1.3 Exchanging data Flashcards

1
Q

What is Asymmetric encryption?

A

An encryption technique where a public key available to everyone is used to encrypt the data and the data is decrypted by the paired private key known only by the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is dictionary coding?

A

A type of lossless compression where text is searched for in entries that match the entries in a dictionary. Entries are substituted by a unique code which can then be translated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hashing?

A

A one-way transformation of data into an abbreviated form called a hash value. The hash value is used to validate login credentials like passwords or pins without revealing the original data to hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossless compression?

A

A compression algorithm that retains all the data in the file by only storing the instructions needed to reconstruct the original file. No data is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is lossy compression?

A

A compression algorithm that removes non-essential data from a file leading to a noticeable decrease in accuracy of data. Data is lost and non-recoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is run-length encoding?

A

A type of lossless compression where repeated occurrences of the same data (like several pixels of the same colour in an image) are stored as single data values with their counts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric encryption?

A

An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is atomicity?

A

All transactions should either succeed or fail and never only be partially processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is consistency?

A

Each transaction must obey the defined validations rules of the database to maintain referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is durability?

A

Once a transaction has begun, it must be completed under all circumstances not lost under power loss.
guarantees that once the transaction completes and changes are written to the database, they are persisted. This ensures that data within the system will persist even in the case of system failures like crashes or power outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is entity-relationship modelling?

A

A method of abstractly describing the data tables and the relationship between them visually. They can be used to reduce redundancy and construct a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1NF

A

A table with no repeating attributes. The intersection of each record and attribute produces exactly one value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Flat file database?

A

A database where a single table data structure is used to store all of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Foreign key

A

A linking attribute that joins two table in a relational database by being a primary key in one and a foreign key in another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is indexing?

A

The process of creating an index of primary keys such that the location of any record can be retrieved given its primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is isolation?

A

No transaction should overwrite other transactions that are simultaneously occurring. The same results must be obtained if transactions are concurrently or sequentially processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is normalisation

A

The formal process of optimally designing data tables by reducing data redundancy and repetition by converting them into normal forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a primary key?

A

A unique identifier that identifies each RECORD in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is record locking?

A

A technique used to prevent simultaneous access to data in a database by locking a record when it is being edited or updated. Otherwise inconsistencies may arise in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is redundancy?

A

The unnecessary repetition of a field in multiple tables. Databases should have redundancy in the form of identical copies if part of the database gets lost and needs to be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is referential integrity

A

The idea of keeping a database consistent by ensuring that any changes made to data or relationships associated with a table are accounted for in all the linked tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a relational database?

A

A database where separate tables are made for each entity and relationships between entities are represented by foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a secondary key?

A

A key that can be used as an alternative index to access or sort records in the table in a quicker but less accurate way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

2NF

A

1NF needs to be completed and a table that has data that repeats across multiple records removed and put into a new table with appropriate relationships ( no partial dependencies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

3NF

A

2NF needs to be completed where all attributes that are not the primary key are fully dependant on the primary key (no non-key dependencies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is transaction processing?

A

The idea of making sure that any logical operation or change in state of a database (transaction) conforms to ACID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is ACID

A

Atomicity, consistency, isolation, durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is circuit switching?

A

A method for sending data between two nodes on a networks by creating a dedicated communication channel first. All data follows this path for the duration of communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a client-server network?

A

A type of network organisation where networked computers (clients) connect to one or more powerful central computers (servers) that handles service requests and has resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a domain name system?

A

A hierarchical naming system that maps human-readable domain names to IP addresses that locate and identify resources on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is encryption?

A

The process of converting the original data (plaintext) into a form which cannot be understood by unauthorised users (cipher text) using an encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are firewalls?

A

A security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent external users from gaining unauthorised access between two networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Local area networks

A

A network connecting a group of computing devices on a single geographical site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Packet switching

A

A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Peer to peer network

A

A type of network organisation where networked computers are connected to each other and share resources and workloads without a central server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Protocol layering

A

A technique the simplifies network design by dividing it into its functional layers and assigning protocols to each layer to complete tasks and communicate with adjacent layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are proxies?

A

A server application that intercepts all data packets entering and leaving a network to hide the true addresses of the source. Also restrict access to data and isolate the network from external networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

TCP/IP stack

A

Networking protocols that allow networked computers to communicate consisting of 4 connected layers. All incoming packets are passed through these layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Wide area networks

A

A network connecting a group of computing devices over a large geographical area typically with the help of third party carriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does CSS stand for?

