SE3316 Final Flashcards

1
Q

T/F: server side scripting files contain both direct html code and code blocks

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which server-side-scripting language is most widespread?

A

PHP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which server-side-scripting language is used in large enterprise applications?

A

JSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which server-side-scripting language is the new hotness?

A

Node.js…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ASP.Net can use which .Net language?

A

Any .Net language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many Apache helicopters does an Apache server need to serve in order for the ancestral land claims of the Apache tribe to be fulfilled?

A

3 + 820 milliseconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Django runs on Which server-side-scripting language?

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which server-side-scripting language is an MVC web application framework?

A

Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a LAMP stack?

A

Linux, Apache, MySQL, PHP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between LAPP stack and LAMP stack?

A

Lapp uses PostgreSQL instead of MySQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Ruby stack?

A

Ruby, ruby-on-rails, Apache, MySQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Django stack?

A

Python, Django, Apache, MySQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which server-side-scripting language used VBScript?

A

ASP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the responsibilities of a scripting engine?

A
  • run script code
  • manage database connections
  • manage cookies and state
  • upload and manage files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following was not mentioned in this course?

SAX, DOM, MEAN, LAPP, LAMP, DMCA, MSXML, COM, MVC, WIPO, WAI, VB, ASP, XML, JAXB, XMLS, DTD, XAct, EFF, SSL, WCT, PGP, IPSec, FOSI, openSSL, DOS, YMYD, PHP, JSP, SOC, URI, HTML, OSP, ISP, CSS, XDuce, JSON, XSLT, W3C, XHTML, XSL-FO, JDOM, API, STX

A

YMYD (Your Mum’s Your Dad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are HTTP/2’s features?

A

Binary Protocol, One TCP connection multiple streams, Header compression,
Server push

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Services can provide?

A

Confidentiality, Integrity, Authenticity, non-repudiation (sender/receiver cannot deny sending/receiving)
& Protection from DOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSL/TLS can provide

A

Confidentiality, Integrity, and Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What cryptography does SSL and TLS use

A

public-key cryptography (public + private keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Can rogue Egyptians frig with certificates issuance?

A

Y E S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is URI?

A

Unifrom Resource Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some Software Stacks for Web apps

A

LAMP (Linux, Apache, MySQL, PHP), MEAN (MongoDB, Expres, Angular, Node),
Ruby, Django

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define AJAX

A

Asynchronous JavaScript and XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What an HTML validator return?

A

Syntax errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is the format for a code point?

A

U+XXXX (4 digit hex)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Is a code unit fixed or variable length?

A

fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In UTF-8, how many code units make up one code point?

A

1-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In UTF-8, how many bytes is 1 code unit?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Is javascript a class based or prototype based language?

A

prototype based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the definition of a prototype based language?

A

– All objects can inherit from another object

– Construct object hierarchy by assigning an object as the prototype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the advantages of client-side scripting?

A

–Does not have to refresh the page with every request
–More interactive, responds to user faster
–Can give developers more control over look and feel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the disadvantages of client-side scripting?

A

–Not all browsers will support
– different browsers will interpret differently
– more development time may be required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Advantages of server–side scripting?

A

–Can create one template for the entire site
– Can use content management system, makes editing simpler
– Scripts are hidden from view, so is more secure
– No need to download plugins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Disadvantages of server–side scripting

A

–scripts and content management may require databases to store dynamic data
– will take longer to fulfill user requests
– user experience is less interactive/immersive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is AJAX?

A

Asynchronous Javascript and XML – allows JavaScript to communicate with server without reloading page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Is Jquery a library or a framework?

A

library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How can info be displayed to someone without JavaScript?

A

using the noscript tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In JS, a variable declared inside a block is accessible where?

A

Only inside the block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is variable hoisting?

A

The act of moving a declared variable to the top of its block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Will a variable initialization be hoisted?

A

No, only the declaration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What happens if a variable created with the let keyword is accessed before declaration?

A

Throws an error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What happens if a variable declared with the var keyword is accessed before declaration?

A

The variable will return undefined, will not throw an error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Will this function declaration

function x(int y){…}

be hoisted?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Will this initialization be hoisted?

var answer = x(int y){…}

be hoisted?

A

No – variable assignment is not hoisted (but the declaration will be)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the types of Nodes in the DOM?

A

Text, element, attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are nodes who have the same parent node called?

A

siblings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How are events captued in JS?

A

With an event listener

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Is HTTP a stateless protocol?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a private address space?

