Study Guide_ Database Systems and ICT_Networking
Study Guide_ Database Systems and ICT_Networking
Networking
Database Topics
Key Points:
- Database: Data storage (tables, files, etc.)
- DBMS: Software layer (query processor, storage manager) handling data operations 1
- The DBMS enforces security, integrity, and provides interfaces (SQL) for data access 1 2 .
1
Answer: For example, a MySQL installation (DBMS) plus its customer and order tables (database) is a
database system 1 .
Descriptive Questions:
1. Explain the difference between a database and a database management system (DBMS).
Answer: A database is the actual data storage (tables of data) and a DBMS is the software that enables
users to interact with that data. The DBMS handles tasks like parsing SQL queries, optimizing them,
enforcing constraints, and ensuring data security 1 2 . Essentially, the database is passive storage, while
the DBMS actively manages and queries that data.
Structured databases contain data in fixed formats (tables with rows and columns). They follow a
predefined schema, making data storage and search efficient. Examples include relational databases (SQL
databases) where fields like name, date, price are in columns. In contrast, unstructured databases store
data without a fixed schema 4 . Unstructured data can include text documents, images, audio or video
files. For instance, email bodies or social media posts are unstructured. Such data is often stored in
document or NoSQL databases. Semi-structured forms (like JSON or XML) lie in between.
For example, a customer list in Excel is structured: each row has ID, Name, Date (fixed columns) 4 . The
diagram below shows a sample structured dataset (table of purchases):
2
Figure: Example of structured data in a table (Excel).
In practice, organizations use structured databases (RDBMS) for well-defined data and NoSQL or file stores
for unstructured data. Structured data is easy to query with SQL, while unstructured data may require
specialized search or analysis tools 4 .
6. Answer: B.
7. Which type of database is most appropriate for large-scale text or media content?
Descriptive Questions:
1. Compare and contrast structured and unstructured databases.
Answer: Structured databases use a rigid schema (tables with defined columns) 4 , so data fits neatly in
rows/columns (e.g., SQL databases). They allow efficient queries on fields (like SQL queries). Unstructured
databases have no strict schema; they store raw content (e.g., JSON, multimedia) 4 . Structured data is
easier to search by specific fields, whereas unstructured data may require full-text search or machine
3
learning. Structured systems emphasize data integrity and normalization, while unstructured systems
emphasize flexibility and scale.
1. Why might an organization choose a NoSQL database over a traditional SQL database?
Answer: Organizations may use NoSQL databases to handle large volumes of semi-structured or
unstructured data (e.g. logs, social media, images) that do not fit a fixed schema 4 . NoSQL
databases (document stores, key-value stores, etc.) allow flexible schemas and horizontal scaling,
which is beneficial for big data or rapidly changing data formats.
A primary key is an attribute (or set of attributes) that uniquely identifies each record in a table. By
definition, a primary key’s values must be unique and not null 5 . Its main function is to enforce entity
integrity: no two rows share the same primary key value, ensuring every record can be found
unambiguously. For example, a “UserID” column might be a table’s primary key.
A secondary key (also called an alternate key) is another column or set of columns that also uniquely
identifies rows, but is not chosen as the primary key 6 . Secondary keys have the same uniqueness
property as primary keys, but the database uses them less often. They provide additional paths to retrieve
data (e.g., an email column that is unique but not the primary key).
Key Functions:
- Uniqueness: Ensures one-to-one mapping of key to record (applies to both primary and secondary keys)
5 6 .
4
6. Answer: B.
Descriptive Questions:
1. Explain the roles of primary and secondary keys in a relational database.
Answer: Primary keys uniquely identify table rows, providing the main reference for accessing and linking
data. They enforce uniqueness and not-null rules 5 . Secondary (alternate) keys serve the same
uniqueness purpose but offer alternative lookup paths. For example, if “EmployeeID” is primary, “Email”
could be a secondary key (if it’s unique). Keys are also used for creating foreign-key relationships between
tables, linking data across the database.
2. Give an example table with a primary key and a secondary key and explain their use.
Answer: Consider a Users table with columns UserID (primary key) and Email (secondary
key). UserID uniquely identifies each user. A query like
SELECT * FROM Users WHERE UserID = 123 uses the primary key. Alternatively, Email is
also unique; queries like SELECT * FROM Users WHERE Email='[email protected]' use the
secondary key. Although not the primary key, the database can index on Email so it retrieves the
user quickly by that alternate key.
5
(ACID properties) ensure that the database never contains contradictory or invalid data 7 3 .
- Minimal Redundancy: Data should not be unnecessarily duplicated. Reducing redundancy (normalization)
avoids inconsistency and saves storage 8 .
