Internet Flashcards

1
Q

What is the internet?

A

interconnected group of computing devices that uses open protocols to standardize how information is sent and received across our planet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the relationship between servers and clients?

A

clients request information that exist on servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is defined by protocols?

A

form of the client request, and how it is sent through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a server?

A

computer connected to internet that responds to requests – machine that ‘serves’ content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What lives in server?

A

HTML (or other website info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server Example

A

canvas.ubc.ca

NO ‘WWW’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a file server?

A

machine that serves up files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ie. machine www.cs.ubc.ca lives in ICICS/CS building

A

this machine is networked with a file server, which allows different machines on cs.ubc.ca network to access same files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do most interactions over the internet use?

A

client/server interaction protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the client/server interaction protocol?

A
  • when you click web link, computers gets the page for you… beginning the client/server interaction
  • computer = client
  • computer with web page = server (web server)
  • client gets services from server
  • when the page is returned, operation is completed and client/server relationship ends
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is synchronous communication?

A

both sender and receiver are active at same time (ie. talking on telephone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is asynchronous communication?

A

sending and receiving occur at different times (ie. email, answering machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can servers handle many clients at a time?

A

yes – server is busy only for as long as it takes to perform your request

ie. between two consecutive client requests from your browser (getting page, and asking for another), that server could have serviced hundreds of other clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is data transmitted via?

A

open protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do protocols do?

A

standardize communication, so all data is sent by same rules for sending and receiving data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are open protocols?

A

protocols available for use by anyone to ensure that anyone can build systems that connect to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are two of the most important protocols?

A
  • transmission control protocol (TCP)

- internet protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP

How do packets travel?

A
  • information is divided into numbered packets
  • packets are sent over the internet by the most expedient route
  • don’t necessarily all take the same route
  • don’t necessarily arrive in sequential order
  • arranged in order after they all arrive, and reassemble
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP/IP

What information do packets hold?

A
  • one unit of information
  • destination IP
  • their sequence number (which packet they are)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP/IP

Why is each packet independent?

A

because each packet can take different route – congestion and service interruptions do not delay transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does TCP/IP protocol work under adverse conditions?

A

if traffic is heavy and pack progress is slow, protocol allows packet to be thrown away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do routers do?

A

perform traffic directing functions on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In what form is data sent through internet (such as webpage or email)?

A

data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where do packets travel?

A

forwarded from one router to another router through networks that constitute an internetwork until it reaches its destination node – routers direct the packet through the network to the server with the given IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is point-to-point routing?

A

computers send data to their neighbours, which send data to their neighbours… somehow, data gets from one computer across network to another

26
Q

How is each packet sent along a path?

A

routing algorithm

27
Q

Why is the internet fault-tolerant?

A

it is a redundant network

28
Q

Whys is the internet a redundant network?

A

there are multiple pathways among its physical connections to create redundancy

even if one pathway is unavailable, there is still another way to transmit message from sender to receiver
- software in connection points knows how to re-route data if one connection fails

29
Q

What are 3 types of addresses?

A
  • email address
  • URL
  • domain name
30
Q

What are addresses for?

A

key to performing networking tasks

31
Q

What do email addresses do?

A

identify people

32
Q

What do URLs do?

A

identify webpage

33
Q

What do domain names do?

A

identify computers?

34
Q

Do email addresses and URLs have domain names?

A

yes

35
Q

What is uniform resource locator (URL)?

A

specifies location (address) of web resource, and mechanism to retrieve it

36
Q

kemiola@cs.ubc.ca

A

user ID = kemiola

computer addressed by cs.ubc.ca will figure it out for us

cs.ubc.ca is an address designed for humans

37
Q

What is an address designed for computers?

A

IP address

38
Q

What does a transport layer do?

A

switches from human-readable domain names to machine-friendly IP addresses

39
Q

What is an internet protocol address (IP address)?

A

unique address (series of numbers and letters separated by dots) that each computer connected to internet is given

40
Q

Is IP address temporary or permanent?

A

either temporarily or permanently assigned by internet service provider (ISP)

  • old IPv4 (1983): 4 billion (109) IPv4 addresses (32 bits) – we’ve almost run out
  • new IPv6 (2017): about 1038 IPv6 addresses (128 bits) – enough addresses for every atom in every person
41
Q

What is a domain name?

A

name that identifies one or more IP addresses

42
Q

Can a server have more than one IP address attached to them?

A

yes

43
Q

What are domain name servers (DNSs)?

A

keep a directory connecting domain names to IP addresses

  • every computer connected to internet needs IP address of its ‘nearest’ DNS
  • this DNS is used to resolve, or translate, a domain name to IP address
  • DNS names need to be constantly updated
44
Q

URL = http://www.phdcomics.com/comics.php

A

protocol = http://

domain = www.phdcomics.com

file, directory, and additional information = /comics.php

45
Q

What does a URL have to begin with?

A

protocol

  • most of the time, protocol is http (hyper text transfer protocol), but it can be other things
  • https = secure hyper text transfer protocol
46
Q

How do domain names form a hierarchy?

A
  • each ‘.’ separates a different level
  • higher level = further towards end
  • read from right to left (←)
47
Q

Hierarchy – Domain Names

www.students.cs.ubc.ca

A

top-level domain is Canada (ca)

which contains UBC domain (ubc.ca)

which contains computer science department domain (cs.ubc.ca)

which contains undergrad domain (students.cs.ubc.ca)

which contains computer (www.students.cs.ubc.ca)

48
Q

File Organization

http://imgs.xkcd.com/comics/phishing_license.png

A

protocol = http://

domain = imgs.xkcd.com/

directory = comics/

file = phishing_license.png

49
Q

Hierarchy – File Paths

A
  • each ‘/’ separates different level
  • higher level = closer to front
  • read from left to right
50
Q

How can file paths end?

A

can end in ‘file type’ (after trailing period) that provide important information

51
Q

What is ‘?’ in a URL?

A

everything after ‘?’ is data needed to process the request

52
Q

What is spam?

A

unsolicited or undesired messages sent in bulk by email

53
Q

What is phishing?

A

type of social engineering where attacker sends fraudulent (‘spoofed’) message designed to trick human victim into revealing sensitive information to attacker, or to deploy malicious software on victim’s infrastructure (like ransomware)

54
Q

What is encryption?

A

taking data and changing it so that it’s hard to understand

55
Q

What are cookies?

A

store information about your web browsing

56
Q

What are first party cookies?

A

save information about you for that website

  • relevant to experience you are trying to have
    ie. that you’ve authenticated yourself, Fahrenheit vs. Celsius, language option
57
Q

What are third party cookies?

A

save information about you that is not used for that website

  • largely why we see targeted ads
58
Q

What is disinformation?

A

false information that is deliberately created and spread “in order to influence public opinion or obscure the truth”

59
Q

What are filter bubbles (echo chambers)?

A

algorithms have isolated you from info & perspectives that you haven’t already expressed an interest in

60
Q

Why are filter bubbles (echo chambers) dangerous?

A
  • don’t ask for your permission
  • don’t tell you when they’re active
  • don’t say what they’re keeping from you
61
Q

What is end to end encryption?

A

only you and the people you talk to can decrypt the message

no one else has the ability to see what you are saying

62
Q

Will your information be encrypted if you back it up to a third party?

A

no