Unit 5 Networks and Web Technologies Flashcards

1
Q

What is the largest Network in the world?

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Internet?

A

A network of inter-connected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the World Wide Web?

A

A collection of resources accessed via the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main part of the Internet known as?

A

The backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Backbone of the Internet?

A

A set of dedicated connections that connect several large networks at various points on the globe. Each of these points are then connected to other regional networks, usually controlled by Internet Service Providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an ISP do?

A

Internet Service Providers
Provides access to individual end-users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Internet Address?

A

Each device on a network needs to be uniquely identified so that data can be sent to the correct destination, much like an address on a letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a URL stand for?

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a URL do?

A

Specifies the means of accessing a resource across a network and its location
The protocol and the domain name of the resource together form the URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DNS?

A

Domain Name System
Servers are dedicated computers with an index of domain names and their corresponding IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many DNS servers work together to catalogue every domain name

A

13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do we not use IP addresses directly in a browser?

A

Because URLs are much more user friendly and easier to remember

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What could happen when the DNS Server does not have a record for a specific domain? (2)

A
  • It could recursively handle the request so that it can eventually deliver an IP address or print an error message
  • It could refer to a DNS server authoritative
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why must Domain Names be unique?

A

Because otherwise the DNS request could be confused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Internet Registries?

A

Organizations that control the allocation of domain names and IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many global Internet Registries are there?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who issues available Domain Names?

A

Internet Registries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a LAN?

A

Local Area Network
Two or more computers connected together within a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a WAN?

A

Wide Area Network
A large network of information that is not tied to a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Network Topology?

A

The arrangement of the various computing devices which make up a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Bus Topology?

A

An arrangement where nodes are connected in a daisy chain by a single central communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the advantages of a Bus Topology? (3)

A
  • Inexpensive to set up
  • Devices can be easily added
  • Good for small networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does a Bus Topology work? (5)

A
  • All nodes are connected to a single backbone cable
  • Each end of the backbone is connected to either a terminator or a computer which stops signals ‘bouncing back’
  • Each node is passive
  • Data is sent in one direction at a time only
  • Only one computer can transmit successfully at any one time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What the disadvantages of a Bus Topology? (4)

A
  • Main cable is a point of failure
  • Limited cable length
  • Performance degrades with heavy use because of data collisions
  • Poor security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Star Topology?

A

An arrangement where a central node or hub provides a common connection point for all other nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the advantages of a Star Topology? (3)

A
  • Easy to isolate problems
  • Good performance
  • More secure if a switch is used because data is only sent to recipient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does a Star Topology work? (2)

A
  • Computers are connected to a central node. This is often a switch
  • A switch sends each communication to the specific computer it is intended for
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the disadvantages of a Star Topology? (2)

A
  • Can be expensive to set up because of the length of cable required
  • Central device is point of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a Physical Topology?

A

How the devices are physically connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Logical Topology?

A

How the devices communicate across the physical topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Wifi?

A

A wireless networking technology providing high-speed Internet and network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does WAP stand for?

A

Wireless network Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What happens in Circuit Switching?

A

A communication connection is created between 2 endpoints for the duration of a phone call or transfer of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What happens in Packet Switching?

A

Packets are often sent across networks that have multiple connections with multiple routes through a destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does a Router do?

A

Forwards data packets from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How to Routers work? (4)

A
  • Each router stores data about the available routes to the destination node
  • Looks up the destination IP address in its routing table to find the best router to forward the packet to
  • Each transfer between routers is known as a hop
  • Routers continue to forward the packet until it reaches its destination node
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a Packet Split into? (3)

A
  • Trailer
  • Payload
  • Header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does a Packet Header Contain? (4)

A
  • The recipient’s address so that it can be directed appropriately across the network
  • Senders address so that replies can be sent appropriately
  • The packet number and overall number of packets in the transmission to assist in reassembling the data
  • The Time To Live (TTL) or hop limit is also included
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does a Packet Trailer Contain?

A

Error checking components to verify the data received in the payload has not been corrupted on transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a Protocol?

A

A set of rules, or a formal description, of the format of a digital transmission. It will cover, for example, the size of the packets, the contents and format of the header, the error detection and correction procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

When is a Gateway required?

A

When data is travelling from one network to another that use different protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Why are Protocols important?

A

They make sure that all data being transfered in consistent which is needed for communication to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a TCP/IP Stack?

A

A set of rules used in turn, to format a message so it can be sent over a network. Each layer provides a specific function within the transmission of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the layers of a TCP/IP Stack? (4)

A
  • Application layer
  • Transport layer
  • Internet layer
  • Link layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the Application Layer used for?

A

Providing services for applications that want to communicate across a network, often the Internet

46
Q

Does the Application Layer determine how data is transmitted?

