Web Flashcards

1
Q

Node

A

Chunk of information corresponding to a semantic unit e.g. a page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Link

A

Association between nodes that may be navigable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Endpoint

A

Component of a link that points to anchor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anchor

A

Representation of a link on a node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Embedded/Web Links

A

Embedded in source code.
One-way.
Connect only a pair of nodes (binary).
Explicitly defined nodes.
Usually no additional information regarding link relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First Class Links

A

Links separate from nodes in link-bases.
Multiple overlays (Personalisation).
Can be bidirectional.
Can be N-ary.
Can be generic (based on value).
Can be functional (destination is a function of the source)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Typed Links

A

Contain additional information about relationship.
Rel (Relationship),
Rev (Reverse Relationship).
Rarely used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP URIs

A

http: //〈host〉〈:port〉〈/path〉?〈query〉#〈fragment〉

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP Requests

A

GET / HTTP/1.1
HOST: example.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP 1.0

A

Separate TCP connection for every request so 3-way TCP Handshake (SYN, SYN-ACK, ACK) for each TCP open and a 4-way handshake for each TCP close (Latency issues).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP 1.1

A

Keep-alive introduced. Same TCP connection used for multiple HTTP requests (One TCP open/close).

Pipelining introduced allowing multiple requests without waiting for response (Responses sent in same order of requests).

Compressible Body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTP 2

A

Multiplexed Requests (Asynchronous requests, each with their own stream, with responses returned in any order)

Stream Prioritisation (Data in high priority streams sent before low priority).

Compressible Headers.

Server Push (Server pre-emptively sends resources to a client in response to a single request)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP 3

A

Replaces TCP with QUIC on UDP addressing HTTP 2 issue where multiplexes are not visible to TCP loss recovery mechanism, causing stalls when packets are lost.
UDP is unreliable but QUIC has error correction with retransmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why was HTML5 developed?

A

Developed in response to
* The increased use of the web for web applications using client-side JavaScript (XHR, AJAX etc)
* Concerns about Adobe Flash in relation to openness, reliability, security, and performance
* Concerns about the inconsistency of handling invalid markup across browsers
* Overuse of semantic-light markup (div, span) which go against the semantic intent of HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTML5 Design Principles

A

Compatibility (Support old content).
Utility (Separate content and presentation).
Interoperability (Well-defined behaviour with graceful error handling).
Universal Access (Work on all platforms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XSL

A

Extensible Stylesheet Language. Family of XML technologies to define how XML data should be presented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

XSLT

A

Extensible Stylesheet Language Transformations
Transform one XML language into another e.g. HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

XPath

A

Navigate XML documents
E Selects all nodes with name E
/ Selects from the root node
// Selects nodes anywhere under current node
. Selects current node
.. Selects parent of current node
@ Selects attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSS vs XSL

A

CSS is simple and cascading (consideration of needs) but cannot modify document structure.
XSL is able to transform document structure but is complex and cumbersome with no consideration for needs of users, authors, implementers (c.f. cascading)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Internet Engineering Task Force (IETF)

A

Practical standards organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IESG

A

Internet Engineering Steering Group.
Manage and oversee standards process, Approves RFCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IESG Areas

A

Categories of interest overseen by an area director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IETF Working Groups

A

Collaborative groups to develop and standardise practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IAB

A

Internet Architecture Board
Provide architectural advice and oversight ensuring all proposals from IESG areas function together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IRTF

A

Internet Research Task Force.
Research for topics that may need standards in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IETF Internet Drafts

A

Preliminary technical specifications valid for only 6 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IETF Requests for Comments (RFC)

A

Documents produced by working groups that describe specifications, guidelines and best practices.
STD describe standards.
BCP describe Best Current Practice with policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

W3C

A

Corporate membership standards organisation (companies, universities, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

W3C Roles

A

Director.
Team (Support workings of W3C).
Advisory Committee (AC) (Contains a representative from each member organisation. Reviews director’s proposals).
Advisory Board (AB) (Guide W3C in non-technical matters i.e. policy).
Technical Architecture Group (TAG) (Oversight ensuring all standards work together, like IAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

W3C Working Group

A

Chartered for a specific duration to deliver a standard. May invite non-member experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

W3C Interest Group

A

Chartered discussion form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

W3C Community Group

A

Discussion forum open to non-members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

First Public Working Draft

A

Draft made public signifying beginning of work on a specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Working Draft

A

Document actively being worked on by a Working Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Last Call Working Draft

A

Document that the Working Group believes is ready to be publish, open for review by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Candidate Recommendation

A

Demonstrates the standard has multiple independent implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Proposed Recommendation

A

Awaiting director approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Recommendation

A

Formally approved, has become a W3C recommendation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Member Notes

A

From a member of a working group detailing a technology they want to be considered as part of a Working Group deliberation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Working Group Notes

A

Document decisions made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cross-Site Request Forgery (CSRF)

A

Web security vulnerability. Malicious origin tricks browser into making unauthorised requests to trusted sites and carrying out actions on the users behalf without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Same-Origin Policy (SOP)

A

Restricts how resources from different origins interact. Blocks all cross-origin reads except embedded resources (Scripts cant make requests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Cross-Origin Resource Sharing (CORS)

A

Selectively relaxes the Same-Origin Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CORS Response Headers

A

Specify allowed origins, methods and headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Cross-Site Scripting (XSS)

A

User input allows malicious code (XSS Vector) injection.

