connections.
WANs are used to connect smaller networks, including LANs and MANs. The Internet is the
largest and most well-known example of a WAN.
A WLAN is a LAN that uses wireless communication technology to connect devices within a
limited area. Wi-Fi is the most common type of WLAN technology, allowing devices to connect
to the network without physical cables.
A MAN is a network that spans a metropolitan area, such as a city or large campus. It is larger
than a LAN but smaller than a WAN and often used to connect multiple LANs within the same
geographic area.
3. Wi-Fi
Wi-Fi is a wireless networking technology that allows devices such as computers, smartphones,
and other equipment to connect to the Internet or communicate with one another wirelessly
within a particular area. It uses radio waves to provide high-speed Internet and network
connections.
4. Bluetooth
Bluetooth is a short-range wireless technology standard used for exchanging data between fixed
and mobile devices over short distances using UHF radio waves. It is commonly used for
connecting peripherals such as keyboards, mice, and headphones to computers and mobile
devices.
5. Tethering
Tethering is the process of sharing a mobile device's internet connection with other devices. This
can be done over Wi-Fi, Bluetooth, or USB. For example, a smartphone can share its mobile data
connection with a laptop.
6. Internet
The Internet is a global network of interconnected computer networks that use the standard
Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks
that consists of millions of private, public, academic, business, and government networks.
7. Intranet
8. Extranet
An extranet is a controlled private network that allows access to partners, vendors, and suppliers
or an authorized set of users outside of the organization. It is used to securely share part of a
business’s information or operations with external parties.
9. Cloud Computing
Cloud computing is the delivery of different services through the Internet, including data storage,
servers, databases, networking, and software. Instead of storing data on a local hard drive or on-
premises server, cloud-based storage makes it possible to save data to a remote database.
10. Encryption
Encryption is the process of converting data into a code to prevent unauthorized access. It
ensures that only authorized parties can decode and read the data, providing confidentiality and
security in communication and data storage.
Cloud storage is a model of computer data storage in which the digital data is stored in logical
pools, said to be "in the cloud." The physical storage spans multiple servers (sometimes in
multiple locations), and the physical environment is typically owned and managed by a hosting
company. Users access the stored data through the Internet.
1. Range:
o Wi-Fi: Typically covers a larger area, up to around 100 meters indoors and more
outdoors.
o Bluetooth: Designed for short-range communication, typically around 10 meters
but can extend up to 100 meters in some cases.
2. Data Transfer Speed:
o Wi-Fi: Generally faster, with speeds up to several Gbps depending on the Wi-Fi
standard (e.g., Wi-Fi 6).
o Bluetooth: Slower compared to Wi-Fi, with maximum speeds around 2 Mbps
(Bluetooth 5.0).
3. Power Consumption:
o Wi-Fi: Higher power consumption, suitable for devices with ample power
sources.
o Bluetooth: Lower power consumption, making it ideal for battery-operated
devices like wearables and headphones.
1. Scope:
o Internet: A global network connecting millions of private, public, academic,
business, and government networks.
o Intranet: A private network accessible only to an organization's staff, limited in
scope to internal communication and data sharing.
2. Access:
o Internet: Publicly accessible by anyone with an internet connection.
o Intranet: Restricted access, usually protected by firewalls and authentication
measures, only available to authorized users within the organization.
3. Purpose:
o Internet: Used for a wide variety of purposes including communication,
information sharing, entertainment, and commerce.
o Intranet: Primarily used for internal communication, collaboration, and
information sharing within an organization, enhancing productivity and
streamlining operations.
1. Modem
A modem (modulator-demodulator) is a hardware device that converts data from a digital format
suitable for communication with computer devices to a format suitable for transmission over
analog telecommunications circuits, such as phone lines or cable systems. It enables a computer
or other device to connect to the Internet by modulating digital data into an analog signal and
demodulating the incoming analog signal back into digital data.
