1.3 Exchanging data Flashcards

1
Q

Why do we need to reduce the size of files

A

Data is sent more quickly
Less bandwidth is used
Buffering less likely to occur
Less storage is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of compression

A

lossy and lossless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossless compression?

A

File size reduced without losing any original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossy compression?

A

Unneeded data permanently removed to lower file size. This data that is removed will be non noticable such as certain sound frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does lossless compression work?

A

Records patterns in the data instead of the data instead to prevent recording redundant data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when should lossless compression be used

A

when no data can be lost for example a word document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

examples of lossy compression

A

JPEG, MP3, MPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

examples of lossless compression

A

ZIP
PNG
GIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of lossless compression

A

Run length encoding
Dictionary encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is run length encoding?

A

Compression where conexcutive identical pieces of data are stored as one piece of data and a number representing length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is dictionary compression

A

Spots regularly occuring data and stores it in a dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does dictionary compression reduce size

A

Repeated phrases are only stored once and are referenced with an identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encryption

A

The process of encoding a message so that it can be read only by the sender and intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is symmetric encryption?

A

An encryption method in which the same key is used to encrypt and decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is asymmetric encryption?

A

An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message. Such that someone with the public key can only encrypt and someone witht he private key can only decrpyt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a one time pad

A

A one time key generated via random methods used for symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is hashing

A

A one-way encryption an algorithm but no key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the uses of hashing

A

Storing passwords securly
Uniquely identify a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a flat file database?

A

A database that consists of information on a single entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an entity

A

A category of object, person, event or thing of interest about which data needs to be recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ther names for entities

A

Record, tuple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a relational database

A

Database that stores data points that are related to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a primary key

A

A field (or group of fields) that uniquely identifies a given entity in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a secondary key