A

Cascading style sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CSS

A

A style language used to define the layout, design and presentation of a webpage written in a markup language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is client-side processing

A

The data processing and operations performed by the clienton the clkienbts local computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What resources are used for client-side processing

A

The user’s local computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does HTML stand for?

A

HyperText Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

HTML

A

A mark-up language used to write the contents of the webpages on the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is JavaScript?

A

A interpreted, object oriented programming language used to create interactive elements within web browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Why is JavaScript used?

A

To add functionality to dynamic web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

PageRank algorithm

A

A link analysis algorithm to rank web pages. Assesses number and quality of inbounded links to a page
recalculates pagerank scores each time it crawls the web and rebuilds its index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Search engine indexing

A

A method of collecting, parsing and storing data from websites to facilitate fast and accurate information retrieval using an index of webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Server side processing

A

The data processing and operations performed by the web server. Data sent from the clients browser to the web server for secure processing, output is sent back to client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

AAAAAABBBBBCCC in RLE

A

A6B5C3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What also has to be stored when using dictionary compression

A

The dictionary created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the process of the sender and receiver sharing the same private key in symmetric encryption?

A

Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the key used for in symmetric encryption?

A

Encrypting and decrypting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Why does the private key have to be kept secret in symmetric encryption?

A

As if the key is intercepted then any communications sent can be intercepted and decrypted using the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How many keys are used for asymmetric encryption?

A

two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the two keys used in asymmetric encryption?

A

Public and private key, private key has to be kept secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What are the two keys together called in asymmetric encryption and what type of relation do they have

A

key pair and they are mathematically related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are messaged encrypted and decrypted with in asymmetric encryption?

A

The recipients public key and decrypted with the recipients private key which only the recipient should have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What happens if someone wants to send you a message?

A

they must first find your public key. There are a
variety of websites which can do this for you. The message is then encrypted with your
public key meaning that only you can decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How can you prove a message has been sent by you?

A

you can encrypt it using your
private key. This means that anyone can decrypt it (as your public key is available to
anyone) and by doing so, can guarantee that you encrypted the message, as only you
have access to the private key. This forms the basis of a system called digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the process of hashing?

A

an input (called a key) is turned into a
fixed size value (called a hash). There are a vast number of algorithms, called hash
functions, which do this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Describe a picture of hashing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Difference between encryption and hashing

A

Unlike encryption, the output of a hash function can’t be reversed to form the key. This
quality makes hashing useful for storing passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Why is hashing good for passwords?

A

A password entered by a user can be
hashed and checked against the key to see if it is correct, but
a successful hacker would only gain access to the keys,
which can’t be reversed to gain the passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is another use of hashing?

A

Hash tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are hash tables

A

data
structure which holds key-value pairs. Formed from a bucket
array and a hash function, hash tables can be used to lookup
data in an array in constant time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What happens when data needs to be inserted into a hash table

A

When data needs to be
inserted, it is used as the key for the hash function and
stored in the bucket corresponding to the hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Where are hash tables used

A

in situations where a lot of data needs to be stored with
constant access times. For example, in caches and databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What happens if two keys produce the same hash?

A

a collision is said to have occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

How do you overcome hashing collisions

A

including storing items together in a list under
the hash value, or using a second hash function to generate a new hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What should a good hash function have

A

low chance of collision and should be quick to
calculate. A hash function should provide an output which is smaller than the
input it was provided, otherwise searching for the hash could take longer than simply
searching for the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is an entity?

A

item of interest about which information is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is a relational database in link to entities?

A

database which recognises the differences between entities by creating different tables for
each entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What are attributes?

A

Attributes are characteristics of the entity;
these are categories about which data is collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What do primary keys uniquely identify?

A

Each record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What needs to be set up for secondary keys

A

Secondary index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Why is the primary key often not queried?

A

It is not normally remembered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is another way data is inputted into databases apart from manually when surveys are done

A

Magnetic Ink
Character Recognition (MICR). All of the details excluding the amount are printed in a
special magnetic ink which can be recognised by a computer but the amount must be
entered manually

80
Q

How is data from multiple choice questions entered into databases

A

Optical Mark Recognition (OMR)

81
Q

What do other forms use to input data into databases

A

Other forms use Optical Character Recognition (OCR).

82
Q

One way of exchanging data

A

EDI (Electronic Data Interchange). This doesn’t require human
interaction and enables data transfer from one computer to another

83
Q

What process is referential integrity?

A

Ensuring consistency

84
Q

What does ensuring consistency ensure

A

information
is not removed if it is required elsewhere in a linked database. If two database tables are
linked, one of these tables cannot be deleted as the other table requires its contents.

