Finals Flashcards
Backup policies
Predefined, set schedule whereby information is copied to disk and/or tape to ensure data recoverability in the event of accidental deletion, corrupted info or some kind of system outage
Database index
Data structure that improves the speed of data retrieval operations on a database table at the cost additional writing and storage space to maintain the index data structure
Database administrators
Use specialised software that store and organise data.
Their roles may include:
- capacity planning
- installation
- configuration
- database design
- migration
- performance monitoring
- security
- troubleshooting
- backup and data recovery
Advantages of installing SQL on the database
High speed:
the user can quickly retrieve large amounts of records from the database
No coding needed:
It is easy to manage the database system and doesn’t require alot of code
Portability:
Can be used in laptops, PCs, servers and some mobile phones
Principles of good database management
- Outline business goals
- Focus on data quality
- Reduce duplicate data
- Ensure data is readily accessible
- Priorities data protection and security
Full backup
Complete type of of backup where at least one additional copy of all selected data and files that an organisation wishes to protect is done in a single backup operation
Incremental backup
The first backup is full backup but the rest will only store changes to files and data that have changed since the previous backup
types of CSS
- Inline CSS
- Internal CSS
- External CSS
<object>
</object>
- Defines an embedded object within an HTML
- Can also be used to embed another webpage into an HTML document
<style>
</style>- Used to define style info for an HTML document
- Inside the element you specify how HTML elements should render in a browser
<select></select>
used to create a drop down list
Stages of the web site development process
Gather Information:
This is to get a clear understanding of future website purposes, the main goals one wishes to achieve and the target audience of the site
Planning:
Developer creates the data that will allow a customer to judge what the entire site will look like
Design:
All visual content is created
Content writing and assembly:
put in writing the essence of what one would like to communicate and add calls to action
Coding:
One can start creating the actual website
Factors that make a poor website
A website that does not tell user what a company does and why they should choose it
A website that is not mobile friendly
If the website takes more than 3 seconds to load
The font size is too small and are not user friendly
Importance of storyboarding
makes the design process easier and more efficient
helps you visualise the result of the project
How to improve security of a private wireless network
Change the name of the default home network. This will make it harder for hackers to know what type of router you are using
Ensure that you have a strong and unique password
Activate network encryption
Turn off your WIFI when you’re not at home, so that hackers cannot try to access it while you’re away
Change your WIFIs default IP address
Instrusion detection system
System that monitors network traffic for suspicious activity and alerts when such activity is discovered
Intrusion prevention system
System that monitors a network for malicious activities such as security threats or policy violations
VPN
private network that encrypts and transmits data while it travels from one place to another on the internet
Anti virus software programs
Bitdefender Antivirus
Norton Antivirus
Avast Antivirus
Home directory
- the directory or folder given to a user on a network or Unix or Linux varient operating system
- this directory is where the user stors all their personal info and files and login scripts and user info
Virtual directory
- path within a website that refers users to another directory where the data is hosted
- also used if the admin wants to publish from these directories in addition to the home directory
Star topology
topology for LAN where all nodes are individually connected to a central connection point, like a hub or switch
Bus topology
network setup where each computer and network device is connected to a single cable or backbone
Ring topology
network configuration in which device connections create a circular path
each network device is connected to two other
Forward lookup zone
DNS zone in which host name to IP address relations are stored
When a computer asks the IP address of a specific host name, the forward lookup zone is checked and the desired result is returned
Proxy server
verifies and forwards incoming client requests to other servers for further info
the proxy server’s most important role is providing security
DNS
translates domain names into IP addresses that computers can understand
also provides a list of mail servers which accepts emails for each domain name
Apache server
an open source amd free wen server software that powers around half of websites around the world
allows website owners to serve content on the web
Domain controller
A domain is a security system used to authenticate users on a network. All users on the network connection sign up to the domain controller, using their user account and password
Password history policy
will set how often an old password can be reused
it should be implemented with a minimum of 10 previous password remembered
Password complexity policy
Passwords may not contain the username or parts of the user’s full name
passwords must include at least three of four character types: Lowercase, Uppercase, numbers and symbols
Log in attempts
creates a condition where a user must wait a period before making additional login attempts
prevents random computer generated login attempts that occur many times a second
Password age policy
determines the period that a password can be used before the system requires the user to change it
Purpose of a server
Computer that provides client computers or workstations with shared resources.
