Network Basics
Network Protocols
Transmission Media
Data Transmission
Network Security
100

This conceptual framework organizes network communication functions

What is the OSI (Open Systems Interconnection) model?

100

This topology connects all devices to a central hub or switch, making it easy to add new devices but creating a single point of failure.

What is a star topology?

100

Name one type of wired transmission media.

What is Twisted pair, coaxial cable, or fibre optic cable?

100

This is a unit of data transmitted across a network, containing both the actual information being sent and metadata like source address, destination address, and error-checking codes.

What is a data packet?

100

What is an intranet?

A private network used inside an organization.

200

This type of network uses Bluetooth technology to connect devices within approximately 10 meters, such as wireless headphones to a smartphone or a fitness tracker to a laptop.

What is a PAN (Personal Area Network)?

200

This protocol suite consists of two main protocols working together: one breaks data into packets and ensures reliable delivery, while the other handles addressing and routing across networks.

What is TCP/IP (Transmission Control Protocol/Internet Protocol)?

200

Which type of cable transmits data using pulses of light?

What is Fibre optic cable?

200

What term describes the amount of data that can be transmitted in a given time?

Bandwidth

200

wireless routers, access points, and network interface cards, plus programs like network drivers, security protocols, and network management software.

What are hardware and software components of wireless networks?

300

This technology uses encryption protocols, tunneling protocols, and authentication mechanisms.

What is VPN?

300

This system translates human-readable domain names into IP addresses that computers use to locate and connect to web servers.

What is DNS (Domain Name System)?

300

Which cable is commonly used for Ethernet connections in networks?

What is Twisted pair cable (Ethernet cable)?

300

Data is broken into smaller packets that travel independently through the network, each containing source and destination addresses, and may take different routes before being reassembled at the destination, providing efficient bandwidth use and fault tolerance.

What is packet switching?

300

Reduced security vulnerability to interception, slower speeds than wired connections, and health concerns about long-term electromagnetic radiation exposure.

What are the disadvantages of wireless networks?

400

Without these internationally agreed-upon specifications developed by organizations like IEEE and IETF, devices from different manufacturers and countries couldn't communicate, creating isolated technology ecosystems and preventing the global interoperability we rely on today.

What are network standards?

400

While TCP provides reliable, connection-oriented communication with error checking and packet ordering, this alternative transport layer protocol sacrifices reliability for speed, making it ideal for streaming and gaming.

What is UDP (User Datagram Protocol)?

400

What type of transmission media uses radio waves instead of cables?

What are Wireless media?

400

This mechanism prevents the sender from overwhelming the receiver by using techniques like sliding windows and acknowledgment signals to regulate the rate of data transmission between devices with different processing speeds.

What is flow control?

400

This wireless technology provides internet access over larger geographical areas than WiFi, covering up to 30 miles radius, making it suitable for rural broadband and metropolitan area networks.

What is WiMAX (Worldwide Interoperability for Microwave Access)?

500

VPN adoption has enabled remote work flexibility but raises these three concerns: work-life boundary erosion, job displacement in high-cost regions, and enabling both freedom of expression and illegal activity.

What are the social and ethical implications of VPN use?

500

HTTPS, FTPS, and SSH all implement this security approach: they encrypt data in transit, authenticate server identity through certificates, and establish secure channels before transmitting sensitive information, protecting against eavesdropping and man-in-the-middle attacks.

What are secure protocol implementations (or what is protocol encryption/security)?

500

TWO wireless technologies used in networking.

What are Wi-Fi, Bluetooth, infrared, microwave, satellite (any two)? 

500

Checksums calculate values based on packet contents, parity bits that detect single-bit errors, and cyclic redundancy checks (CRC) that use polynomial division to verify data hasn't been corrupted during transmission.

What are error checking mechanisms? OR What is data integrity check mechanisms?

500

Encryption scrambles data using WEP, WPA, or WPA3 protocols; User authentication requires valid userID and password combinations;  MAC address filtering allows only trusted device addresses to connect.

What are network security methods? 

M
e
n
u