Section 5 - Networks and Web Technologies Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Search Engine Indexing

What is a search engine?

A

Systems that locates resources on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Search Engine Indexing

What is an index?

A

A record of the resources located on the Internet/World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Search Engine Indexing

What is a web crawler/spider?

A

Software that creates an index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Search Engine Indexing

What process does the web crawler go through?

A
  • Visits a web page and follows all the links on that page
  • Then follows all the links on those pages
  • Repeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Search Engine Indexing

What are meta tags?

A

A list of keywords or concise phrases specified by the website owner that are built into each webpage which effect the chances of a webpage from being found during a search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Search Engine Indexing

What factors effect a page’s chance of being placed high in the results list?

A
  • Keywords in the <title> tag</title>
  • The age of your website and date of last update (or frequency of updates)
  • The number and relevancy of keywords appearing in <h1> tags and
  • The relevancy of the domain name to the conten
  • PageRank
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Search Engine Indexing

PageRank equation:
PR(A) = ( 1-d ) + d( PR(Ti)/C(Ti) + … + PR(Ti)/C(Tn) )

  1. What is the dampening factor?
  2. What is PR(X)?
  3. What is C(X)
  4. What is Ti to Tn?
A
  1. The probability a user does not follow any links, normally set to 0.85
  2. The PageRank of X
  3. Number of outbound links on page X
  4. Incoming pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Search Engine Indexing

What steps are taken using the PageRank algorithm to find the PageRank of multiple unknowns?

A
  • Start by guessing each PageRank as 1
  • Substitute the values into the PageRank equation
  • Update the guesses based on the answer
  • Repeat until the guesses and the answers match

EXAMPLE
Iteration 1:
PR(A) = 0.15 + 0.85( 1/3 + 1/1 ) = 1.283
PR(B) =0.15 + 0.85( 1/1) = 1
PR(C) =0.15 + 0.85( 1/3 ) = 0.433
PR(D) = 0.15 + 0.85( 1/3 ) = 0.433

Iteration 2:
PR(A) = 0.15 + 0.85( 1/3 + 0.433/1 ) = 0.801PR(B) =0.15 + 0.85( 1.283/1) = 1.241
PR(C) =0.15 + 0.85( 1/3 ) = 0.433
PR(D) = 0.15 + 0.85( 1/3 ) = 0.433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Structure of the Internet

What is a Uniform Resource Locator (URL)?

A

The full address of an Internet resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Structure of the Internet

What is an internet registrar?

A

A company that holds records of all existing website names and the details of those domains that are currently available to purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Structure of the Internet

What is an internet registry?

A
  • A global organisation governed by the Internet Corporation for Assigned Names and Numbers (ICANN)
  • Has worldwide databases that hold records of all the domain names currently issued to individuals and companies, as well as their details
  • Allocate IP addresses and keep track of which address(es) a domain name is associated with as part of the Domain Name System (DNS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Structure of the Internet

What is the Domain Name System (DNS)?

A

A catalogue of all domain names and IP addresses in a series of global directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Structure of the Internet

What does a domain name do?

A

Identifies the area/domain that an internet resource resides in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Structure of the Internet

What is a Fully Qualified Domain Name (FQDN)?

A

A domain name is one that includes the host server name
(e.g. www, mail, ftp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Structure of the Internet

What is an Internet Protocol (IP)?

A

A unique address that is assigned to a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet Communication

What is a MAC address?

A

A unique identifier assigned to a Network Interface Controller (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Structure of the Internet

What is a Wide Area Network (WAN)?

A

A network spread over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Structure of the Internet

What is a Local Area Network (LAN)?

A

A network that consists of a number of computing devices on a single site or in a single building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Structure of the Internet

What is physical bus topology?

A

A LAN topology where all computers are connected to a single cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Structure of the Internet

What is the advantage of using bus topology?

1 point

A
  • Inexpensive to install as it requires less cable and no additional hardware
21
Q

Structure of the Internet

What are the disadvantages of using bus topology?

A
  • If the main cable fails, network data can no longer be transmitted to any nodes
  • Performance degrades with heavy traffic
  • Low security - all computers on the network can see all data transmissions
22
Q

Structure of the Internet

What is physical star topology?

A

A network that has a central node - a switch or computer that acts as a router to transmit messages

23
Q

Structure of the Internet

What does a switch do in a network?

A

A switch keeps a record of the unique MAC address of each device on the network and can identify which particular computer it should send data to

24
Q

Structure of the Internet

What are the advantages of using star topology?

