Communication and Internet technologies Flashcards

1
Q

BitTorrent

A

a peer-to-peer protocol used to transfer and share large files across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User Rights

A

rules about what a user is allowed to do with files but an administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does BitTorrent work?

A
  • install software
  • Link it into a folder it is going to transfer files from
  • list of contents of folder sent to BitTorrent server
  • doesn’t actually contain a file but a list of where to download it
  • ‘seeders’ share file
  • more seeders faster download
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Benefits of BitTorrent’s

A
  • reduces cost to host
  • forces equality through sharing
  • usually free
  • effective uses of download bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks of BitTorrent’s

A
  • little protection against malware
  • legal only if you have a license
  • you are not anonymous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

online storage

A

Storage space is available on a server-connected storage medium accessed via the internet, requiring login credentials for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TWO advantages of installing a wireless network.

A
  • No cables used
  • Cost saving
  • Easy to setup/connect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TWO reasons why a peer-to-peer network is less suitable for a
company with many users.

A
  • Difficult to manage a large number of computers
  • More prone to the spread of malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

role of a server

A
  • A server provides resources (software, storage, etc.)
  • Serves as a log-on controller
  • Manages security settings on a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a switch and name a advantage and disadvantage

A

Switch = used to connect computers in a network to a central location for communication
Disadvantage = When a switch fails, all the computers connected to the switch will not be able to access the network
Advantage = They increase the available bandwidth of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIC

A

network interface controller
= allows communication wirelessly or via a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADSL

A
  • permanent connection via telephone line
  • can be used for small and large networks
  • different bandwidth specifications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP/HTTPS

A
  • defines how web pages and their content are transferred across the web
  • secure communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Archiving

A

store non-changeable files onto a secondary system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disk defragmentation

A

reorganise part of files to speed up your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GIGO

A

Garbage in Garbage out
quality of output is directly related to the quality of the input

17
Q

SEO

A

Search engine optimization
To ensure high ranking in search results/increase the amount of
traffic on a website  by changing the design of webpages.

18
Q

File sharing

A

need to send a link so they can access it
gets around file size limitations.

19
Q

file syncing

A

Choose a folder that is linked to your server and as you edit it the software makes changes on the online one
- access even when offline
- Always have the latest file
- copied to cloud service automatically

20
Q

VPN

A

Virtual private network
creates a secure encrypted connection between your computer and a target network.

21
Q

Encryption

A

the scrambling of text or data using a specific set of rules to ensure privacy of data

22
Q

local encryption

A

protection of local files from unauthorized access and malware

23
Q

automatic encryption

A

built into various hardware and software devices .. without the user’s awareness like ATM transactions, etc

24
Q

SSL

A

secure sockets layer
- encrypts data that is sent over the internet using public key encryption

25
Q

Public key encryption

A

mathematical algorithms
2 separate keys. public plain text
private keys decrypt

26
Q

sematic search

A

where the semantic web allows computers to intelligently search though metadata

27
Q

Internet of things

A

the concept that more devices are being connected to the internet and are able to communicate

28
Q

Mediated Search

A

managed by humans rather than algorithms. fewer more useful results

29
Q

how would a sematic search work

A

A search will take place using the metadata of the relevant
content on the internet and will relate it to the user’s contextual
information to present a search result uniquely suited to the
user.

30
Q

AJAX

A

asynchronous JavaScript and XML
combines Java with a browser to download data without refreshing the page

31
Q

CSS

A

Cascading Style Sheets (CSS) separates the formatting of HTML and consolidates it in a single .css file. This allows for easy modification of website formatting by simply updating the CSS file, which will automatically update all web pages.