- Concurrency Support: Multiple users should be able to access and modify the database simultaneously
without conflicts 9 . Concurrency control (locking, transactions) ensures this.
- Multiple User Views: Different users/applications may have different views of the data. A good DBMS
supports external schemas so each user sees only relevant data 10 .
- Security: Access controls (passwords, roles) should restrict data access to authorized users only.
Encryption and audit trails enhance security.
- Scalability and Performance: The database should perform queries efficiently even as data grows. Proper
indexing and query optimization help maintain speed.
- Backup and Recovery: The system must provide reliable backup mechanisms and ways to recover data
after failures or attacks, ensuring availability 11 .
- Adherence to ACID: Transactions should be Atomic, Consistent, Isolated, Durable (ACID) 3 , meaning all
or none of a transaction’s operations apply and integrity is always maintained.
6. Answer: B.
8. A. Distributed.
9. B. Durable (after a crash, committed data remains) 3 .
10. C. Dependent.
11. D. Data-centric.
12. Answer: B.
6
- Why is concurrency control important in a DBMS?
Answer: Concurrency control allows multiple users to safely read/write data at the same time. It prevents
conflicts (like lost updates or dirty reads) so that simultaneous transactions do not corrupt the database
9 .
Descriptive Questions:
1. Explain the ACID properties and why they are important.
Answer: ACID ensures database reliability. Atomicity guarantees that a transaction’s operations all occur or
none occur, so partial updates don’t persist. Consistency means every transaction moves the database from
one valid state to another (integrity constraints hold). Isolation prevents concurrent transactions from
interfering (each transaction sees the database as if it were alone). Durability ensures that once a
transaction commits, its results persist even if there is a crash 3 . Together, ACID prevents data corruption
and ensures predictable behavior under concurrent access and failures.
Backup is maintaining copies of the data at specific points in time so that if data is lost or corrupted, it can
be restored 11 . For example, nightly snapshots of the database or differential/incremental backups.
Redundancy refers to having duplicate components or data to prevent single points of failure. This includes
hardware redundancy (like RAID disk arrays) and data replication. In replication, the database automatically
maintains multiple synchronized copies of data across different machines or locations 12 . Importantly,
replication is not the same as backup; replication spreads live copies for high availability, while backup
preserves historical copies 13 . Together, backup and redundancy ensure durability and availability: if one
server fails or data is corrupted, another copy can take over and data can be recovered 14 11 .
7
- D. Removing old data.
- Answer: B.
6. Answer: C.
8. A. Full backup.
9. B. Normalization.
10. C. Redundancy/Replication 12 .
11. D. Indexing.
12. Answer: C.
Descriptive Questions:
1. Compare backup and redundancy/replication in database systems.
Answer: Backup and redundancy serve different purposes. Backups are periodic, point-in-time copies
stored offline; they allow recovery to a specific time if data is lost or damaged 11 . Redundancy/
Replication means keeping continuous copies (mirrors) of the data on multiple servers to avoid a single
point of failure 14 12 . Backup is for recovery (durability), whereas redundancy ensures high availability
(uptime). Together they provide robust protection: if one server fails, another has the data (redundancy),
and if data is corrupted, an older backup can restore it.
8
2. Why is redundancy important in preventing data loss?
Answer: Redundancy (e.g., RAID, database replication) means there are multiple physical copies of
the data. If one copy (or hardware component) fails, another copy is immediately available, so the
system continues running. This prevents downtime and data loss from hardware failures or site
outages 14 . It also allows maintenance on one node without taking the entire database offline.
6. Encryption
Encryption protects a database by transforming plaintext data into ciphertext using an algorithm and keys,
so unauthorized users cannot read it. In databases, encryption can be applied at rest (encrypting stored
data and backups) or in transit (encrypting data moving over the network). For example, Transparent Data
Encryption (TDE) encrypts the entire database files and backups so that even if disk files are stolen, the data
is unreadable without the key 15 . The basic idea is: “Database encryption is… a process that uses an
algorithm to transform data… into ciphertext that is incomprehensible without decryption” 15 . Common
algorithms include AES (symmetric) for bulk data and RSA (asymmetric) for key exchanges. Proper
encryption ensures confidentiality of sensitive data and compliance with privacy regulations.
6. Answer: B.
8. A. SQL.
9. B. AES (Advanced Encryption Standard) 15 .
10. C. RAID.
11. D. HTTP.
12. Answer: B.
9
In transit encryption secures data as it travels over networks (e.g., TLS for SQL connections) so
eavesdroppers cannot intercept plaintext.
- Give an example of a scenario where encryption is critical.