2. Switch
A switch is a network device that connects multiple devices (such as computers, printers,
servers) within a local area network (LAN) and uses MAC addresses to forward data to the
correct destination. Switches operate at the data link layer (Layer 2) of the OSI model and can
improve network performance by reducing collisions and efficiently managing data traffic.
3. Router
A router is a networking device that connects different networks together and directs data
packets between them. It operates at the network layer (Layer 3) of the OSI model. Routers use
IP addresses to determine the best path for forwarding data across interconnected networks, such
as connecting a home or office network to the Internet.
A NIC, or Network Interface Card, is a hardware component that allows a computer or other
device to connect to a network. It provides the necessary circuitry to communicate over wired or
wireless networks and is responsible for converting data from the device into a format suitable
for network transmission.
5. Bridge
A bridge is a network device that connects and filters traffic between two or more network
segments at the data link layer (Layer 2) of the OSI model. It helps to reduce traffic on a network
by dividing it into separate collision domains while still allowing communication between them.
Bridges use MAC addresses to forward data only to the segment where the destination device is
located, improving overall network performance.
1. Modem
Function: A modem (modulator-demodulator) serves as a bridge between a digital device and an
analog transmission medium, such as a telephone line or cable system. It performs two main
functions:
Modulation: Converts digital data from a computer or other digital device into an analog
signal that can be transmitted over analog media.
Demodulation: Converts incoming analog signals back into digital data that the device
can process.
Modems are essential for connecting to the internet over traditional telephone lines (DSL), cable
systems, or other forms of analog communication channels.
2. Switch
Function: A switch is a network device that connects multiple devices within a local area
network (LAN) and intelligently directs data traffic based on MAC addresses. Its primary
functions include:
Forwarding Data: Switches receive incoming data packets, read the destination MAC
address, and forward the packets only to the intended recipient device.
Reducing Collisions: By providing dedicated communication paths, switches reduce
data collisions that occur in networks using shared media.
Improving Network Performance: Switches segment network traffic, which reduces
congestion and increases overall network efficiency.
3. Router
Function: A router is a device that connects multiple networks and routes data packets between
them, typically using IP addresses. Key functions of a router include:
Packet Forwarding: Routers determine the best path for data packets to reach their
destination across interconnected networks.
Network Address Translation (NAT): Routers can map private IP addresses within a
local network to a public IP address for communication over the internet.
Connecting Different Networks: Routers enable communication between different
networks, such as connecting a home or office network to the internet.
Providing Security: Many routers offer built-in firewalls and other security features to
protect the network from external threats.
Function: A NIC (Network Interface Card) allows a computer or other device to connect to a
network. Its functions include:
5. Bridge
Function: A bridge is a device that connects and filters traffic between two or more network
segments, operating at the data link layer (Layer 2) of the OSI model. Its functions include:
Connecting Network Segments: Bridges link multiple LAN segments, making them
function as a single LAN.
Filtering Traffic: Bridges analyze incoming data frames and make forwarding decisions
based on MAC addresses, only sending frames to the appropriate segment.
Reducing Traffic: By dividing a network into segments, bridges reduce the amount of
traffic on each segment, improving overall network performance and reducing collisions.
Learning: Bridges build a table of MAC addresses to learn which devices are on which
segments, improving their efficiency over time.
Advantages:
1. Cost Efficiency: Cloud computing eliminates the need for large capital expenditures on
hardware and software, as businesses can pay for cloud services on a subscription or pay-
as-you-go basis.
2. Scalability: Businesses can easily scale their computing resources up or down based on
their needs, allowing for flexibility and better management of resources.
3. Accessibility and Collaboration: Cloud services enable employees to access data and
applications from anywhere with an internet connection, facilitating remote work and
collaboration.
Disadvantages:
1. Security and Privacy Concerns: Storing sensitive data on third-party servers can raise
concerns about data breaches and loss of control over data privacy.
