Unit 5 Flashcards

1
Q

Which component is required to access the internet?

A

Network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are IP addresses and why are they needed?

A

Each address has a 32-bit number
It is usually written in denary with a dot separating each byte
The address allows data to be sent to the correct computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are data packets needed?

A

When data is sent through the Internet
or a TCP/IP network, it is split up
into much smaller quantities
known as data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are routers used for?

A

The home router will route packets. It also:
Contains a wireless access point for Wi-Fi connections
Connects the local network to the internet using a modem
Assigns IP addresses to each computer that connects to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is used for IP address assignment?

A

When a new device connects to the network it is assigned
an IP address by the DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are MAC addresses needed for?

A

The MAC address is given to the NIC when it is manufactured.
Every network hardware device has a unique MAC address
MAC addresses are used
to send data between two
items of hardware on a
network – such as
a computer
and router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do different parts of the MAC address represent?

A

The first three bytes (24 bits) of the MAC address contains a number that represents the manufacturer
The second part of the number is the serial code which is given to the hardware device by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some internet protocol issues?

A

IP version 4 (IPv4) addresses are made from
four bytes.

The problem with 32-bit IP addresses is that there aren’t enough of them

As more and more devices are added to the Internet we need an IP address system that can address all of them.
We therefore need to use a larger binary number than a 16-bit address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are differences between the address sizes of IPV4 and IPV6?

A

IPV4: 32-bit

IPV6: 128-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the different numbers of unique addresses for IPV4 and IPV6.

A

IPV4: 4.3 billion
IPv6: 340 trillion trillion trillion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the seperators in IPV4 and IPV6?

A

IPV4: Dots
IPV6: Colons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the security differences between the 2 internet protocols.

A

IPV6 has better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What assigns IP addresses as IPV4?

A

IPV4: DHCP server
IPV6: They configure themselves;autoconfiguration or use DHCPv6 as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a dynamic IP address?

A

Sometimes the ISP will give a different IP address each time the router connects – this is known as a dynamic IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a static IP address?

A

If the IP address is always the same, it is known as a
static IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some features of a browser?

A

Storing bookmarks and favourites
Recording user history
Allowing use of multiple tabs
Storing cookies
Providing navigation tools
Providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the address bar needed for?

A

The address bar allows the user to enter a
web address.
browsers also allow navigation such as previous page, next page and refresh page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are bookmarks used for in a browser?

A

Users are able to store a list of bookmarks of sites they want to visit again
Folders allow these to be organised easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is user browsing history?

A

Web browsers store a history of visited web pages, including timestamps, enabling users to easily revisit and search recent sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are tabs?

A

Tabs are a user interface feature that allow many web pages to remain open at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the router?

A

The router is responsible for routing data packets between different networks. Assigning IP addresses to devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the router responsible for?

A

Send and Receive packets of data

Connect a local network to the internet

Assign IP addresses to devices

Converts packets from one protocol to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the internet?

A

The Internet is a global network of networks

24
Q

What is the world wide web?

A

a collection of websites and web pages that are accessed using the internet

25
Q

What does HTTP do?

A

Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website viewing

HTTP & HTTPS are protocols, a set of rules governing communication between devices on a network

HTTP allows clients to receive data from the sever (fetching a webpage) and send data to the server (submitting a form, uploading a file)

26
Q

What is HTTPs?

A

HTTPS works in the same way as HTTP but with an added layer of security

All data sent and received using HTTPS is encrypted

HTTPS is used to protect sensitive information such as passwords, financial information and personal data

27
Q

What is a web browser?

A

A web browser is a piece of software used to access and display information on the internet

28
Q

Functions of Web browser

A
  • Render HTML
    -Provide navigation tools
  • Storing bookmarks
  • Storing cookies
  • Record user history
  • Provide address bar
  • Multiple tabs
29
Q

How is a web page loaded?

A

Web pages are held on web servers (1), known as ‘hosting’

To access a web page on a web server, a web browser is used

In the browser, a user enters a web page URL (2)

The browser sends the domain name to a DNS (3)

The browser connects to the web server and requests to access the page

HTML (4) is transferred and rendered by the browser, displaying the web page

30
Q

What is a web server?

A

A web server is a remote computer that stores the files needed to display a web page on the Internet

  • Multiple people can access at the same time
  • available 24/7
31
Q

What is a URL?