Non-persistent has malicious code in parameters of a GET request which gets executed.
Persistent has malicious code in the state of a resource that is displayed to all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Content Security Policy

A

Describes what a resource is allowed to access with
Fetch Directives (controls the places from which resources can be loaded).
Document Directives (Controls properties of a document).
Navigation Directives (Controls where a user can navigate to).
Reporting Directives (Controls where violations are reporting to).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Marketing Funnel

A

Narrows down a wide audience to those who actually purchase something

Awareness
Interest
Decision
Action

48
Q

Advertising Types

A

Display (Banners, images, etc.).
Contextual (Displayed in content relevant to the product)
Search.
Behavioural (Based on user profiling)

49
Q

Advertisement Billing

A

CPM (Cost per Mile) (Pay per impressions).
CPC (Cost per Click).
CPA (Cost per Action) (Pay be actions linked to ads e.g. sign up to a mailing list, or purchase something)

50
Q

Google AdWords

A

Auction to show advertisementsin search. Calculates Ad Rank for how likely a user is to click a result

51
Q

Google AdSense

A

Contextual advertising based on keyword matching in the content. Auctions for ad positions

52
Q

Fingerprinting

A

Stateless tracking technique using an identifier derived from device information (timezone, language, OS, etc.)

53
Q

Real-time Bidding (RTB):

A

Mimics stock exchange for buying and selling ads in real time.

54
Q

Open Hypermedia

A

An information system consisting of nodes connected with associative links with an interface by which third party programs can access the functionality of the system

55
Q

Link Service

A

Takes a document and returns hyperlinks that can be applied

56
Q

Dexter Hypertext Reference Model

A

A model of open hypertext systems, concerned with the database of nodes and links

57
Q

Dexter Storage Layer

A

Consists of three Components: Atoms (Documents), First-class Links , Composites (Sequences of components)

58
Q

Dexter Specifiers

A

Consist of component reference, anchor reference and direction

59
Q

Referential Integrity

A

Ability to follow any link

60
Q

Hyper-G Core Links

A

Relate documents stored on the same server

61
Q

Hyper-G Surface Links

A

Relate documents stored on different servers

62
Q

P-flood Algorithm

A

Allows surface link updates to be propagated across servers (alternative to expensive broadcasting). Arrange servers in a ring and send link updates to successor with random chance of sending to another location in ring.

63
Q

Microcosm

A

Hypermedia for read-only media

64
Q

Microcosm Filters

A

Take a document and add / remove links. Filters organised into chains. Filters can be published for other Microcosm instances to use

65
Q

Web Hypermedia Link Injection

A

Batch Processing.
Origin Server (Apply with algorithm on demand).
Proxy (User configures browser to go via link injector proxy).
User Agent (Browser injection)

66
Q

Spatial Hypermedia

A

Ambiguous and partial relationships expressed through space i.e. close objects have a close relationship

67
Q

Sculptural Hypermedia

A

Assumes all nodes are linked to each other and removes links until desired structure is reached

68
Q

Temporal Hypermedia

A

Links continuous media (sound, video) to other contexts with annotations and synchronisation

69
Q

Conceptual Hypermedia

A

Structure and links derived from relationships between objects in the real world

70
Q

Pervasive Hypermedia

A

Integration of hypermedia into every day life as technology is integrated

71
Q

Cacheable Assets

A

Images, systlesheets, fonts, media

72
Q

Carefully Cacheable Assets

A

Data, HTML, Frequently modified JS and CSS

73
Q

Never Cacheable Assets

A

Sensitive data, frequently changing user specific data

74
Q

Proxy Cache

A

Located close to clients to decrease latency and bandwidth usage

75
Q

Reverse Proxy Cache

A

Located close to origin server intended to decrease load on a web service

76
Q

Forward Proxy

A

Located close to client
For content filtering and content translation (injection of adverts, compress images)

77
Q

Open Proxy

A

Located anywhere between client and server
For anonymity

78
Q

Reverse Proxy

A

Located near server
Load balancing (distribute web requests across servers).
Content Switching (each server stores different content, direct to appropriate server).
Protocol Translation.
Monitoring & Filtering (credential checks, rate limits)

79
Q

CDN Server Deployment Strategies

A

Deep in Network (Improved performance, harder management and maintenance).
Clusters near internet exchanges (Poorer performance, easer management and maintenance)

80
Q

DASH

A

Dynamic Adaptive Streaming over HTTP: divides video files into chunks stored at multiple bit rates and a manifest file provides URLs to each chunk.
Client periodically measures server-to-client bandwidth and consults the manifest to find where to request chunks from with the maximum sustainable coding rate given the current bandwidth

81
Q

Specific Query

A

User know what and where to look e.g. Database

82
Q

Broad Query

A

User knows where to look but not what to look for e.g. Searching for the manager of HR

83
Q

Vague Query

A

User doesn’t know where or what to look for e.g. Search engines

84
Q

Web Crawler Selection Policy

A

States which pages to index using a search strategy

85
Q

Web Crawler Re-visit Policy

A

Describes how often and what pages to re-visit for the most up to date pages

86
Q

Web Crawler Politeness Policy

A

Describes strategies that consider server load i.e. parallel calls policy, frequency of requests.