A

Another field that can be used to identify an entity in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a foreign key?
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
26
How to write an entity description
EntityName(__PrimaryKey__, foreignKey, secondaryKey1, secondaryKey2)
27
What is a composite primary key?
A key made up of two primary keys from different tables
28
What is a one to one relationship
One entity is related to another single entity
29
What is a one-to-many relationship?
One entity is related to many entities
30
What is a many-to-many relationship?
Many entities a re related to many other entities
31
Diagram for one to one
Straight line between entities
32
Diagram for one to many
One ended 3 pronged pitch fork
33
Diagram for many to many
many Two ended 3 pronged pitchfork
34
What are some manual methods of capturing data
Forms or surveys
35
What are some automatic methods of capturing data
Smart card readings Barcode readers Scanners Optical character recognition Optical mark recognition Magnetic ink character regonition Sensors
36
How can data be transferred to a databse
Automatically using DBMS software By typing it in using a customised format Importing from a spreadsheet or file Using an EDI (Electronic Data Ingterchange)
37
What is an EDI
Computer to computer exchange of documents such as purchase orders All documents must be in standard format
38
How do we select data in a database
Use SQL or similar to query data bases
39
What is database normalization
Process used to come up with the best possible design for a database It avoids data duplication and inconsistency.
40
When is a database in first normal form
Contains no repeating attributes All attributes must be atomic
41
When is a database in second normal form
It is in first normal form It contains no partial dependencies
42
When is a database in third normal form
In second normal form Contains no non key dependencies
43
Why is it important to be in third normal form
Easier to maintain data as integrity is preserved, so wen one piece of data is changed other instances of it a re changed Searches are faster and less storage space is used due to no duplication of data Easy to update data, due to fields only having to be added to one table as well as necessary data not being able to be deleted without being replaced
44
Example table creation sql
CREATE TABLE tblProduct ( ProductID CHAR(4) NOT NULL PRIMARY KEY, Description VARCHAR(20) NOT NULL, Price CURRENCY )
45
Alter table examples sql
ALTER TABLE tblProduct ADD QtyInStock INTEGER DROP QtyInStock MODIFY COLUMN Description VARCHAR (30) NOT NULL
46
Linked table example sql
CREATE TABLE ProductComponent ( FOREIGN KEY ProductID REFERENCES Product(ProductID), FOREIGN KEY CompID REFERENCES Component(CompID), PRIMARY KEY (ProductID, CompID) )
47
Insert into example sql
INSERT INTO Product (ProductID, Description, Price), VALUES ("A345", "Pink Rabbit", 7.50)
48
Update example sql
UPDATE Product, SET Description = "Blue Rabbit", Price = 8.25, WHERE ProductID = "A345"
49
Delete example sql
DELETE FROM Product WHERE ProductID = "A345"
50
What is the default order for ORDER BY sql
Ascending
51
Select example sql
SELECT productID, productName, subject, price FROM tblProduct WHERE level = 4 ORDER BY productName
52
Between example sql
WHERE price BETWEEN 5.00 AND 10.00
53
In example sql
WHERE subject IN ('Computing', 'Maths')
54
LIKE example sql
WHERE subject LIKE "Comp*"
55
Selecting from multiple tables example sql
SELECT tblCustomer.custID, surname, tblProduct.productID, productName FROM tblCustomer, tblProduct, tblSubscription WHERE tblSubscription.custID = tblCustomer.custID AND tblSubscription.productID = tblProduct.productID
56
Join example sql
SELECT tblPlayer.surname, tblPlayer.firstname, tblTeam.teamName FROM tblTeam, tblPlayer JOIN tblPlayer ON tblTeam.teamID = tblPlayer.teamID WHERE team.teamName = "Binham"
57
What is transaction processing
The processing of several operations as part of a transaction (a single logical operation)
58
What is referential integrity
No foreign key in one table can reference a non existent record in a related table
59
Transaction processing example
Customer makes order: may consist of several order line all of which must be processed the quantity of each product adjusted on the stock fill credit card details checked payment accepted or rejected
60
What does ACID stand for?
Atomicity, Consistency, Isolation, Durability
61
What is ACID for
Ensures that the integrity of the database is maintained under all circumstances It guarantees that transactions are processed reliably
62
What is Atomicity in ACID?
All or nothing principle This property requires that a transaction is processed in its entirety or not at all
63
What is consistency in ACID
This property ensures that no transaction can violate any of the defined validation rules Referential integrity, specified when the database is set up, will always be upheld
64
What is isolation in ACID?
Ensures that concurrent execution (at the same time) of transactions leads to the same result as if transactions were processed one after the other
65
What is durability in ACID
This ensures that once a transaction has been committed, it will remain so, even in the event of a power cut As each part of a transaction is completed, it is held in a buffer on disk until all elements of the transaction are completed Only then will the changes to the database tables be made
66
What is a potential problem with multi user databases
Simultaneous accessing of records may cause updates to the database to be lost
67
What is record locking
Record locking prevents simultaneous access to objects in a database in order to prevent updates being lost or inconsistencies in the data arising
68
What is the problem with record locking
If two users are attempting to update two records, a situation can arise in which neither can proceed, known as deadlock
69
What is serialisation
ensures that transactions do not overlap in time and therefore cannot interfere with each other or lead to updates being lost
70