2. Downtime and Reliability: Dependence on internet connectivity and cloud service
providers can result in downtime and service interruptions, impacting business
operations.
3. Compliance and Legal Issues: Businesses may face challenges in meeting regulatory
requirements for data storage and protection when using cloud services, especially if data
is stored in different jurisdictions.
Advantages:
1. Cost Savings: Cloud storage reduces the need for investing in and maintaining physical
storage hardware, lowering overall IT costs.
2. Data Accessibility: Users can access stored data from any location with an internet
connection, enhancing flexibility and productivity.
3. Automatic Backups and Disaster Recovery: Cloud storage services often include
automatic backups and disaster recovery options, ensuring data integrity and availability.
Disadvantages:
1. Security Risks: Storing data in the cloud introduces risks of unauthorized access, data
breaches, and potential loss of sensitive information.
2. Dependency on Internet Connectivity: Access to data is dependent on internet
availability, which can be a drawback in areas with unreliable connectivity.
3. Limited Control: Businesses may have limited control over the infrastructure and data
management practices of the cloud storage provider, which can lead to concerns about
data governance and compliance.
Network Security: Network security refers to the policies, practices, and technologies designed
to protect the integrity, confidentiality, and availability of data and resources on a computer
network from unauthorized access, misuse, or cyber attacks.
Types of Malware:
1. Viruses: Malware that attaches itself to legitimate programs and replicates itself to
spread to other programs or files.
2. Worms: Self-replicating malware that spreads independently from one computer to
another without needing to attach to a host program.
3. Trojan Horses: Malware disguised as legitimate software that, once executed, can steal
data or provide unauthorized access to the system.
4. Spyware: Malware that secretly monitors user activity and collects personal information
without the user's knowledge.
5. Ransomware: Malware that encrypts the victim's data and demands a ransom payment
for the decryption key.
6. Adware: Malware that automatically displays or downloads advertising material, often in
the form of unwanted pop-ups.
7. Rootkits: Malware that grants unauthorized users access to a computer system while
hiding its presence and activities.
Detection: Anti-malware scans files, applications, and network traffic for known and
potential threats using signature-based and heuristic analysis.
Prevention: Anti-malware provides real-time protection by blocking malicious activities
and preventing malware from being installed or executed.
Removal: Anti-malware identifies and removes detected malware, cleaning infected files
and restoring system integrity.
Updates: Anti-malware software regularly updates its virus definitions and threat
databases to protect against the latest malware strains.
Monitoring: Anti-malware continuously monitors the system for suspicious behavior,
helping to identify and mitigate threats before they cause significant damage.
User Education: Many anti-malware solutions offer user education and alerts to raise
awareness about potential threats and safe computing practices.
i. Virus
Purpose: A virus is designed to attach itself to legitimate programs or files and replicate itself
when the host is executed. Its main purposes include:
j. Worm
Purpose: A worm is a type of malware that self-replicates and spreads independently without
needing a host program. Its main purposes include:
k. Trojan
Purpose: A Trojan, or Trojan horse, disguises itself as a legitimate program to trick users into
installing it. Once executed, it performs malicious activities. Its main purposes include:
Data Theft: Stealing sensitive information such as passwords, credit card details, or
personal data.
Remote Access: Providing attackers with unauthorized access to the infected system,
allowing them to control it remotely.
System Damage: Corrupting or deleting files, installing additional malware, or causing
other harm to the system.
l. Spyware
Purpose: Spyware is designed to secretly monitor and collect information about a user's
activities without their knowledge. Its main purposes include:
Data Collection: Gathering personal information, browsing habits, login credentials, and
other sensitive data.
Surveillance: Tracking user behavior and transmitting the collected data to a remote
attacker.
