Networks (Unit 5) (Finished) Flashcards

1
Q

(5.1) What is the largest network in the world?

A

WWW (world wide web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(5.1) What is an IP?

A

Internet protocol- defines a system with a unique number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(5.1) What is a MAC address?

A

Hard coded hexadecimal number that defines a system permanently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(5.1) What is a URL?

A

used to specify the means of accessing a resource across a network and its location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(5.1) What is DNS (domain name system?)

A

dedicated computers with a list of domain names and their corresponding IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(5.1) What is the structure of DNS servers?

A

Several global servers that work together to catalogue every website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(5.1) What is a backbone?

A

A set of dedicated, high transmission rate network connections between 2 geographical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(5.1) What is a LAN?

A

Local area network, two or more computers together within a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(5.1) What components are needed for a wireless network?

A

Wireless Network Interface Card (NIC)

Wireless Access Point (WAP) requires a connection to a router, and the router requires a connection to a modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(5.2) What is circuit switching?

A

creates a communication connection between 2 endpoints for a transfer of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(5.2) What is a data packet?

A

Data is broken into chunks called packets and reassembled at the end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(5.2) What is time of travel known as

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(5.2) What is packet switching?

A

when packets switch network routes in order to take the quickest possible route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(5.2) What is routing?

A

when routers create the optimal path for packets to travel along in order to get to their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(5.2) What is a data packet made up of?

A

trailer- end of packet
payload- data
header- holds ip addresses and packet number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(5.2) How big are packets?

A

Packets are deliberately small so that they don’t take excessive time moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(5.2) What is the purpose of the packet header?

A

The header contains the recipient’s address so that it can be directed appropriately across the network

The address of the sender is also included so that replies can be sent appropriately

The packet number and overall number of packets in the transmission is attached to assist in reassembling the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(5.2) What is the purpose of the packet trailer?

A

contains error checking

cycle redundancy is used to check the data by the receiving host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(5.2) What is a protocol?

A

A set of rules for data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(5.2) why are protocols important?

A

Protocols are important as the help enforce the rules of data communication

these protocols must be standard across all devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(5.2) What are the protocols used in networks?

A

TCP/IP-Used to ensure data goes to the correct place on a network

DNS-Used to convert URLs to IP addresses

TLS/SSL-Encryption of data (not on the spec.)

HTTP/HTTPS-Viewing webpages (not on the spec.)

SMTP-Emailing (not on the spec.)

POP-Emailing (not on the spec.)

IMAP-Emailing (not on the spec.)

FTP/SFTP-Transferring files (not on the spec.)

Telnet-Old method of connecting to other terminals (not on the spec.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(5.2) What is the TCP/IP stack?

A

The TCP/IP stack is a set of rules used in turn, to format a message so it can be sent over a network

Each layer provides a specific function within the transmission of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(5.2) What are the 4 layers of the TCP/IP stack?

A
Application
Transport
Internet (network)
Link
(A til)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(5.2) What happens in the application layer of the TCP/IP stack?

A

Used to provide services for applications that want to communicate across a network, often the Internet

Uses high-level protocols that set an agreed standard between the communicating end-points
For example, SMTP (for e-mail), FTP (for file transfer) and HTTP (for web browsing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

(5.2) What happens in the transport layer of the TCP/IP stack?

A

Uses the Transmission Control Protocol (TCP) to establish an end‐to‐end connection with the recipient computer

Splits data into packets and numbers them sequentially

Adds port number to be used based on HTTP protocol

At the receiving end this layer confirms that packets have been received and requests any missing packets be resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

(5.2) What happens in the internet layer of the TCP/IP stack?

A

Uses the Internet Protocol (IP) to address packets with the source and destination IP addresses

A router forwards each packet towards an endpoint called a socket, defined by the combination of IP address and port number: 42.205.110.140:80

Each router uses a routing table to instruct the next hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

(5.2) What happens in the link layer of the TCP/IP stack?

A

The link layer operates across a physical connection

Adds the MAC address of the physical NIC that packets should be sent to based on the destination IP address

MAC addresses change with each hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

(5.2) How is the data received in the TCP/IP stack?

A

At the destination, the message is passed back up through the layers

The Link Layer removes the MAC address from each packet and passes it to the internet Layer

The Internet Layer removes the IP address from each packet and passes it to the Transport Layer

The Transport Layer removes the port number from each packet, reassembles the packets in the correct order and passes them to the Application Layer

The Application Layer presents the image data for the user in a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

(5.2) What is a MAC address?

A

A MAC address uniquely identifies a physical device with a Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

(5.2) What is a gateway, and what is it used for?

