1.3 Exchanging data extra Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Explain some reasons there might appear to still be duplicates when hashing with images

A

Hashing works on the data / bits (1)
and so two images may appear the
same but not be identical at a bit level
(1). This could be because they are
different file types (1) / different sizes
(1). Even the change of a single bit
may result in a completely different
hash (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lossy compression on text

A

Text loss means it will be undreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For dictionary coding, instead of tokens what word should you use

A

Tokens or smaller groups of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain why asymmetric encryption is more suited to transactions over the internet than symmetric encryption

A

Any four from:
Symmetric encryption would require both
parties to have copy of the key (1) this
couldn’t be transmitted over the internet or
an eavesdropper monitoring the message
may see it (1) Asymmetric gets round this
requirement as there are two different keys
(1) One key encrypts the data (1) which
can be publically distributed (1) and a
different key to decrypt it (1) which is kept
private (1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a primary key

A

A field that has a unique value / a
unique identifier (1) for every record in
that table (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the problem with many to many relationships

A

They are not allowed in 3NF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give one advantage and one disadvantage of indexing the field Artis

A

+Searches of artist can be performed more quickly
-The index takes up extra space in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State what is meant by an IP address

A

A numerical address made of 4 numbers
each between 0 and 255 / 32 hexadecimal
digits (1)
That uniquely identifies a device on a
network. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of identifier is an IP adress

A

It is a logical identifier (i.e. can change on a
physical device) (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by the term hash

A

A result generated by applying an
algorithm / numeric process to a value. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a bridge

A

–Provides a link between (local area)
networks
–To connect the student and / or teacher
and / or administration networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a gateway

A

–Provides a link between two dissimilar
networks
–Links the school networks to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls

A

Restrict access to websites and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where does client side processing take plac e

A

Client side processing takes place in the
web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where does server side processing take place

A

on the
webserver. Data is sent from the browser
to the server, the server processes it and
sends the output back to the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does client side processing not require

A

Data to be sent back and forth meaning code is much more responsive

17
Q

Is code visible or invisible with client side processing

A

Code is visible which means it can be
copied

18
Q

What does server side processing take away

A

the
reliance of the browser having the correct
interpreter

19
Q

Is code invisible or visible to the user with server side processing

A

It hides the code from the user,
protecting copyright and avoiding it being
amended/circumvented

20
Q

Disadvantage of server side processing

A

Server side
processing puts extra load on the server.
This is at the cost of the company hosting
the website

21
Q

When is client side processing best used

A

Client side processing is best used when
it’s not critical code that runs or where a quick response is needed

22
Q

When is server side processing best used

A

Server side processing is best used where
it is integral that processing is carried out.
It is often used for generating content

23
Q

When is server side processing often used

A

to access data including
secure data. For this reason any data
passed to it has to be checked carefully

24
Q

What do hackers get access to in relation to hash

A

The hash value which cannot be reversed to the key

25
Q

What is HTTP?

A

An application layer protocol that facilitates clients requesting information from servers. Each HTTP request by a client expects a HTTP response from the server.

26
Q

What are the Get and Post requests?

A

The two main types of HTTP request. Get requests are supposed to be harmless and repeatable and can be bookmarked. Post requests are for when a change is meant occur (e.g. create, update or destroy operations).

27
Q

What is the URL (Uniform Resource Locator)?

A

A text string that represents a destination for a HTTP (or other protocol) request.

28
Q

What is the API (Application Programmers Interface)?

A

series of functions or protocol endpoints that allow applications to access the features of another system.

29
Q

What is web api

A

modern approach to server side processing. Web APIs send unformatted data to the client on demand and the client decides how to render it.

30
Q

What is client side processing

A

When the client generates content based on a data requested from the server. See JavaScript…

31
Q

How does javascript allow dynamic web pages

A

Modern JavaScript can execute HTTP requests without the need to reload the page. This makes it possible to create dynamic web applications

32
Q

Uses of server side processing on the web

A

Accessing a database
Security and authentication
Search engines
Cloud services
Hosting APIs (see later slides)

33
Q

Uses of server side processing elsewhere

A

Traditional file storage (e.g. a NAS)
Infrastructure (for LANs and WANs)
Virtual machines for thin clients

34
Q

Advantages of server side processing

A

Can access secure data and control what the client sees.
Should be far more secure against code manipulation.
The server is probably more powerful than the client so can potentially tackle heavy workloads in less time.

35
Q

Uses of Client side on web side?

A

Interactivity without page reloads
Validation rules
Animations, games, etc.
Responsive design
Any ‘offline’ abilities

36
Q
A
37
Q
A

Traditional desktop apps
Any processing in mobile apps
Video games (apart from Stadia!)