matric networking Flashcards

1
Q

centralised networks

A

single server responsible for some/all of processing
server used for applications, data storage, facilities
less powerful work stations connect to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

decentralised networks

A

workload distributed among several machines instead of relying on single sever
desktops + laptops
Extra power is used for distributed processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

distributed processing

A

computer systems that utilise more than 1 computer to run a single application
detect idle CPUs on the network in a locate programs to utilise them.
Includes parallel processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

thin clients

A

desktop terminal w no hard drive
all features typically stored on desktop pc are stored in server
used as PC replacements to provide cost effective way to create network
benefits: cost (inexpensive) , security, manageability, scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

fat clients

A

networked computer where required software is stored locally, minimal dependence on network resources
preferred over thin clients- computers can be customised + configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

smart clients

A

data stored remotely on internet but use processing power + other resources of local device
eg, google applications (drive,earth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

peer to peer file sharing

A

P2P
each computer acts as a server (peer) , making communication a 2-way street

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

p2p advantages

A
  • easy, quick file sharing over large distances
  • reduced costs as no need to get separate computer for server
    -adaptability : easily include new clients
    -reliability: remain functional even if central server crashes
    -high performance: improved performance when new client joins as each client is a server and contributes resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

p2p disadvantages

A

-easy to make files sharable without realising it
-security risks
malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BitTorrent

A

p2p protocol
multiple peers downloading and uploading same torrent (swarm)
transfer data between each other w/o need for central server
larger files split up into smaller parts to increase speed
once peer has the complete file- it becomes a seed which can be used by other peers ( more seeds- faster peers can download+ share files)
-BitTorrent tracker - server assists in communication between peers - records which peer machines have file copies + peers accessible at time of request and helps co-ordinate efficient transmission + reassembly of file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

remote access

A

ability to access a device from a remote location
only works if host computer is powered on, connected to internet and running sharing software
computer at risk of malware, data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A

virtual private network
connects remote users to a private internal network using internet
protection - device on vpn becomes invisible to rest of internet users
anonymity -vpn replaces devices ip address w ip address of device providing vpn
censorship- country, bypass restrictions
remote access of network resources , reduced costs
risks: vpn service can track what you do on web while using, leaks can occur if poorly configured encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT

A

-internet of things
system of related computing devices, digital machines, objects + people with unique identifiers and ability to transfer data without human interaction
devices - SoC devices (System on Chip)
devices can have identification chip, built in sensors
thing - object that can be assigned IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advantages of IoT

A

cost saving, saved time, improved quality-of-life, increased productivity, efficiency, automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of IoT

A

replaced many jobs
challenging to manage large no. of devices connected
hacking
difficult for devices from different manufacturers to to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

surface web

A

part of web indexed by search engines + searchable w standard web search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

deep web

A

non indexed pages so cannot be accessed by search engine
anything behind pay-wall or that requires sign in credentials
medical records, fee-based content, corporate web pages

18
Q

dark web

A

not indexed by search engines
only accessible w special web browser, users mask IP addresses
illegal activity

19
Q

onion router

A

provides anonymous communication over computer network
messages surrounded in layers of encryption
makes web browsing safer and more secure
indirect connection- message hops from 1 server to another- reaches intended server through multiple nodes

20
Q

Tor

A

open source software project to provide anonymous communication over internet
consists of many relay nodes that voluntarily implement onion routing protocol (multiple layers of encryption to hide origin of networks requests)

21
Q

GPS

A

global positioning system
satellite based navigation system made up of at least 24 satellites
works in any conditions all the time

22
Q

LBS

A

Location based services
use geographical position of device to provide contextual information (eg nearest atm)
uses GPS technology or cell towers to track user’s location
store locators, proximity based marketing, travel info, road assistance, social networking, mobile workforce management, fraud prevention

23
Q

cloud backup

A

sending a copy of stored data to an off-site location using internet connection

24
Q

types of cloud storage

A

personal - on-premises storage device allows users to store personal data
Private - company owned-on premises storage servers allows users to store company data
Public - storage available to users from third party companies as a service (Google Drive, Apple, iCloud dropbox, Microsoft OneDrive )

25
Q

advantages cloud storage

A

cost- do not need to purchase expensive infrastructure for storing data
access- anywhere w internet connectivity
save storage space on device
synchronisation of data between devices
easy sharing of large data files
data redundancy
cloud storage companies have advanced security features
only pay for what you use- auto-scaling

26
Q

disadvantages of cloud storage

A

requires internet connection
not all cloud storage is secure
slow uploading and downloading- internet bandwidth and cloud storage limited compared to local device

27
Q

microsoft 365

A

allows users to access remotely shared files + share info in an easy manner
paid
installed online
more features
cant scan emails or documents
ideal for businesses
offers offline editing, desktop versions

28
Q

google g-suite

A

cloud based simpler, cheaper alternative to microsoft 365
less complexity + functionality - basic functions
no desktop version
scans emails + files to collect data - personalised ads
docs,sheets + slides can be enabled for offline use
ideal for small businesses, basic work, reliable internet connection

29
Q

subscription licenses

A

month to month or annual fees

30
Q

pay as you go licenses

A

Pay only for specific services that you use

31
Q

pay-as-you-go licenses

A

Pay only for specific services that you use

32
Q

pay-as-you-go licenses

A

Pay only for specific services that you use

33
Q

pay-by-instance licenses

A

once off payment
only pay for what you need

34
Q

educational licenses

A

Services free to those within school domain

35
Q

digital signature

A

user can sign doc by encrypting data w their private key
if doc can be decrypted w matching public key- doc can be proved to be sent by user

36
Q

ssl

A

secure socket layer
cryptographic protocol to manage security when transmitting data over internet
all ssl certificates replaced by TLS (transport layer security ) certificates - more advanced + secure - standard encryption technology

37
Q

digital certificate

A

ssl/tls certificate
data file issued by certificate authority (CA) to organisation to prove its identity
cryptographically binds entity’s public key to specific attributes relating to its identity

38
Q

public key infrastructure

A

pki
set of hardware + software, policies + processes required to use + revoke digital certificates + public keys
relies on use of 2 related public + private keys to manage identity and security in internet communications
-trusted CA to issue digital certificates
-policies to govern pki
-digital certificates
-apps to use pki to facilitate encrypted connection

39
Q

ssl communication

A

established though a handshake (a series of communications exchanges) between the client and the server.

A client attempts to connect to a website secured with SSL. Client requests that the web server identify itself.
Server sends back an encrypted public key.
Client checks to see whether or not it trusts the SSL certificate. If so, it sends an encrypted key back to web server.
Server decrypts key + delivers encrypted content w key to the client
Client decrypts content, completing the handshake

40
Q

digital currency

A

only exist in digital electronic form
payments quick, inexpensive and without unnecessary intermediaries
needs internet supported device

41
Q

blockchain

A

decentralised, distributed public, trustworthy , transparent
ledger of decentralized data that is securely shared. Blockchain technology enables a collective group of select participants to share data
digital ledger to provide quick and secure transfer of ownership of valuable items by means of public key encryption
shared database
p2p - no central authorities control it
distributed- spread over entire network- impossible to change data
cryptographically secured- digital signatures
distributed consensus-

42
Q

search engine optimisation

A

seo
combination of strategies to increase amount of visitors to a website by obtaining high ranking in search engine page results (serp)