A

A computer that sits between different networks or applications

A gateway is required where data is travelling from one network to another that use different protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

(5.2) What is a bridge?

A

can be used to connect Local area networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

(5.2) What is a hub?

A

is used to connect devices in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

(5.2) What is a switch?

A

used to segment sections of a LAN

34
Q

(5.2) What is a router?

A

used to connect to the internet – enables routing onto the internet

35
Q

(5.2) What are the 3 protocols used for sending emails?

A

SMTP-Used to send emails and forward them between mail servers to their destination

POP3-Downloads email stored on a remote server to a local client (removed after download)

IMAP-Manages emails on a server so multiple clients can access the same email account in synchronicity

36
Q

(5.2) What is the difference between IMAP and POP?

A

IMAP holds mail on the server so that multiple devices can access all mail

POP downloads mail to a local device and removes it from the server

37
Q

(5.3) What is a firewall?

A

A firewall is either software or hardware that controls access to and from a network

38
Q

(5.3) How are things allowed through a firewall?

A

Numbered doors called ports are opened so that only certain traffic is allowed to pass through

39
Q

(5.3) What is packet filtering?

A

Packets of data are inspected by the firewall to check which port they are attempting to access

If this traffic is to be allowed through, the port must be opened for the duration of the connection, otherwise the firewall will automatically reject it.

40
Q

(5.3) What is a proxy server?

A

a server that makes a web request on behalf of your own computer

41
Q

(5.3) What are the functions of a proxy server?

A

Enables anonymous surfing

Can be used to filter undesirable online content

Can be used to disguise your location so you can access content you aren’t normally able to. (Foreign Netflix for instance)

Provides a cache of previously visited sites to speed access

42
Q

(5.3) What is malicious software?

A

software intentionally designed to cause disruption and problems

Some examples include:
malware- annoy users + damage data
worms- self replicate
viruses- self replicates, infects itself into other programs, but needs a user to help it spread

43
Q

(5.3) What are some measures that can be taken against malicious software?

A
Improving code quality
careful monitoring
Strong passwords
2 factor authentication 
guarding against SQL injection attack and buffer overflow attack
44
Q

(5.3) What is buffer overflow?

A

When a program accidentally writes data to a location too small to handle it, which results in overflow data

45
Q

(5.3) What is an SQL injection?

A

When a malicious user enters SQL commands via an online database to change the processing

46
Q

(5.3) What is monitoring, and what are some methods of monitoring?

A

monitoring can protect against the threat of hacking, which can introduce malware

Some examples of this includes:
Packet sniffers
User access logs
File auditing q

47
Q

(5.3) How can being up to date in updates be helpful in preventing hacking?

A

up to date patches to the software system helps to reduce vulnerabilities as new, more secure versions are constantly developed

48
Q

(5.4) What is HTML?

A

Hyper Text Markup Language- the language of the world wide web

describes the content of web pages

49
Q

(5.4) Where is HTML code stored?

A

Stored in a text file containing the contents of the website (such as text and images)

HTML uses tags to decide how to present sections of content

50
Q

(5.4) What is the difference between CSS and HTML?

A

HTML is used to define the page content and structure

CSS are used to define page style and appearance

51
Q

(5.4) What are the important HTML tags?

A

<h1> </h1>

<h2>

<img></img><a><div><p></p><li><ul></ul><ol>
</ol>

</li></div></a></h2>

52
Q

(5.4) What are ordered lists?

A

A numbered list can be created using the <ol> tags</ol>

53
Q

(5.4) What is an unordered list?

A

A bulleted list can be created using the <ul> tags</ul>

54
Q

(5.4) How can you apply CSS styles?

A

Inline styling to apply a unique style within an HTML element

Internal, embedded styles defined within tags in the section of a single HTML file

Using an external style sheet and linking to it from any HTML files that may be created for an entire website

55
Q

(5.4) How are external CSS files used?

A

External CSS files enable you to apply styles on a single CSS stylesheet to multiple HTML files throughout an entire website

56
Q

(5.4) What does linking to an external CSS file do

A

Linked to an external CSS file will apply the same styles to any HTML files that link to it

57
Q

(5.4) How are CSS style attributes linked to HTML sectors?

A

CSS style attributes are linked to HTML selectors

58
Q

(5.5) why is JavaScript important?

A

One of the 3 essential web technologies

Can be used to:
Program behavior of web pages
add interactivity between the user and a web page

59
Q

(5.5) What are the main 3 different programs of web design, and what are they mainly used for?

A

HTML is for adding content to a webpage/website.
CSS is for making a webpage/website look pretty.
JavaScript is for making a website interactive.

60
Q

(5.5) What is meant by JavaScript being an interpreted language?

