1.3/1.4 Flashcards

(106 cards)

1
Q

what is compression?

A

the idea of trying to reduce the file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the need of using compression

A

reducing number of bits in a file
making the storage capacity of the file lower
making data transfer of the file quicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossy compression?

A

Removing some of the data=reduce its size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossless compression?

A

Making the size of a file smaller without losing any of the information in the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

advantages/disadvantages of lossy compression?

A

advantages = reduces file size , suitable for images,sound and videos
disadvantages = some of the data is lost and cannot be recovered , reduces quality of the image/sound ,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

advantages and disadvantages of lossless compression?

A

advantages = none of the data is lost it is encoded differently , can be turned back into the original format , can be used on types of data ,
disadvantages = usually less effective = reducing the file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the advantages of networking?

A

users can share files.

users can share peripherals: printers and connection to other networks e.g the internet.

users can access their files from any computer on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the characteristics of local area newtork (lan)

A

covers a small geographical area located on a single site.

all the hardware for a lan is owned by the organisation using it.

lan are wired with utp cable,fibre optic or wireless using Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the characteristics of wide area network (wan)

A

covers a large geographical areas , connecting lan’s together.

infrastructure between the lans is leased from telecommunication companies who own and manage it.

wan’s are connected with telephone lines , fibre optics cables or satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which hardware are needed for home solution

A

personal home devices for connecting to the internet tend to be multi-functions , all - in one devices acting as
switch
router
wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

disadvantages of networking?

A

malware and viruses spread very easily between computers.

if a server fails the computers connected to it may not work.

the computer may run more slowly if there is a lot of data travelling on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the client-server model?

A

where devices are reliant on services provided and managed by a central server;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the roles of client-server model?

A

manages access to the internet
provides email services
runs a backup of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the advantages of client-server model?

A
  • easier to manage security files
  • easier to take backups of all shared data
  • easier to install software updates to all computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the disadvantages of client -server model?

A
  • can be expensive to set up and maintain
  • requires it specialists to maintain
  • users will lose access if the server fails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the peer to peer model?
.

A

peer is a computer on a network and is equal to all other peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the role of the peer to peer model?

A
  • peers serve their own files to each other
  • each peer is responsible for its own security
    -each peer is responsible for its own backup
  • peers usually have their own printers
  • you can send print jobs to another peer to process but that peer would need to be switched on to be able to communicate with the connected printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

advantages of the peer to peer model?

A
  • very easy to maintain
  • cheaper to set up
  • no expensive hardware to be required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

disadvantages of the peer to peer model

A
  • the network is less secure
  • users will need to manage their own backups
  • can be difficult to maintain a well ordered file store
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the factors that affect the performance of a network?

A

bandwidth
the number of users
transmission media
the error rate
latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what does network performance mean?

A

concerned with how well data is transmitted through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how does bandwidth affect the performance of the network?

A

measures how much data can be transferred over a network in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

how does the number of users affect the performance of the network?

A

the bandwidth of the network is shared between the users of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

how does transmission media affect the performance of the network?

