Finals Flashcards

1
Q

Backup policies

A

Predefined, set schedule whereby information is copied to disk and/or tape to ensure data recoverability in the event of accidental deletion, corrupted info or some kind of system outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Database index

A

Data structure that improves the speed of data retrieval operations on a database table at the cost additional writing and storage space to maintain the index data structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database administrators

A

Use specialised software that store and organise data.

Their roles may include:
- capacity planning
- installation
- configuration
- database design
- migration
- performance monitoring
- security
- troubleshooting
- backup and data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages of installing SQL on the database

A

High speed:
the user can quickly retrieve large amounts of records from the database

No coding needed:
It is easy to manage the database system and doesn’t require alot of code

Portability:
Can be used in laptops, PCs, servers and some mobile phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Principles of good database management

A
  • Outline business goals
  • Focus on data quality
  • Reduce duplicate data
  • Ensure data is readily accessible
  • Priorities data protection and security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Full backup

A

Complete type of of backup where at least one additional copy of all selected data and files that an organisation wishes to protect is done in a single backup operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incremental backup

A

The first backup is full backup but the rest will only store changes to files and data that have changed since the previous backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

types of CSS

A
  • Inline CSS
  • Internal CSS
  • External CSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

<object>
</object>

A
  • Defines an embedded object within an HTML
  • Can also be used to embed another webpage into an HTML document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<style>

</style>
A
  • Used to define style info for an HTML document
  • Inside the element you specify how HTML elements should render in a browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<select></select>

A

used to create a drop down list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stages of the web site development process

A

Gather Information:
This is to get a clear understanding of future website purposes, the main goals one wishes to achieve and the target audience of the site

Planning:
Developer creates the data that will allow a customer to judge what the entire site will look like

Design:
All visual content is created

Content writing and assembly:
put in writing the essence of what one would like to communicate and add calls to action

Coding:
One can start creating the actual website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Factors that make a poor website

A

A website that does not tell user what a company does and why they should choose it

A website that is not mobile friendly

If the website takes more than 3 seconds to load

The font size is too small and are not user friendly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Importance of storyboarding

A

makes the design process easier and more efficient
helps you visualise the result of the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to improve security of a private wireless network

A

Change the name of the default home network. This will make it harder for hackers to know what type of router you are using

Ensure that you have a strong and unique password

Activate network encryption

Turn off your WIFI when you’re not at home, so that hackers cannot try to access it while you’re away

Change your WIFIs default IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Instrusion detection system

A

System that monitors network traffic for suspicious activity and alerts when such activity is discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intrusion prevention system

A

System that monitors a network for malicious activities such as security threats or policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VPN

A

private network that encrypts and transmits data while it travels from one place to another on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anti virus software programs

A

Bitdefender Antivirus
Norton Antivirus
Avast Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Home directory

A
  • the directory or folder given to a user on a network or Unix or Linux varient operating system
  • this directory is where the user stors all their personal info and files and login scripts and user info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virtual directory

A
  • path within a website that refers users to another directory where the data is hosted
  • also used if the admin wants to publish from these directories in addition to the home directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Star topology

A

topology for LAN where all nodes are individually connected to a central connection point, like a hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bus topology

A

network setup where each computer and network device is connected to a single cable or backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ring topology

A

network configuration in which device connections create a circular path
each network device is connected to two other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Forward lookup zone

A

DNS zone in which host name to IP address relations are stored
When a computer asks the IP address of a specific host name, the forward lookup zone is checked and the desired result is returned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Proxy server

A

verifies and forwards incoming client requests to other servers for further info
the proxy server’s most important role is providing security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DNS

A

translates domain names into IP addresses that computers can understand
also provides a list of mail servers which accepts emails for each domain name

28
Q

Apache server

A

an open source amd free wen server software that powers around half of websites around the world
allows website owners to serve content on the web

29
Q

Domain controller

A

A domain is a security system used to authenticate users on a network. All users on the network connection sign up to the domain controller, using their user account and password

30
Q

Password history policy

A

will set how often an old password can be reused
it should be implemented with a minimum of 10 previous password remembered

31
Q

Password complexity policy

A

Passwords may not contain the username or parts of the user’s full name
passwords must include at least three of four character types: Lowercase, Uppercase, numbers and symbols

32
Q

Log in attempts

A

creates a condition where a user must wait a period before making additional login attempts
prevents random computer generated login attempts that occur many times a second

33
Q

Password age policy

A

determines the period that a password can be used before the system requires the user to change it

34
Q

Purpose of a server

A

Computer that provides client computers or workstations with shared resources.
The main purpose of a server is to support and most servers are dedicated servers and fulfill only one function

35
Q

Advantages of using a DBMS

A
  • Increased end user productivity
  • Better data integration
  • Improved data access
  • Improved data sharing
  • Improved data security
36
Q

One to one relationship

A

a row in one table can only relate to one row in the table on the other side of their relationship and vice versa

37
Q

One to many

A

one record in a table can be associated with one or more records in another table

38
Q

Many to many

A

refers to a relationship between tables in database when a parent row in one table contains several child rows in the second table and vice versa

39
Q

Display the employee’s name and company name

A

SELECT Employee.Name, Company.Company_Name
FROM Employee,Company
WHERE Employee.Emp_No = Company.Emp__No;

40
Q

Display the employee’s name and company name and salary of all employess whole salary > 100000

A

SELECT Employee.Name, Employee.Emp_City,
Company.Company_name, Company.Salary
FROM Employee.Company
WHERE Company.Salary > 100000;

