Topic 1 Networks
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Switch | Connects segments of a network together.
🗑
|
||||
Router | Reads the addresses of the packets and send them along a selected route.
🗑
|
||||
Hub | A common connection point for devices in a star network
🗑
|
||||
Packet-Switching | Data (content) split into packets, which can take a different route through network.
🗑
|
||||
Bridge | Connects two LANs of t he same type
🗑
|
||||
Gateway | Enables LANs to communicate with dissimilar LANs
🗑
|
||||
Firewall | Acts as a network filter between a LAN and external network, such as the Internet, to protect against intrusion
🗑
|
||||
Repeater | Acts as a signal amplifier for extending network distances
🗑
|
||||
Data Collision | Data collision occurs when two sets of data are detected on the network simultaneously
🗑
|
||||
LAN | Restricted to a small geographical area, such as a single building, site, or college campus
🗑
|
||||
WAN | Geographically distributed, can be world-wide
🗑
|
||||
Client-server | A network where several computers are connected to one or more servers, where processing and resources are shared...Preferred choice for large networks
🗑
|
||||
Peer-to-Peer | A small network where each computer has the same status, processing is local on a single PC, resources are shared...
🗑
|
||||
Star Topology | A Star topology is based around the traditional centralised server. Nodes communicate with the server via a central common connection point, such as a hub, switch or router
🗑
|
||||
Bus Topology | based on a single shared cable
🗑
|
||||
Ring Topology | The ring topology is a peer-to-peer network as it has no dedicated file server. All stations on the network have the same access rights
🗑
|
||||
User Accounts | Users are allocated certain ACCESS rights, which allow you to do certain things on the network
🗑
|
||||
User Log | Records successful and failed login attempts. Ensures only authorised users can access a network
🗑
|
||||
Auditing | The login procedure provides an audit trail (i.e. Makes a record of all details) of who has used what resources on the system.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
mcounsell
Popular Computers sets