85
Q

What is record locking?

A

The process of preventing simultaneous access to records in a database is called record
locking

86
Q

Why is record locking used?

A

to prevent inconsistencies or a loss of updates. While one
person is editing a record, this ‘locks’ the record so prevents others from accessing the
same record

87
Q

What is the biggest issue of record locking?

A

Deadlock

88
Q

What is deadlock?

A
89
Q

What is redundancy?

A

Redundancy is the process of having one
or more copies of the data in physically different locations. This means that if there is any
damage to one copy the others will remain unaffected and can be recovered.

90
Q

What is physical topology?

A

the physical layout of the wires and components which form the
network. Examples include bus, star and mesh.

91
Q

What is logical topology?

A

the layout which shows how data flows

92
Q

Bus topology diagram and explanation?

A
93
Q

Advantages of bus topology?

A

● Relatively inexpensive to set up
● Doesn’t require any additional
hardware

94
Q

Disadvantages of bus topology

A

● If backbone cable fails, the entire
network gets disconnected
● As traffic increases, performance
decreases
● All computers can see the data
transmission

95
Q

Explanation of a star topology?

A

Star topologies use a central node, often a
switch, to direct data through the network.
MAC (Media Access Control) addresses,
which are unique to a device, are used to
identify each device on the network

96
Q

Diagram of a star topology

A
97
Q

Advantages of star topology

A

● Performance is consistent even with
heavy network traffic
● If one cable fails, only that single
terminal is affected
● Transmits data faster, giving better
performance than bus topology
● Easy to add new stations.
● No data collisions

98
Q

Disadvantages of star topology

A

● Expensive due to switch and cabling
● If the central switch fails, the rest of
the network fails

99
Q

Explain mesh topology

A

In a mesh topology, every node is
connected to every other node. Mesh
topologies are most commonly found
with wireless technology such as
Wi-Fi.

100
Q

Diagram of mesh topology

A
101
Q

Advantages of mesh topology

A

● If using a wireless network, there is
no cabling cost
● As the number of nodes increase,
the reliability and speed of network
becomes better
● Nodes are automatically
incorporated
● Nodes don’t go through a central
switch, improving speed

102
Q

Disadvantages of mesh topology

A

● If using a wireless network, devices
with wireless capability (which
increases cost) must be purchased
● If using a wired network, a large
quantity of cable is required
compared to other network
topologies like bus and star. This is
expensive.
● Maintaining the network is difficult

103
Q

What is a protocol

A

set of rules defining how two computers communicate with each other.
Protocols are standard so that all devices have a designated method of communicating
with each other, regardless of manufacturer.

104
Q

HTTP

A

(Hypertext Transfer Protocol) – Used for sending and receive access to web page information.
version, HTTPS (Secure), is becoming more common

105
Q

TCP/IP

A

(Transmission Control Protocol / Internet Protocol) – This is a networking
protocol used in the routing of packets through networks

106
Q

POP3

A

(Post Office Protocol) and IMAP (Internet Message Access Protocol) –
Mailing protocols, used for email access

107
Q

FTP

A

(File Transfer Protocol) – Used for the transmission of files over networks.

108
Q

How are continents connected together?

A

large
international backbone cables. Many of these pass underwater, linking continents to one
another.

109
Q

4 layers of the TCP/IP stack

A

Application layer
Transport layer
Network layer
Link layer

110
Q

Application layer

A

The application layer is based at the top of the stack. It specifies what
protocol needs to be used in order to relate the application that’s being sent.

111
Q

Protocols used in application layer

A

HTTP, POP3, FTP

112
Q

Transport layer

A

The transport layer uses TCP to establish an end-to-end connection
between the source and recipient computer.
The transport layer splits data up into packets and labels these packets with
their packet number, the total number of packets the original data was split
up into and the port number being used for communication

113
Q

What happens in the transport layer if any packets get lost?

A

the transport layer requests retransmissions of these
lost packets

114
Q

Network layer

A

○ The network layer adds the source and destination IP addresses. (The
combination of the IP address and the port number is called a socket
address.)
○ Routers operate on the network layer and the router is what uses the IP
addresses to forward the packets.

115
Q

What are the sockets used to do in the network layer?

A

The sockets are then used to specify which device the packets must be sent
to and the application being used on that device.

116
Q

Link layer

A

The link layer is the connection between the network devices, it adds the
MAC address identifying the Network Interface Cards of the source and
destination computers.
○ For devices on the same network, the destination MAC address is the
address of the recipient computer, otherwise, it will be the MAC address of the router.

117
Q

Diagram of stacks

A
118
Q

What are the different sections of a packet?

