Statistics for IB Computer Science Topic 3 - Networks

Click here to take the quiz!

General Stats

  • This quiz has been taken 333 times
    (328 since last reset)
  • The average score is 29 of 89

Answer Stats

DefinitionTerm% Correct
Connects computer systems within small area such as house, office building, or school, allowing use of peripheral devices such as printers and external hard drives by connected computer systems.Local Area Network (LAN)
87%
Connects computer systems within large geographical area, such as cities, countries, or network of contries.Wide Area Network (WAN)
84%
More sophisticated than above two, can join multiple networks and acts as intermediary between networks for effective and efficient data exchange between devicesRouter
77%
Global network of a large array of computers and networks connected togetherInternet
73%
Internet
73%
"Bus" connects all devices through common cable{Bus} topology
72%
Makes "tunnelled" network connection through Internet or any public network. Enables device to exchange and access data across Internet as if it were directly connected to a private network.Virtual Private Network (VPN)
69%
Similar to above but wireless; easier for laptop and mobile devices but less secureWireless Local Area Network (WLAN)
69%
Network
68%
Computer system or software application that provides service to other computer systems on same networkServer
68%
Nodes/Computers are connected to central node (computer or hub){Star} topology
68%
Like above but knows which port to send data toSwitch
63%
Requests service from above connected to same network.Client
61%
Connection point for devices on a single network that transfers data from one device to all other connected devices, slowing down networkHub
61%
Interconnects devices centred around one person's workspace, maximum 10m range.Personal Area Network (PAN)
59%
Application
57%
Application
57%
Physical
57%
International rules that ensure data transfer or communication between systems.Protocol
57%
Nodes/Computers connected in a circle; no central node{Ring} topology
57%
Portion of message that is transmitted through network. Has data such as check digits and destination address.Data packet
51%
Transport
51%
Transport
51%
Handles system resources with responsibility for managing all protocols, hardware, and applications to cooperate so that network can function properlyOperating System (OS)
49%
Uses distributed network architecture where all computer systems (nodes or peers) in network are decentralized and are clients and servers at the same time.Peer-to-Peer (P2P)
49%
Partitions LANVirtual Local Area Network (VLAN)
48%
Collection of private computer networks within company, school, or organization, whose main purpose is to facilitate communication between individuals or work groups and to improve data sharing.Intranet
47%
Allows large storage devices to be accessed by servers convenientlyStorage Area Network (SAN)
46%
Data link
45%
Most widely used example of above. Reference model that aims to facilitate communication across variety of systems.Open Systems Interconnection (OSI) model
43%
Presentation
43%
Session
41%
Utilizes above to selectively authorize users to specific LAN(s) or WAN(s); to everyone else, LAN or WAN in question is private.Extranet
40%
Consists of websites and webpages, and support for services such as email and file transferWorld Wide Web (WWW)
38%
Carries beam of light, used for data transmission and telephone lines. Higher speeds with high security but very expensive.Fibre optic cable
36%
Reduces number of bits by identifying and then eliminating statistical redundancy. No loss of information.Lossless compression
33%
Some loss of information, no way to get original file back. Examples: JPG, MPEG2Lossy compression
33%
Hierarchical protocol model that models and represents all functionality required for successful communication between users.Transfer Control Protocol/Internet Protocol (TCP/IP)
32%
Third generation of mobile telecommunication technology. Mobile networking and telecommunications technology used in wireless telephony, GPS and location based services, mobile Internet access, video calls, and mobile TV. More secure than 2G.3G
29%
Fourth generation of mobile telecommunication technology; released after above. Used for mobile Internet access to laptops, smartphones, etc.4G
29%
Uses microwave radio to exchange data at very low power levels. Frequencies change regularly.Bluetooth
29%
Network security system that determines what data comes in/goes out of network or computerSoftware firewall
29%
Fifth generation of mobile telecommunication technology. Not yet publicly available but aims to be faster than previous generations.5G
27%
Theoretical speed of data in mediaBandwidth
27%
Necessary to prevent unauthorized data access during Internet use. Uses complex mathematical algorithms and keys to render message incomprehensible to unauthorized people. Two categories below.Encryption
27%
Process to determine errorError {checking}
27%
Most common cabling in networksCopper cable