Answer: A health-care database storing patient records should use encryption at rest, so if someone steals
the database files, personal health data cannot be read without the key. Similarly, connecting to that
database over the internet should use SSL/TLS encryption.
Descriptive Questions:
1. How does encryption at rest protect a database’s data?
Answer: Encryption at rest means the database files are stored encrypted on disk. Even if an attacker gains
file-level access (e.g., steals a backup or disk), they cannot interpret the data without the encryption key 15 .
The DBMS automatically encrypts/decrypts data during reads/writes, making the process transparent to
applications. This guards against data theft from lost media or unauthorized disk access.
• Query Processor: Parses and executes user queries. It includes a DML compiler (translates SQL into
low-level instructions), a DDL interpreter (handles schema definitions), an embedded SQL pre-
compiler, and a Query Optimizer (chooses efficient query plans) 17 19 .
• Storage Manager (Database Engine): Manages data storage, retrieval, and updates on disk. It
includes modules for authorization (access control), integrity manager (enforcing constraints),
transaction manager (ensuring ACID), file manager (allocating disk space), and buffer manager
(caching pages in memory) 20 21 . This layer ensures the consistency and durability of the
database.
• Disk Storage: The actual physical files. Includes data files (holding tables, records), indexes (for fast
lookup), and a Data Dictionary (metadata repository) 18 . The data dictionary stores definitions of
tables, columns, keys, and constraints 18 .
10
• Database Schema and Architecture: Most DBMSs use a three-level architecture. The Internal
Level handles physical storage details. The Conceptual Level defines the logical schema (tables,
columns, relationships) independent of physical storage 22 . The External Level defines user-
specific views of the data (what each user is allowed to see). This separation provides data
independence: applications do not depend on the physical details of data storage 22 .
6. Answer: C.
8. A. Internal level.
9. B. Conceptual level.
10. C. External level (user view) 22 .
11. D. Physical level.
12. Answer: C.
Descriptive Questions:
1. Describe the main components of a DBMS and their roles.
Answer: A DBMS has: (a) Query Processor: interprets SQL, optimizes and executes queries 17 ; (b) Storage
Manager: interfaces between the DB and storage, handles transactions, locks, buffer management, and
enforces integrity 20 ; (c) Disk Storage: actual data files, indexes, and data dictionary (metadata) 18 ; (d)
11
Transaction Manager: part of the storage manager that ensures ACID during concurrent operations. These
together allow users to query/update data without worrying about low-level file handling.
• Relational Model: Organizes data into tables (relations) with rows and columns. Each table has a
primary key, and relations between tables are defined by foreign keys 25 . This model (e.g., SQL
databases) is most common. It handles one-to-many and many-to-many relationships and supports
powerful queries via SQL 25 .
• Hierarchical Model: Data is organized in a tree-like structure where each record has exactly one
parent (except the root) and possibly many children 26 . It resembles a file system directory. This
model was used in early systems (e.g. IBM IMS) but is less common today 26 .
• Network Model: Extends the hierarchical model by allowing many-to-many relationships. A child
may have multiple parents, forming a graph structure 27 . It uses sets of records (CODASYL DBs).
• Object-Relational Model: A hybrid where relational tables can have object-like data types (complex
types, inheritance). It combines SQL with object features (e.g. PostgreSQL's JSON support).
• NoSQL Models: Not strictly part of traditional DBMS models but widely used now. Includes
document databases (e.g. JSON documents), key-value stores, column-family, and graph databases.
These are designed for scalability and flexible schemas. In the 2000s, non-relational (NoSQL)
databases became popular for large-scale or unstructured data 29 .
12
- D. Object-oriented.
- Answer: B.
6. Answer: C.
8. A. Network.
9. B. Object-relational.
10. C. Hierarchical 26 .
11. D. Relational.
12. Answer: C.
Descriptive Questions:
1. Compare hierarchical, relational, and network database models.
Answer: The hierarchical model (tree structure) organizes records with one parent-child chain 26 . It’s
rigid: each child has only one parent. The network model extends this to allow multiple parents (a record
can appear in several parent sets) 27 . The relational model is table-based: data stored in rows/columns,
and tables related by keys 25 . Relational is the most flexible, supporting ad-hoc queries and complex joins.
Hierarchical/network models require predefined paths to reach data and are less flexible.
13
earlier models. It abstracts away storage details, provides a strong mathematical foundation (set
theory), and easily handles most common data relationships. Standardization (SQL) and commercial
products (Oracle, DB2) also drove adoption.
Non-procedural (declarative) languages allow users to specify what data to retrieve, not how to retrieve it.
