IBCS Topic 3
Identify the processes that take place in the server for both transactions. (referring to the credit card question)
1. Server receives request to access an account with a specified ID. 2. The student's account record is retrieved from the server's database. 3. The account balance is extracted from the account record. 4. The server sends either authorization to select a meal or a denial. 5. Server receives request to update an account with a specified ID. 6. The account balance is reduced by the specified amount.
Define the term LAN.
A LAN is a computer network that covers a small physical area. It is often characterized by a high data-transfer rate.
Identify a type of network that would allow secure access from an employee's home to their company's LAN.
A VPN
Distinguish between a VPN and an extranet.
A VPN authenticates the sender before sending. A VPN's access is always encrypted, whereas the extranet has limited encryption. The VPN's transmission is always encrypted. Finally, VPN users have access to everything whereas extranet users only have access to specific servers.
In the context of a networked world, state the role of a client.
A client is a piece of computer hardware that accesses a service made available by a server. Clients send requests for different services to the servers.
Define the term computer network.
A computer network is a computer system that uses communications equipment to connect computers and their resources.
Outline the role of a hub in a star topology.
A hub passes data packets from input channels to the other input channels.
Identify three ways in which the network administrator can reduce the risk of unauthorized access to confidential data.
A network administrator can give each user an appropriate login password,
In the context of a networked world, state the role of a server.
A server is a program or host computer that awaits and fulfills requests from a client in the same or other computers.
Identify one hardware component of the WLAN, other than computers.
A wireless router, access points, or a switch
Outline the relationship between binary and hexadecimal.
Binary numbers have base 2, hexadecimal numbers have base 16 (24 =16);
Outline the reasons for having both primary memory and secondary memory.
Both primary memory and secondary memory are necessary because primary memory is faster, although it costs more. Primary memory holds data temporarily, while secondary memory can store more data and is sued to hold data permanently.
Define the term extranet.
Extranet is an external extension to a company's local network. There is limited access to an extranet and it uses internet protocols.
Outline two implications of a school administrator being able to monitor students' use of the Internet.
In an administrator being able to monitor the students use of the internet, they have a lack of privacy. Also, they are prevented from visiting unsuitable sites.
Compare bus topology with star topology for networking.
In bus topology, each computer or server is connected to a single cable through the same connector. In a star topology, each machine in the network has a one-to-one connection to a hub in the network. Both the bus and star topology are adequate for a LAN.
Describe why data loss is a more serious problem than the loss of software or hardware for a sales company.
Losing software is not a critical problem, in that it can be reinstalled if the owner had a backup. Losing hardware also is not as detrimental as losing data because if the hardware was insured, then a new substitute hardware could be repurchased.
Outline one advantage and one disadvantage of allowing wireless access to the server.
One advantage in allowing wireless access to the server is that users are able to access the internet even outside of their normal work environment, making it more accessible. One disadvantage is that the wireless networking signals are subject to a wide variety of interference, in addition to complex propagation effects that are beyond the control of the network administrator.
Outline two disadvantages of using a WLAN.
One disadvantage is that the data transfer speed with decrease because the number of computers using the network has increased. A second disadvantage is that a teacher is no longer capable of directly monitoring a specific student's machine because there is intermittent connectivity due to physical barriers such as the walls.
Outline one threat to the security of the school's data that may arise from the use of the Internet.
One threat to the security could he hackers that are trying to gain access rights.
Explain two ways of reducing the time required to transmit data in a computer network.
One way to reduce the time required to transmit data in a computer network to compress the data resulting in less data that would need to be sent. Another way would be to use high speed lines or fibre optic lines which would call for faster transmission than that of traditional lines.
State two functions of operating systems.
Operating systems communicate with peripherals and manage the program and data from within.
Outline, with an example, the function of protocols.
Protocols are a set of rules that are implemented to ensure that a process is being carried out properly. Protocols are used in each layer of the OSI model to ensure communication. For example, in the physical layers, the protocols could define the methods for opening and closing communication.
Outline why protocols are necessary.
Protocols are necessary to ensure data integrity, to provide error checking, and to minimize congestion.
Explain why switches would be used, rather than hubs, in this hybrid network.
Switches would be used in place of hubs because a switch inspects the data packet that is received and forwards the packet to the appropriate server only. The performance of this network, in using switches rather than hubs would be better.
Explain how the use of media access control (MAC) addresses can improve security.
The MAC address identifies a specific device such as a network card or controller. The MAC address checked against a list of approved addresses or whitelisted people and if they are not on the list, they are denied. The MAC address prevents unauthorized access and makes access more difficult. Lastly, any data that is sent to a specific MAC address can only be accessed on that device.
Outline the concept of the OSI model in the communication across a network.
The OSI is a standardized system or model for network connection that consists of 7 layers. The 7 layers of the OSI model include the physical layer, the data-link layer, the network layer, the transport layer, the session layer, the presentation layer, and finally the application layer. In the physical layer, for example, the physical communication occurs.
Outline the function of memory management in terms of an operating system.
The memory management is in charge of allocating an appropriate amount of memory for the program that is currently running.
Outline the resource monitoring function of an operating system.
The resource monitoring function of an operating system is to manage the access to shared resources. Also, it is in charge of monitoring the functioning hardware resources and to report any malfunctions.
Outline the function of security in terms of an operating system.
The security of a operating system deals with passwords and different access levels. Only people who have the appropriate password can work with the particular files.
Identify two key features of a peer-to-peer network.
There is no central server; the resources are more widely available; and it supports file sharing for collaborative work.
Identify three causes of data loss.
Three causes of data loss include natural disasters, hackers, and viruses.
Outline two advantages of using a WLAN.
Two advantages are user-mobility and economical access points.
Outline two benefits and two problems of employees working from home.
Two benefits of working from home include saving fuel cost in transportation and an increase in productivity. Two problems of employees working from home include a strain on their family life and how employees are not able to monitor the other employees.
Outline two functions of an operating system.
Two functions of an operating system include the allocation of storage and keeping track of the programs in memory.
Identify two methods of preventing data loss.
Two methods that can be used to prevent data loss are antivirus programs or a series of backup systems.
Using computer memory as an example, outline the meaning of the term volatile.
Volatile memory can be described as memory that does not retain its contents once the power source is cut. RAM and cache memory are both volatile forms of memory.