ST 4 - 5 Flashcards

1
Q

computer that provides services to the computer and other devices

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

different services provided by server

A
  • control hardware, software, and data
  • centralized storage
  • sharing software
  • manage network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • manages printing jobs
  • a network with a centralized printing services
A

print server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a type of server that stores and distribues a set of application software to each system on the network

A

application server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a type of server that manages database or an organization

A

database server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

type of server that handles a large volume of incoming, outgoing and internal emails

A

email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • handles all communications in the server
  • manages internet connectivity
  • all requests in information from the internet all messages being sent through internet pass through communication server
A

communication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • type of server that is used to host a webiste available through internet
  • used specialized software that enables them to host a webiste
A

web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • keeps tracks of users who logins
  • keep track of different services available
  • manage and coordinate the service provided by any other dedicated servers
A

authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stores and manage files for network user

A

file server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

8 types of servers

A
  1. print server
  2. application server
  3. database server
  4. email server
  5. communication server
  6. authentication server
  7. file server
  8. web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • software deployed over the internet
  • hosted service and accessed over the internet as opposed to “on premised”
  • provider licenses an appplication to customer either as service or pay as you go
  • Gmail and Docs
A

software as service
service on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • provide computer based services on customers
  • deploy applications form other companies
  • depend on commerical software developers
A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • package computing resources such as computation, storage and services metered similar to tradditional public utlility
  • model has advantage of a low initial cost to acquire computer resources; instead computational resources are essentially rented, turn needed products into service
  • foundation of “On Demand” computing
A

Utility Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

location dependent computing whereby shared computers provide resources to computers and other services on demand with electricity grid

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • delivery of computing platform and solution as a service
  • development platform for developers
  • facilitate deploymen of applications without cost and complexity of buying
  • include facilities for application design and team collaboration
A

Platform as a Service
(Paas)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • delivery of the compuitng inrafstructure as fully outsourced service
  • manage hosting and development environments
  • also referred as Haas
A

Infrastructure as a Service
(Iaas)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • derivative of software as a service
  • denotes a class of software as a service thta emphasizes security and storage of any content
  • security transmissio, storage and control over the user’s data
  • provides security in the linkto the service
A

Software as a Security
(SaSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • flexible set of design principles used during phases of systems development and integration in computing
  • will package functionality as a suite of interoperable services that can be used within multiple separate system
A

Service Oriented - Architecture
(SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Web communication relies on standardized protocols like HTTP

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTP facilitates the transfer of text, images, and more

A

Data Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The web operates on a client-server model.

A

Client-Server Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Uniform Resource Locators (URLs) identify web resources

A

URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTTPS ensures secure data transmission on the web

