1.3/1.4 Flashcards

1
Q

what is compression?

A

the idea of trying to reduce the file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the need of using compression

A

reducing number of bits in a file
making the storage capacity of the file lower
making data transfer of the file quicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossy compression?

A

Removing some of the data=reduce its size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossless compression?

A

Making the size of a file smaller without losing any of the information in the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

advantages/disadvantages of lossy compression?

A

advantages = reduces file size , suitable for images,sound and videos
disadvantages = some of the data is lost and cannot be recovered , reduces quality of the image/sound ,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

advantages and disadvantages of lossless compression?

A

advantages = none of the data is lost it is encoded differently , can be turned back into the original format , can be used on types of data ,
disadvantages = usually less effective = reducing the file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the advantages of networking?

A

users can share files.

users can share peripherals: printers and connection to other networks e.g the internet.

users can access their files from any computer on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the characteristics of local area newtork (lan)

A

covers a small geographical area located on a single site.

all the hardware for a lan is owned by the organisation using it.

lan are wired with utp cable,fibre optic or wireless using Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the characteristics of wide area network (wan)

A

covers a large geographical areas , connecting lan’s together.

infrastructure between the lans is leased from telecommunication companies who own and manage it.

wan’s are connected with telephone lines , fibre optics cables or satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which hardware are needed for home solution

A

personal home devices for connecting to the internet tend to be multi-functions , all - in one devices acting as
switch
router
wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

disadvantages of networking?

A

malware and viruses spread very easily between computers.

if a server fails the computers connected to it may not work.

the computer may run more slowly if there is a lot of data travelling on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the client-server model?

A

where devices are reliant on services provided and managed by a central server;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the roles of client-server model?

A

manages access to the internet
provides email services
runs a backup of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the advantages of client-server model?

A
  • easier to manage security files
  • easier to take backups of all shared data
  • easier to install software updates to all computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the disadvantages of client -server model?

A
  • can be expensive to set up and maintain
  • requires it specialists to maintain
  • users will lose access if the server fails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the peer to peer model?
.

A

peer is a computer on a network and is equal to all other peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the role of the peer to peer model?

A
  • peers serve their own files to each other
  • each peer is responsible for its own security
    -each peer is responsible for its own backup
  • peers usually have their own printers
  • you can send print jobs to another peer to process but that peer would need to be switched on to be able to communicate with the connected printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

advantages of the peer to peer model?

A
  • very easy to maintain
  • cheaper to set up
  • no expensive hardware to be required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

disadvantages of the peer to peer model

A
  • the network is less secure
  • users will need to manage their own backups
  • can be difficult to maintain a well ordered file store
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the factors that affect the performance of a network?

A

bandwidth
the number of users
transmission media
the error rate
latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what does network performance mean?

A

concerned with how well data is transmitted through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how does bandwidth affect the performance of the network?

A

measures how much data can be transferred over a network in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

how does the number of users affect the performance of the network?

A

the bandwidth of the network is shared between the users of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

how does transmission media affect the performance of the network?

A

what the data is transmitted through.data can be carried around networks via cables or wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

how does error rate affect the performance of the network

A

the number of errors that occur during data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

how does latency affect the performance of the network

A

measure of how much time it takes for a packet of data to travel across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is the hardware needed to connect stand-alone computers into a lan?

A

nic (network interface controller)
switch
wap
router
tranmission media: copper cables , fibre optic cables , radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what does the nic do

A

enables the computer to be connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what does the switch do

A

connects wired devices on a lan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what does the wap do

A

connects wireless devices on a lan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what does the router do?

A

connects different types of network together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what does the tranmission media do?

A

copper cable - transmits electrical signals (typically used in ethernet cables)

fibre optic cables - made up of thin glass strands (or fibres) which transmit data as pulses of light

radio wave - uses parts of em spectrum to connect devices wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is the internet?

A

worldwide collection of computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is a dns

A

domain name system, it matches each domain name to its matching ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what is hosting

A

websites and others internet services needed to be placed on a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is the cloud?

A

storage, services and applications that are accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what the webserver?

A

this is a dedicated computer on the internet that responds to http and https requests by returning web pages requested by a client computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what is a star topology?

A

all nodes are connected through a central point typically a switch or a hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is a mesh topology?

A

all nodes are involved in the transmission of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

node

A

device which is connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

adv of star topology

A

fast - each node has its own connection to the centre.
reliable - if a fault occurs in one link other links are not neccessary affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

disadv of star topology

A

if the central switch/hub fails then the whole network goes down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

adv of mesh topology

A

full mesh - if you get a break in any of the connections you can still route your traffic

having no central switch means there is no single point of failure

44
Q

disadv of mesh topology?

A

full mesh - expensive
usually implemented wirelessly

45
Q

what is ethernet?

