Year 13 Theory Test 1 Flashcards
What are the features of Serial Files?
- Data is stored in the order in which it is entered.
- No order to the data is maintained.
- Useful for storing transactional data and initialisation files.
What are the features of Sequential Files?
- Store data in order of a key field.
- The order is maintained when new records are added.
- Useful for storing master files.
What is a Database?
A structured, persistent collection of data.
What are the advantages of Databases?
- Makes processing more efficient.
- Reduces storage requirements.
- Avoids redundancy.
- Allows different users to only see relevant data.
What does DBMS Stand for?
DataBase Management System
What is a DataBase Management System?
A software system that enables the definition, creation and maintenance of a database and which provides controlled access to this database.
What is a Table?
A collection of related data and is made up of Records and Fields.
What is a Field?
Used in a database to provide category headings for each item of data in the database.
What is a Record?
A collection of data for one object, person, or thing.
What is a Primary Key?
An attribute or set of attributes which uniqely identifies a tuple.
What is a Composite Key?
A combination of attributes that uniquely identifies a tuple/ record.
What is a Foreign Key?
An attribute in one table that is a primary key in another table.
What is a Data Model?
An abstract model for organising data and its relationship in real world entities.
What is Entity-Relationship Modelling?
A method of abstractly describing the data tables and the relationships between them visually. They can be used to reduce redundancy and construct a relational database.
What is an Attribute?
A characteristic specification that defines a property or feature about an entity stored in a database.
What is a Relational Database?
A database where separate tables are made for each entity, and the relationships between entities are represented by foreign keys.
What is Normalisation?
The formal process of optimally designing data tables by reducing data redundancy and repitition by converting them into normal forms.
What is First Normal Form (1NF)?
A table with no repeating attributes. The intersection of each record and attribute produces exactly one value.
What is Second Normal Form (2NF)?
A table in 1NF that has data that repeats across multiple records removed and put into a new table with appropriate relationships (no partial dependencies).
What is Third Normal Form (3NF)?
A table in 2NF where all attribures that are not the primary key are fully dependent on the primary key, meaning there are no non-key dependencies.
What does SQL stand for?
Structured Query Language
What is SQL?
A language for relational database management and manipulation.
What is a Client Server Database?
A system that provides simultaneous access to the database for multiple clients.
What is a Router?
A device that receives packets from one host or router and uses the destination IP address that they contain to pass them correctly ormated to another host, or router.
What is a Gateway?
A device used to connect networks using different protocols so that information can be successfully passed from one system to another.
What is a Domain Name?
The name that locates a domain on the internet. It is included as part of a URL.
What does DNS stand for?
Domain Name Server
What is a Domain Name Server System?
A hierarchical and decentralised naming system for computer systems connected to the internet. It contains the IP addresses of all domain names on the internet.
What does FQDN stand for?
Fully Qualified Domain Name
What is a Fully Qualified Domain Name?
A domain name specifying the exact location of a domain in the Domain Name Server System hierarchy.
What is the Internet?
A global network of computer systems communicating using TCP/ IP.
What are Internet Registries?
Organisations responsible for the allocation of Domain Names and IP Addresses.
What does IP stand for?
Internet Protocol
What is an IP Address?
A numerical address assigned to any device communicating via Internet Protocol on a network that identifies its host and addresses its location.
What is a Packet?
A block of data.
What is Packet Switching?
A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination.
What is the Process of Packet Switching.
- Data is split into equally-sized packets.
- They are attached with a header for error checking.
- They are given an IP address and then sent across the network.
- Each packet generally takes different routes depending on the levels of traffic at each route.
- The packets are checked for errors and the recipient requests the packet to be resent if there is an error.
- The packets will usually be out of order when they arrive, so are put back into order when they all arrive.
What does URL stand for?
Uniform Resource Locator
What is a URL?
A reference to a resource on the internet that is able to locate and retrieve it.
What is a Firewall?
a security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent exteranl users from gaining unauthorised access between two networks.
What is Asymmetric Encryption
An encryption tecnhique where a public key available to everyone is used to encrypt the data, and the data is decrypted by the paired private key known only by the recipient.
What is Symmetric Encryption?
An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties.
What is a Digital Certificate?
An electronic docmument providing ownership of a public key and hence authenticating your identity.
What is a Digital Signature?
A mathematical scheme for producing a unique signature, that verifies the authenticity of encrypted digital messages.
What is a Certification Authority?
A trusted organisation which is responsible for providing digital certificates,
What is the process of applying a Digital Signiture?
- Apply a hash function to the plaintext message to produce a message digest.
- Use the private key to encrypt the message digest. The encrypted digest becomes the digital signiture.
- Attach the digital signature to the plaintext message and encrypt the whole thing with Public Key.
4, Decrypt with the recipient;s private key. - Extract the digital signature with the recipient’s public key.
- The message digest is regenerated by applying the hash function to the plaintext message.
- Compare the regenerated message digest with the original digest.
What does Malware stand for?
Malicious Software
What is Malware?
A broad catch all term to describe any software which has been written with an intent to cause damage/ harm/ corruption/ nuisance.
What is a Trojan?
A malware that hides within another file and misleads the user of its true intnet.
What is a Virus?
A program that attaches itself to antoher computer file to infect a computer system by replicating itself and inserting its code into other files.
What is a Worm?
A standalone virus capable of spreading and infecting a computer without being attached to a file.
What is a Port?
A communication endpoint that addresses a service on a network. It is used to represent services or applications.