41
Q

SQL code for full backup

A

Backup database Future_Bank
To disk - ‘C:\future_bank’;

42
Q

Aspects that should be considered during the planning phase of a website

A

Simplicity:
putting too many elements on the page usually distracts visitors from the main purpose of the page

Consistency:
Plan everything like the fonts, colour, button, text etc

Mobile compatibility:
Make sure your website can work well on mobile phone and tablets

Easy loading:
Make sure the website doesnt take too long to load

Audience:
The website must be designed to attract the target audience

Text and images;
These keep the users interested and help with navigation

43
Q

Steps involved in the development of a website

A
  • conceptualization
  • analysis
  • design
  • production
  • testing
  • launch
  • maintenance
  • evaluation
44
Q

elements that included in the Header Section

A
  • brand
  • logo
  • title
45
Q

elements that included in the Footer Section

A
  • copyright
  • creation date
  • revision date
46
Q

Navigation tools on websites

A
  • drop down menu
  • left navigational columns
47
Q

HTML for checkbox form

A

<!DOCTYPE html>

<html>
<body>
<h1>Show checkboxes:</h1>
<form>
<input></input> I have a HouseA<br></br>
<input></input> I have a HouseB<br></br>
<input></input> I have a HouseC<br></br><br></br>
<input></input>
</form>
</body>
</html>

48
Q

HTML for radio button form

A

</html>
<!DOCTYPE html>

<html>
<body>
<form> <p>Please select your age:</p>
<input></input>0-30<br></br>✓ <input></input> 31 - 60<br></br> <input></input> 61-100<br></br> <input></input>
</form>
</body>
</html>

49
Q

HTML code for form

A

<!DOCTYPE html>

<html>
<body>
<h2>HTML Forms</h2>
<form>
First name:<br></br>
<input></input>
<br></br>
Last name:<br></br>
<input></input>< <br></br><br></br>
<input></input><
</form>
</body>
</html>

50
Q

More HTML Code

A

<!DOCTYPE html>

<html>
<body>
<form><
Email: <input></input><br></br> Password: <input></input><br></br><
<input></input>
</form>
</body>
</html>

51
Q

<!DOCTYPE html>

A

used to inform a website visitor’s browser that the document being rendered is an HTML document.

52
Q

Disadvantages of using frames

A
  • A user is unable to bookmark any of the web pages viewed within a frame.
  • Frames can make the production of a website complicated
  • The use of too many frames can put a high workload on the server
53
Q

Two type of image compression

A

Lossy compression
Lossless compression

54
Q

Lossy compression

A

Refers to making the file size smaller by removing unnecessary bits of information

55
Q

Lossless compression

A

Refers to compression that uses more memory because it does not change the image

56
Q

Important guidelines for securing a new web server

A
  • Disable FTP service if it is not being used
  • Delete default data/scripts
  • Update permissions/ownership of files
  • Disable windows guest account
  • Administrator account should have a strong password
57
Q

Controlled detour attack

A

A controlled detour attack is also called a routing detour attack, it happens when the attacker intercepts the message that travels between the user and the web server and redirects it without the user or web server knowing about it

58
Q

Disadvantages of using an open source Operating system

A

There is no extensive support in general available for open source software
There is a lack of extensive technical support.
It is developed by numerous people so there is no clear idea of who can be held liable If the program doesn’t function properly or causes damage to hardware.

59
Q

When you should use a digital certificate

A
  • To secure communication between your website and your customer’s internet browser.
  • To secure email communications sent to and from your network (or private email address).
  • To secure information between servers (both internal and external).
60
Q

Brute force attack

A

A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).

61
Q

Four layers in web browser

A

Application layer:
Programs on your computer communicate directly with the application layer

Transport layer:
splits the data it receives into smaller pieces of information (called
packets), which can be sent over the internet

Internet Protocol layer:
adds the address of the computer where the information is
coming from as well as the computer to which the information is going

Network interface layer:
receives packets over the internet and sends them to their
destination. To do this, it uses the information stored in the packet as well as the information
that other computers on the network send to it

62
Q

List and describe the function of six network devices

A

a network adapter:
is a piece of hardware that is added to a computer, allowing it to be
connected to a network

network cables
used to connect a computer to a network or one network to another network

An Ethernet hub
is a device that allows you to connect multiple computers to the same
network.

switch
sends the information to the correct computer

router
can assign IP addresses, block certain kinds of traffic, control how much
bandwidth any computer can use and complete many other useful network related tasks

A modem
used to connect you to the internet

63
Q

TCP/IP specifies how data should be

A

formatted
addressed
transmitted
routed
received

64
Q

List and describe the characteristics of a database

A

self-contained:
databases are considered self-contained because they not only contain the
data, they also contain information about the data

data independence: independence means that the data is independent of the applications
using the data. This means that the applications accessing the data cannot make changes to
either the data or the structure in which the data is stored.

data abstraction:
with data abstraction, databases hide the complexity of the database
from the final user. This means that the user does not have to see the SQL code or the
complex relationships between the data when browsing the database

multiple views:
SQL databases also allow different users to see different views of the
database

centralised control: all the data can be controlled from a central position. This means that any changes you make to the data will immediately be made to all the applications that use it

65
Q

What are the six kinds of database structures?

A
  • hierarchical database structure
  • network database structure
  • relational database structure
  • object-oriented database structure
  • distributed database structure
  • non-relational database structures
66
Q

List security risks.

A
  • hardware capacity problems
  • physical damage to hardware
  • programming bugs in the server software
  • data loss or corruption due to hardware problems
  • viruses and malware