ST 4 - 5 Flashcards

1
Q

computer that provides services to the computer and other devices

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

different services provided by server

A
  • control hardware, software, and data
  • centralized storage
  • sharing software
  • manage network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • manages printing jobs
  • a network with a centralized printing services
A

print server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a type of server that stores and distribues a set of application software to each system on the network

A

application server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a type of server that manages database or an organization

A

database server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

type of server that handles a large volume of incoming, outgoing and internal emails

A

email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • handles all communications in the server
  • manages internet connectivity
  • all requests in information from the internet all messages being sent through internet pass through communication server
A

communication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • type of server that is used to host a webiste available through internet
  • used specialized software that enables them to host a webiste
A

web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • keeps tracks of users who logins
  • keep track of different services available
  • manage and coordinate the service provided by any other dedicated servers
A

authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stores and manage files for network user

A

file server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

8 types of servers

A
  1. print server
  2. application server
  3. database server
  4. email server
  5. communication server
  6. authentication server
  7. file server
  8. web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • software deployed over the internet
  • hosted service and accessed over the internet as opposed to “on premised”
  • provider licenses an appplication to customer either as service or pay as you go
  • Gmail and Docs
A

software as service
service on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • provide computer based services on customers
  • deploy applications form other companies
  • depend on commerical software developers
A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • package computing resources such as computation, storage and services metered similar to tradditional public utlility
  • model has advantage of a low initial cost to acquire computer resources; instead computational resources are essentially rented, turn needed products into service
  • foundation of “On Demand” computing
A

Utility Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

location dependent computing whereby shared computers provide resources to computers and other services on demand with electricity grid

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • delivery of computing platform and solution as a service
  • development platform for developers
  • facilitate deploymen of applications without cost and complexity of buying
  • include facilities for application design and team collaboration
A

Platform as a Service
(Paas)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • delivery of the compuitng inrafstructure as fully outsourced service
  • manage hosting and development environments
  • also referred as Haas
A

Infrastructure as a Service
(Iaas)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • derivative of software as a service
  • denotes a class of software as a service thta emphasizes security and storage of any content
  • security transmissio, storage and control over the user’s data
  • provides security in the linkto the service
A

Software as a Security
(SaSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • flexible set of design principles used during phases of systems development and integration in computing
  • will package functionality as a suite of interoperable services that can be used within multiple separate system
A

Service Oriented - Architecture
(SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Web communication relies on standardized protocols like HTTP

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTP facilitates the transfer of text, images, and more

A

Data Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The web operates on a client-server model.

A

Client-Server Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Uniform Resource Locators (URLs) identify web resources

A

URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTTPS ensures secure data transmission on the web

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • are sets of rules and conventions that define how data is transmitted and received in computer networks and communication systems.
  • They ensure orderly and efficient communication between devices and systems
A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • Think of protocols as the language that devices use to understand each other.
  • They establish a common ground for devices to exchange information reliably.
A

Communication Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

web communication protocol

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

email protocol

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

for general network communication protocol

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • how web browsers request and receive web pages from servers.
  • They dictate the format of data packets, the order of communication, and how errors are handled
A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Protocols enable devices and systems from different manufacturers and developers to communicate seamlessly

A

interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

HTTP forms the foundation of how we access and interact with web content, making it a fundamental protocol on the internet.

A

Foundation of Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

HTTP employs status codes to communicate the success or failure of requests, aiding in troubleshooting

A

Status Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

It operates on a request-response model, where clients send requests, and servers send back responses containing requested content

A

Request-Response Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

HTTP ensures the reliable transfer of various web resources, such as text, images, and videos

A

Data Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

It enables clients (web browsers) to request resources from servers and servers to respond with data

A

Client-Server Interaction

37
Q

plays a pivotal role in web communication.

A

HTTP (Hypertext Transfer Protocol)

38
Q

fundamental process behind web communication

A

The HTTP request-response cycle

39
Q

The HTTP request-response cycle two main components

A
  • client request
  • server response
40
Q
  • The client, often a web browser, initiates the cycle by sending an HTTP request.
  • This request specifies what resource it wants from the server, typically a web page or a file
A

client’s role

41
Q
  • The server, which hosts the requested resource, receives the request.
  • It processes the request and prepares an HTTP response.
A

server’s role

42
Q
  • The response contains the requested data, which can include HTML content, images, stylesheets, and more.
  • It may also include metadata like status codes and headers.
A

response content

43
Q
  • The cycle is completed when the server sends the response back to the client.
  • The client then interprets and displays the content.
A

Completion of Cycle

44
Q
  • Upon receiving the request, the server processes it based on the method and URL.
  • It may access databases, execute scripts, or perform other tasks to generate the response.
A

Server Processing

45
Q
  • HTTP responses include:
  • A status line (e.g., “HTTP/1.1 200 OK”) indicating the outcome.
  • Headers providing additional information (e.g., Content-Type, Content-Length).
  • The response body containing the requested data.
A