A

what the data is transmitted through.data can be carried around networks via cables or wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
how does error rate affect the performance of the network
the number of errors that occur during data transmission
26
how does latency affect the performance of the network
measure of how much time it takes for a packet of data to travel across the network.
27
what is the hardware needed to connect stand-alone computers into a lan?
nic (network interface controller) switch wap router tranmission media: copper cables , fibre optic cables , radio waves
28
what does the nic do
enables the computer to be connected to a network.
29
what does the switch do
connects wired devices on a lan
30
what does the wap do
connects wireless devices on a lan
31
what does the router do?
connects different types of network together
32
what does the tranmission media do?
copper cable - transmits electrical signals (typically used in ethernet cables) fibre optic cables - made up of thin glass strands (or fibres) which transmit data as pulses of light radio wave - uses parts of em spectrum to connect devices wirelessly
33
what is the internet?
worldwide collection of computer networks
34
what is a dns
domain name system, it matches each domain name to its matching ip address
35
what is hosting
websites and others internet services needed to be placed on a web server.
36
what is the cloud?
storage, services and applications that are accessed via the internet
37
what the webserver?
this is a dedicated computer on the internet that responds to http and https requests by returning web pages requested by a client computer
38
what is a star topology?
all nodes are connected through a central point typically a switch or a hub.
39
what is a mesh topology?
all nodes are involved in the transmission of a message
40
node
device which is connected to a network
41
adv of star topology
fast - each node has its own connection to the centre. reliable - if a fault occurs in one link other links are not neccessary affected
42
disadv of star topology
if the central switch/hub fails then the whole network goes down.
43
adv of mesh topology
full mesh - if you get a break in any of the connections you can still route your traffic having no central switch means there is no single point of failure
44
disadv of mesh topology?
full mesh - expensive usually implemented wirelessly
45
what is ethernet?
traditional protocol used to connect devices in a wired lan it defines how data should be physically transmitted between different devices, using MAC addresses to determine which device the data should be sent to.
46
adv of ethernet
stable connection more secure signal quality usually better
47
disadv of ethernet
expensive difficult to add extra devices devices can be used in one devices
48
what is wi-fi
set of protocols that defines how network devices can communicate wirelessly using radio waves.
49
what does the wi-fi protocol determine?
frequency band and channel that should be used. data transmission rates how devices should be authenticated when they attempt to join a network.
50
adv of wifi
cheap setup costs can handle large numbers of users connect multiple devices without the need for extra hardware.
51
disadv of wifi
tends to have slower data transfer speeds connection isn't stable less secure then a wired network as it is more vulnerable to hacking.
52
what is bluetooth?
another form of wireless protocol that can be used over short distances using ultra high frequency (uhf) radiowaves it is very secure and does not require a clear line of sight between the two devices
53
encryption?
the process of disguising a message so that it cannot be understood by anyone but its intended recipient.
54
how is encryption done?
by scrambling data into cipher text using a 'master key' created from ssid of the network and the password. data is decrypted by the reciever using the same master key , so this key is not transmitted. handshaking protocol is used to ensure that the reciever has a valid master key before transmission to the device begins.
55
protocols used for wireless encryption include...
WEP , WPA , WPA2
56
IPv4 format?
written in 4 numbers separated by periods (.) e.g 193.74.211.63 each number in the range 0-255
57
IPv6 format?
written in 8 numbers separated by colons each group is made up of four hex values representing 16-bits
58
why is MAC address used?
its used to route frames on a local area network. e.g 00:0a:95:9d:68:16 each mac address is unique to every network interface card.
59
what is the purpose of using ip addressing on a wide area network
is used to route packets on a wide area network
60
format for an iPv4 address?
32 bits in size. written as four numbers separated by periods (.), each number in the range of 0-255 e.g 69:89:31:212
61
what is a mac address?
unique number that identifies the actual device that is connected to a lan its part of the NIC inside the device and is assigned when the NIC is manufactured and cannot be changed
62
what does the IP address represent
location on the device on the network. every time a device connects to the internet it is assigned an ip address to use for that session by the internet service provider.
63
why is IPv4 being replaced by IPv6
because the unique static address are running out.
64
format for an IPv6 address?
128 bits written in 8 groups, separated from by colons, each group is made up of four hex values representing 16 bits
65
what are standards?
official definitions or rules that exist for various aspects of computing
66
why are hardware and software standards important?
they allow different manufacturers to make components and programs that are compatible and will work with each other. without standards only hardware and software made by the same company could be used together it is clear that networks require standards in order to work conveniently
67
give examples of when standards are used in computer science?
ascii/unicode - character sets ieee - standards for computer cables html - standards for creating websites documents, image and sound standards e.g pdf
68
what is a protocol?
set of rules that allow two devices to communicate
69
what are the common protocols?
TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL/ HTTP (HYPER TEXT TRANSFER PROTOCOL) HTTPS (HYPER TEXT TRANSFER PROTOCOL SECURE) FTP ( FILE TRANSFER PROTOCOL) POP (POST OFFICE PROTOCOL) IMAP (INTERNET MESSAGE ACCESS PROTOCOL) SMTP (SIMPLE MAIL TRANSFER PROTOCOL)
70