A

Not visible outside of LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Is GET a safe method?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Is POST idempotent?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Is TRACE a safe method?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Is GET idempotent?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What does TLS stand for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What security services do SSL and TLS offer?

A

Confidentiality, Integrity, Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Name server side scripting languages

A

 PHP (Personal Home Page), ASP (Active Server
Page), CFM (ColdFusion Mark up Language), JSP (Java Server Pages) Pearl, Python, Ruby on Rails
 Server-side JavaScript (using Node.js)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are some Software Stacks for Web apps

A

LAMP (Linux, Apache, MySQL, PHP), MEAN (MongoDB, Expres, Angular, Node),
Ruby, Django

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is required in an HTTP request?

A

Request line, header lines, body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is required in an HTTP response message?

A

Status line, header lines, body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What does a 200-level HTTP response mean?

A

success

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What does a 500-level response mean?

A

Server-side error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is a cookie?

A

A file stored on a domains server containing data about the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the limitations of HTTP?

A
  • Stateless: No session management

- No built in security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are the improvements of HTTP/2 over HTTP/1?

A

Binary Protocol
One TCP connection, multiple streams
Header compression
Server push

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Are all Safe HTTP Methods also idempotent?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Is HTTP digest good?

A

No… It uses MD5 hashing, which has been broken!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is a 4xx Error?

A

Client Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

what is a 3xx error

A

Redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What are the cons of JavaScript Libraries?

A

Adds another dependency

Maintenance & Quality Issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What do Frameworks do that Libraries don’t?

A

Provide a programming model as well as libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Give an example of a user without JavaScript

A

Web Crawler
Browser plug-n that interferes
Text-Based Client
Visually Disabled Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

How does TLS provide security

A

Through symmetry encryption, shared secret, Message Authentication Checking MAC and certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What are the 2 types of scope in JavaScript

A

Function scope (block scope), global scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Define AJAX

A

Asynchronous JavaScript and XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What are the responses/states of a promise in JavaScript?

A

Fulfilled or Rejected, Pending or Settled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What are the responsibilities of web servers?

A
  • listen to incoming HTTP connections, respond to requests
  • manage access to resources
  • encrypt/decrypt and compress/decompress data
  • manage multiple domains and URLs
  • invoke scripting engines, send and receive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What are the responsibilities of a scripting engine?

A
  • run script code
  • manage database connections
  • manage cookies and state
  • upload and manage files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What are the pros and cons of web scripting?

A

Pro:
-allows integrating large databses and sophisticated processing
Cons:
-requires entire software suite to be written in the scripting language
-interfacing w/ existing enterprise software can be difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

How is interactivity typically achieved in web applications?

A

By sending “form data” through HTTP put or post methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

T/F: Web content for machines deals with presentation

A

No it does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Form based web apps can have sluggish interfaces due to network latencies - what is the solution?

A

client-side scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is required for a web service implementation?

A

Any web server + server-side scripting language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

JSP with Tomcat server setup is designed for Web Service Standards (WS-*)

A

No - it is designed for Java

Apache Axis2 with Java/C interfaces is designed for WS-*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

T/F: ReST is a standard?

A

False, only a pattern

85
Q

What is the difference between PUT /parts/042 ad POST /parts/042

A

PUT should completely replace the existing representation, POST can update it

86
Q

T/F: HTTP server with Node.js uses IBM v6 Javascript engine to run javascript on server side

A

False: it uses the Google v8 engine

87
Q

T/F: HTTP server with Node.js is faster than Apache

A

True

88
Q

How does Node.js provide superior performance?

A
  • Asynchronous, eventdriven framework suits the nature of the web
  • Does not deal with per-file access control
  • no barrier between web server and script engine
89
Q

What middleware can be used to simplify routing in a ReST API with Node.js?

A

Express

90
Q

What is the recommended approach to exchanging data asynchronously with AJAX?

A

Fetch API

91
Q

What methods can be called on a promise object, and what do they do?

A

.then() - for when promise is fulfilled

.catch() - for when promise is rejected

92
Q

When is a promise pending?

A

When it has been neither fulfilled OR rejected

93
Q

How many females will attend the software party on Dec 20?

A

RANDBETWEEN(0-4)

94
Q

What language is Angular written in?

A

Typescript

95
Q

In Angular, what are the possible data bindings with the DOM?