A

Header, payload and trailer

119
Q

Header

A

Sender and recipients IP address
Protocols needed
Order of packets
Time to live

120
Q

What is TTL (Time to live)

A

The time to live (TTL) tells the packet when to expire so that it does not travel forever

121
Q

Payload

A

Raw data to be transmitted

122
Q

Trailer

A

Checksum, or cyclic redundancy check
The trailer contains a code used to detect whether any errors have
occurred during transmission

123
Q

What is packet switching?

A

packets are sent across the
most efficient route, which can vary for each packet.

124
Q

Advantages of packet switching

A

Packets can be transferred over very large networks, multiple routes can be used so if one breaks another can be used and there are multiple methods to ensure data is intact

125
Q

Disadvantages of packet switching

A

Time is spent deconstructing and
reconstructing the data packets
Must wait for all packets to arrive before
data can be received.

126
Q

What is circuit switching

A

a direct link is created between two
devices. This direct link is maintained for the duration of the entire conversation between
devices

127
Q

What does circuit switching require

A

Circuit switching requires the two devices to transfer and receive data at the
same rate

128
Q

Advantages of circuit switching

A

Data arrives in a logical order which
results in a quicker reconstruction of the
data
Enables two users to hold a call without
delay in speech

129
Q

Disadvantages of circuit switching

A

Bandwidth is wasted when no data is being sent, devices must send and receive data at same rate and Using switches means electrical
interference may be produced which can
corrupt or destroy data

130
Q

What does circuit switching tie up?

A

Ties up sections of the network which
cannot be used by others data until
transmission has been completed

131
Q

What does a firewall consist of?

A

two network interface cards (NICs) between the user and the Internet

132
Q

How do firewalls work?

A

firewall passes the packets between these two NICs and compares them against a set of
rules set by the firewall software. The preconfigured rules are called packet filters

133
Q

What happens when access is denied by a firewall

A

The packet can either be
dropped or rejected. A rejected packet sends an alert to the sender to notify them of the
error whereas a dropped packet will not.

134
Q

What limits network access?

A

Packet filtering/ static filtering

135
Q

How does packet/static filtering work

A

s in accordance with administrator rules
and policies. It works by examining the source IP, destination IP and the protocols being
used as well as the ports being requested

136
Q

What does a proxy do

A

Collects and sends data on behalf of the user

137
Q

Uses of proxies

A

The privacy of the user is protected and they remain anonymous
- The proxy server can cache frequently used website data making it faster to load
- Proxies can reduce overall web traffic
- Can be used by administrators to prevent access to sensitive or irrelevant
information at work or at school

138
Q

What does an NIC do

A

Allows a device to connect to a network

139
Q

How does a NIC work

A

assigns a unique media access control (MAC) address to
each device. The MAC address is a 48-bit value coded into
the device and is usually written as a twelve digit
hexadecimal number

140
Q

What is a switch

A

A switch is a device used to direct the flow of data across a network. Switches are most
commonly used in networks using a star topology.

141
Q

Wireless access point (WAP)

A

This is a device which allows a device to connect to a network. It is more commonly
combined with a router to enable internet access. These are used in mesh networks

142
Q

Routers

A

A router is used to connect two or more networks together. Routers allow private, home
networks to connect to the Internet.

143
Q

When is a gateway used

A

When protocols are not the same between networks

144
Q

What does a gateway do

A

It translates the
protocols so that networks can communicate with each other. Gateways work by removing
the header from packets before adding the data to packets using the new protocol.

145
Q

What does a client server consist of?

A

Terminals that are known as clients connected to a server which is a powerful, central computer

146
Q

What does the terminal do in a client server

A

Holds all of the resources and important information that the clients can request

147
Q

Advantages of a client server

A

More secure as data is stored in one
location
● Central backups are carried out so
there is no need for individual
backups
● Data and resources can be shared
between clients

148
Q

Disadvantages of a client server

A

Relatively expensive to set up
● Functionality of terminals depends
on the server; if this fails,
performance falls
● Trained staff are required to
maintain the server

149
Q

Peer to peer

A

computers are connected to each other so that they can share files.
Each device effectively acts as both a server and client, as it can both provide and request
resources

150
Q

Where are peer to peer networks used

A

. Peer-to-peer networks are used in piracy, since it’s almost impossible to trace
the origin of files.

151
Q

Advantages of a peer to peer network

A

Cheaper to set up
● Allows users to share resources
● Easy to maintain
● Not dependent on a central server
● Specialist staff are not required

152
Q

Disadvantages of a peer to peer network

A

Impossible to trace the origin of files
● Backups must be performed
separately
● Poorer security
● May be difficult to locate resources

153
Q

What is HTML used to do

A

Write webpages

154
Q

What does HTML allow a browser to do?