A

No, it only specifies the rules of what should be sent

47
Q

How does the Transport Layer work? (4)

A
  • Uses the Transmission Control Protocol (TCP) to establish an end‐to‐end connection with the recipient computer
  • Splits data into packets and numbers them sequentially
  • Adds port number to be used based on HTTP protocol
  • At the receiving end this layer confirms that packets have been received and requests any missing packets be resent
48
Q

How does the Internet Layer work? (3)

A
  • Uses the Internet Protocol (IP) to address packets with the source and destination IP addresses
  • A router forwards each packet towards an endpoint called a socket, defined by the combination of IP address and port number
  • Each router uses a routing table to instruct the next hop
49
Q

How does the Link Layer work?

A
  • Operates across a physical connection
  • Adds the MAC address of the physical NIC that packets should be sent to based on the destination IP address
  • MAC addresses change with each hop
50
Q

Using the TCP/IP Stack Levels, how is data received? (4)

A
  • The Link Layer removes the MAC address from each packet and passes it to the Internet Layer
  • The Internet Layer removes the IP address from each packet and passes it to the Transport Layer
  • The Transport Layer removes the port number f from each packet, reassembles the packets in the correct order and passes them to the Application Layer
  • The Application Layer presents the image data for the user in a browser
51
Q

What does TCP/IP stand for?

A

Transmission Control Protocol/Internet Protocol

52
Q

What does a MAC address do?

A

Media Access Control addresses
Uniquely identifies a physical device with a NIC

53
Q

What does NIC stand for?

A

Network Interface Card

54
Q

What is a Port used for?

A

Alerting a specific application to deal with data sent to a computer. They are used by protocols to specify what data is being sent

55
Q

What is Port 20 typically used for?

A

File Transfer Protocol (FTP) DATA

56
Q

What is Port 21 typically used for?

A

File Transfer Protocol (FTP) CONTROL

57
Q

What is Port 22 typically used for?

A

Secure Shell (SSH) Remote login

58
Q

What is Port 23 typically used for?

A

Telnet (unencrypted) Remote login

59
Q

What is Port 25 typically used for?

A

Simple Mail Transfer Protocol (SMTP)

60
Q

What is Port 80 and 8080 typically used for?

A

HyperText Transfer Protocol (HTTP)

61
Q

What is Port 110 typically used for?

A

Post Office Protocol v3 (POP3)

62
Q

What is Port 143 typically used for?

A

Interim Mail Access Protocol (IMAP)

63
Q

What is Port 443 typically used for?

A

HyperText Transfer Protocol Secure (HTTPS)

64
Q

What does FTP stand for?

A

File Transfer Protocol

65
Q

What is File Transfer Protocol?

A

An application level protocol used to move files across a network. FTP uses the client-server model with separate data and control channels operating on ports 20 and 21

66
Q

What are Mail Servers?

A

Dedicated computers that are responsible for storing email, providing access to clients and providing services to send emails

67
Q

What are the protocols of Mail Servers? (3)

A
  • SMTP
  • POP3
  • IMAP
68
Q

What does the SMTP protocol of Mail Servers do?

A

Used to send emails and forward them between mail servers to their destination

69
Q

What does the POP3 protocol of Mail Servers do?

A

Downloads email stored on a remote server to a local client (removed after download)

70
Q

What does the IMAP protocol of Mail Servers do?

A

Manages emails on a sever so multiple clients can access the same email account in synchronicity

71
Q

What is a Firewalll?

A

Software or hardware that controls access to and from a network

72
Q

What happens in Packet Filtering?

A

Packets of data are inspected by the firewall to check which port they are attempting to access. If this traffic is to be allowed through, the port must be opened for the duration of the connection, otherwise the firewall will automatically reject it

73
Q

What does a Proxy Server do?

A

Makes a web request on behalf of your own computer, hiding the true request IP addresses from the recipient

74
Q

What are the purposes of a Proxy Server?

A
  • Enables anonymous surfing
  • Can be used to filter undesirable online content
  • Logs user data with their requests
  • Provides a cache of previously visited sites to speed access
75
Q

What is Encryption?

A

The act of encoding a plaintext message so that it cannot be deciphered unless you have a numerical key to decrypt it

76
Q

What is Malware?

A

Malicious software that annoys users or damages their data

77
Q

What is a Worm?

A

A standaloneprogram that does not require a user to run it in order for it to spread.
Worms exploit vulnerabilities in the destination system and spread automatically

78
Q

What is a Trojan?

A

A programs that masquerades as innocuous or useful application. It cannot self-replicate and they often serve to open up back doors in your computer to the internet so that the processing power, internet bandwidth and data can be exploited remotely

79
Q

What is Phishing?

A

Using an email to manipulate a victim into visiting a fake website and giving away personal information

80
Q

When does Buffer Overflow Occur?

A

When a program accidentally writes data to a location too small to handle it

81
Q

What is an SQL Injection?

A

When a malicious user enters SQL commands via online database forms to change the processing

82
Q

What does HTML stand for?

A

Hyper Text Mark-up Language

83
Q

What is HTML?

A

The language of the World Wide Web
HTML describes the content of Web Pages

84
Q

What is the difference between HTML and CSS?

A

HTML is used to define the page content and structure
CSS are used to define page styles and appearance

85
Q

What does CSS stand for?

