Professional Documents
Culture Documents
2. Compare and contrast a LAN and a WAN in terms of their scope and usage.
A LAN covers a small geographical area that are commonly used in homes,
small businesses, schools, and organizations to facilitate local communication, data
sharing, and resource sharing. They provide high-speed connections and are typically
privately owned and managed by the organization or individual.
A WAN covers a large geographical area. They enable data exchange,
communication, and resource sharing across wide distances. WANs are typically
established and maintained by service providers, such as Internet Service Providers
(ISPs).
Network Devices:
• Routers: Responsible for directing network traffic between different
networks and connecting LANs to WANs.
• Switches: Used to create connections within a LAN, allowing devices to
communicate with each other.
• Modems: Enable communication between the network and an internet
service provider (ISP), typically for WAN connectivity.
Network Interfaces:
• Network Interface Cards (NICs): Hardware components that provide the
physical connection between a device (e.g., computer) and the network.
• Wireless Network Adapters, known as wireless NICs: Enable wireless
connectivity by transmitting and receiving data via radio waves
Network Protocols:
• TCP/IP: The fundamental protocol suite for data transmission over networks,
including the internet.
• DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses
dynamically to devices on a network.
• DNS (Domain Name System): Translates human-readable domain names into
IP addresses.
Network Security:
• Firewalls: Protect the network by monitoring and controlling incoming and
outgoing network traffic.
• Virtual Private Networks (VPNs): Create secure connections over public
networks, allowing remote access to a private network.
4. What are the advantages and disadvantages of using wireless networks compared to
wired networks?
differences.
Client-Server Network:
• Centralized architecture with a dedicated server.
• Server provides services and manages resources.
• Clients request and utilize resources.
• Communication occurs between clients and server.
• Scalability through server upgrades or additional servers.
Peer-to-Peer Network:
• Decentralized architecture without a central server.
• Peers have equal capabilities and can act as clients and servers.
• Peers directly communicate and share resources.
• Dynamic and self-organizing topology.
• Scalability through the addition of more peers.
• Resource sharing among peers without reliance on a central server.
Differences:
• Centralization: Client-server networks have a centralized architecture with a
dedicated server, while P2P networks operate in a decentralized manner without
a central server.
• Resource Management: In client-server networks, the server manages and
controls resources, while in P2P networks, peers independently manage their
resources and directly share them with other peers.
• Role Distribution: In client-server networks, the server has a distinct role from
the clients, while in P2P networks, all peers have equal capabilities and can act as
both clients and servers.
• Scalability: Client-server networks can scale by upgrading server hardware or
adding more servers, while P2P networks can scale by adding more peers as each
peer contributes resources to the network.
• Dependency: In client-server networks, clients are dependent on the server for
accessing shared resources, while in P2P networks, peers can directly
communicate and share resources without relying on a central server.
7. Discuss the potential risks and challenges associated with data transmission over the
internet.
8. Define the term "protocol" and provide examples of commonly used network protocols.
A protocol refers to a set of rules and procedures that govern how devices
communicate and exchange data over a network. The commonly used protocols are
TCP/IP, HTTP, FTP, SMTP, DNS and so on.
9. How does a web browser differ from a search engine? Explain their respective roles.
A web browser is used to access and view web content, while a search engine helps
users discover relevant information on the internet by providing search results based on
user queries.
11. Describe the concept of cloud computing and discuss its advantages for businesses.
12. What measures can be taken to ensure data security when using online collaboration tools?
13. Explain the purpose and benefits of using virtual private networks (VPNs).
Purpose: VPNs enhance privacy, security, and anonymity when accessing the internet.
Benefits:
• Enhanced security by encrypting internet traffic.
• Privacy and anonymity by masking IP address and location.
• Bypassing geographic restrictions and censorship.
• Secure remote access to corporate networks.
• Protection on public Wi-Fi networks.
• Secure P2P file sharing.
• Secure VoIP and messaging.
• Protection from ISP monitoring.
• Business confidentiality in sharing sensitive information.
14. Discuss the ethical considerations that individuals and organizations should keep in mind
15. How does e-commerce contribute to the global economy? Discuss its impact on
16. Outline the steps involved in setting up an online banking account and explain the
security measures in place to protect user information.
Setting up an online banking account involves the following steps:
• Choose a bank offering online banking services.
• Visit the bank's website and initiate the registration process.
• Provide personal information and create login credentials.
• Verify your identity through additional steps if required.
• Read and accept the terms and conditions.
• Set up additional security features like two-factor authentication.
• Familiarize yourself with the online banking features.
available today.
18. Discuss the benefits and drawbacks of mobile computing in terms of its impact on work-
life balance.
19. Explain the concept of online storage and backup methods. Give examples of popular
20. What measures can individuals and organizations take to protect their data and privacy
• Strong Authentication: Use unique and strong passwords, consider using password
managers, and enable multi-factor authentication (MFA).
• Regular Updates: Keep applications and devices up to date with the latest security
patches.
• Data Encryption: Utilize encryption protocols for transmitting sensitive data over
networks.
• Secure Network Connections: Connect to trusted and secure networks, especially
for sensitive activities.
• Firewalls and Antivirus: Install and maintain firewalls and antivirus software for
protection against malware and unauthorized access.
• Privacy Settings: Review and adjust privacy settings for network applications to
control data sharing.
• Data Backup: Regularly back up important data to prevent loss in case of accidents
or cyberattacks.
• Secure Data Storage: Store sensitive data in encrypted and password-protected
containers or folders.
• Employee Training: Provide training on data protection, privacy, and safe online
behavior.
• Privacy Policies: Review the privacy policies and terms of service of network
applications.