Intrusion: Often used by attackers to gather intelligence for further malicious activities,
such as identity theft or financial fraud.
m. Adware
Purpose: Adware is designed to automatically display or download advertising material, often in
the form of unwanted pop-ups or banners. Its main purposes include:
Audio-Video Conferencing
1. Improved Communication:
o Video conferencing allows participants to see non-verbal cues such as body
language and facial expressions, which can enhance understanding and reduce
misunderstandings.
2. Cost Savings:
o Reduces the need for travel, saving time and money associated with
transportation, accommodation, and other travel-related expenses.
3. Enhanced Collaboration:
o Facilitates real-time collaboration and decision-making among team members,
regardless of their locations, through features like screen sharing, virtual
whiteboards, and document sharing.
1. Connectivity Issues:
o Poor internet connection can lead to dropped calls, lag, and buffering, affecting
the quality of the video conference.
2. Hardware Malfunctions:
o Problems with cameras, microphones, or speakers can disrupt communication.
This includes issues like low-quality video, poor audio clarity, or total hardware
failure.
3. Software Compatibility:
o Incompatibility between different video conferencing software or outdated
software versions can lead to problems in connecting, sharing screens, or using
other collaborative features.
Firewall
Definition: A firewall is a network security device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. Its primary
purpose is to establish a barrier between a trusted internal network and untrusted external
networks, such as the Internet, to prevent unauthorized access and potential threats.
Functions:
Authentication
Definition: Authentication is the process of verifying the identity of a user, device, or entity
before granting access to a system, network, or resource. It ensures that only authorized
individuals or entities can access sensitive information or perform actions within a system.
Types of Authentication:
Encryption: Definition: Encryption is the process of converting plaintext data into an encoded
format called ciphertext, which is unreadable without a decryption key. It is used to protect
sensitive information from unauthorized access during storage or transmission.
Purpose:
Data Protection: Ensures that sensitive data remains confidential and secure from
unauthorized access.
Secure Communication: Protects data being transmitted over networks, such as the
Internet, from eavesdropping and interception.
Types of Encryption:
Symmetric Encryption: Uses a single key for both encryption and decryption. Examples
include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).
Asymmetric Encryption: Uses a pair of keys—a public key for encryption and a private
key for decryption. Examples include RSA (Rivest-Shamir-Adleman) and ECC (Elliptic
Curve Cryptography).
Purpose:
Data Access: Allows authorized users to access and read the protected information.
Secure Data Recovery: Ensures that encrypted data can be converted back to its original
form when needed, maintaining its usability.
Hub:
Function: A hub is a basic networking device that connects multiple Ethernet devices,
making them act as a single network segment.
Operation: Operates at the physical layer (Layer 1) of the OSI model.
Data Transmission: Uses broadcasting to send data packets to all connected devices
regardless of the destination, leading to potential network collisions.
Efficiency: Less efficient due to broadcasting and collision issues.
Bandwidth Sharing: Shared bandwidth among all connected devices, resulting in
reduced performance with more devices.
Intelligence: Lacks intelligence to direct data to specific devices.
Switch:
Function: A switch is a more advanced device that connects multiple devices within a
local area network (LAN) and uses MAC addresses to forward data to the correct
destination.
Operation: Operates at the data link layer (Layer 2) and sometimes at the network layer
(Layer 3) of the OSI model.
Data Transmission: Sends data packets only to the intended recipient device, reducing
collisions and improving efficiency.
Efficiency: More efficient due to reduced collisions and intelligent data forwarding.
Bandwidth Sharing: Provides dedicated bandwidth to each connected device, enhancing
performance.
Intelligence: Can learn and store MAC addresses, allowing it to make informed
forwarding decisions.
1. Password-Based Authentication:
o Users provide a secret password to verify their identity.
2. Two-Factor Authentication (2FA):
o Combines two different methods, typically something the user knows (password)
and something they have (verification code sent to a mobile device).
3. Biometric Authentication:
o Uses unique biological characteristics, such as fingerprints, facial recognition, or
iris scans, to verify identity.
4. Token-Based Authentication:
o Involves the use of a physical or digital token that generates a unique code for
access.