A

A Uniform Resource Locator (URL) is a unique identifier for a web page, known as the website address

32
Q

What are the parts of a URL?

A

Protocol

Domain name

Web page/file name

33
Q

Split https://www.savemyexams.com/igcse/computer-science/cie/23/revision-notes/ into 3 parts

A

Protocol: https
Domain name: www.savemyexams.com
Web page/file name: /igcse/computer-science/cie/23/revision-notes/

34
Q

What is meant by cookies?

A

A cookie is a tiny data file stored on a computer by browser software that holds information relating to your browsing activity

35
Q

What are the 2 types of cookies and how do they work?

A

Session - Created and replaced every time a user visits a website

Persistent - Created and saved the first time a user visits a website, retained until they expire

36
Q

What are the functions of a cookie?

A

Browsing history - what websites you have visited

Login information - usernames & passwords

Preferences - language/font size/themes

Shopping cart

37
Q

What is a brute-force attack?

A

A brute force attack works by an attacker repeatedly trying multiple combinations of a user’s password to try and gain unauthorised access to their accounts or devices

38
Q

What is data interception?

A

Data interception and theft is when thieves or hackers can compromise usernames and passwords as well as other sensitive data

This is done by using devices such as a packet sniffer

A packet sniffer will be able to collect the data that is being transferred on a network

A thief can use this data to gain unauthorised access to websites, companies and more

39
Q

What is a DDoS attack?

A

A Distributed Denial of Service Attack (DDoS attack) is a large scale, coordinated attack designed to slow down a server to the point of it becoming unusable

A server is continually flooded with requests from multiple distributed devices preventing genuine users from accessing or using a service

40
Q

What is hacking?

A

Hacking is the process of identifying and exploiting weaknesses in a computer system or network to gain unauthorised access

41
Q

What is malware?

A

Malware (malicious software) is the term used for any software that has been created with malicious intent to cause harm to a computer system

42
Q

Types of malware?

A

Virus
Worm
Trojan horse
Ransomware
Spyware
Adware

43
Q

What is pharming?

A

Pharming is typing a website address into a browser and it being redirected to a ‘fake’ website in order to trick a user into typing in sensitive information such as passwords

44
Q

What is phishing?

A

Phishing is the process of sending fraudulent emails/SMS to a large number of people, claiming to be from a reputable company or trusted source

45
Q

What is social engineering?

A

Social engineering is exploiting weaknesses in a computer system by targeting the people that use or have access to them

There are many forms of social engineering, some examples include

Fraudulent phone calls: pretending to be someone else to gain access to their account or their details

Pretexting: A scammer will send a fake text message, pretending to be from the government or human resources of a company, this scam is used to trick an individual into giving out confidential data

46
Q

What are access levels?

A

Access levels ensure users of a network can access what they need to access and do not have access to information/resources they shouldn’t

Users can have designated roles on a network

47
Q

What is anti-malware software?

A

Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

48
Q

How does ant-malware work?

A

Anti-malware scans through email attachments, websites and downloaded files to search for issues

Anti-malware software has a list of known malware signatures to block immediately if they try to access your device in any way

49
Q

What is authentication?

A

Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system

50
Q

What are biometrics?

A

Biometrics use biological data for authentication by identifying unique physical characteristics of a human such as fingerprints, facial recognition, or iris scans

51
Q

What are automatic software updates?

A

Automatic software updates take away the need for a user to remember to keep software updated and reduce the risk of software flaws/vulnerabilities being targeted in out of date software

52
Q

What is communication?

A

One way of protecting data is by monitoring digital communication to check for errors in the spelling and grammar or tone of the communication

53
Q

How to check a URL?

A

Checking the URL attached to a link is another way to prevent phishing attacks

54
Q

What is a firewall?

A

A firewall monitors incoming and outgoing network traffic and uses a set of rules to determine which traffic to allow

A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

55
Q

What are privacy settings?

A

Privacy settings are used to control the amount of personal information that is shared online

56
Q

What is a proxy server?

A

A proxy-server is used to hide a user’s IP address and location, making it more difficult for hackers to track them

57
Q

What is SSL?

A

Secure Socket Layer (SSL) is a security protocol which is used to encrypt data transmitted over the internet

This helps to prevent eavesdropping and other forms of interception