SQL is a classic example: you write a query like SELECT name FROM Employees WHERE
department='Sales' and the DBMS figures out the best way to execute it. In contrast, procedural
languages require step-by-step instructions on how to perform operations. Procedural extensions in DBMS
(like PL/SQL, T-SQL) let you write loops, conditionals, and explicit control flow. In summary, SQL is a non-
procedural query language (specify the desired result), whereas procedural languages (PL/SQL, for
example) let you script exact procedures with control logic 30 .
Key Differences: In non-procedural languages (SQL) “the user has to specify only what to do and not how to
do” it 30 . In procedural languages, you write the sequence of operations. Non-procedural queries are
generally shorter and handled by the DBMS optimizer, whereas procedural code is more like traditional
programming.
6. Answer: B.
8. A. SQLite.
9. B. PL/SQL (Procedural Language/SQL) 30 .
10. C. XML.
11. D. HTML.
12. Answer: B.
14
- Give an example of a task that requires a procedural language in a DBMS.
Answer: Complex business logic like an iterative calculation (e.g., computing factorial or batch processing
with loops and error handling) requires a procedural language (PL/SQL, T-SQL) since SQL alone cannot
express loops or conditionals directly.
- Name a benefit of using non-procedural query languages.
Answer: They are simpler and allow the DBMS optimizer to choose the best execution strategy. The user
need not worry about physical storage or join algorithms.
Descriptive Questions:
1. Explain how a stored procedure in a DBMS uses procedural language features.
Answer: A stored procedure (e.g. in PL/SQL) can include variables, loops (FOR, WHILE), conditional
statements (IF), and explicit cursors. This allows processing multiple rows in steps, calling functions, and
complex logic. The procedure is compiled into an execution plan, but the developer wrote the exact
sequence of operations. This is useful for tasks like batch updates, calculations, or enforcing business rules
that require procedural control.
Information and Communication Technology (ICT) is an umbrella term encompassing technologies for
processing and transmitting information. It integrates computing and telecommunications. According to
Wikipedia, ICT stresses “unified communications and the integration of telecommunications (telephone
lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage,
and audiovisual systems, enabling users to access, store, transmit, and manipulate information” 31 .
15
Together, these components allow modern digital services like e-commerce, e-learning, and telemedicine.
6. Answer: A (hardware).
Descriptive Questions:
1. Explain how ICT integrates telecommunications and computing.
Answer: ICT unifies telecom and computing by using digital networks to transmit data. For instance, VoIP is
telephony over IP networks. Smartphones combine computing power with wireless communication. ICT
ensures these systems work together: a packet of voice data is routed through networks like any other
16
data, integrating telecom (voice) into computing infrastructure 31 . The convergence is seen in services like
video conferencing (audio/video over the internet), which rely on both fields.
A computer network is a set of interconnected computers and devices that share resources and
communicate with each other. Formally, it is “a set of computers sharing resources… using common
communication protocols over digital interconnections” 33 . Networks can range from small (a LAN in an
office) to large (WAN connecting cities). Key features include network interface cards (NICs) in each device,
and communication protocols (like TCP/IP) that govern data exchange.
The Internet is a global network of networks. It is the “global system of interconnected computer networks
that uses the Internet protocol suite (TCP/IP) to communicate” 34 . In essence, the Internet connects
millions of private, public, academic, business and government networks. It supports services like the World
Wide Web, email, and file sharing. The Internet relies on hierarchical infrastructure (from personal routers
to ISPs to backbone networks) and the DNS system for resolving names to IP addresses.
6. Answer: C.
17
7. Which protocol suite underlies the Internet?
8. A. HTTP.
9. B. FTP.
10. C. IP/TCP (Internet Protocol suite) 34 .
11. D. SMTP.
12. Answer: C.
Descriptive Questions:
1. Explain how the Internet works at a high level.
Answer: The Internet works by routing data in packets across interconnected networks using the TCP/IP
protocol. When you send data (e.g. a web request), it is broken into packets with source/destination IP
addresses. Routers on the network forward each packet toward its destination based on IP. Along the way,
DNS resolves human-readable domain names to IP addresses. The Internet’s backbone consists of many
networks joined at exchange points. This distributed design means data can travel multiple paths and still
reach the destination (routing).
18
3. Server Types and Functions
A server is a computer (hardware) or program (software) that provides services to other computers (clients)
over a network 36 . Common server types include:
• Web Server: Hosts websites and serves HTTP content. For example, Apache or Nginx software
running on a server machine publishes web pages to browsers 37 .
• Database Server: Runs a DBMS (like MySQL, Oracle) and provides database services to applications.
It manages data storage/retrieval and handles client queries 38 .
• File Server: Stores and manages files in a centralized location. Clients connect to it to save and
access shared documents and media. The server enforces file permissions and supports multiple
users concurrently 39 .