A

Cascade Style Sheets

86
Q

What can CSS be used to change? (4)

A
  • The style of an entire website
  • A single web page
  • A section of a webpage define by a <div> tag or
  • A single occurrence of an element, for example:
87
Q

What are the ways that Styles can be applied to HTML content? (3)

A
  • Inline styling to apply a unique style within an HTML element
  • Internal, embedded styles defined within <style> tags in the <head> section of a single HTML file</style>
  • Using an external style sheet and linking to it from any HTML files that may be created for an entire website
88
Q

What is the benefit of using External CSS Files?

A

Enables you to apply styles on a single CSS stylesheet to multiple HTML files throughout an entire website.
This also removes the CSS from the HTML pages making them easier to read

89
Q

What is the difference between Identifiers and Classes

A

Identifiers are unique to one element per web page. Classes can identify more than one element per page

90
Q

What is Javascript used for?

A

Used to program the behavior of web pages and add interactivity between the user and a web page

91
Q

What is a Function?

A

A block of code that is designed to be repeatedly called. They perform specific tasks that the user may wish to carry out multiple times. Functions are executed once they are invoked and are otherwise idle in the background

92
Q

Why would a website want an Alert Box? (2)

A
  • Sometimes it is an effective way of making sure the user conveys a piece of information
  • The alert box will often ask for confirmation and will not allow the user to continue interacting with the webpage
93
Q

What can an Array do?

A

Store multiple pieces of data under a single variable assignment

94
Q

What is a Web Crawler?

A

An Internet bot that continuously crawls the web to discover and record publicly available web pages

95
Q

What does a Meta Tag do?

A

Describes the content of a web page through HTML tags to make the page more likely to be found

96
Q

Can Meta Tags be seen by users?

A

No, only by web crawlers

97
Q

What is the PageRank algorithm specifically?

A

PR(A) = (1-d) + d [PR(Ti)/C(Ti) + … + PR(Tn)/C(Tn)]

98
Q

What is PR(Ti)?

A

The PageRank of Ti

99
Q

What is C(Ti)?

A

The number of outlinks on Ti

100
Q

What Factors affect PageRank? (6)

A
  • Domain name – relevance to the search item
  • Frequency of search term in web page
  • Age of web page
  • Frequency of page updates
  • Magnitude of content updates
  • Keywords in <H1> tags
101
Q

What is the Damping Factor?

A

The probability of a random web browser reaching a page. This value is usually set to 0.85

102
Q

What are the features of Client-Server Networking? (6)

A
  • A central server is used to manage security
  • Some files are held on the central server
  • Some processing tasks are performed by the server
  • Clients issue requests to the server for services such as email, file storage, backup and printing
  • Suitable for many different types of organization, small and large
  • Can require specialist IT staff to administer the network
103
Q

Does a Peer-to-Peer Model have a Central Server?

A

No

104
Q

What are the features of Peer-to-Peer Networking? (5)

A
  • They are suitable for a small company or home network with a few computers
  • No central server controls files or security
  • All computers can see files on all other computers
  • All computers can communicate with each other without going through a server
  • If a computer is switched off, data cannot be retrieved from it
105
Q

What are the other features of Client-Server Networking? (5)

A
  • User IDs, passwords and access levels centrally controlled
  • Used in many small, medium-size and large organisations
  • Can be expensive to set up and to manage
    Backup is centralised and usually automated
  • No access to other users’ files
106
Q

What are the other features of Peer-to-Peer Networking? (5)

A
  • Files and programs stored on individual computers
  • Suitable for a home computer network
  • Cheap to set up and maintain
  • Each computer on the network can act as both client and server
  • Can be used for sharing of music and streaming coverage of live events
107
Q

What are the advantages of Client Processing? (4)

A
  • Allows for more interactivity by immediately responding to a users’ action
  • Quick execution as no communication with the server is required
  • Removes potentially unnecessary processing from the server
  • Data cannot be intercepted on the way to the server, increasing security for the user
108
Q

What are the disadvantages of Client Processing? (4)

A
  • Not all browsers support all scripts (although most modern browsers support an overwhelming majority)
  • Because the scripts are processed by the client, they are dependent on the performance of the clients’ machine
  • Different browsers process scripts in slightly different ways, so the web page owner cannot be certain how the end-product will look to the user
109
Q

What are the disadvantages of Client Processing? (4)

A
  • Not all browsers support all scripts (although most modern browsers support an overwhelming majority)
  • Because the scripts are processed by the client, they are dependent on the performance of the clients’ machine
  • Different browsers process scripts in slightly different ways, so the web page owner cannot be certain how the end-product will look to the user
110
Q

What are the disadvantages of Client Processing? (4)

A
  • Not all browsers support all scripts (although most modern browsers support an overwhelming majority)
  • Because the scripts are processed by the client, they are dependent on the performance of the clients’ machine
  • Different browsers process scripts in slightly different ways, so the web page owner cannot be certain how the end-product will look to the user
111
Q

What is an API?

A

Application Programming Interface
A set of tools that can be used for building software applications. API requests are processed by the client and responded to by the relevant server

112
Q

What are examples of Server Programming Languages? (3)

A
  • Python
  • PHP
  • ASP