1.3 Exchanging Data Flashcards

1
Q

How does lossy compression work

A

Unnecessary information is removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does lossless compression work

A

All information is retained so file is replicated exactly and patterns in the data are recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What files use lossy compression

A

JPG - quality is lost
MP3- Frequencies and sounds that can not be heard are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an entity (databases)

A

Category of object, person, event or thing of interest to an organisation about which data us to be recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an identifier (databases)

A

Uniquely identifies the entity (known as primary key in relational database)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the secondary key (database)

A

Any index that is not the primary key of a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the possible relationship between entities

A

1-1
1-many
many-many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a foreign key (databases)

A

Links two tables in a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a composite primary key (databases)

A

A primary key that consisted if mire than one attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an attribute (databases)

A

An identifying piece of information that serves to define further and expand the primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is referential integrity

A

Ensuring that a component in tables linked in a relational database are not deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an index (databases)

A

Gives the position of each record according to its primary key
One or more secondary indexes may be defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is data captured

A

Manual methods (transcribing) Magnetic Ink Character Recognition
Optical Character Recognition
Smart card readers
Scanners
Barcode readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is data selected and managed

A

Speed cameras
SQL, data may be used to produce reports, send letters or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is data exchanged

A

Electronic Data Interchange
Transaction software processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are internet service providers

A

Connect directly to backbone cables connected by trans continental lines fed across the sea beds and distribute the internet connection to smaller providers who in turn provide access to individual homes and businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an URL

A

Full address of an internet resource, it specifies location of a resource on the internet, including resource name and usually the file type so a browser can request it from a website server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are internet registrars

A

Hold records of all existing website name names and the details of those domains that are available for purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are internet registries

A

Organizations that manage and allocate Internet resources like IP addresses within specific geographic regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the domain name do

A

Identifies domain that an internet resource resides In.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a domain name server

A

Domain names structured into a hierarchy of smaller domains and written as a string separated by full stops as dictated by the rules of the dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are global directories

A

DNS catalogues all domain names and IP addresses here
Servers can access them to find the correct IP address location for a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What happens when a user enters the URL

A

Browser requests IP address from local DNS
Keeps asking DNS servers till IP address is located
Once it is located a data request is sent by users computer to the location to find the web page data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a fully qualified domain name

A

Includes the host server name

25
Q

What is an IP address

A

Unique address that is assigned to a network device, it indicates where a packet of data is to be sent or has been sent from.

26
Q

What is a router

A

Use the IP address to direct the data packet

27
Q

Features of a WAN

A

Relies on third party connections and are typically spread over a large geographical area

28
Q

Features of a LAN

A

Computing devices on a single site connected together by cables.
Can transmit data very fast but only over a short distance

29
Q

What is a bus topology

A

All computers are connected to a single cable, the ends of the cables are plugged into a terminator

30
Q

Advantages and Disadvantages of a bus topology

A

Inexpensive to install as it requires less cable

If main cable fails network data can not be transmitted
Performance degrades with heavy traffic
Low security, all computers can see all data transmissions

31
Q

What is the structure of a star topology

A

Has a single central node, either a switch or computer that acts as a router

32
Q

What is the role of a switch in a star topology

A

Keeps record of unique MAC address of each device on the network and can identify the particular computer on the network it should send data to

33
Q

Advantages and Disadvantages of a star topology

A

One cable fails, one station affected
Consistent performance
Higher transmission speeds
No data collisions
More secure
Easy to add new stations

Costly to install
If central device fails all nodes can not transmit data

34
Q

What is WiFi

A

Local area wireless technology that enables you to connect devices to a network resource or to the internet via a wireless network access point

35
Q

What is circuit switching

A

Creates a direct link between two devices for the duration of the communication
Band with is wasted when data is not sent
Devices must transmit and send data at the same rate
Simple to reconstruct message
Electrical interferente could corrupt data

36
Q

What is packet switching

A

Method of communicating packets of data across a network on which other communications are happening simultaneously

37
Q

What is a data packet

A

Chunks of data that is transmitted across the internet Each contain a header and payload
Include time to live

38
Q

What is a MAC address

A

It is assigned and hard coded into a NIC, uniquely identifying the device

39
Q

What is a protocol

A

Set of rules defining common methods of data communication

40
Q

What is HTTP/HTTPS

A

Hyper text transfer protocol (secure) is a standard protocol for browsers to render web pages

41
Q

What is TCP/IP

A

Enables communication with any other computer connected to the internet regardless of its location

42
Q

What is the TCP/IP stack

A

Set of networking protocols that work together as four connected layers passing incoming and outgoing data packets
Application layer
Transport layer
Internet layer
LInk layer

43
Q

What happens in then application layer

A

Uses protocols relating to the application being used to transmit data over a network

44
Q

What happens in the transport layer

A

Uses TCP to establish end to end connection with the recipient computer. Data is sorted into packets with the packet number, number of packets and port number through which the packet should route.
Can request retransmission of lost packets

45
Q

What happens in the internet layer

A

Adds source and destination IP address. Routers operate on the network layer and use these to forward packets to its destination

46
Q

What happens in the link layer

A

Physical connection between network nodes and adds the unique MAC address identifying the NICs of the source and destination computers
Once received MAC address us stripped off by link layer, which passes packets onto the internet layer which passes them onto the transport layer to remove the port numbers and reassemble the packets

47
Q

What is the FTP

A

File transport protocol
Transfers data across a network
Works at application layer using appropriate software

48
Q

What is a mail server

A

Routes mail according to its database and it is stored until it can be retrieved

49
Q

What is the P0P3

A

Post office protocol
Retrieves emails from a mail server and then deletes it from server

50
Q

What is IMAP

A

Internet message access protocol
Keeps email on the server

51
Q

What is SMTP

A

Simple mail transfer protocol
Transfers outgoing emails from one server to another or from an email client to the server when sending an email

52
Q

What is HTML

A

Language web pages are written in, describes content and structure of a web page so that a browser is able to interpret and render the page for the viewer

53
Q

What is CSS

A

Scripting language that is used to describe the layout and styles of a web page

54
Q

What is java script

A

Script language that uses all of the same programming constructs that are familiar in languages
Interpreted rather than compiled
Can be used to process input data from a clients computer

55
Q

What is a client server network

A

One or more computers (clients) that are connected to a powerful central computer (server)

56
Q

Advantages and Disadvantages of client server network

A

Secure
Backups done centrally
Data easily shared between clients

Expensive
Professional IT staff needed

57
Q

What is cloud computing

A

Growing service based industry providing access to software or files via the internet using client server model

58
Q

What is a peer to peer network

A

No central server and individual computers are connected to each other either locally or over a WAN

59
Q

Advantages and Disadvantages of a peer to peer network

A

Cheap
Share resources like printer
Not difficult to maintain

Used for online piracy