A
  • One way: componentn -> DOM
  • One way: DOM events -> component
  • Two way: DOM <=> Model (using MVC pattern)
96
Q

Describe Ember.js

A
  • An “opinionated framework”
  • easy to create apps, lots of support
  • but resistance is futile
97
Q

Describe React.js

A
  • Developed by Zuckerborg
  • High performance, simple
  • It is a library, not a framework
98
Q

Describe how to write an angular app, using templates, components, services, and modules

A
  • Compose HTML templates with Angular markup
  • write component classes to manage templates
  • write application logic in service
  • package components and services in modules
99
Q

What a JavaScript decorator do?

A

It wraps an object/class with another “decorator” class/function

100
Q

What are the benefits of using a decorator?

A
  • Allows dynamic modification

- Allows common functionaility to be applied ot many classes

101
Q

What is the difference between inhertiance and decorators?

A

inhertiance: compile-time
decorator: run-time

102
Q

What is the benefit of single page applications?

A

Application is loaded by the client only once, allowing for fast response to user interactions

103
Q

What issue is created when combining front-end frameworks (like Angular) and back-end APIs?

A

Both front-end and back-end require a server end-point, which leads to two servers running on different ports on the same host -> CORS issue

104
Q

What are the two approaches to combining front-end and back-end?

A
  1. One server (back-end) with a static route

2. Two servers with a proxy

105
Q

What is XML?

A

Extensible Markup Language: a framework for defining markup languages

106
Q

T/F: XML is inhertently ASCII

A

False: it is internationalized Unicode

107
Q

T/F: In XML each language is targeted at its own application domain

A

true

108
Q

Who developed XML?

A

W3C, standardized in 1998

109
Q

T/F: Recipe Markup Languages follow a universally accepted way of naming, standardized by W3C

A

False: there is no universally accepted way of naming

110
Q

What are the different types on node in XML trees?

A

text (leaf)
element (hierarchical groupings, has name)
attribute (has name, value)
comment (meta info)
processing instruction (has target, value)
root node

111
Q

What is the syntax for a comment node in XML?

A

!– mycomment –!

112
Q

What is the syntax for a processing instruction XML?

A

?target value?

113
Q

What is the syntax for an element node XML?

A

name (in braces)

114
Q

What is the syntax for an attribute node XML?

A

< … name=”value” … >

115
Q

What are the requirments for a well-formed XML document?

A
  • start and end tags must match and nest correctly
  • one root element
  • only 5 predefined entity references are used (amp, lt, gt, apos, quot)
116
Q

What is the purpose of an XML parser?

A

Given a textual XML document, construct tree representation

117
Q

What is a cross side scripting attack (XSS)

A

alert(“An attack whereby an attacker injects unwanted elements into the DOM through inputs”);

118
Q

What is the motivation behind XML namespaces?

A

When combining languages, element names may become ambiguous

119
Q

What does a namespace declaration achieve?

A

It binds a URI to a prefix

120
Q

How is the default namespace (no prefix) declared?

A

xmlns=”…”

121
Q

T/F: Attribute names cannot be prefixed

A

False

122
Q

XML uses lexical scope - what does that mean?

A

Lexical scope covers the containing element and all its descendants

123
Q

What are some namespace best practices?

A
  • rarely change prefixes
  • choose URIs carefully (who controls it?)
  • identify default namespace, even if not using namespaces
  • make no assumptions about URI resolution
  • Include all namespace declarations in the document (dont rely on schemas)
124
Q

What is a schema language?

A

A notation for writing schemas

125
Q

What is a schema language?

A

A notation for writing schemas

126
Q

When a schema processor receives an instance document and its associated schema, what are the possible outputs?

A
  1. If the doc is a syntactically correct recipe markup language document, it will create a normalized instance document
  2. Else, send error message
127
Q

What is XSL?

A

XML stylesheet language: defines presentation format for XML documents

128
Q

What is XSLT?

A

XSL Transfrmations: defines transformation from one class of XML docs to another

129
Q

What is XSLT?

A

XSL Transfrmations: defines transformation from one class of XML docs to another

130
Q

What are the benefits of XSL?

A
  1. decouples the presentation from data

2. Simplify the translation of data from one XMl format to another (XSLT)

131
Q

T/F: XSL stylesheet must be explicitly associated with a DTD

A

False

132
Q

T/F: There can be many different XSL stylesheets for the same document type

A

True: can have multiple presentations and/or multiple transformations

133
Q

T/F: There can be many different XSL stylesheets for the same document type

A

True: can have multiple presentations and/or multiple transformations

134
Q

What is a location path?

