Finals Flashcards
Backup policies
Predefined, set schedule whereby information is copied to disk and/or tape to ensure data recoverability in the event of accidental deletion, corrupted info or some kind of system outage
Database index
Data structure that improves the speed of data retrieval operations on a database table at the cost additional writing and storage space to maintain the index data structure
Database administrators
Use specialised software that store and organise data.
Their roles may include:
- capacity planning
- installation
- configuration
- database design
- migration
- performance monitoring
- security
- troubleshooting
- backup and data recovery
Advantages of installing SQL on the database
High speed:
the user can quickly retrieve large amounts of records from the database
No coding needed:
It is easy to manage the database system and doesn’t require alot of code
Portability:
Can be used in laptops, PCs, servers and some mobile phones
Principles of good database management
- Outline business goals
- Focus on data quality
- Reduce duplicate data
- Ensure data is readily accessible
- Priorities data protection and security
Full backup
Complete type of of backup where at least one additional copy of all selected data and files that an organisation wishes to protect is done in a single backup operation
Incremental backup
The first backup is full backup but the rest will only store changes to files and data that have changed since the previous backup
types of CSS
- Inline CSS
- Internal CSS
- External CSS
<object>
</object>
- Defines an embedded object within an HTML
- Can also be used to embed another webpage into an HTML document
<style>
</style>- Used to define style info for an HTML document
- Inside the element you specify how HTML elements should render in a browser
<select></select>
used to create a drop down list
Stages of the web site development process
Gather Information:
This is to get a clear understanding of future website purposes, the main goals one wishes to achieve and the target audience of the site
Planning:
Developer creates the data that will allow a customer to judge what the entire site will look like
Design:
All visual content is created
Content writing and assembly:
put in writing the essence of what one would like to communicate and add calls to action
Coding:
One can start creating the actual website
Factors that make a poor website
A website that does not tell user what a company does and why they should choose it
A website that is not mobile friendly
If the website takes more than 3 seconds to load
The font size is too small and are not user friendly
Importance of storyboarding
makes the design process easier and more efficient
helps you visualise the result of the project
How to improve security of a private wireless network
Change the name of the default home network. This will make it harder for hackers to know what type of router you are using
Ensure that you have a strong and unique password
Activate network encryption
Turn off your WIFI when you’re not at home, so that hackers cannot try to access it while you’re away
Change your WIFIs default IP address
Instrusion detection system
System that monitors network traffic for suspicious activity and alerts when such activity is discovered
Intrusion prevention system
System that monitors a network for malicious activities such as security threats or policy violations
VPN
private network that encrypts and transmits data while it travels from one place to another on the internet
Anti virus software programs
Bitdefender Antivirus
Norton Antivirus
Avast Antivirus
Home directory
- the directory or folder given to a user on a network or Unix or Linux varient operating system
- this directory is where the user stors all their personal info and files and login scripts and user info
Virtual directory
- path within a website that refers users to another directory where the data is hosted
- also used if the admin wants to publish from these directories in addition to the home directory
Star topology
topology for LAN where all nodes are individually connected to a central connection point, like a hub or switch
Bus topology
network setup where each computer and network device is connected to a single cable or backbone
Ring topology
network configuration in which device connections create a circular path
each network device is connected to two other
Forward lookup zone
DNS zone in which host name to IP address relations are stored
When a computer asks the IP address of a specific host name, the forward lookup zone is checked and the desired result is returned
Proxy server
verifies and forwards incoming client requests to other servers for further info
the proxy server’s most important role is providing security