26%
Reduction of bits by encoding data using fewer bits than original file/representationData compression
25%
Provided by wireless router, allows wireless data transfer between device and network.Wireless Access Point (WAP)
25%
Allows wireless connection to InternetModem
24%
Specifies set of protocols for accessing information over mobile wireless network, e.g. Internet access, email exchange. Supported by most operating systemsWireless Application Protocol (WAP)
24%
Cheap to install, consists of two copper conductors. Used in networks as well as carrying TV signals.Coaxial cable
22%
Based on this, networks permit access to certain devices. Consists of 12 digits or letters e.g. 1a:2b:3c:4d:5e:6f; what every network card has when manufactured.MAC address
22%
Application software used to find, retrieve, and display content on WWW, including web pages, text, images, audio, videos, etc.Web browser
21%
When two or more network competing actions are waiting for other to finish but neither doesDeadlock
20%
Accuracy of data following input, transmission, storage, or processingData integrity
19%
Communication method where file is divided into packets before transmission. Each packet is sent to destination via different routes. Delays are minimal.Packet switching
18%
Provide common international "language" that enables compatibility for all computer systems globallyStandards
18%
Created by slowest segment of network that affects aboveBottleneck
17%
Extra digit added to numerical dataCheck digit
17%
Ability to repair errorError {correction}
17%
Type of above, as well as standard for wireless communication of high-speed data for smartphones. Goal: to be fast and to have large capacityLong-Term Evolution (LTE)
17%
When request on network resources exceeds capacityCongestion
15%
Required for devices to connect to wireless networkNetwork Card
15%
Another type of above-above. Provides portable mobile broadband connectivity across cities or countries through many devices. Relatively low costWorldwide Interoperability for Microwave Access (WiMAX)
15%
Actual transfer rate of data. Affected by interference, traffic, number of connected devices, errors, etc.Throughput
13%
Two wires twisted with each other. Easy and cheap to installUnshielded Twisted Pair (UTP) cable
13%
Took over above as interim security measure. Uses Advanced Encryption Standard (AES) block cipher. Considered best protection but strong password still recommendedWi-Fi Protected Access (WPA/WPA2)
13%
Used extensively for mobile telephone networks and LANs. Information transmitted through air. High bandwidth but lower than cables.Microwave radio
11%
Public key for encryption and private key for decryptionPublic-key encryption
11%
Slowing down data flow rate in order to prevent overload of resources due to limited memory and bandwidth in network infrastructuresFlow control
10%
Only for very short distances, cannot pass through objects. Directional.Infrared
10%
Like above but pairs are wrapped. More difficult to install.Shielded Twisted Pair (STP)
9%
Protocol that allows server to automatically assign IP address to client device. Very effective and convenient.Dynamic Host Configuration Protocol (DHCP)
8%
"Name" of WLAN. Maximum 32 characters, case-sensitive.Service Set Identification (SSID)
8%
Significantly increase effective communication area of wireless network. Fixed, optional, or removable.Wireless antennas
8%
Most common data encryption technique, provides data confidentiality. Adds processing overheads that slow down wireless connection. Cracking is possible but novice users cannot do so. Offers interoperability with older devices/access to legacy wireless device.Wireless Equivalent Protocol (WEP)
8%
Transfer rate of usable dataGoodput
7%
Network access
7%
Uses microwave signalsSatellite
7%
Same key for encryption and decryptionSymmetric-key encryption
7%
Identity of sender has been validated. Can be proven by data signatures.Source integrity
6%
Connects to router or access pointWireless repeater
6%
Operates with various radio technologies.RFID
4%
Includes all software that prevents unauthorized access, use, disclosure, disruption, etc. Includes access, but not limited to, control, firewall, anti-spyware, anti-tamper, antivirus.Security software
3%
Network security protocol specially designed to allow novice and residential users to securely operate wireless network. Requires router and compatible devices. Has known security weaknesses.Wireless Protected Setup (WPS)
3%
Operates or controls hardware of network card, acting as a translator to device.Network Interface Card driver
2%
Can measure data and parameters such as temperature, sound, and pressure for physical or environmental reasons such as sampling, security, health-care monitoring, and underware measurements.Sensor networks
2%
Wireless computer communication with lasersFree space optics
1%

Score Distribution

Percentile by Number Answered

Percent of People with Each Score

Your Score History

You have not taken this quiz since the last reset