Internet principles of operation Flashcards

Syllabus: 1.2.3

1
Q

Define

network

A

A computer network is a number of computers linked together and able to communicate using certain protocols. Networked computers can share resources including hardware, software and data.

Most computer networks have at least one server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some advantages of using networks

A

Advantages:

  • Easy, efficient communication by emails, instant messaging, telephony, video conferencing, chat rooms, etc.
  • Ability to share files, data and information (beneficial for large organizations to organise data and allow certain people access to data)
  • Saves costs by sharing hardware (e.g. printer) and software (site licences are likely to be cheaper than buying several standalone licences)
  • Sensitive files and programs on a network can be password protected.
  • Rapid sharing and transferring of files, saves time while maintaining the integrity of files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some disadvantages of using networks

A

Disadvantages:

  • Possibility of breakdowns and loss of resources
  • Expensive to build
  • Managing a large network is complicated, requires training and a network manager usually needs to be employed
  • Viruses can spread to other computers in the network
  • Danger of hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, e.g. a firewall.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define

protocol

A

Pre-agreed signals, codes and rules that are used between two or more computer systems to exchange data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define

internet

A

The internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.

The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define

web browser

A

A piece of software used to view and download web pages and various types of files such as text, graphics, sound and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the typical functions offered by web browers

A
  • —Displaying web pages
  • —Browsing back and forward between web pages
  • —Customisation of basic options such as your homepage, content censorship and security preferences
  • —Bookmarking
  • —History
  • —Offline browsing
  • —Downloading
  • —Search engines
  • —E-mail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define

server

A

A combination of computer and software that provides a service to other client computers or application programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Internet server?

A

This is a computer with specific web server software that provides clients with access to web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define

client

A

—Client devices send requests for services, e.g. printing or retrieval of data to specific server devices that perform the requested processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Internet Service Provider (ISP)?

A

A company that provides you with access to the Internet, usually for a fee. The most common ways to connect to an ISP are by using a phone line (dial-up) or broadband connection (cable or DSL).

Examples : STC, Mobily, Zain, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is http?

A

Hypertext transfer protocol (http) is the underlying protocol used by the World Wide Web which defines (1) how messages are formatted and transmitted, and (2) what actions Web servers and browsers should take in response to various commands.

For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is https?

A

Hypertext transfer protocol over secure (https) is a secure method of accessing or sending information across a web page. All data is encrypted before it is sent, preventing anyone from understanding that information if intercepted.

Because data is encrypted over https, it is slower than http, which is why https is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is HTML?

A

HyperText Markup Language (HTML) is the markup language used in creating web pages on the World Wide Web.

A document Markup Language is a modern system for annotating a document in a way that is clearly distinguishable from the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distinguish between HTML structure and presentation

A

Structure consists of the mandatory parts of an HTML document plus the semantic and structured markup of its contents.

Presentation is the style you give the content. In most cases presentation is about the way a document looks, but it can also affect how a document sounds – not everybody uses a graphical web browser.

Separate structure from presentation as much as possible. Ideally you should end up with an HTML document which contains the structure and content, and a separate CSS file which contains everything that controls presentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TCP/IP?

A
  • —IP: internet protocol
  • TCP: transmission control protocol, it performs handshakes, packet sequencing, flow control and error handling
  • —Extremely popular protocol on which the internet is based
  • —Data is broken up into independent small packets
  • —Size of the packet is up to the network designer (typically they start from 512 bits upwards)
17
Q

What is an IP address and why is it used?

A
  • An Internet Protocol (IP) address is a unique identifier for computers on the internet
  • —Each device that is part of a network using TCP/IP (normally internet) has to have an address to be able to identify itself and be allowed to use the network.

Static IP addresses are fixed, dynamic addresses change frequently.

18
Q

What are the two forms of IP address and how do they differ?

A

IPv4:

  • —Uses 32-bit addresses
  • There are not enough addresses for all computers on the internet, as some addresses are reserved for certain purposes or for certain companies

IPv6:

  • Uses 128-bit addresses
  • Solution to the problem of not having enough addresses
19
Q

What is the format of an IPv4 address?

A
  • —Four numbers separated by periods (in the form w.x.y.z.)
  • —Each number is an 8-bit binary number between 0 and 255, making up a 32-bit address
  • —Each number group in the address sub-divides the network to which the computer is connected with the final number being the actual computer.
20
Q

What is a MAC address?

A
  • —Stands for Media Access Control
  • —Also known as a hardware address or physical address
  • —Uniquely identifies each node of a network (A node is a processing location – a network adapter or any device with built-in network capability)
  • While an IP address can potentially be assigned to any device, a MAC address is ‘burned into’ a given device from the factory – it is hard-coded into the network interface card (NIC) by the manufacturer
21
Q

How are MAC addresses used?

A
  • —Uniquely identifies an adapter on a LAN
  • —Allow communication between devices on a local network by making it possible to reliably distinguish one computer from another
  • —Increase security as cannot be impersonated
  • If you set up a WiFi one of the things you can do to improve security is to only allow devices with certain MAC addresses to connect to the network.
  • When a data packet is being sent out to a station that is on the same network LAN segment, only the MAC address is needed.
22
Q

What is the format of a MAC address?

A

—Six pairs of hexadecimal digits (48 bits in length), usually separated by colons or dashes

23
Q

What are cookies and why are they used?

A

A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.

They are used:

  • to enable logon information to be kept on the computer
  • to provide customised pages the next time the user logs on, e.g. customised adverts
  • to implement shopping carts and one-click purchasing
  • to be able to distinguish between new and repeat visitors to the website