Response Details

46
Q
  • HTTP requests from clients contain specific details, including:
  • The request method (e.g., GET, POST).
  • The URL (Uniform Resource Locator) identifying the resource.
  • Optional headers (e.g., User-Agent, Accept-Encoding).
  • An optional message body (used in POST requests).
A

Request Details

47
Q

are actions that clients can use to interact with web servers

A

HTTP method or HTTP verb

48
Q
  • Used for requesting data from a specified resource.
  • Generally, it doesn’t change the server’s state and is considered safe.
A

GET

49
Q
  • Updates a specified resource with new data.
  • It’s idempotent, meaning multiple identical requests will produce the same result as a single request.
A

PUT

50
Q
  • Removes a specified resource.
  • Also idempotent, multiple identical requests have the same effect as a single request.
A

DELETE

51
Q
  • Partially updates a specified resource.
  • Useful when you want to modify only a portion of a resource
A

PATCH

52
Q

Idempotent methods ensure that repeating the same request multiple times has the same effect as a single request.

A

Idempotent Methods (GET, PUT, DELETE)

53
Q

These methods are considered safe because they don’t change the server’s state.

A

Safe Methods (GET, HEAD, OPTIONS)

54
Q

Specifies the protocol or scheme used
(e.g., http, https).

A

Scheme

55
Q

Identifies the web server hosting the resource.
www.example.com

A

Domain

56
Q

Optionally, it specifies the port number for the server (e.g., :80 for HTTP).
443 (default for HTTPS)

A

Port

57
Q

Describes the file path or location on the server
/blog/article.html

A

Path

58
Q

Optional username and password for authentication

A

User Info

59
Q

Points to a specific part of the resource (e.g., #section).

A

fragment

60
Q

Contains parameters for the resource (e.g., ?param1=value1&param2=value2).

A

Query

61
Q

https

A

protocol

62
Q

www.

A

subdomain

63
Q

example

A

domain

64
Q

.com

A

top-level domain

65
Q

/blog/

A

subfolder

66
Q

description-blog-post

A

slug

67
Q
  • three-digit status codes returned by web servers to indicate the outcome of an HTTP request.
  • They play a crucial role in communication between clients (browsers) and servers.
A

HTTP Error Codes

68
Q

Request received, continue processing

A

1xx: Informational

69
Q

Request was successfully received, understood, and accepted

A

2xx: Success

70
Q

Further action needed to complete the request.

A

3xx: Redirection

71
Q

The client appears to have made an error

A

4xx: Client Errors

72
Q

The server failed to fulfill a valid request.

A

5xx: Server Errors

73
Q

A generic server error, often indicating a problem with the server’s configuration or code

A

500 Internal Server Error

74
Q

Access to the requested resource is denied to the client.

A

403 Forbidden

75
Q

Perhaps the most recognized error code, indicating that the requested resource could not be located on the server.

A

404 Not Found

76
Q

While there are standard headers, developers can also define custom headers for specific application requirements, allowing for flexibility in data exchange.

A

Custom Headers

77
Q

These headers are sent by the server to provide information like the content type of the response, caching directives, and server information.

A

Response Headers

78
Q

These headers are sent by the client (e.g., web browser) to provide details such as the user agent (browser type), accepted content types, and more

A

Request Headers

79
Q

HTTP headers are metadata included in both HTTP requests and responses to convey additional information about the message.

A

HTTP Headers

80
Q
  • Mention benefits like data confidentiality, integrity, and authentication.
  • HTTPS also improves SEO rankings and user trust, as indicated by the padlock icon in browsers.
A

Benefits of HTTPS

81
Q
  • Explain that HTTPS relies on SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption protocols.
  • This encryption secures data in transit, making it unreadable to unauthorized parties.
A

SSL/TLS Encryption

82
Q
  • Emphasize the importance of security in web communication.
  • Mention the risks of transmitting sensitive data over unsecured connections, such as passwords or credit card details.
A

The Need for Security

83
Q
  • communication protocol that enables real-time, bidirectional communication between clients and servers.
  • Widely used in applications requiring instant updates, such as chat applications and online gaming.
A

WebSocket

84
Q
  • protocol responsible for translating domain names (e.g., www.example.com) into IP addresses.
  • Essential for navigating the web by human-readable addresses
A

DNS (Domain Name System):

85
Q

architectural style for designing networked applications that use HTTP requests to perform CRUD (Create, Read, Update, Delete) operations on resources

A

Representational State Transfer (RESTful) API

86
Q
  1. Explain that WebSocket servers must be designed to handle a large number of concurrent connections.
  2. Discuss strategies for scaling WebSocket applications, including load balancing and clustering.
A

Scaling and Load Handling

87
Q
  • Mention security measures such as securing WebSocket connections with the WSS (WebSocket Secure) protocol, which encrypts data transmission.
  • Highlight the importance of validating and sanitizing data to prevent security vulnerabilities.
A

Security Considerations

88
Q
A