A

traditional protocol used to connect devices in a wired lan

it defines how data should be physically transmitted between different devices, using MAC addresses to determine which device the data should be sent to.

46
Q

adv of ethernet

A

stable connection
more secure
signal quality usually better

47
Q

disadv of ethernet

A

expensive
difficult to add extra devices
devices can be used in one devices

48
Q

what is wi-fi

A

set of protocols that defines how network devices can communicate wirelessly using radio waves.

49
Q

what does the wi-fi protocol determine?

A

frequency band and channel that should be used.
data transmission rates
how devices should be authenticated when they attempt to join a network.

50
Q

adv of wifi

A

cheap setup costs
can handle large numbers of users
connect multiple devices without the need for extra hardware.

51
Q

disadv of wifi

A

tends to have slower data transfer speeds
connection isn’t stable
less secure then a wired network as it is more vulnerable to hacking.

52
Q

what is bluetooth?

A

another form of wireless protocol that can be used over short distances using ultra high frequency (uhf) radiowaves

it is very secure and does not require a clear line of sight between the two devices

53
Q

encryption?

A

the process of disguising a message so that it cannot be understood by anyone but its intended recipient.

54
Q

how is encryption done?

A

by scrambling data into cipher text using a ‘master key’ created from ssid of the network and the password.

data is decrypted by the reciever using the same master key , so this key is not transmitted.

handshaking protocol is used to ensure that the reciever has a valid master key before transmission to the device begins.

55
Q

protocols used for wireless encryption include…

A

WEP , WPA , WPA2

56
Q

IPv4 format?

A

written in 4 numbers
separated by periods (.) e.g 193.74.211.63
each number in the range 0-255

57
Q

IPv6 format?

A

written in 8 numbers
separated by colons
each group is made up of four hex values representing 16-bits

58
Q

why is MAC address used?

A

its used to route frames on a local area network.

e.g 00:0a:95:9d:68:16
each mac address is unique to every network interface card.

59
Q

what is the purpose of using ip addressing on a wide area network

A

is used to route packets on a wide area network

60
Q

format for an iPv4 address?

A

32 bits in size.
written as four numbers separated by periods (.), each number in the range of 0-255
e.g 69:89:31:212

61
Q

what is a mac address?

A

unique number that identifies the actual device that is connected to a lan

its part of the NIC inside the device and is assigned when the NIC is manufactured and cannot be changed

62
Q

what does the IP address represent

A

location on the device on the network.

every time a device connects to the internet it is assigned an ip address to use for that session by the internet service provider.

63
Q

why is IPv4 being replaced by IPv6

A

because the unique static address are running out.

64
Q

format for an IPv6 address?

A

128 bits
written in 8 groups, separated from by colons, each group is made up of four hex values representing 16 bits

65
Q

what are standards?

A

official definitions or rules that exist for various aspects of computing

66
Q

why are hardware and software standards important?

A

they allow different manufacturers to make components and programs that are compatible and will work with each other. without standards only hardware and software made by the same company could be used together

it is clear that networks require standards in order to work conveniently

67
Q

give examples of when standards are used in computer science?

A

ascii/unicode - character sets
ieee - standards for computer cables
html - standards for creating websites
documents, image and sound standards e.g pdf

68
Q

what is a protocol?

A

set of rules that allow two devices to communicate

69
Q

what are the common protocols?

A

TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL/
HTTP (HYPER TEXT TRANSFER PROTOCOL)
HTTPS (HYPER TEXT TRANSFER PROTOCOL SECURE)
FTP ( FILE TRANSFER PROTOCOL)
POP (POST OFFICE PROTOCOL)
IMAP (INTERNET MESSAGE ACCESS PROTOCOL)
SMTP (SIMPLE MAIL TRANSFER PROTOCOL)

70
Q

TCP (transmission control protocol)?

A

provides an error free transmission between 2 routers

71
Q

IP (internet protocol)?

A

route packets across a wide area network
along with TCP its makes up the TCP/IP protocol stack.

72
Q

HTTP (hypertext transfer protocol)?

A

a client server method of requesting and delivering HTML web pages.

73
Q

HTTPS (hypertext transfer protocol secure)

A

encryption and authentication for requesting and delivering html web pages.
used when sensitive information needs to be transferred e.g passwords

74
Q

FTP ( file transfer protocol)

A

used for sending files between computers usually on wide area network.

75
Q

POP (post office protocol)

A

retrieves emails from a mail server
removes it from server
transfers it to your device

76
Q

SMTP ( simple mail transfer protocol)

A

sends email to an email server

77
Q

IMAP (internet message access protocol)

A

used by mail clients to manage remote mail boxes and retrieve email from a mail server

78
Q

what is the concept of layering?

