1.3 Exchanging data Flashcards

1
Q

What is the bus network topology, and what are its advantages/disadvantages?
(1.3.3)

A

All devices connected to backbone cable.

Advantages:

  • Cheap setup
  • No additional hardware

Disadvantages:

  • Backbone cable dependency
  • Traffic increase 🡆 performance decrease
  • All devices see data transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ACID within transaction processing? (1.3.2)

A
  • Atomicity: processed in entirety or not at all
  • Consistency: ensuring referential integrity
  • Isolation: Simultaneous execution must make same results as sequence
  • Durability: once executed, remains so
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does normalisation in databases aim to accomplish? (1.3.2)

A
  • No redundancy
  • Consistent data
  • Problemless record addition/removal
  • Accepts complex queries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is server-side and client-side processing, and what are the advantages /
disadvantages of each? (1.3.4)

A

Server-side:

  • Client sends data, server processes
  • Advantages: improved security, consistency between clients, advanced
    calculations, easily scaled
  • Disadvantages: availability/reliability required, limited responsiveness,
    complex development

Client-side:

  • Local device processing
  • Advantages: quick execution, immediate feedback, server load reduced
  • Disadvantages: security risks, processing power limitation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is referential integrity? (1.3.2)

A
  • No data redundancy
  • Prevents foreign key pointing to non-existant primary key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is packet / circuit switching, and what are the advantages / disadvantages
of each? (1.3.3)

A

Circuit:

  • Direct-linked devices, maintained for conversation, data sending/receival same rate
  • Advantages: arrival logically ordered, quick data reconstruction, no
    communication delay
  • Disadvantages: bandwidth waste when unused, rate requires maintaining,
    electrical interference

Packet:

  • Data section communication across network, unlimited routes
  • Advantages: multiple data arrival checks, many paths, WANs
  • Disadvantages: time spent deconstructing / reconstructing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is run-length and dictionary encoding? (1.3.1)

A

Run-length:

  • Lossless, repeated values removed, replaced with 1 occurrence & repetition
    amount
  • Relies on consecutive data pieces, otherwise little reduction

Dictionary:

  • Lossless, frequent data pieces replaced with index
  • Compressed data along dictionary
  • Dictionary matches data to index
  • Original data restorable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are primary, foreign, and secondary keys? (1.3.2)

A

Primary: unique identifier, each object

Foreign: attribute linking 2 tables

Secondary: enables quicker searching, sorting by attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the mesh network topology, and what are its advantages/disadvantages?
(1.3.3)

A

Every node connects to every other node

Advantages:

  • No cabling costs (if Wi-Fi)
  • Node amount 🡅, reliability / speed 🡅
  • Faster, no switch

Disadvantages:

  • Maintenance difficult
  • Wireless required (if Wi-Fi)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the star network topology, and what are its advantages/disadvantages?
(1.3.3)

A

Central node (switch), directs data flow, MAC identifies devices.

Advantages:

  • Consistent performance
  • Cable failure only affects 1 connection
  • Data transmission faster
  • Easy station addition
  • No data collisions

Disadvantages:

  • Expensive (switch / cabling)
  • Switch-dependant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are routers, switches, and gateways? (1.3.3)

A

Routers:

  • Connects 2+ networks, has IP
  • Determines best packet path

Switches:

  • Directs data flow across network
  • Only destination receives data

Gateways:

  • Translate different network protocols, makes use same protocol
  • Switches packet header protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 3 main methods of strengthening network security exist, and how do they
work? (1.3.3)

A

Firewall:

  • Prevents unauthorised network access
  • Filters requests, ensures legitimacy

Proxy servers:

  • Collecting / sending data on user behalf
  • Protects user privacy (anonymity)
  • Can prevent website access

Encryption:

  • Secure data transmission across internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the steps of protocol layering? (1.3.3)

A

Application:

  • Specifies protocol used

Transport:

  • Splits data into packets
  • Labels with packet number
  • Requests retransmission of lost
  • Declares port

Network:

  • Adds source / destination IP
  • Routes packets

Link:

  • Adds source / destination MAC
  • Identifies device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between lossy and lossless compression? (1.3.1)

A

Lossy: reduces size whilst removing some information

Lossless: reduces size without losing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is symmetric and asymmetric encryption? (1.3.1)

A

Symmetric:

  • Sender / receiver share private key
  • Key exchange distributes
  • Both encrypts / decrypts data
  • Key requires secrecy

Asymmetric:

  • Two keys: public / private
  • Public published anywhere
  • Private kept secret
  • Together creates key pair, mathematically-related
  • Public key messages, only private key decrypts
  • Encrypting with private key verifies sender, decryptable by public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a relational database, and what is a flat file? (1.3.2)

A

Relational:

  • Different tables for different entities
  • Entity = item of interest

Flat-file:

  • Single file
  • Generally single entity
17
Q

What is indexing in databases? (1.3.2)

A
  • Method storing each position’s when ordered
  • Quickens data searching / access
  • Primary key auto-indexed
18
Q

What is hashing and how is it used? (1.3.1)

A

What:

  • Input turned into fixed-size value
  • Output irreversible

Uses:

  • Hash table holds key-value pairs
  • In constant-access data storage, like cache / database
  • If collision, second hash function
  • Passwords
19
Q

What are the 3 normal forms? (1.3.2)

A

First:

  • Values atomic (no more than single value)

Second:

  • No partial dependencies
  • 1NF achieved

Third:

  • 2NF achieved
  • No non-key dependencies
20
Q

What are client-server and peer-to-peer networks, and what are their
advantages/disadvantages? (1.3.3)

A

Client-server:

  • Clients connected to server (holds all info), clients request use
  • Advantages: more secure, centralised backups, scalability
  • Disadvantages: expensive, maintenance required, single failure point

Peer-to-peer:

  • Comptuers connected together, shares files
  • Advantages: inexpensive, easy maintenance, no server-dependancy, direct data
    sharing
  • Disadvantages: lacking centralisation, weakened security, performance issues
21
Q

What are the HTML tags for images, and lists? (1.3.4)

A

Unordered list: <ul>

Ordered list: <ol>

List item: <li>

Image: <img></img></li></ol></ul>

22
Q

What is search engine indexing? (1.3.4)

A
  • Web crawlers collect webpages information
  • Keywords/phrases/metadata collected
  • Creates ranking
23
Q

What is record-locking and redundancy in databases? (1.3.2)

A

Record-locking

  • Prevents simultaneous record access
  • Prevents inconsistencies / update loss
  • Can cause deadlock

Redundancy:

  • Having data copies in physically different locations
  • Data recoverable if 1 damaged
24
Q

What is the PageRank algorithm? (1.3.4)

A
  • Determined by: incoming link amount, rank of pages linking it
  • Data structure: directed graph, webpages = nodes
25
Q

What is DNS? (1.3.3)

A
  • Domain Name System
  • Method of naming internet resources
  • DNS server translates domain name 🡆 IP address