• Email Server: Handles sending and receiving email. It uses protocols like SMTP, IMAP or POP3. For
example, when you send an email, it passes through an email (SMTP) server to the recipient’s mail
server 40 .
• DNS Server: Translates domain names to IP addresses. It acts like the Internet’s directory, returning
IP addresses when given domain names 35 .
• Other Servers: DHCP servers (assign IP addresses), FTP servers (file transfers), application servers
(run business logic), etc.
6. Answer: B.
8. A. FTP Server.
9. B. DHCP Server.
10. C. Web Server.
11. D. DNS Server 35 .
12. Answer: D.
19
- How does a web server differ from a file server?
Answer: A web server specifically serves web content over HTTP to browsers. A file server simply stores and
shares files over the network. The web server may generate dynamic content; a file server just provides
static files.
- Give an example of when you would use an FTP server.
Answer: You might use an FTP server to allow remote employees to upload and download large files (e.g.,
backups, datasets) to a central location. FTP is useful for file sharing over the internet with client software.
Descriptive Questions:
1. Explain how a web server and a database server might interact in a web application.
Answer: In a web application, the web server (e.g., Apache) handles client HTTP requests and serves pages.
When dynamic data is needed (e.g., user info), the web server communicates with the database server (e.g.,
MySQL) using queries. The DB server retrieves or updates the data and returns results (often as SQL result
sets). The web server then uses that data to construct HTML to send back to the client. In this way, the web
server provides the frontend, while the database server provides the backend data.
2. What is a proxy server and how does it differ from the servers above?
Answer: A proxy server acts as an intermediary between clients and other servers. For example, a
web proxy forwards client requests to web servers and caches results. This is different from the
above servers (which provide specific services). A proxy provides services on behalf of clients, often
for security, caching, or filtering. It’s not specifically one of the types listed, but is a common network
appliance.
Transmission media refers to the physical means to transfer data signals between devices. It is broadly
classified into:
- Guided (Wired) Media: Uses physical cables that guide the signal. Examples include twisted-pair cables,
coaxial cables, and optical (fiber) cables. In guided media, the signal travels along the conductor, confined
within it 41 . Twisted-pair (Ethernet cable) is common in LANs, coax is used in cable networks, and fiber
optic (glass fiber) carries light pulses for high-speed, long-distance links 42 . Guided media is generally
secure and high-speed but limited by cable length.
• Unguided (Wireless) Media: Transmits signals through the air or space. Here, no physical conductor
is used. Instead, the signal is broadcast as electromagnetic waves. Examples are radio waves,
microwaves, and infrared. Radio is used for broadcast/multicast (e.g. Wi-Fi, cellular) because it
disperses widely 43 . Microwave links require line-of-sight (e.g. satellite or point-to-point links).
Infrared (light just below visible) is used for short-range, line-of-sight communication (e.g. remote
controls) 44 . Wireless media allows mobility and is easy to deploy but is subject to interference and
attenuation.
20
The diagram below categorizes the main types of transmission media:
1. Which transmission medium typically requires line-of-sight and is used for satellite links?
2. A. Twisted-pair cable.
3. B. Infrared.
4. C. Microwave 43 .
5. D. Coaxial cable.
6. Answer: C.
21
broadband), and optical fiber cable (glass fibers carrying light) 42 .
- Name two unguided (wireless) media and an application of each.
Answer: Radio waves (e.g., FM radio, Wi-Fi, cellular communications) 45 ; Microwave (e.g., satellite TV,
point-to-point links); Infrared (e.g., remote controls, short-range data transfer between devices) 44 .
- Why is guided media generally more secure than unguided?
Answer: Guided media confines signals to a cable, making them hard to intercept without physically
tapping the cable. Unguided signals propagate in all directions and can be intercepted if an eavesdropper is
within range, so they require stronger encryption or shielding.
Descriptive Questions:
1. Describe the advantages and disadvantages of fiber optic cable as a guided medium.
Answer: Fiber optic cable uses light pulses in glass fibers, offering very high bandwidth and low signal
attenuation 46 . It can carry data over long distances without repeaters and is immune to electromagnetic
interference 46 . Its disadvantages are cost (more expensive than copper) and fragility (glass can break),
and it requires optical transceivers. Fiber is ideal for backbone networks and undersea cables.
1. Explain how wireless signals differ from wired signals in terms of coverage and interference.
Answer: Wireless signals (radio/microwave/IR) radiate into space, covering a wide area (radio) or
targeted line-of-sight (microwave). They allow mobility but suffer interference (other devices on
similar frequencies) and obstacles (buildings, trees can block/attenuate). Wired signals are confined,
so interference is mostly from physical cross-talk (which can be shielded against). A dropped packet
in wireless may simply not arrive, whereas in wired links it’s usually more reliable unless cables are
cut.