A

to divide the complex task of networking into smaller , simpler tasks that work with each other

the hardware and/or software for each layer has a defined responsibility.

each layer provides a service to the layer above it

79
Q

adv of layering?

A

reduces the complexity of the problem into manageable sub-problems.
devices can be manufactured to operate at a particular layer.
products from vendors will work together.

80
Q

4 layer model or TCP/IP stack:

A

layer 4 - application layer - browsing using HTTPS
layer 3 - transport layer - TCP error handling
layer 2 - internet layer - IP routing
layer 1 - networking layer - mac frames (sent over fibre optic)

81
Q

different forms of attack?

A

malware
phishing
brute force
denial of service
data interception and theft
SQL injection

82
Q

what is a malware?

A

software which is specifically designed to disrupt, damage or gain unauthorised access to a computer system.
e.g virus , worms , trojan horses , ransomware , spyware

83
Q

what is phishing?

A

use fake emails and websites to trick people into giving away their sensitive data and info.

84
Q

what is social engineering?

A

form of attack that involves tricking people into giving away critical info or access details. e.g phishing

85
Q

what is brute force attack?

A

trial and error method of attempting passwords and pin numbers .
automates software is used to generate a large number of consecutive guesses

e.g by trying every word in the dictionary

86
Q

what is denial of service attack

A

flooding a server with useless traffic causing the server to become overloaded and unavailable.

87
Q

what is data interception and theft?

A

the unauthorised act of stealing computer-based info from an unknowing victim with the intent of compromising privacy or obtaining confidential info

e.g sniff username

88
Q

what is SQL injection?

A

a hacker tries to insert extra SQL commands into input boxes on web forms in web pages hoping the server will carry these commands in error

89
Q

threats to a malware?

A

files are deleted, become corrupted or are encrypted.

computer crashes, reboots spontaneously and slow down.

internet connection becomes slow.

keyboard inputs are logged and sent to hackers

90
Q

threats to phishing?

A

access a victims account to withdraw money etc

open bank accounts and credit cards cashing illegitimate cheques.

gains access to high value corporate data

financial service can blacklist the company, resulting in damage to brand reputation

91
Q

threats to a brute force attack

A

theft of data
access to corporate systems

92
Q

threats to a denial of service attack

A

loss of access to a service for customers.
loss of revenue
lower productivity
damage to reputation

93
Q

threats to data interception and theft attack

A

usernames and passwords compromised allowing unauthorised access systems.
disclosure of corporate data
theft of data

94
Q

threats to SQL injection

A

contents of databases can be output, revealing private data
data in the database can be amended or deleted
new rogue records can be added to the database

95
Q

threats to a social engineering?

A

not installing operating systems updates.
not keeping anti-malware up to date
not keeping doors to computer rooms
not logging off or locking their computers

96
Q

common prevention methods?

A

penetration testing ( used to test to identify vulnerabilities)
anti-malware software.

firewalls (designed to prevent unauthorised access to networks , they inspect and outgoing data packets)

user access levels

passwords

encryption

physical security

97
Q

common prevention methods?

A

penetration testing ( used to test to identify vulnerabilities)
anti-malware software.

firewalls (designed to prevent unauthorised access to networks , they inspect and outgoing data packets)

user access levels

passwords

encryption

physical security

98
Q

prevention of malware?

A

strong security software (firewall , spam filter , anti virus , anti spyware)

enabling OS and security software updates.

educate users being cautious of opening email attachments and downloading software.

backup files regularly onto removable device

99
Q

prevention of phishing?

A

strong security software
educate users on awareness of spotting fake emails and websites
educate users not disclosing personal or corporate info.
staff training: disabiling

100
Q

prevention of phishing?

A

strong security software
educate users on awareness of spotting fake emails and websites
educate users not disclosing personal or corporate info.
staff training: disabiling

101
Q

prevention of phishing?

A

strong security software
educate users on awareness of spotting fake emails and websites
educate users not disclosing personal or corporate info.
staff training: disabiling

101
Q

prevention of phishing?

A

strong security software
educate users on awareness of spotting fake emails and websites
educate users not disclosing personal or corporate info.
staff training: disabiling

102
Q

prevention of brute force attack

A

network lockout policy: locks account after 3 passwords attempts
using progressive delays
staff training: using effective passwords with symbols, letters numbers and mixed cases.
using challenge response e.g ‘i am not a robot’ and reCAPTCHA

103
Q

prevention of denial of service attack

A

strong firewall
packet filters on routes
configuring the web server
auditing , logging and monitoring of systems

104
Q

prevention of data interception and theft

A

encryption
using virtual networks
staff training: use of passwords, locking computers, logging off, use of portable media
investigating your own networks vulnerabilities

105
Q

preventing SQL injection?

A

validation on input boxes
using parameter queries
setting databases permission
penetrating testing