Preview

04 -Network Hardware

 1. Networks make it easier to share viruses and other malware. They can quickly spread and damage files on many computers via a network

  True

  False

 2. In order to create a physical network we need certain hardware. For wired networks the transmission media would be what is used to carry the data around the network - effectively this is the ___________

  routers

  satellites

  cables

  computers

 3. There are different types of cables: 1. Coaxial 2. Twisted pair cable and 3. Fibre-optic cable. Which one of the following is a description of coaxial cable?
Types of Cables
================
#1 
A type of cable that that has a central wire that is surrounded by
an insulating layer.*Many of these cables also have an additional
outer layer that acts as a jacket. This type of cable is mostly used
in Ethernet

#2
This is a type of cable	that has two separately insulated wires that
are twisted around each other inside an outer layer. This is the most
common type of cable used in a network

#3
This is a type of cable that has lots of very fine glass threads 
inside an outside layer. It is based on the idea that light can 
travel through these cables - at great speed. Many networks are 
changing over to this due to it's speed and potential. 
networkhardware_typesofcables.png

  #3

  #2

  #1

  None of the above

 4. Which one of the following describes the Fibre Optic Cable?
Types of Cables
================
#1 
A type of cable that that has a central wire that is surrounded by
an insulating layer.*Many of these cables also have an additional
outer layer that acts as a jacket. This type of cable is mostly used
in Ethernet

#2
This is a type of cable	that has two separately insulated wires that
are twisted around each other inside an outer layer. This is the most
common type of cable used in a network

#3
This is a type of cable that has lots of very fine glass threads 
inside an outside layer. It is based on the idea that light can 
travel through these cables - at great speed. Many networks are 
changing over to this due to it's speed and potential. 
networkhardware_fibreoptic.jpg

  #3

  #2

  None of the above

  #1

 5. Along the cable, data is sent in binary. Sometimes 'interference' can occur and the signals from other electrical sources (such as radiation or other large electrical devices in the area) can .....

  can cause the data to leak back into the electrical source that is causing the interference

  can cause the data to be sent back in reverse

  can cause the data (bits) to flip - which is what causes errors in the sent data

  can cause the data to be transformed into hex instead of binary, causing obvious issues

 6. Another very important piece of hardware that is needed to connect the computer to the transmission media and to the network comes as standard on most computers - this is the ____________________.
networkhardware_networkinterfacecard.jpg

  Network Internet Coaxial

  Network Inner Commotion

  Network Interface Controller or Network Interface Card

  Neumann's Inventive Cable

 7. In a wireless network (like in most modern laptops) there is a piece of hardware called the WNIC (Wireless Network Interface controller) that works in the same way as the NIC except that....

  cables that go through the air are used instead of underground

  wireless signals instead of transmission media (cables) are used

  'cloud' cables that are fibre-optic in nature (e.g. thin and carry light) are used instead of co-axial cables

  cables instead of wireless signals are used

 8. In order for a computer to connect wirelessly to a network, the network will need to have _____________________________

  Switch

  Router for Networks (RFN)

  Gateway

  WAP (Wireless Access Point)

 9. Most WAPs will have security built in (e.g. you will need a username and password) but also will have at least three methods of encryption to choose from: What is the third?
networkhardware_wepkey.jpg

  WEP (Wired equivalent privacy)

  None of the above

  SEP (Secured Encryption privacy)

  NEP (Network Ethernet privacy)

 10. Routers, hubs, switches and bridges are all pieces of networking equipment that can perform slightly different tasks. A router can often incorporate hubs, switches and wireless access within the same hardware.

  TRUE

  FALSE

 11. Fill in the blanks
A ________ is used to connect two separate LAN networks. A computer 
can act as a _______ through the operating system. A _______looks 
for the receiving device before it sends the message. This means 
that it will not send a message if the receiving computer is not 
there. It will check to see if the receiver has already had the 
message. This can help save unnecessary data transfers, 
which improves the performance of a network.

  Router

  Hub

  Bridge

  Network Interface Card

 12. Fill in the blanks
A ______ broadcasts data to all devices on a network. This can use a 
lot of bandwidth as it results in unnecessary data being sent - 
not all computers might need to receive the data. A ______would be
useful to link up a few games consoles for a local multiplayer 
game using a wired LAN.
hub.jpg

  Hub

  Router

  Switch

  Gateway

 13. Fill in the blanks
A _________ can form a LAN by connecting devices within a building. 
It also makes it possible to connect different networks together. 
Homes and businesses use a ________to connect to the internet. 
A router can often incorporate a modem within the hardware.
router.jpg

  Router

  Hub

  Switch

  Modem

 14. Fill in the blanks
A ________ enables a computer to connect to the internet over a 
telephone line. A ______ converts digital signals from a computer
to analogue signals that are then sent down the telephone line. 
A _______ on the other end converts the analogue signal back to a 
digital signal which another 
computer can understand.
modem.gif

  Modem

  Network Interface Card (built inside a computer)

  Internet

  Switch

 15. Fill in the blanks
Every piece of hardware on a network has a unique MAC address. 
This is __________________________ when the product is made in the 
factory, and the user cannot change it. On a computer, the MAC 
address is a unique code built into a NIC. No two computers have
the same MAC address. A MAC address is made up of 48 bits of data, 
usually written as 12 hexadecimal characters.

  put on the sticker (that is stuck on the hardware) - it can be removed

  input into the software by the programmer

  given to the user on an official form

  embedded in the hardware