A

Interpret and render a webpage by describing the structure and order

155
Q

Tags for heading styles in decreasing styles

A

<h1>, <h2>, <h3>
</h3></h2></h1>

156
Q

Tag for the title

A

<title>
</title>

157
Q

Tag for the browser tab or window heading area

A

<head>
</head>

158
Q

Tag for a link for external files such as CSS style sheets

A

<link></link>

159
Q

Tag for the main content area

A

<body>
</body>

160
Q

main tag that everything is inside of

A

<html>
</html>

161
Q

Tag for paragraph

A

<p>
</p>

162
Q

Tag for images

A

<img></img>

163
Q

What is special about the tag for images

A

It is self closing

164
Q

Tag for hyper link

A

<a> </a>

165
Q

Tag for ordered list and how to use it

A

<ol>
<li> Computer Science </li>
<li> Maths </li>
<li> Physics </li>
</ol>

166
Q

Tag for unordered list and how to use it

A

<ul>
<li> Computer Science </li>
<li> Maths </li>
<li> Physics </li>
</ul>

167
Q

Tag for division

A

<div id= “page”>

168
Q

What else do you have to do for image tab

A

<img src=“Header-Physics-Maths-Tutor.png” width=“1000”
height=“100”>

169
Q

What does CSS stand for?

A

Cascading style sheets

170
Q

What is CSS used for

A

a language which is used to describe the style of a
webpage

171
Q

Two forms of CSS

A

internal/embedded CSS or external CSS

172
Q

What is internal/embedded CSS

A

Internal/embedded CSS is placed inside the style tags and is entered directly into the
HTML document.

173
Q

External CSS

A

Meanwhile external CSS is written in a separate document and a link to
this style sheet is added to the HTML document.

174
Q

What link is added whenever an external style sheet is used

A

<link href= “nameofstylesheet.css” rel= “stylesheet” type=
“text/css”>

175
Q

What is JavaScript

A

JavaScript is a scripting language which primarily exists to
add interactivity to websites

176
Q

Is JavaScript interpreted of compiled?

A

Interpreted

177
Q

What is JavaScript often used to do

A

validate input data on the client
computer

178
Q

Advantages of JavaScript

A

Local computer can deal with invalid data before it is sent off to the servers,
- Eases the load on busy servers
- Reduces web traffic

179
Q

What is a search engine

A

A search engine is a program that searches through a database of internet addresses
looking for resources based on criteria set by the client

180
Q

Why is the order in which web resources are displayed important

A

as it determines which
websites users choose to visit and use. Therefore it is important that search engines
display the most high-quality websites with relevant content at the top of the page

181
Q

What do search engines rely on

A

Search engines rely on an index of web pages. Web crawlers, occasionally termed
spiders

182
Q

What are web crawlers used to do

A

to collect information about websites to build this index

183
Q

How do web crawlers work

A

by traversing the Internet, web page by web page using links on websites. The web
crawlers collect keywords and phrases from the linked web pages and add this information
to the indexW

184
Q

What do web crawlers also do

A

collect and add meta data from websites, which is the information
specified by the website owner

185
Q

What does the pageRank algorithm do?

A

The page rank algorithm ranks web pages, determining the
order in which web pages are displayed when a search is
conducted. Higher ranked pages will show up first.

186
Q

What are the two factors which determine the page rank of a page

A

How many incoming links it has from other web pages
The page rank of the web pages that link to it

187
Q

What data structure is used to display the information in a pageRanking Algorithmn

A

Directed graph

188
Q

Why is server side processing useful

A

Does not require plugins
● Can perform large calculations much faster than clients
● Not browser dependent,
● More secure

189
Q

What is client side processing

A

Client side processing is when a client processes the data on a local device. This means
that all of the information is processed on the client computer

190
Q

What does client side processing use

A

Javascript

191
Q

Why us client side processing useful

A

Webpage can immediately respond to user actions
● Executes quickly
● Gives developers more control over the behaviour and look of the website

192
Q

What is a hub

A

A hub is a hardware device that connects multiple devices in a network. All traffic has to pass through the hub

193
Q

Hub v switch

A

Hub broadcasts to all devices and swithc uses mac adress and only does it to intended recipients

194
Q

Is it internet or network layer

A

INTERNET LAYER

195
Q

What is a repeater

A

a device used in computer networks to regenerate and amplify signals as they pass through the network

196
Q

What is an entity?

A

An object about what data is captured

197
Q
A