A

A sequence of nodes, sorted in document order

135
Q

Can a location path contain duplicates?

A

No

136
Q

What does a location step consist of?

A

axis :: nodetest [p1] [p2]

  • an axis
  • a nodetest
  • some predicates (boolean expressions)
137
Q

What does a location step consist of?

A

axis :: nodetest [p1] [p2]

  • an axis
  • a nodetest
  • some predicates (boolean expressions)
138
Q

When evaluation a location path, what does each step do?

A

A step maps a context node into a sequence. The path applies each step in turn

139
Q

What is an axis in XPATH?

A

A sequence od nodes, evaluated relative to the context node

140
Q

How many axes does XPath support?

A

12

141
Q

What direction is the child axis?

A

Forwards

142
Q

What direction is the self axis?

A

Forwards

143
Q

What direction is the ancestor axis?

A

Backwards

144
Q

Which axis is stable but depends on the implementation?

A

attribute

145
Q

What is XML programming needed for?

A
  • domain specific applications
  • implementing new generic tools
  • parsing XML docs -> trees
  • navigating trees
  • manipulating trees
  • serializing XML trees -docs
146
Q

T/F: The DOM is a language neutral API for manipulating XML

A

True

147
Q

Approximately how many methods does the DOM specify?

A

~200

148
Q

What is SAX?

A

Simple API for XML: a stream driven parser ofr XML documents

149
Q

T/F: SAX provides a procedure based interface

A

False - SAX provides an event based interface

150
Q

What are the event types in SAX?

A

text nodes
element nodes
processing instruction nodes
comment nodes

151
Q

What is the motivation behind XML data binding?

A

Methods doc2vector and vector2doc are tedious to write

152
Q

XML data binding provides tools to do what?

A
  • map schemas to class declarations

- automatically generate unmarshalling code, marshalling code, and validation code

153
Q

What is streaming for XML documents?

A

View the XML doc as a stream of events -> the SAX tool observes these events, calls corresponding methods

154
Q

T/F: SAX does not check forms to the same level as the W3C validator

A

False: SAX checks forms BEYOND W3C validator:

  • all input tags inside form tags
  • all form tags have distinct names
  • form tags are not nested
155
Q

What is OWL?

A

Web Ontology Language: defines a relationship between vocabularies

156
Q

What is RDF?

A

Resource description framework: a language for representing metadata about web resources.
Provides a common framework so metadata can be exchanged between apps without loss of meaning

157
Q

What are the benefits of RDF?

A
  • app designers can leverage common RDF parsers and processing tools
  • information can be made available to applications other than those for which it was riginally created
158
Q

What are the components of a RDP triple?

A
  • Subject (resource)
  • property (predicate)
  • property value (object)
159
Q

How is a property represented in an RDF graph?

A

By an arc (connection) between a subject and object

160
Q

How can an RDF graph be converted into a serializable format?

A

By breaking the graph into several tree structures

161
Q

How are RDF properties identified?

A

With a property URI

162
Q

T/F: The RDF parser concatenates the base URI from the prefix, and the proprty name

A

True

163
Q

How many terms does DC vocabulary contain?

A

15

164
Q

Whate are DC, FOAF, DOAP, and RSS examples of?

A

RDF vocabularies

  • dublin core
  • friend of a friend
  • description of a project
  • RDF site summary
165
Q

What is the most popular RDF application?

A

RSS

166
Q

What are the advantages of RDF?

A
  • strictly specified
  • graph model is conceptually simple
  • number of implementations
  • decentralized (anyone can create vocabulary, publish data about resources)
167
Q

What are the disadvantages of RDF?

A
  • RDF/XML is verbose, tedious to write

- programming interfaces require knowledge of triples, URIs, low-level details

168
Q

What is RDFa?

A

RDF in attributes: it is a set of attribute-level extensions to XHTML
-it is similar to microdata, and is a mechanism that can encode schema.org

169
Q

What are the benefits of RDFa?

A
  • publisher independence
  • data reuse
  • self containment
  • schema modularity
  • evolvability
170
Q

What is RDFa lite?

A

A minimal subset of RDFa, designed to fill the needs of 80% of RDF authors

171
Q

What are the 5 attributes of RDFa lite?

A
vocab
typeof
property
resource
prefix
172
Q

What is microformat?

A

A vocabulary AND markup syntax

173
Q

What is microdata?