5. Certificate-Based Authentication:
o Uses digital certificates issued by a trusted Certificate Authority (CA) to
authenticate users or devices.
6. Single Sign-On (SSO):
o Allows users to authenticate once and gain access to multiple systems or
applications without needing to log in again.
Interactivity: Generally lacks interactivity; viewers can watch and listen but cannot
interact with the presenter in real-time.
Purpose: Often used for live streaming events, presentations, or broadcasts to
disseminate information to a wide audience.
Audience Size: Suitable for reaching large audiences, sometimes thousands of viewers
simultaneously.
Engagement: Limited engagement, typically involves passive viewing.
Webinar:
1. Cost Efficiency:
o Reduces the need for large capital expenditures on hardware, software, and IT
infrastructure. Businesses can pay for what they use on a subscription or pay-as-
you-go basis.
2. Scalability and Flexibility:
o Allows businesses to scale their IT resources up or down based on demand. This
flexibility supports business growth and can accommodate varying workloads
without the need for physical upgrades.
3. Accessibility and Collaboration:
o Enables employees to access data and applications from anywhere with an
internet connection, fostering remote work and enhancing collaboration across
geographically dispersed teams.
Definition of Protocol
Protocol: A protocol is a set of rules and conventions that govern the communication between
devices on a network. Protocols ensure that data is transmitted accurately and efficiently between
devices.
Definition of Topology
Topology: Network topology refers to the arrangement of different elements (links, nodes, etc.)
in a computer network. It defines the layout of a network and how different nodes are
interconnected.
Wired Network:
Reliability: Generally more reliable and stable connections with consistent speeds.
Security: More secure as physical access to the network cable is required.
Speed: Typically faster due to direct connections without interference.
Installation: Requires physical cabling, which can be cumbersome and expensive to
install.
Wireless Network:
Flexibility: Greater flexibility and mobility, allowing users to connect from anywhere
within the network range.
Installation: Easier and cheaper to set up as it does not require extensive cabling.
Speed: Can be slower and more prone to interference from other wireless devices and
physical obstructions.
Security: More vulnerable to security threats like eavesdropping and unauthorized access
if not properly secured.
1. Resource Sharing:
o Enables multiple users to share resources such as printers, files, and internet
connections, reducing costs and increasing efficiency.
2. Data Security and Management:
o Easier to implement security measures and data management policies within a
confined network environment, ensuring better protection and control over data.
3. Improved Communication:
o Facilitates quick and efficient communication between users within the same
organization, supporting collaboration and information sharing.
1. Enhanced Security:
o Encrypts internet connections, protecting data from eavesdropping, hacking, and
other cyber threats, especially on public Wi-Fi networks.
2. Remote Access:
o Allows remote employees to securely access the company's internal network and
resources from anywhere, supporting remote work and business continuity.
3. Anonymity and Privacy:
o Masks the user's IP address and location, enhancing online privacy and allowing
access to geo-restricted content without exposing personal information.
4o
15. Explain the purpose of NIC. 16. Draw the following diagrams a. Local area network in an
ICT Lab. b. Wide area network c. Two local area networks connected by a bridge.
ChatGPT
Network Interface Card (NIC): A NIC, also known as a network adapter, is a hardware
component that allows a computer or other device to connect to a network. It can be either an
expansion card that fits into a computer's motherboard or integrated directly into the
motherboard itself.
Purpose:
1. Network Connectivity:
o Provides a physical interface for connecting a computer to a wired or wireless
network, enabling communication with other devices on the network.
2. Data Transmission:
o Facilitates the sending and receiving of data over the network by converting
digital data from the computer into signals that can be transmitted over the
network medium (e.g., Ethernet cables, Wi-Fi).
3. Network Addressing:
o Each NIC has a unique MAC (Media Access Control) address that identifies the
device on the network, ensuring accurate data delivery and reception.