A
  • If one cable fails, only one station is affected - faults are isolated
  • Consistent performance
  • Higher transmission speeds give better performance
  • No data collisions since each station has its own cable to the server
  • More secure, as messages are sent directly to the central computer and cannot be intercepted by other stations
  • Easy to add new stations without disrupting the network
25
Q

Structure of the Internet

What are the disadvantages of using star topology?

A
  • May be costly to install due to the length of cable required
  • If the central device goes down, network data can no longer be transmitted to any nodes
26
Q

Structure of the Internet

What is physical topology?

A

The design layout of the network cables/nodes

27
Q

Structure of the Internet

What is logical topology?

A

The shape of the path the data travels in, as well as how components communicate

28
Q

Structure of the Internet

What is Wi-Fi?

A

A local area wireless technology that enables devices to connect to a network resource or the Internet via a Wireless Network Access Point (WAP)

29
Q

Structure of the Internet

What is a Wireless Network Access Point (WAP)?

A

A networking device that allows wireless devices to connect to a wired network

30
Q

Internet Communication

What are the 4 layers of the TCP/IP stack?

A
  1. Application
  2. Transport
  3. Network / Internet
  4. Link
31
Q

Internet Communication

What happens at the application layer of the TCP/IP stack?

A
  • The appropriate protocol for communication is selected
  • (HTTP, HTTPS, FTP, etc.)
32
Q

Internet Communication

What happens at the transport layer of the TCP/IP stack?

A
  • Establishes a connection between the sending and receiving computers
  • The data to be sent is split into packets, each with a packet number, total packet count, and port number
  • If any packets are lost, this layer requests to resend them
33
Q

Internet Communication

What is a port?

A

A port can be used to ensure the correct application is used when receiving data

34
Q

Internet Communication

What happens at the network / internet layer of the TCP/IP stack?

A
  • Both the sender’s and the recipient’s IP addresses are added to the packets
  • The data packets are sent across different routers until they reach their destination
35
Q

Internet Communication

What happens in the link layer of the TCP/IP stack?

A
  • Both the sender’s and recipient’s MAC addresses are added to the packets
36
Q

Internet Communication

What happens once all 4 layers of the TCP/IP stack of been completed?

A

The steps of the stack are reversed at the recipient’s computer:
1. The MAC addresses are removed
2. The IP addresses are removed
3. The port number is removed and the packets are reassembled
4. The reassembled data is then presented to the user on the application

37
Q

Internet Communication

What is packet switching?

A

A method of communicating in which packets of data are sent across a network where other
similar communications are happening simultaneously

38
Q

Internet Communication

What is circuit switching?

A

A method of communicating in which a direct link is created between two devices for the duration of the communication

39
Q

Internet Communication

What is a gateway used for?

A

When protocols differ between networks, a gateway is used rather than a router
to translate between them

40
Q

Internet Communication

What is a router used for?

A

Routers are used to connect at least two networks (e.g. two LANs or WANs) or to connect a LAN and its ISP’s network

41
Q

Network Security and Threats

What is a firewall?

A

A security checkpoint designed to prevent unauthorised access between two networks

42
Q

Network Security and Threats

What is packet / static filtering?

A

A method of controlling network access according to network administrator rules and policies by examining the source and destination IP addresses in packet headers

43
Q

Network Security and Threats

What is a proxy server?

A

A server that intercepts all packets entering and leaving a network, hiding the network addresses of the source from the recipient, enabling privacy and anonymous surfing

44
Q

Network Security and Threats

What are the 3 types of malware?

A
  • Worm
  • Virus
  • Trojan
45
Q

Network Security and Threats

What is a virus?

A

Viruses are capable of duplicating and spreading themselves, relying of a user to open a file in order to begin self-replicating
Most viruses are stored within memory once opened, and will proceed to infect any other opened files from within the memory

46
Q

Network Security and Threats

What is a worm?

A

Worms are capable of duplicating and spreading themselves, but do not rely on a user’s interaction (e.g. opening a file) to begin doing so
A worm can replicate itself and send copies to other users from a computer, typically via email

47
Q

Network Security and Threats

What is a trojan?

A

A trojan is often hidden within files and causes few visible problems, instead acting as a back door to your computer system that the trojan’s creator can exploit

48
Q

Network Security and Threats

List all potential security vulnerabilies

A
  • Phising scams (trickery used to obtain a password or other sensitive information)
  • Weak passwords
  • Lack of firewall/antivirus software
  • Administrative rights failing to prevent access to certain file areas
  • Cracks in software where data is passed from one subroutine/application to another
  • Buffer overflow (occurs where a program accidentally writes values to memory locations too small to handle them, inadvertently overwriting the values in neighbouring locations that it is not supposed to have access to)
49
Q

Internet Communication

What is a protocol?

A

A set of rules that govern communication on a network