What are the two types of serialisation
Timestamp ordering Commitment ordering
71
How does timestamp ordering work
Every object in the database has a read timestamp and a write timestamp These are updated whenever an object is read or written When a user tries to save an update, if the read timestamp is not the same as it was when they started the transaction, the transaction fails
72
What is commitment ordering
ensures that no transactions are lost if two clients are simultaneously trying to update a record Transactions are ordered in terms of their dependencies on one another as well as the time they were initiated
73
What is redundancy?
Having backups for when the main system goes down so everything continues to work as normal
74
Example of redundancy
Duplicate hardware, located in different geographical areas, mirrors every transaction that takes place on the main system
75
What is the internet
A network of inter connected networks
76
What is the world wide web
A collection of resources accessed via the internet
77
What is the backbone of the internet
The set of dedicated connections that connect several large networks at various points on the globe
78
What is an IP address?
a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
79
What is a URL
specifies the means of accessing a resource across a network and its location, is linked to an IP address
80
What is a DNS
The Domain Name System (DNS) converts domain names or host names into IP addresses. Instead of having to remember a host's IP address, DNS allows you to use a friendly name to access the host. For example, it is easier to remember http://www.cisco.com than 198.133.219.25.
81
Why are URLs and DNSs so important
Instead of having to remember a host's IP address, DNS allows you to use a friendly name to access the host.
82
How might an IP address be resolves
1.Asks for bbc.co.uk 2.Local DNS doesnt know, refers to root DNS 3.Root DNS knows where .uk server is 4..uk server finds .co serveer 5..co server finds BBC server and resolves IP address
83
What is A LAN
Local Area Network: two or more computers connected together within a small geographical area, for example confined to one building or site
84
What is a WAN
Wide area network Systems of LANs that are connected over a large geographical distance
85
What is a network topology
A network topology is the arrangement of the various computing devices which make up a computer network
86
What is a bus topology
An arrangement where nodes are connected in a daisy chain by a single central communications channel
87
What is a star topology?
An arrangement where a central node or hub provides a common connection point for all other nodes
88
What hardware might be used in a star network as the central node
Switch: sends each communication to the specific computer it is intended for
89
Advantages of a bus network
Inexpensive to set up Devices can easily be added Good for small networks
90
Disadvantages of a bus network
Main cable is a point of failure Limited cable length Performance degrades with heavy use, owing to data "collisions" Poor security
91
Advantages of a star network
Easy to isolate problems Good performance More secure if a switch is used as data is sent only to the recipient
92
Disadvantages of a star network
Can be expensive to set up because of the length of cable required Central device is point of failure
93
What is physical topology
The physical topology of a network defines how the devices are physically connected
94
What is a logical topology?
The logical topology defines how the devices communicate across the physical topologies
95
What is a wifi newtork
One that allows devices to connect to it wirelesses
96
What is wireless hardware
Wireless Network Interface Card Wireless access point connected to a router, connected to a modem
97
What is circuit switching
Circuit switching involves creating a communication connection between two endpoints for the duration of a phone call or transfer of data
98
Why is circuit switching unfeasible for the internet
Too many devices to be able to make manual connections between
99
What are packets
Small chunks of one whole data sent individually throughout the web on their own path
100
What is the advantage of packets
Means large pieces of data are split up so one connection isnt taken up completely for a long time
101
What is latency
Latency is the length of time it takes to receive a response back after receiving a packet
102
What is packet switching
The packets across multiple, not necessarily perfect routes to reach a destination
103
What is a router
A piece of hardware that forwards packets based on IP address
104
What is a transfer between routers called
A hop
105
How does routing work
Each router stores data about the available routes to the destination node Looks up the destination IP address in its routing table to find the best router to forward the packet to Routers continue to forward the packet until it reaches its destination node
106
What is a packet made of
Sender IP address Receiver IP address Protocol Packet number Data Checksum
107
What is a protocol
A set of rules, or a formal description, of the format of a digital transmission
108
What is a gateway
Connects one network to another And converts data to required protocol
109
Why are protocols important for networking?
Defines the rules of communication so data can be transferred and meaningfully decoded such that we can communicate over a network
110
What is the TCP/IP protocol stack
A set of rules used in turn, to format a message so it can be sent over a network
111
What are the layers in the TCP/IP stack
Application Transport Network Link
112
What happens in the application layer while transmitting
Determines the format of the data to be transmitted
113
What happens in the application layer while receiving
Receives full data and displays or stores it
114
What happens in the transport layer when sending
Establishes an end‐to‐end connection with the recipient computer Splits data into packets
115
What happens in the transport layer when receiving
Rearranges packets into full data
