paper 1 - laws and protocols Flashcards

1
Q

what is a protocol?

A

a set of rules for how devices communicate and how data is transmitted across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what information do protocols cover?

A

how communication between two devices should start and end, how the data should be organised, and what the devices should do if data goes missing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the three components of a data packet?

A
  1. header - contains control information - like the envelope of a letter - includes packet’s destination address (where it’s going), the source address (where it’s come from) and the packet number
  2. payload - the letter inside the envelope - the thing the person is likely to read, and the reason it was sent in the first place. might be part of an email, document, web page of streamed video.
  3. likely to include a checksum number - a form of validation used to check that the payload data hasn’t been corrupted during transit. the sending and receiving devices both calculate a checksum value by performing a function on the payload data. if the values match then the data has been received correctlly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the TCP/IP protocol do?

A

dictate how data is sent between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what two protocols is the TCP/IP protocol made up of?

A

Transmission control protocol (TCP) and Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does the transmission control protocol (TCP) do?

A

set the rules for how devices connect on the network. It’s in charge of splitting the data into packets and reassembling the packets back into the original data once they reach the receiving device. It’s also responsible for checking the data is correctly sent and delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the internet protocol (IP) responsible for?

A

packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the Hyper Text Transfer Protocol (HTTP) used for?

A

used by web browsers to access websites and communicate with web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the HTTPS protocol?

A

a more secure version of HTTP. encrypts all information sent and received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the file transfer protocol (FTP) used for?

A

used to access, edit and move files between devices on a network e.g. to access the files on a server from a client computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does POP3 stand for?

A

Post Office Protocol - version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is POP3 used for?

A

used to retrieve emails from a server. The server holds the email until you download it at which point it is deleted from the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does IMAP stand for?

A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is IMAP used for?

A

used to retrieve emails from a server. The server holds the email until you delete it - you only download a copy. Used by most web-based email clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does SMTP stand for?

A

simple mail transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is SMTP used for?

A

used to send emails. Also used to transfer emails between servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a layer?

A

a group of protocols which have similar functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the name of layer 4?

A

application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what does layer 4 do?

A

turns data into websites and other applications and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the name of layer 3?

A

transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what does layer 3 do?

A

controls data flow - e.g. splitting data into packets and checking packets are correctly sent and delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is layer 2 called?

A

network layer

23
Q

what does layer 2 do?

A

makes connections between networks, directs data packets and handles traffic. used by routers

24
Q

what is layer 1 called?

A

data link layer

25
Q

what does layer 1 do?

A

Passes data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware

26
Q

what protocols work in layer 4 (the application layer)?

A

HTTP, FTP, SMTP

27
Q

which protocols work in layer 3 (the transport layer)

A

TCP (transmission control protocol)

28
Q

what protocols work in layer 2 (the network layer)?

A

IP

29
Q

what protocols work in layer 1 (the data link layer)?

A

ethernet

30
Q

what are the advantages of using layers?

A
  • it breaks network communication into manageable pieces. This helps developers to concentrate on only one area of the network without having to worry about others
  • as layers are self-contained, they can be changed without the other layers being affected
  • having set rules for each layer forces companies to make compatible, universal hardware and software, so different brands will work with each other and in basically the same way
31
Q

what is the first principle of the data protection act?

A

data must only be used in a fair and lawful way

32
Q

what is the second principle of the data protection act?

A

data must only be used for the specified purpose

33
Q

what is the third principle of the data protection act?

A

data should be adequate, relevant and not excessive for the specified use

34
Q

what is the fourth principle of the data protection act?

A

data must be accurate and kept up-to-date

35
Q

what is the fifth principle of the data protection act?

A

data should not be kept longer than necessary

36
Q

what is the sixth principle of the data protection act?

A

the rights of the data subject must be observed

37
Q

what is the seventh principle of the data protection act?

A

data should be kept safe and secure

38
Q

what is the eighth principle of the data protection act?

A

data should not be transferred abroad without adequate protection

39
Q

what does the data protection act 1998 do?

A

it gives rights to data subjects

40
Q

what is a data subject?

A

a person whose personal data is stored on computer systems

41
Q

what does the data protection act mean for organisations?

A
  • before collecting personal data an organisation must register with the government, saying what data they’ll collect and how they’ll use it
  • the act gives data subjects the right to see the personal data an organisation holds about them
  • there are some exceptions to this, e.g. organisations don’t have to disclose the data they hold if it could affect national security, tax assessment, or the outcome of a court case
  • if a data subject feels an organisations use of their data has caused them distress, they may be entitled to compensation
42
Q

what does the Freedom of Information Act 2000 allow?

A

public access to data - it allows members of the public to access information held by a public organisation about that organisation’s activities. The Act covers information stored in computer data files (including audio and video files), emails, and printed documents

43
Q

what are some exceptions to the Freedom of Information Act 2000?

A

an organisation can withhold requested information if it is intended for future publication, or if disclosing it could affect national security or cause people harm

44
Q

what does the computer misuse act 1990 prevent?

A

illegal access to files - it was introduced to stop hacking and cyber crime

45
Q

what three new offences did the Computer Misuse Act 1990 introduce?

A
  1. Gaining unauthorised access to a private network or device, e.g. through hacking
  2. gaining unauthorised access to a network or device in order to commit a crime like stealing data or destroying the network
  3. unauthorised modification of computer material - e.g. deleting or changing files. The Act also makes it illegal to make, supply or obtain malware
46
Q

what does the Copyright, Designs and Patents Act 1988 protect?

A

innovation - it was introduced to protect intellectual property - anything that someone has created

47
Q

what does the Copyright, Designs and Patents Act 1988 make illegal?

A

it makes it illegal to share copyrighted files without the copyright holder’s permission, use unlicensed software of plagiarise somebody else’s work. Copyright holders can make money by granting permission to use the material for a fee

48
Q

why has the internet made it harder to protect copyrighted content?

A

because of the ease of file sharing. It’s also difficult to enforce copyright if content is held on servers in countries with more relaxed copyright laws

49
Q

what do Creative Commons licenses allow?

A

legal file sharing - they allow you to legally share media and software online without having to ask for permission first. Intellectual property owners use creative commons licences when they want other people to share of build upon their work

50
Q

what are the four main types of creative commons license?

A
  1. Attribution - work can be shared, copied or modified, but the copyright holder has to be credited
  2. Share-alike - modified works can only be distributed with the same license terms as the original
  3. Non-commercial - nobody can use the copyrighted work for profit
  4. No derivative works - the work can be copied and distributed, but can’t be modified or built upon
51
Q

can you combine CC licences?

A

yes

52
Q

what does it mean for works to be in the public domain?

A

they don’t have any copyright attached to them, meaning you can copy them and share them as you wish.

53
Q

when does UK copyright expire?

A

70 years after the creators death, at which point their creation enters the public domain - Shakespeare’s plays, Beethoven’s symphonies and da Vinci’s paintings are all now in the public domain