A

A markup syntax

  • similar to RDFa lite
  • geared towards search engines (developed by Google, MS and Yahoo)
174
Q

What is OpenGraph?

A

A vocabulary

  • markup syntax based on RDFa
  • 4 required, 7 optional properties
  • Facebook
175
Q

What is schema.org?

A

A vocabulary

  • syntax is based on microdata, maps well to RDFa
  • developed by Google, yahho, MS
176
Q

What are some of the differences between microformat and schema.org?

A
  • microformat is a vocabulary and a syntax, schema.org is just a vocabulary
  • a microformat has 1 or more required properties, schem.org has none
  • an individual microformat is a standalone schema, while schema.org can inherit from a parent
  • microformat relies only on the use of prescribed HTML, schema.org can use other mechanisms (like JSON-LD)
177
Q

Which is more widely used, RDF or OWL?

A

RDF

178
Q

T/F: A schema.org property cannot be another item

A

False, a porperty can be another “embedded” item

179
Q

What is JSON-LD?

A

A JSON based format to exchange data as an alternate to using markup attributes in HTML

180
Q

Which HTTP verbs are safe?

A

GET
HEAD
OPTIONS
TRACE

181
Q

Which HTTP verbs are not idempotent?

A

POST

PATCH

182
Q

What is a 401 error?

A

unauthorized

183
Q

What is a 503 error?

A

Service unavailable

184
Q

T/F: HTTP request line and status line must be encoded in Unicode

A

False: must be encoded in US-ASCII

185
Q

T/F: HTTP Basic Authentication is acceptable even without the use of SSL

A

False: only acceptable when used with HTTP over SSL (HTTPS)

186
Q

What security services does SSL/TLS not provie?

A
  • non repudiation

- protection against denial of service

187
Q

How does TLS provide integrity?

A
  • each message includes a message integrity check

- used a message authentication code (MAC)

188
Q

How does TLS provide confidentiality?

A
  • symmetric encryption

- server and client negotiate encryption algorithm, crytographic keys, shared secret

189
Q

How does TLS provide authentication?

A

-uses digital certificates using public-key cryptography

190
Q

T/F: Only W3C registered bodies can issue a digital certificate

A

False: ayone can issue a certificate

191
Q

In the context of digital security, what does non-repudiation mean?

A
  • a service that provides proof of the integrity and origin of data
  • an authentication that can be asserted to be genuine with high assurance
192
Q

Information privacy includes what claims?

A
  • claim that certain information should not be collected at all
  • claim of individuals to control the use of whatever info is collected about them
193
Q

What is the EFF?

A

Electronic frontier foundation, which aims for protecting privacy and civil liberties

194
Q

What is selectable output control (SOC)?

A

A content protection technology that enables a cable company to disable lower quality and non-secure output encodings

https://en.wikipedia.org/wiki/Selectable_Output_Control

195
Q

What does title II (Online copyright infringement liability limitation act) of the DMCA enact?

A

Title II limits the liability of online service providers for copyright infringement

196
Q

What are the two general requirements for OSP eligibility?

A
  • must adopt and implement policy of terminating accounts of repeat infringers
  • must accomodate and not interfere with “standard technical measures”
197
Q

Following a counter-notice for a DMCA claim, how many days does a claimant have to take legal action before material can be reinstated?

A

14

198
Q

What is the philosophical difference between DMCA and Canada’s Notice and notice system?

A

DMCA: guilty until proven innocent

Notice and notice: innocent until proven guilty

199
Q

FOSI, SafeSurf, and RTALabels are all examples of what?

A

Tools for allowing children to safely use the internet

200
Q

Why do you get cyberbullied?

A

Because you’re just as much of a loser online as you are in real life

201
Q

What is a symmetric cipher model?

A
  • shared key

- same decryption algorithm

202
Q

What are the 3 block cipher modes?

A

ECB: electronic book mode
CBC: cipher block chaining mode
CTR- counter mode

203
Q

Describe ECB

A

Each block is independent (128 bits), not good practice

204
Q

Describe CBC

A
  • XOR previous encryption block with current plaintext

- common

205
Q

Majority of attacks can be traced to what fault?

A

bad RNG

206
Q

What is a public-key used for?

A

encrypt messages, verify signatures

207
Q

What can a private key be used to do?

A

decrupt messages, sign signatures

208
Q

T/F: Hash is a two way functon

A

false

209
Q

Which Hash functions are not considered secure?

A

MD5, SHA1