The Internet and World Wide Web Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a network?

A

a collection of computers and devices in order to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of devices that can be in a network (4)

A

modems, cables, telephone lines, and satellites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a worldwide collection of networks that links millions of businesses, government agencies, etc

A

Internet (“Net”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Services on the Internet? (5)

A

e-mail, file transfer (FTP), instant messaging, chat, and web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

networking project by Pentagon’s Advanced Research Projects Agency (ARPA). Allowed scientists to share info. Built to function even if part was disabled or destroyed. Became functional in September 1969

A

DARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 host nodes for arpanet

A

University of California, Los Angeles, (U.C.L.A.), the Stanford Research Institute (S.R.I.) in Menlo Park, Calif., U.C. Santa Barbara (UCSB), and the University of Utah

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 supercomputers connected to ARPANET in 1986 creating ________

A

NSFNET (National Science Foundation’s Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet Structure today?

A
  • networks from corporations, commercial firms, etc
  • satellite companies
  • phone companies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How has the network grown?

A

1969 - 4 host nodes

1984 - more than 1000 host nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who controls the internet?

A

no single entity owns it, W3C controls HTML, and Internet2 controls delivery and communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is Tim-Berners Lee?

A
  • created the World Wide Web
  • director of the W3C at MIT
  • developed HTML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

first browser

A

Mosaic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

second browser

A

Netscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an internet service provider (ISP)?

A

a business that has a permanent Internet connection. Provides temporary connections to people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

access to internet through one or more telephone numbers

A

Regional ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

local telephone numbers

A

National ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

leading service provider

A

America Online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

used phone for connectivity

A

Dial up access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many groups of numbers are there in an IP address?

A

4

20
Q

Examples of networks (3)

A

Local area network (LAN)
Virtual Private Network (VPN)
The Internet

21
Q

Network components

A
Client computer 
Server computer
Network interface card (NIC)
Network operating system (NOS)
Connection medium
Hub or switch connecting multiple computers in a network
Routers
22
Q

Device that forwards data “packets” between computer networks for internetwork communication

A

router

23
Q

simplest and slowest physical connection media

A

Twisted-pair wire (modems)

24
Q

copper wires surrounded by thick insulation

A

Coaxial cable

25
Q

Wireless transmission media and devices (3)

A

Microwave
Satellites
Cellular telephones

26
Q

Method of communication that breaks a transmitted message into separate units (called packets), and allows each packet to follow any available network route that may lead to the destination
Upon arrival at the destination, the packets are reorganized into the original message
Previously circuit-switched networks required a dedicated path (circuit) through the network
Packet switching is dynamic and can efficiently use the network capacity and availability

A

Packet switching

27
Q

Plaintext information floating around the internet can be captured by tools known by systems administrators, but also hackers
The need for encrypting sensitive information becomes more understood when considering plaintext can be viewed (e.g., credit card info in websites only using http, or in plaintext email)
May violate campus or corporate regulations

A

Packet Sniffers

28
Q
Daughter of poet Lord Byron
Many call her the first programmer
Worked with Charles Babbage
Ada computer language
Famous colleagues (Dickens, Faraday)
Died at 36, would have been 199
A

Ada Lovelace

29
Q

criminal caught by bits

A

dennis rader

30
Q

Needs for privacy and security

A

Protection from against external/internal hackers
Defending against industrial espionage
Protecting E-commerce assets
Verifying bank accounts/electronic transfers
Securing intellectual property
Preventing issues regarding liability
Ubiquity of email/networks and privacy
Cloud-based storage of private information
Insecure technologies (e.g., wireless)
Emergence of a paperless society

31
Q

deals with creating documents that can be shared secretly over public communication channels
Cryptographic documents are decrypted with the key associated with encryption, with the knowledge of the encryptor
The word cryptography comes from the Greek words: Krypto (secret) and graphein (write)

A

cryptography

32
Q

deals with finding the encryption key without the knowledge of the encryptor

A

cryptanalysis

33
Q

deals with cryptography and cryptanalysis

A

cryptology

34
Q

computer systems used to encrypt data for secure transmission and storage

A

cryptosystems

35
Q

text that is in readable form

A

plaintext

36
Q

results from plaintext by applying the encryption key

A

ciphertext

37
Q

is the method of hiding secret messages in an ordinary document
Steganography does not use encryption explicitly, but rather through hiding information into an existing document
Steganography does not generally increase file size for hidden messages
Example: select the bit patterns in pixel colors to hide the message

A

steganography

38
Q

can be used for both encryption and decryption

A

symmetric key

39
Q

requires a different key for both encryption and decryption

A

asymmetric system

40
Q

are used in algorithms to convert a plaintext document into a secret document

A

keys

41
Q

A substitution cipher where each plaintext letter is replaced by some letter a fixed number of spaces down in the alphabet

A

caesar cipher

42
Q

Rotates characters by 13 places

A

ROT13

43
Q

the same key used for encryption/decryption

Problem of key distribution – how to get the key safely into hands of both parties

A

private key

44
Q

a public key used for encryption and private key for decryption
Key distribution problem solved
Very popular technique:
Large Prime Numbers

A

Public (asymmetric) key

45
Q

Issued by trusted third parties known as Certificate Authorities (CAs)
Verisign is a trusted third party
Used to authenticate an individual or an organization
Digital Certificates are usually given for a period of one year
They can be revoked
It is given at various security levels. The higher the security level, the CA verifies the authenticity of the certificate seeker more

A

digital certificates

46
Q

Potential Problems with cryptographic technologies?

A

False sense of security if badly implemented
Government regulation of cryptographic technologies/export restrictions
Encryption prohibited in some countries