matric networking Flashcards

1
Q

centralised networks

A

single server responsible for some/all of processing
server used for applications, data storage, facilities
less powerful work stations connect to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

decentralised networks

A

workload distributed among several machines instead of relying on single sever
desktops + laptops
Extra power is used for distributed processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

distributed processing

A

computer systems that utilise more than 1 computer to run a single application
detect idle CPUs on the network in a locate programs to utilise them.
Includes parallel processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

thin clients

A

desktop terminal w no hard drive
all features stored on desktop pc stored in server
used as PC replacements to provide cost effective way to create network
benefits: cost (inexpensive) , security, manageability, scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

fat clients

A

networked computer where required software is stored locally, minimal dependence on network resources
preferred over thin clients- computers can be customised + configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

smart clients

A

data stored remotely on internet but use processing power + other resources of local device
eg, google applications (drive,earth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

peer to peer file sharing

A

P2P
each computer acts as a server (peer) , making communication a 2-way street

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

p2p advantages

A
  • easy, quick file sharing over large distances
  • reduced costs as no need to get separate computer for server
    -adaptability : easily include new clients
    -reliability: remain functional even if central server crashes
    -high performance: improved performance when new client joins as each client is a server and contributes resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

p2p disadvantages

A

-easy to make files sharable without realising it
-security risks
malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BitTorrent

A

p2p protocol
multiple peers downloading and uploading same torrent (swarm) transfer data between each other w/o need for central server
larger files split up into smaller parts to increase speed
once peer has the complete file- it becomes a seed which can be used by other peers ( more seeds- faster peers can download+ share files)
-BitTorrent tracker - server assists in communication between peers - records which peer machines have file copies + peers accessible at time of request and helps co-ordinate efficient transmission + reassembly of file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

remote access

A

ability to access a device from a remote location
only works if host computer is powered on, connected to internet and running sharing software
computer at risk of malware, data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A

virtual private network
connects remote users to a private internal network using internet
protection - device on vpn becomes invisible to rest of internet users
anonymity -vpn replaces devices ip address w ip address of device providing vpn
censorship- country, bypass restrictions
remote access of network resources , reduced costs
risks: vpn service can track what you do on web while using, leaks can occur if poorly configured encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT

A

-internet of things
system of related computing devices, digital machines, objects + people with unique identifiers and ability to transfer data without human interaction
devices - SoC devices (System on Chip)
devices can have identification chip, built in sensors
thing - object that can be assigned IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advantages of IoT

A

cost saving, saved time, improved quality-of-life, increased productivity, efficiency, automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of IoT

A

replaced many jobs
challenging to manage large no. of devices connected
hacking
difficult for devices from different manufacturers to to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

surface web

A

surface web: part of web indexed by search engines + searchable w standard web search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

surface web

A

part of web indexed by search engines + searchable w standard web search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

deep web

A

non indexed pages so cannot be accessed by search engine
anything behind pay-wall or that requires sign in credentials
medical records, fee-based content, corporate web pages

19
Q

dark web

A

not indexed by search engines
only accessible w special web browser, users mask IP addresses
illegal activity

20
Q

onion router

A

provides anonymous communication over computer network
messages surrounded in layers of encryption
makes web browsing safer and more secure
indirect connection- message hops from 1 server to another- reaches intended server through multiple nodes

21
Q

Tor

A

open source software project to provide anonymous communication over internet
consists of many relay nodes that voluntarily implement onion routing protocol (multiple layers of encryption to hide origin of networks requests)

22
Q

GPS

A

global positioning system
satellite based navigation system made up of at least 24 satellites
works in any conditions all the time

23
Q

LBS

A

Location based services
use geographical position of device to provide contextual information (eg nearest atm)
uses GPS technology or cell towers to track user’s location
store locators, proximity based marketing, travel info, road assistance, social networking, mobile workforce management, fraud prevention

24
Q

cloud backup

A

sending a copy of stored data to an off-site location using internet connection

25
Q

types of cloud storage

A

personal - on-premises storage device allows users to store personal data
Private - company owned-on premises storage servers allows users to store company data
Public - storage available to users from third party companies as a service (Google Drive, Apple, iCloud dropbox, Microsoft OneDrive )

26
Q

advantages cloud storage

A

cost- do not need to purchase expensive infrastructure for storing data
access- anywhere w internet connectivity
save storage space on device
synchronisation of data between devices
easy sharing of large data files
data redundancy
cloud storage companies have advanced security features
only pay for what you use- auto-scaling

27
Q

disadvantages

A

requires internet connection
not all cloud storage is secure
slow uploading and downloading- internet bandwidth and cloud storage limited compared to local device

28
Q

microsoft 365

A

allows users to access remotely shared files + share info in an easy manner
paid
installed online
more features
cant scan emails or documents
ideal for businesses
offers offline editing, desktop versions

29
Q

google g-suite

A

cloud based simpler, cheaper alternative to microsoft 365
less complexity + functionality - basic functions
no desktop version
scans emails + files to collect data - personalised ads
docs,sheets + slides can be enabled for offline use
ideal for small businesses, basic work, reliable internet connection

30
Q

subscription licenses

A

month to month or annual fees

31
Q

pay as you go licenses

A

Pay only for specific services that you use

32
Q

pay-as-you-go licenses

A

Pay only for specific services that you use

33
Q

pay-as-you-go licenses

A

Pay only for specific services that you use

34
Q

pay-by-instance licenses

A

once off payment
only pay for what you need

35
Q

educational licenses

A

Services free to those within school domain

36
Q

digital signature

A

user can sign doc by encrypting data w their private key
if doc can be decrypted w matching public key- doc can be proved to be sent by user

37
Q

ssl

A

secure socket layer
deprecated cryptographic protocol to manage security when transmitting data over internet
all ssl certificates replaced by TLS (transport layer security ) certificates - more advanced + secure - standard encryption technology

38
Q

digital certificate

A

ssl/tls certificate
data file issued by certificate authority (CA) to organisation to prove its identity
cryptographically binds entity’s public key to specific attributes relating to its identity

39
Q

public key infrastructure

A

pki
relies on use of 2 related public + private keys to manage identity and security in internet communications
-trusted CA to issue digital certificates
-policies to govern pki
-digital certificates
-apps to use pki to facilitate encrypted connection

40
Q

ssl communication

A

begins w handshake before data is transferred
uses asymmetric cryptography for clients browser to verify web server, get public key + establish secure connection before transfer of data
actual data transfer uses symmetric cryptography- more efficient

41
Q

digital currency

A

only exist in digital electronic form
payments quick, inexpensive and without unnecessary intermediaries
needs internet supported device

42
Q

blockchain

A

decentralised, distributed public, trustworthy , transparent digital ledger to provide quick and securely transfer of ownership of valuable items by means of public key encryption + encryption
shared database
p2p - no central authorities control it
distributed- spread over entire network- impossible to change data
cryptographically secured- digital signatures
distributed consensus-

43
Q

search engine optimisation

A

seo
combination of strategies to increase amount of visitors to a website by obtaining high ranking in search engine page results (serp)

44
Q

hardware failure

A