WWL/HTML Flashcards

1
Q

Who invented WWW

A

Tim Berner Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is WW?

A
  • A way of accessing the information on the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is information encapsulated and viewed in?

A
  • Information is encapsulated in a web page and viewed in web browser (e.g google chrome)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Client-Server Model

A
  • Describes the interaction of networked computers
  • Clients request information from servers
  • Servers respond with the information (if applicable)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the web server?

A
  • A computer set up to respond to requests for web pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server Codes

A

Web Server; HTTP
File Server: FTP
Mail Server: SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP (Hyper Text Transfer Protocol)

A
  • Method of requesting and transmitting web pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does communication between client computers and web servers happen?

A
  • Done by sending HTTP Requests and receiving HTTP Responses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens when a clicks on a link or enters a URL in a browser?

A
  • A request is sent to the HTTP port (80 or 8080) of the associated web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are web analytics?

A
  • Collection and analysis of data regarding website usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are web analytics used?

A
  • Used by website owners to track the number and

behavior of users visiting their sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is HTML? (HyperText Markup Language)

A
  • Defines content of web page as text file with .html extension
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Escape Characters

A
  • Characters that are used in HTML in addition to
    ordinary text and need to be represented
    by a character sequence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Special Characters

A
  • A character that is not an alphabetic or numeric character.
  • Entered in unicode using hex/dec notation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three components of a webpage?

A

-HTML (Content and Strucutre, CSS (Presentation), Javascript (behaviour)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forms

A
  • Allow users to provide information that is sent to a server for storage (e.g., creating a new account) and processing (e.g., making an online purchase)
17
Q

What are the three ways CSS can be added to HTML elements?

A
  1. Inline - by using the style attribute in HTML elements
  2. Internal - by using a element in the section
  3. External - by using an external CSS file
18
Q

Inline CSS

A
  • An inline CSS is used to apply a unique style to a single HTML element.
19
Q

Internal CSS

A
  • An internal CSS is used to define a style for a single HTML page.
20
Q

What can Java Script Change?

A
  • Browser characteristics (e.g., display size, orientation, device)
  • User actions (e.g., mouse movement, clicks, scrolling)
21
Q

What are Cookies used for?

A
  • Cookies are used to store permanent ID about a client’s visit to a specific web server such as:
  • Identification information (e.g., username and credentials)
    • Display preferences (e.g., preferred shopping categories)
    • Shopping information (e.g., items browsed, items in your cart)
    • Regional and language preference
22
Q

Tracking Mechanisms:

A
  1. Cookies
  2. Browser Fingerprinting
    - browser version, language preference, installed fonts, plug-ins, … may (uniquely) identify you without the use of cookies
  3. Javascript
  4. Web Beacon/Web bug
23
Q

Security Risks- Clients

A
  1. Phishing
  2. Malware
  3. Trojan
  4. Vrius
  5. Worm
24
Q

Types of Malicious Software

A
  • Virus
  • Worm
  • Trojan
25
Q

Trojan

A
  • Invade your computer disguised as a real, operational program.
26
Q

Types of Malicious Actions by Trojan

A
  1. RAT (Remote Administration Tool): can activate and
    broadcast images from a webcam
  2. Key logger: capture and transfer typed data (passwords)
  3. Backdoor: Provide remote access and control
  4. Ransomware: encrypt user data to extort money from owner
27
Q

Virus

A
  • Can corrupt, delete, or steal data; can disrupt computer system
  • Spreads by “infecting” (attaching itself to) other files that are shared between computers
28
Q

Worm

A
  • Does not attach itself to a file to spread

- Able to replicate itself autonomously over networks

29
Q

Security Risks-Server

A
  • An attack meant to shut down a machine or network, making it inaccessible to its intended users
30
Q

Distributed Denial of Service Attack

A
  • DoS attack from hundreds, thousands, or millions of clients from many different computers
31
Q

Security Risks-Communication

A
  1. Man-in the middle

- Typically uses lure of “free Wi-Fi” in coffee shops, airports, etc.

32
Q

Security Risks-Communication Migitation Measures

A
  • Use HTTPs connections when avaiable

- Use a virtual private network (VPN) service