TCP (transmission control protocol)?
provides an error free transmission between 2 routers
71
IP (internet protocol)?
route packets across a wide area network along with TCP its makes up the TCP/IP protocol stack.
72
HTTP (hypertext transfer protocol)?
a client server method of requesting and delivering HTML web pages.
73
HTTPS (hypertext transfer protocol secure)
encryption and authentication for requesting and delivering html web pages. used when sensitive information needs to be transferred e.g passwords
74
FTP ( file transfer protocol)
used for sending files between computers usually on wide area network.
75
POP (post office protocol)
retrieves emails from a mail server removes it from server transfers it to your device
76
SMTP ( simple mail transfer protocol)
sends email to an email server
77
IMAP (internet message access protocol)
used by mail clients to manage remote mail boxes and retrieve email from a mail server
78
what is the concept of layering?
to divide the complex task of networking into smaller , simpler tasks that work with each other the hardware and/or software for each layer has a defined responsibility. each layer provides a service to the layer above it
79
adv of layering?
reduces the complexity of the problem into manageable sub-problems. devices can be manufactured to operate at a particular layer. products from vendors will work together.
80
4 layer model or TCP/IP stack:
layer 4 - application layer - browsing using HTTPS layer 3 - transport layer - TCP error handling layer 2 - internet layer - IP routing layer 1 - networking layer - mac frames (sent over fibre optic)
81
different forms of attack?
malware phishing brute force denial of service data interception and theft SQL injection
82
what is a malware?
software which is specifically designed to disrupt, damage or gain unauthorised access to a computer system. e.g virus , worms , trojan horses , ransomware , spyware
83
what is phishing?
use fake emails and websites to trick people into giving away their sensitive data and info.
84
what is social engineering?
form of attack that involves tricking people into giving away critical info or access details. e.g phishing
85
what is brute force attack?
trial and error method of attempting passwords and pin numbers . automates software is used to generate a large number of consecutive guesses e.g by trying every word in the dictionary
86
what is denial of service attack
flooding a server with useless traffic causing the server to become overloaded and unavailable.
87
what is data interception and theft?
the unauthorised act of stealing computer-based info from an unknowing victim with the intent of compromising privacy or obtaining confidential info e.g sniff username
88
what is SQL injection?
a hacker tries to insert extra SQL commands into input boxes on web forms in web pages hoping the server will carry these commands in error
89
threats to a malware?
files are deleted, become corrupted or are encrypted. computer crashes, reboots spontaneously and slow down. internet connection becomes slow. keyboard inputs are logged and sent to hackers
90
threats to phishing?
access a victims account to withdraw money etc open bank accounts and credit cards cashing illegitimate cheques. gains access to high value corporate data financial service can blacklist the company, resulting in damage to brand reputation
91
threats to a brute force attack
theft of data access to corporate systems
92
threats to a denial of service attack
loss of access to a service for customers. loss of revenue lower productivity damage to reputation
93
threats to data interception and theft attack
usernames and passwords compromised allowing unauthorised access systems. disclosure of corporate data theft of data
94
threats to SQL injection
contents of databases can be output, revealing private data data in the database can be amended or deleted new rogue records can be added to the database
95
threats to a social engineering?
not installing operating systems updates. not keeping anti-malware up to date not keeping doors to computer rooms not logging off or locking their computers
96
common prevention methods?
penetration testing ( used to test to identify vulnerabilities) anti-malware software. firewalls (designed to prevent unauthorised access to networks , they inspect and outgoing data packets) user access levels passwords encryption physical security
97
common prevention methods?
penetration testing ( used to test to identify vulnerabilities) anti-malware software. firewalls (designed to prevent unauthorised access to networks , they inspect and outgoing data packets) user access levels passwords encryption physical security
98
prevention of malware?
strong security software (firewall , spam filter , anti virus , anti spyware) enabling OS and security software updates. educate users being cautious of opening email attachments and downloading software. backup files regularly onto removable device
99
prevention of phishing?
strong security software educate users on awareness of spotting fake emails and websites educate users not disclosing personal or corporate info. staff training: disabiling
100
prevention of phishing?
strong security software educate users on awareness of spotting fake emails and websites educate users not disclosing personal or corporate info. staff training: disabiling
101
prevention of phishing?
strong security software educate users on awareness of spotting fake emails and websites educate users not disclosing personal or corporate info. staff training: disabiling
101
prevention of phishing?
strong security software educate users on awareness of spotting fake emails and websites educate users not disclosing personal or corporate info. staff training: disabiling
102
prevention of brute force attack
network lockout policy: locks account after 3 passwords attempts using progressive delays staff training: using effective passwords with symbols, letters numbers and mixed cases. using challenge response e.g 'i am not a robot' and reCAPTCHA
103
prevention of denial of service attack
strong firewall packet filters on routes configuring the web server auditing , logging and monitoring of systems
104
prevention of data interception and theft
encryption using virtual networks staff training: use of passwords, locking computers, logging off, use of portable media investigating your own networks vulnerabilities
105
preventing SQL injection?
validation on input boxes using parameter queries setting databases permission penetrating testing