The main purpose of a server is to support and most servers are dedicated servers and fulfill only one function
Advantages of using a DBMS
- Increased end user productivity
- Better data integration
- Improved data access
- Improved data sharing
- Improved data security
One to one relationship
a row in one table can only relate to one row in the table on the other side of their relationship and vice versa
One to many
one record in a table can be associated with one or more records in another table
Many to many
refers to a relationship between tables in database when a parent row in one table contains several child rows in the second table and vice versa
Display the employee’s name and company name
SELECT Employee.Name, Company.Company_Name
FROM Employee,Company
WHERE Employee.Emp_No = Company.Emp__No;
Display the employee’s name and company name and salary of all employess whole salary > 100000
SELECT Employee.Name, Employee.Emp_City,
Company.Company_name, Company.Salary
FROM Employee.Company
WHERE Company.Salary > 100000;
SQL code for full backup
Backup database Future_Bank
To disk - ‘C:\future_bank’;
Aspects that should be considered during the planning phase of a website
Simplicity:
putting too many elements on the page usually distracts visitors from the main purpose of the page
Consistency:
Plan everything like the fonts, colour, button, text etc
Mobile compatibility:
Make sure your website can work well on mobile phone and tablets
Easy loading:
Make sure the website doesnt take too long to load
Audience:
The website must be designed to attract the target audience
Text and images;
These keep the users interested and help with navigation
Steps involved in the development of a website
- conceptualization
- analysis
- design
- production
- testing
- launch
- maintenance
- evaluation
elements that included in the Header Section
- brand
- logo
- title
elements that included in the Footer Section
- copyright
- creation date
- revision date
Navigation tools on websites
- drop down menu
- left navigational columns
HTML for checkbox form
<!DOCTYPE html>
<html>
<body>
<h1>Show checkboxes:</h1>
<form>
<input></input> I have a HouseA<br></br>
<input></input> I have a HouseB<br></br>
<input></input> I have a HouseC<br></br><br></br>
<input></input>
</form>
</body>
</html>
HTML for radio button form
</html>
<!DOCTYPE html>
<html>
<body>
<form> <p>Please select your age:</p>
<input></input>0-30<br></br>✓ <input></input> 31 - 60<br></br> <input></input> 61-100<br></br> <input></input>
</form>
</body>
</html>
HTML code for form
<!DOCTYPE html>
<html>
<body>
<h2>HTML Forms</h2>
<form>
First name:<br></br>
<input></input>
<br></br>
Last name:<br></br>
<input></input>< <br></br><br></br>
<input></input><
</form>
</body>
</html>
More HTML Code
<!DOCTYPE html>
<html>
<body>
<form><
Email: <input></input><br></br> Password: <input></input><br></br><
<input></input>
</form>
</body>
</html>
<!DOCTYPE html>
used to inform a website visitor’s browser that the document being rendered is an HTML document.
Disadvantages of using frames
- A user is unable to bookmark any of the web pages viewed within a frame.
- Frames can make the production of a website complicated
- The use of too many frames can put a high workload on the server
Two type of image compression
Lossy compression
Lossless compression
Lossy compression
Refers to making the file size smaller by removing unnecessary bits of information
Lossless compression
Refers to compression that uses more memory because it does not change the image
Important guidelines for securing a new web server
- Disable FTP service if it is not being used
- Delete default data/scripts
- Update permissions/ownership of files
- Disable windows guest account
- Administrator account should have a strong password
Controlled detour attack
A controlled detour attack is also called a routing detour attack, it happens when the attacker intercepts the message that travels between the user and the web server and redirects it without the user or web server knowing about it
Disadvantages of using an open source Operating system
There is no extensive support in general available for open source software
There is a lack of extensive technical support.
It is developed by numerous people so there is no clear idea of who can be held liable If the program doesn’t function properly or causes damage to hardware.
When you should use a digital certificate
- To secure communication between your website and your customer’s internet browser.
- To secure email communications sent to and from your network (or private email address).
- To secure information between servers (both internal and external).
Brute force attack
A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
Four layers in web browser
Application layer:
Programs on your computer communicate directly with the application layer
Transport layer:
splits the data it receives into smaller pieces of information (called
packets), which can be sent over the internet
Internet Protocol layer:
adds the address of the computer where the information is
coming from as well as the computer to which the information is going
Network interface layer:
receives packets over the internet and sends them to their
destination. To do this, it uses the information stored in the packet as well as the information
that other computers on the network send to it
List and describe the function of six network devices
a network adapter:
is a piece of hardware that is added to a computer, allowing it to be
connected to a network
network cables
used to connect a computer to a network or one network to another network
An Ethernet hub
is a device that allows you to connect multiple computers to the same
network.
switch
sends the information to the correct computer
router
can assign IP addresses, block certain kinds of traffic, control how much
bandwidth any computer can use and complete many other useful network related tasks
A modem
used to connect you to the internet
TCP/IP specifies how data should be
formatted
addressed
transmitted
routed
received
List and describe the characteristics of a database
self-contained:
databases are considered self-contained because they not only contain the
data, they also contain information about the data
data independence: independence means that the data is independent of the applications
using the data. This means that the applications accessing the data cannot make changes to
either the data or the structure in which the data is stored.
data abstraction:
with data abstraction, databases hide the complexity of the database
from the final user. This means that the user does not have to see the SQL code or the
complex relationships between the data when browsing the database
multiple views:
SQL databases also allow different users to see different views of the
database
centralised control: all the data can be controlled from a central position. This means that any changes you make to the data will immediately be made to all the applications that use it
What are the six kinds of database structures?
- hierarchical database structure
- network database structure
- relational database structure
- object-oriented database structure
- distributed database structure
- non-relational database structures
List security risks.
- hardware capacity problems
- physical damage to hardware
- programming bugs in the server software
- data loss or corruption due to hardware problems
- viruses and malware