116
What happens in the internet layer when sending
Addresses packets with recipient and sender
117
What happens in the internet layer when receiving
Removes addresses of recipient and sender and pass up to transport layer
118
What happens in the link layer when sending
Addresses packets with mac addresses of next hop
119
What happens in the link layer when receiving
Receives packets and strips mac address
120
Explain why TCP and IP are able to work with different application protocols and different network media
Anything above or below these protocols is separate and does not interact with them
121
What is a MAC
Media Access Control address: uniquely identifies a physical device with a Network Interface Card
122
What is a port
The logical connection point for the transmission of information packets. Used to alert a specific application to deal with data sent to a computer
123
What is FTP
File Transfer Protocol is an application level protocol used to move files across a network
124
What is SMTP
Simple Mail Transfer Protocol, Used to send emails and forward them between mail servers to their destination
125
What is POP3?
Post Office Protocol 3, Downloads email stored on a remote server to a local client (removed after download)
126
What is IMAP
Internet Message Access Protocol, Manages emails on a sever so multiple clients can access the same email account in synchronicity
127
What is a firewall
A firewall is either software or hardware that controls access to and from a network Numbered doors called ports are opened so that only certain traffic is allowed to pass through
128
What is packet filtering
Packets of data are inspected by the firewall to check which port they are attempting to access If this traffic is to be allowed through, the port must be opened for the duration of the connection, otherwise the firewall will automatically reject it
129
What is a proxy server?
A proxy server makes a web request on behalf of your own computer, hiding the true request IP addresses from the recipient
130
What are the functions of a proxy server
Enables anonymous surfing Can be used to filter undesirable online content Logs user data with their requests Provides a cache of previously visited sites to speed access
131
What is a worm
A self-replicating program or algorithm that consumes system resources.
132
What is a trojan
malicious software programs that masquerade as innocuous or useful applications
133
What is phishing
using email to manipulate a victim into visiting a fake website and giving away personal information
134
What can help prevent malware and attacks
Guarding against buffer overflow attack Guarding against SQL injection attack Use of strong passwords for login credentials Two-factor authentication Use of access rights (file system permissions)
135
What is buffer overflow
Buffer overflow occurs when a program accidentally writes data to a location too small to handle it As a result the overflowed data (written to location #3 below) may end up in a neighbouring instruction space, causing a system to crash
136
What is SQL injection?
A malicious user can enter SQL commands via online database forms to change the processing
137
How can we monitor a network for safety
Packet sniffers User access logs
138
What is a client server model
A network model consists of two parts: the client and the server The client accesses data, services and files from the server The client initiates communication to the server The server waits for requests from clients
139
What is a peer-to-peer network?
A network in which each computer has both server and client capabilities.
140
What are the characteristics of client server
User IDs, passwords and access levels centrally controlled Used in many small, medium-size and large organisations Can be expensive to set up and to manage Backup is centralised and usually automated No access to other users' files
141
What are the characteristics of peer to peer
Files and programs stored on individual computers Suitable for a home computer network Cheap to set up and maintain Each computer on the network can act as both client and server Can be used for sharing of music and streaming coverage of live events
142
What is client processing
Data is processed before it is sent to a server by the client
143
What is Server processing
Data is processed when it is received by the server from the user
144
What is an API
An application programming interface, a set of tools that can be used for building software applications
145
What is a search engine
systems that locate resources (web pages, files, pictures) on the World Wide Web
146
What is a search engine index
A record of the resources located on the world wide web
147
How is an index created
Using a web crawler
148
Why is an index useful
Collecting all web pages in one place is very useful to the user as they can more easily find the web pages they want without having to search through many pages to find what they want.
149
How does a web crawler work
Follows every link on a website and does the same for each link in order to index as many web pages as possible
150
What are meta tags
Describe the content of the web page
151
How are meta tags used in the search process
Sites with relevant content in metatags will be more highly recommended by the search engine as it is more likely for the user to want to go to that site
152
What is pagerank
Algorithm to determine which web pages should be shown when a user searches somethink
153
What affects a web pages page rank
Incoming links Outgoing links Meta tags
154
When should server side processing be used
Database queries Encoding data to readable HTML Updating the database Calculations
155
What are the benefits of server side processing
Provides further validation Keeps data owned by organisations secure
156
What should client side processing be used for
Initial validation Web page interactivity Manipulating interface elements Applying styles (CSS)
157
What are the benefits of client side processing
Reduces the load on the server Reduces the amount of web traffic
158