A

Web features are easier to implement and:

allow complex tasks to be performed relatively easily

can execute ‘on the fly’ – does not need to compile which makes it quicker to run

enable quick addition of interactive elements to web pages

can run on many devices

61
Q

(5.5) What are the key components of JavaScript code?

A

Variables: assign, re-assign, and local vs. global scope

Functions: group code into functions, pass arguments to them, and return values from them

Conditionals: if/else statements and logical expressions

Loops: while and for loops to repeat code

Arrays: storing multiple pieces of data under a single variable

62
Q

(5.5) How is JavaScript used in relation to HTML?

A

Like CSS, JavaScript can be added directly into a HTML file or written in external files and then linked to an HTML page

63
Q

(5.5) How does Java deal with inputs?

A

JavaScript is commonly used to process data on the user’s machine as it is entered

This may validate data, animate objects/images such as shopping cart or provide other interactivity

64
Q

(5.6) What is search engine indexing?

A

Search engines keep a record of the resources located on the World Wide Web
This is known as an index

65
Q

(5.6) How are indexes generally created?

A

The process of creating an index includes using a piece of software called a web crawler or spider

66
Q

(5.6) What is a web crawler, and what do they store?

A

Web crawlers are Internet bots that continuously crawl the web to discover and record publicly available web pages

Store:
The URL of the resource
The content of the resource (ie. Text on a web page)
The last time the resource was updated
The quality of the resource (ie. How credible it is)

67
Q

(5.6) What is a meta tag?

A

Meta tags describe the content of a web page

68
Q

(5.6) What is PageRank?

A

PageRank was developed to list search results in the order and rank of usefulness and relevance

The algorithms takes into account inbound links (links from other websites) to a website to determine how useful a web page is

The PageRank of page A is defined by the PageRanks of those pages linked to page A

69
Q

(5.6) What are the key features of the PageRank algorithm? PR(A) = (1-d) + d (PR(Ti)/C(Ti) + … + PR(Tn)/C(Tn))

A

PR(A) is the PageRank of page A
PR(Ti) is the PageRank of pages Ti which link to page A
d is the damping factor (0.85)
C(Ti) is the number of outbound links on page Ti

70
Q

(5.6) What are some factors that affect PageRank?

A
Domain name – relevance to the search item
Frequency of search term in web page
Age of web page
Frequency of page updates
Magnitude of content updates
Keywords in <h1> tags
</h1>
71
Q

(5.7) What is validation?

A

Validation is used to see if the information that has been entered meets certain criteria before it is checked

72
Q

(5.7) What is a client-server network model?

A

This network model consists of two parts: the client and the server

The client accesses data, services and files from the server
The client initiates communication to the server
The server waits for requests from clients

73
Q

(5.7) What is an example of somewhere that would use a client-server model?

A

A school

74
Q

(5.7) What are some features of a client server model?

A

A central server is used to manage security
Some files are held on the central server
Some processing tasks are performed by the server
Clients issue requests to the server for services such as email, file storage, backup and printing
Suitable for many different types of organisation, small and large
Can require specialist IT staff to administer the network

75
Q

(5.7) What is a peer-to-peer network?

A

a group of computers are linked together with equal permissions and responsibilities for processing data.

76
Q

(5.7) What are some features of a peer-to-peer network?

A

They are suitable for a small company or home network with a few computers
No central server controls files or security
All computers can see files on all other computers
All computers can communicate with each other without going through a server
If a computer is switched off, data cannot be retrieved from it

77
Q

(5.7) What is client processing?

A

Data is processed before it is sent to a server by the client

78
Q

(5.7) What are the advantages and disadvantages of client processing?

A

Advantages:
Allows for more interactivity by immediately responding to a users’ action
Quick execution as no communication with the server is required
Removes potentially unnecessary processing from the server
Data cannot be intercepted on the way to the server, increasing security for the user

Disadvantages:
Not all browsers support all scripts (although most modern browsers support an overwhelming majority)
Because the scripts are processed by the client, they are dependent on the performance of the clients’ machine
Different browsers process scripts in slightly different ways, so the web page owner cannot be certain how the end-product will look to the user

79
Q

(5.7) What is Client side processing?

A

A client-side script is a program that is processed within the client browser.

80
Q

(5.7) What is server side processing?

A

When the server:
Process user input – providing another layer of validation
Display pages
Structure web applications
Interact with permanent storage/databases using SQL

This is done in languages such as Python

81
Q

(5.7) What are some advantages of server side processing?

A

The client does not always have the capability to provide the data required to successfully process a request
A company may hold sensitive data relating to the request
Server side is more secure as you cant see the code behind the process
The way the data is processed may also be a company secret and be protected by law