2. What factors should be considered when choosing a transmission medium for a network?
Answer: Important factors include required bandwidth (higher for media like fiber or microwave),
distance (fiber and microwave cover longer distances), environment (electromagnetic interference
favors fiber or shielded cable), mobility (wireless allows moving devices), installation cost, and
security needs. For example, indoor short-range might use Wi-Fi, while long-distance links use fiber
or satellite.
Electromagnetic (EM) waves span from very low frequencies (like power lines) up through radio,
microwaves, visible light, to X-rays. Key relations: the speed of light c relates frequency (f ) and wavelength
(λ ) by c = f × λ (in vacuum c ≈ 3 × 108 m/s) 47 . Thus, higher frequency means shorter wavelength, and
vice versa.
EM waves interact with materials via transmission, reflection, or absorption. If a material is transparent at a
frequency, the wave passes through; if it is opaque, the wave reflects or is absorbed 48 . For example, clear
glass is transparent to visible light but opaque to ultraviolet 48 .
Longer wavelengths (lower frequencies) tend to diffract and penetrate obstacles more effectively. As an
example, AM radio (long waves of hundreds of meters) can go “over and around” buildings and hills 49 . In
contrast, shorter wavelengths like FM radio or TV (meters or centimeters) require line-of-sight and will not
easily bend around obstacles 49 . This is why AM radio can be received at greater distances under varied
terrain, while FM/TV signals fade quickly without a clear path.
22
Multiple Choice Questions:
1. What is the relationship between wavelength and frequency of an EM wave?
- A. λ = c + f .
- B. c = f × λ (where c is speed of light) 47 .
- C. They are unrelated.
- D. f = λ/c .
- Answer: B.
6. Answer: B.
7. Why can very low-frequency (long-wavelength) radio waves reach submarines underwater?
• Why do higher frequency signals often require line-of-sight between transmitter and receiver?
Answer: Higher frequency (short wavelength) signals (e.g. microwaves) have less ability to diffract
around obstacles and are easily blocked by buildings or terrain 49 . They travel in straighter paths
and can be absorbed by objects, so transmitter and receiver usually must see each other directly.
Descriptive Questions:
1. Explain how frequency affects signal range and penetration.
Answer: Lower frequencies have longer wavelengths, which diffract around obstacles and penetrate
materials better. This allows long-range propagation (e.g. AM radio waves going over hills) 49 . Higher
frequencies have shorter wavelengths and thus travel less distance and require direct paths. They also carry
more data (higher bandwidth) but attenuate faster in medium. For example, FM radio and microwaves need
clear paths or repeaters.
23
when material particles absorb wave energy (often converting it to heat). Which effect dominates
depends on material and frequency. For instance, metals strongly reflect radio waves, while water
absorbs microwaves (heating them).
Radio Waves: Long-wavelength EM waves used for a wide range of wireless communication. They can
travel large distances and even through obstacles like walls or foliage. Applications include AM/FM radio
broadcasting, cellular networks, and Wi-Fi (which uses UHF radio) 45 . Radio frequencies (from kHz to GHz)
cover from AM radio up to Wi-Fi. Because they can penetrate the environment well, they are suitable for
broad-area coverage.
Microwaves: Higher-frequency radio waves (GHz range) that provide high bandwidth but require line-of-
sight. Used for satellite links, point-to-point terrestrial links, and radar. For example, satellite TV and GPS
signals are microwave frequencies 50 . Their short wavelengths (centimeters) allow antennas to be small
and directional (like satellite dishes). However, microwaves are blocked by obstacles and weather (rain fade).
Infrared (IR): EM waves just below the visible spectrum (wavelengths ~700 nm to 1 mm). IR is used for very
short-range communication, such as TV remote controls and wireless computer peripherals (IrDA). It is
typically line-of-sight and easily blocked by obstacles (it cannot pass through walls). IR is safe and
unregulated, but limited to a few meters range 44 .
Key Comparison: Radio is low-frequency (e.g. 100 MHz for FM), microwave is higher (GHz), IR is even higher
frequency (hundreds of THz). As frequency increases, bandwidth for data can increase, but range and
penetration decrease.
6. Answer: B.
24
7. Which statement is true about radio waves?
Descriptive Questions:
1. Compare the range and obstacles for radio, microwave, and infrared signals.
Answer: Radio signals (MHz range) have the longest range and can penetrate buildings and vegetation, so
they cover wide areas. Microwaves (GHz) have medium range and require line-of-sight; obstacles like walls
or rain can block them. Infrared (hundreds of THz) has very short range (meters) and cannot penetrate walls
at all; it is essentially line-of-sight like a flashlight beam.
