1.3 Exchanging Data Flashcards

1
Q

How does lossy compression work

A

Unnecessary information is removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does lossless compression work

A

All information is retained so file is replicated exactly and patterns in the data are recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What files use lossy compression

A

JPG - quality is lost
MP3- Frequencies and sounds that can not be heard are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an entity (databases)

A

Category of object, person, event or thing of interest to an organisation about which data us to be recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an identifier (databases)

A

Uniquely identifies the entity (known as primary key in relational database)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the secondary key (database)

A

Any index that is not the primary key of a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the possible relationship between entities

A

1-1
1-many
many-many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a foreign key (databases)

A

Links two tables in a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a composite primary key (databases)

A

A primary key that consisted if mire than one attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an attribute (databases)

A

An identifying piece of information that serves to define further and expand the primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is referential integrity

A

Ensuring that a component in tables linked in a relational database are not deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an index (databases)

A

Gives the position of each record according to its primary key
One or more secondary indexes may be defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is data captured

A

Manual methods (transcribing) Magnetic Ink Character Recognition
Optical Character Recognition
Smart card readers
Scanners
Barcode readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is data selected and managed

A

Speed cameras
SQL, data may be used to produce reports, send letters or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is data exchanged

A

Electronic Data Interchange
Transaction software processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are internet service providers

A

Connect directly to backbone cables connected by trans continental lines fed across the sea beds and distribute the internet connection to smaller providers who in turn provide access to individual homes and businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an URL

A

Full address of an internet resource, it specifies location of a resource on the internet, including resource name and usually the file type so a browser can request it from a website server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are internet registrars

A

Hold records of all existing website name names and the details of those domains that are available for purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are internet registries

A

Organizations that manage and allocate Internet resources like IP addresses within specific geographic regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the domain name do

A

Identifies domain that an internet resource resides In.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a domain name server

A

Domain names structured into a hierarchy of smaller domains and written as a string separated by full stops as dictated by the rules of the dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are global directories

A

DNS catalogues all domain names and IP addresses here
Servers can access them to find the correct IP address location for a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What happens when a user enters the URL

A

Browser requests IP address from local DNS
Keeps asking DNS servers till IP address is located
Once it is located a data request is sent by users computer to the location to find the web page data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a fully qualified domain name

A

Includes the host server name

25
What is an IP address
Unique address that is assigned to a network device, it indicates where a packet of data is to be sent or has been sent from.
26
What is a router
Use the IP address to direct the data packet
27
Features of a WAN
Relies on third party connections and are typically spread over a large geographical area
28
Features of a LAN
Computing devices on a single site connected together by cables. Can transmit data very fast but only over a short distance
29
What is a bus topology
All computers are connected to a single cable, the ends of the cables are plugged into a terminator
30
Advantages and Disadvantages of a bus topology
Inexpensive to install as it requires less cable If main cable fails network data can not be transmitted Performance degrades with heavy traffic Low security, all computers can see all data transmissions
31
What is the structure of a star topology
Has a single central node, either a switch or computer that acts as a router
32
What is the role of a switch in a star topology
Keeps record of unique MAC address of each device on the network and can identify the particular computer on the network it should send data to
33
Advantages and Disadvantages of a star topology
One cable fails, one station affected Consistent performance Higher transmission speeds No data collisions More secure Easy to add new stations Costly to install If central device fails all nodes can not transmit data
34
What is WiFi
Local area wireless technology that enables you to connect devices to a network resource or to the internet via a wireless network access point
35
What is circuit switching
Creates a direct link between two devices for the duration of the communication Band with is wasted when data is not sent Devices must transmit and send data at the same rate Simple to reconstruct message Electrical interferente could corrupt data
36
What is packet switching
Method of communicating packets of data across a network on which other communications are happening simultaneously
37
What is a data packet
Chunks of data that is transmitted across the internet Each contain a header and payload Include time to live
38
What is a MAC address
It is assigned and hard coded into a NIC, uniquely identifying the device
39
What is a protocol
Set of rules defining common methods of data communication
40
What is HTTP/HTTPS
Hyper text transfer protocol (secure) is a standard protocol for browsers to render web pages
41
What is TCP/IP
Enables communication with any other computer connected to the internet regardless of its location
42
What is the TCP/IP stack
Set of networking protocols that work together as four connected layers passing incoming and outgoing data packets Application layer Transport layer Internet layer LInk layer
43
What happens in then application layer
Uses protocols relating to the application being used to transmit data over a network
44
What happens in the transport layer
Uses TCP to establish end to end connection with the recipient computer. Data is sorted into packets with the packet number, number of packets and port number through which the packet should route. Can request retransmission of lost packets
45
What happens in the internet layer
Adds source and destination IP address. Routers operate on the network layer and use these to forward packets to its destination
46
What happens in the link layer
Physical connection between network nodes and adds the unique MAC address identifying the NICs of the source and destination computers Once received MAC address us stripped off by link layer, which passes packets onto the internet layer which passes them onto the transport layer to remove the port numbers and reassemble the packets
47
What is the FTP
File transport protocol Transfers data across a network Works at application layer using appropriate software
48
What is a mail server
Routes mail according to its database and it is stored until it can be retrieved
49
What is the P0P3
Post office protocol Retrieves emails from a mail server and then deletes it from server
50
What is IMAP
Internet message access protocol Keeps email on the server
51
What is SMTP
Simple mail transfer protocol Transfers outgoing emails from one server to another or from an email client to the server when sending an email
52
What is HTML
Language web pages are written in, describes content and structure of a web page so that a browser is able to interpret and render the page for the viewer
53
What is CSS
Scripting language that is used to describe the layout and styles of a web page
54
What is java script
Script language that uses all of the same programming constructs that are familiar in languages Interpreted rather than compiled Can be used to process input data from a clients computer
55
What is a client server network
One or more computers (clients) that are connected to a powerful central computer (server)
56
Advantages and Disadvantages of client server network
Secure Backups done centrally Data easily shared between clients Expensive Professional IT staff needed
57
What is cloud computing
Growing service based industry providing access to software or files via the internet using client server model
58
What is a peer to peer network
No central server and individual computers are connected to each other either locally or over a WAN
59
Advantages and Disadvantages of a peer to peer network
Cheap Share resources like printer Not difficult to maintain Used for online piracy