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
* are sets of rules and conventions that define how data is transmitted and received in computer networks and communication systems. * They ensure orderly and efficient communication between devices and systems
Protocols
26
* Think of protocols as the language that devices use to understand each other. * They establish a common ground for devices to exchange information reliably.
Communication Standards
27
web communication protocol
HTTP
28
email protocol
SMTP
29
for general network communication protocol
TCP/IP
30
* how web browsers request and receive web pages from servers. * They dictate the format of data packets, the order of communication, and how errors are handled
HTTP
31
Protocols enable devices and systems from different manufacturers and developers to communicate seamlessly
interoperability
32
HTTP forms the foundation of how we access and interact with web content, making it a fundamental protocol on the internet.
Foundation of Web
33
HTTP employs status codes to communicate the success or failure of requests, aiding in troubleshooting
Status Codes
34
It operates on a request-response model, where clients send requests, and servers send back responses containing requested content
Request-Response Model
35
HTTP ensures the reliable transfer of various web resources, such as text, images, and videos
Data Transfer
36
It enables clients (web browsers) to request resources from servers and servers to respond with data
Client-Server Interaction
37
plays a pivotal role in web communication.
HTTP (Hypertext Transfer Protocol)
38
fundamental process behind web communication
The HTTP request-response cycle
39
The HTTP request-response cycle two main components
* client request * server response
40
* The client, often a web browser, initiates the cycle by sending an HTTP request. * This request specifies what resource it wants from the server, typically a web page or a file
client's role
41
* The server, which hosts the requested resource, receives the request. * It processes the request and prepares an HTTP response.
server's role
42
* The response contains the requested data, which can include HTML content, images, stylesheets, and more. * It may also include metadata like status codes and headers.
response content
43
* The cycle is completed when the server sends the response back to the client. * The client then interprets and displays the content.
Completion of Cycle
44
* Upon receiving the request, the server processes it based on the method and URL. * It may access databases, execute scripts, or perform other tasks to generate the response.
Server Processing
45
* HTTP responses include: * A status line (e.g., "HTTP/1.1 200 OK") indicating the outcome. * Headers providing additional information (e.g., Content-Type, Content-Length). * The response body containing the requested data.
Response Details
46
* HTTP requests from clients contain specific details, including: * The request method (e.g., GET, POST). * The URL (Uniform Resource Locator) identifying the resource. * Optional headers (e.g., User-Agent, Accept-Encoding). * An optional message body (used in POST requests).
Request Details
47
are actions that clients can use to interact with web servers
HTTP method or HTTP verb
48
* Used for requesting data from a specified resource. * Generally, it doesn't change the server's state and is considered safe.
GET
49
* Updates a specified resource with new data. * It's idempotent, meaning multiple identical requests will produce the same result as a single request.
PUT
50
* Removes a specified resource. * Also idempotent, multiple identical requests have the same effect as a single request.
DELETE
51
* Partially updates a specified resource. * Useful when you want to modify only a portion of a resource
PATCH
52
Idempotent methods ensure that repeating the same request multiple times has the same effect as a single request.
Idempotent Methods (GET, PUT, DELETE)
53
These methods are considered safe because they don't change the server's state.
Safe Methods (GET, HEAD, OPTIONS)
54
Specifies the protocol or scheme used **(e.g., http, https).**
Scheme
55
Identifies the web server hosting the resource. **www.example.com**
Domain
56
Optionally, it specifies the port number for the server (e.g., :80 for HTTP). **443 (default for HTTPS)**
Port
57
Describes the file path or location on the server /blog/article.html
Path
58
Optional username and password for authentication
User Info
59
Points to a specific part of the resource (e.g., #section).
fragment
60
Contains parameters for the resource (e.g., ?param1=value1¶m2=value2).
Query
61
https
protocol
62
www.
subdomain
63
example
domain
64
.com
top-level domain
65
/blog/
subfolder
66
description-blog-post
slug
67
* three-digit status codes returned by web servers to indicate the outcome of an HTTP request. * They play a crucial role in communication between clients (browsers) and servers.
HTTP Error Codes
68
Request received, continue processing
1xx: Informational
69
Request was successfully received, understood, and accepted
2xx: Success
70
Further action needed to complete the request.
3xx: Redirection
71
The client appears to have made an error
4xx: Client Errors
72
The server failed to fulfill a valid request.
5xx: Server Errors
73
A generic server error, often indicating a problem with the server's configuration or code
500 Internal Server Error
74
Access to the requested resource is denied to the client.
403 Forbidden
75
Perhaps the most recognized error code, indicating that the requested resource could not be located on the server.
404 Not Found
76
While there are standard headers, developers can also define custom headers for specific application requirements, allowing for flexibility in data exchange.
Custom Headers
77
These headers are sent by the server to provide information like the content type of the response, caching directives, and server information.
Response Headers
78
These headers are sent by the client (e.g., web browser) to provide details such as the user agent (browser type), accepted content types, and more
Request Headers
79
HTTP headers are metadata included in both HTTP requests and responses to convey additional information about the message.
HTTP Headers
80
* Mention benefits like data confidentiality, integrity, and authentication. * HTTPS also improves SEO rankings and user trust, as indicated by the padlock icon in browsers.
Benefits of HTTPS
81
* Explain that HTTPS relies on SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption protocols. * This encryption secures data in transit, making it unreadable to unauthorized parties.
SSL/TLS Encryption
82
* Emphasize the importance of security in web communication. * Mention the risks of transmitting sensitive data over unsecured connections, such as passwords or credit card details.
The Need for Security
83
* communication protocol that enables real-time, bidirectional communication between clients and servers. * Widely used in applications requiring instant updates, such as chat applications and online gaming.
WebSocket
84
* protocol responsible for translating domain names (e.g., www.example.com) into IP addresses. * Essential for navigating the web by human-readable addresses
DNS (Domain Name System):
85
architectural style for designing networked applications that use HTTP requests to perform CRUD (Create, Read, Update, Delete) operations on resources
Representational State Transfer (RESTful) API
86
1. Explain that WebSocket servers must be designed to handle a large number of concurrent connections. 1. Discuss strategies for scaling WebSocket applications, including load balancing and clustering.
Scaling and Load Handling
87
* Mention security measures such as securing WebSocket connections with the WSS (WebSocket Secure) protocol, which encrypts data transmission. * Highlight the importance of validating and sanitizing data to prevent security vulnerabilities.
Security Considerations
88