1. Explain why cellular phones and Wi-Fi use specific frequency bands (like 900 MHz or 2.4 GHz).
Answer: Cellular and Wi-Fi bands are allocated in the radio/microwave spectrum where antennas
can be reasonably sized and regulatory conditions allow. For example, 900 MHz (UHF) signals can
travel through buildings (good for indoor coverage) and still carry moderate data. 2.4 GHz (also UHF)
offers higher bandwidth (for Wi-Fi speeds) but less range. These bands balance range, capacity, and
device antenna size.
Bandwidth in networking refers to the capacity of a communication channel – essentially how much data
can be transmitted per second. It is typically measured in bits per second (bps). Common units are kilobits
per second (Kbps), megabits per second (Mbps), and gigabits per second (Gbps).
Importantly, network speeds are usually expressed in bits (lowercase “b”). For example, an internet
connection might be 100 Mbps (megabits per second). In contrast, bytes (uppercase “B”) are typically used
25
for file sizes and storage (megabytes MB, gigabytes GB). Remember: 1 byte = 8 bits 51 . Thus, 100 Mbps is
equivalent to about 12.5 MB/s (megabytes per second) of throughput under ideal conditions 52 51 .
A helpful mnemonic from Red Hat: “… your internet speed is not 100 MB/s; it is more like 100 Mb/s
(megabits per second) 53 .” Always note the lowercase “b” vs uppercase “B”.
1. If an internet connection is 50 Mbps, approximately how many megabytes per second (MB/s) is that?
2. A. 50 MB/s.
3. B. 6.25 MB/s.
4. C. 8 MB/s.
5. D. 12.5 MB/s 52 .
6. Answer: D.
8. A. Bits allow use of decimal prefixes like kilo, mega more consistently.
9. B. Historical and because many networking components are specified in bits.
10. C. Because bits are smaller units, indicating finer granularity.
11. D. All of the above, and one byte = 8 bits 52 51 .
12. Answer: D.
Descriptive Questions:
1. Explain the difference between Mbps and MBps, and how confusion between them can occur.
Answer: Mbps (megabits per second) measures bits per second; MBps (megabytes per second) measures
bytes per second. Since 1 byte = 8 bits, 1 MBps = 8 Mbps 52 51 . Confusion arises because speed meters or
26
marketing often say “100 Mb” without clarifying “b”. For example, an ISP might advertise 100 Mbps, but
some people mistakenly think it’s 100 MB/s. The difference is a factor of eight.
1. How does increasing the bandwidth of a network link affect file transfer times?
Answer: Higher bandwidth (bps) allows more data per second, so files transfer faster. For example,
doubling the bandwidth roughly halves the transfer time (ignoring overhead). If you have 100 Mbps
instead of 50 Mbps, a 100 MB file would transfer in ~8 seconds instead of ~16 seconds (ideal case).
2. A 600 MB file is downloaded over a 12 Mbps link. How long should it take (approx.)?
Answer: First convert: 600 MB = 4800 Mb. At 12 Mbps, time ≈ 4800 Mb ÷ 12 Mb/s = 400 seconds
(about 6 minutes 40 seconds) in ideal conditions.
An analog system uses continuous signals to represent information. For example, a sine wave whose
amplitude varies smoothly in time is an analog signal. As defined in electrical terms, an analog signal can
take on any value in a continuous range 54 . Classic analog examples include old telephone lines
(continuous voltage varying with sound) or vinyl records (continuous grooves).
A digital system uses discrete (usually binary) signals. Information is encoded as sequences of bits (0s and
1s). A digital signal can take on only a finite set of values (e.g., high or low voltage) at any given instant 55 .
Computers and modern communication systems use digital signals because they are robust to noise and
can be easily processed by digital circuits.
Key Points:
- Analog signals are continuous and have infinitely many possible values 54 .
- Digital signals are discrete (finite set of values) 55 .
- Analog is simple to generate from sensors, but noise/distortion degrades quality over distance. Digital can
be repeated with regeneration (less quality loss) and compressed, but requires analog-to-digital conversion
for real-world signals.
6. Answer: B.
27
7. Why are digital signals generally preferred for long-distance communication?
Descriptive Questions:
1. Compare the advantages of digital signals over analog signals.
Answer: Digital signals are less susceptible to noise and distortion. Because they use discrete levels,
amplifying or repeating them regenerates the original bits exactly (bit-perfect) rather than amplifying noise.
Digital data can also be easily encrypted, compressed, and error-checked. Additionally, digital systems
integrate well with computer processing (logic, storage).
Modulation is the process of encoding information onto a carrier wave by varying its properties. In
telecommunications, a carrier signal is typically a high-frequency sinusoid. To send a message (audio,
video, or digital data), we modulate the carrier’s amplitude, frequency, or phase according to the message
signal. As defined in communication theory: “Signal modulation is the process of varying one or more
properties of a periodic waveform… for the purpose of transmitting information” 56 .
28
For example, AM (Amplitude Modulation) varies the amplitude (strength) of the carrier in proportion to
the audio signal, and FM (Frequency Modulation) varies the carrier’s frequency with the audio 57 . These
analog modulation schemes have been used in AM/FM radio. In digital communications, we use schemes
like ASK/PSK/FSK or OFDM, where digital bits change the carrier’s parameters (e.g., different frequencies or
phases represent bit patterns) 58 .
Demodulation is the inverse process at the receiver side. A demodulator extracts the original message
signal from the modulated carrier 59 . For example, an AM radio demodulator retrieves the audio from the
amplitude variations of the received signal. A modem (modulator-demodulator) is a device that modulates
digital data onto an analog carrier (for phone lines) and demodulates at the other end (hence “modem”).
6. Answer: C.
7. What is demodulation?
Descriptive Questions:
1. Explain how AM and FM modulation encode audio onto a radio carrier.
29
Answer: In AM, the carrier’s amplitude is varied in step with the instantaneous amplitude of the audio
signal 57 . The frequency of the carrier remains constant, but its strength goes up and down with the sound
waveform. In FM, the carrier’s frequency is varied according to the audio; the carrier oscillates a bit faster or
slower as the sound amplitude changes 57 . The radio receiver demodulates by detecting these amplitude
or frequency variations and reconstructing the original sound waveform.
• Hub: A multi-port repeater operating at OSI Layer 1 (Physical Layer). It broadcasts any incoming data
packet to all ports (all attached devices) 60 . Thus, hubs create one shared collision domain and are
simple “dumb” devices. They are largely obsolete due to inefficiency.
• Switch: An intelligent device at Layer 2 (Data Link). It learns MAC addresses on each port and
forwards a received frame only to the port where the destination device is, rather than broadcasting
61 . This greatly reduces unnecessary traffic. A switch effectively creates separate collision domains
• Router: Operates at Layer 3 (Network Layer). It routes packets between different networks using IP
addresses 62 . Routers maintain routing tables and choose paths for inter-network traffic. Home
routers often combine switch and router functions: they route between the local LAN and the ISP.
• Modem (Modulator-Demodulator): Converts signals between digital and analog form. Commonly,
it modulates digital data onto an analog carrier (e.g. telephone or cable line) and demodulates
inbound analog signals to digital 63 . For instance, a DSL modem lets digital computers use the
analog phone line infrastructure.
Each of these devices plays a specific role: hubs/switches connect devices within the same network, routers
connect different networks, and modems connect digital networks over analog transmission lines.
30
- D. Modem.
- Answer: C.
6. Answer: B.
8. A. IP addresses 62 .
9. B. MAC addresses.
10. C. Port numbers.
11. D. Domain names.
12. Answer: A.
Descriptive Questions:
1. Explain how NAT (Network Address Translation) on a home router works.
Answer: NAT allows multiple devices on a private LAN (with private IPs) to share a single public IP address.
The home router rewrites the source IP of outgoing packets to its own public IP and keeps track of port
mappings. When replies come back, the router maps them to the correct internal device. This enables one
public connection to serve many hosts, and also acts as a security boundary.
31
translates between different protocols or networks (for example, VoIP gateway translates between
voice protocols). It connects dissimilar networks (e.g., IPv4 to IPv6, or SMTP to SMS networks).
1 29 Database - Wikipedia
https://en.wikipedia.org/wiki/Database
5 Types of Keys in Relational Model (Candidate, Super, Primary, Alternate and Foreign) |
6
GeeksforGeeks
https://www.geeksforgeeks.org/types-of-keys-in-relational-model-candidate-super-primary-alternate-and-foreign/
34 Internet - Wikipedia
https://en.wikipedia.org/wiki/Internet
32
47 48 49 The Electromagnetic Spectrum | Physics
https://courses.lumenlearning.com/suny-physics/chapter/24-3-the-electromagnetic-spectrum/
54 55 Analog vs. Digital Signals: Uses, Advantages and Disadvantages | Article | MPS
https://www.monolithicpower.com/en/learning/resources/analog-vs-digital-signal?
srsltid=AfmBOooXVmjdbSE5TO9jTxVpLQ0qUI1YtVwl8LEV-FKXnvXTMzgC45XS
33