87
Q

Web Crawler Parallelisation Policy

A

Web crawlers may stumble across same page via two routes, describes how to handle it.
Dynamically assign pages to crawler processes or map to crawler processes using a hash function

88
Q

Challenges of Search Engine Indexing

A

Distributed data.
Changing Data.
Large Volume of Data.
Data Issues (Redundancy, unstructured data, quality of data, heterogeneous formats)

89
Q

Challenges of Searching

A

User has poor understanding of proper word sequencing.
Unexpected answers.
Boolean logic is not well understood.
Results beyond first page ignored

90
Q

Legitimate SEO

A

Good design,
valid metadata,
alt tags on images

91
Q

Illegitimate SEO

A

Deception,
meta tag abuse,
heavy repetition,
invisible text,
domain spam (duplicate sites)

92
Q

RDF

A

Resource Description Framework.
Subject, Predicate, Object

93
Q

Gold Open Access

A

Gold standard. Articles are freely, permanently and immediately accessible while copyright is retained by authors. Authors may have to pay for publishing

94
Q

Green Open Access

A

Viable option. Authors can disseminate an OA copy of their work (pre or post publication copy).

95
Q

Net Neutrality

A

ISPs must treat internet communications equally and not discriminate based on user, content, website, platform, application, source/destination address or method of communication

96
Q

Arguments for Net Neutrality

A

Accessibility (Web access is a human right).
Equal access for start ups and big companies.
Free Speech.
Unbiased.
Free Choice (Promotes competition).
Innovation

97
Q

Arguments against Net Neutrality

A

Provides funds for infrastructure.
Regulation (stop illegal content).
Increase quality of information.
Anti-Competitive (Limits freedom of how ISPs operate. Could stifle competition)

98
Q

Copyright

A

Protects skill and labour expended by someone creating something new

99
Q

Primary Copyright Infringement

A

Anyone who does any of the things that the owner of copyright has exclusive rights to do (Civil matter)

100
Q

Secondary Copyright Infringement

A

Someone facilitates another person or group to infringe on copyright. Can be a criminal offense.

101
Q

Database Rights

A

Protects skill and labour to create collections of data e.g. Now that’s what I call music

102
Q

Trademarks

A

Recognisable signs which make products identifiable.
Considers impression of two similar marks,
similarity of goods/services,
evidence of confusion,
likelihood of expansion of product lines

103
Q

Cyber Squatting

A

Registering a domain name with no legitimate reason other than to benefit from others good reputation. Redirects users to unrelated material or sell domain at inflated price

104
Q

Creative Commons

A

Copy, Modify, Redistribute, Show. Must attribute original work

105
Q

Creative Commons ShareAlike

A

Copy, Modify, Redistribute, Show. Must attribute original work and share under same license

106
Q

Creative Commons NoDerivs

A

Copy, Redistribute, Show. Must attribute original work and cannot transform or build upon

107
Q

Creative Commons NonCommercial

A

Copy, mody, redistribute,s how. Must attribute original work and cannot use for commercial purposes. Can be combined with ShareAlike and NoDerivs

108
Q

Nelson Definition of Hypertext

A

Knowledge that cannot be conveniently represented on paper and instead is a way of organising knowledge through relationships

109
Q

Otlet

A

Established the RBU where bibliographic information can be accessed by author or by subject.

Defined UDC for library organisation.

Popularised microfiche, the scaling down of documents.

110
Q

Ostwald

A

Established ‘The Bridge’. Reduce literature down to small units of information that can be arranged and linked with other units

111
Q

Bush’s Memex

A

A personal library of information with trails, a path through information. A sequence of linked pages. Branches may exist. Comparable to encyclopaedias made with from trails running through them

112
Q

Project Xanadu

A

Comparison of documents in parallel
Transclusion: Embed content in other documents (instead of copy and pasting)
Transcopyright: Allows integration and sharing of content while maintaing intelletual property rights
Versioning: See revisions and variants
Links that don’t break:
- Can be embedded or first class
- Can be n-ary

113
Q

Halasz Seven Issues of Hypertext Systems:

A
  1. Search and Query: Link navigation may not be the best way to find things, consider searching
  2. Composites: Documents consisting of bits of other documents
  3. Virtual Structures: Documents may not exist until navigated to, they are constructed from the query
  4. Computation: APIs to allow executions when certain events occur
  5. Versioning
  6. Support for Collaborative Work
  7. Extensibility & Tailorability: Change the system to preferences e.g. instead of links, a graphical views.
114
Q

TLS

A

Transport Layer Security.
Secure communication using asymmetric key encryption to agree on a shared symmetric key

115
Q

Digital Signatures

A

Allow for authentication, non-repudation and integrity of messages

116
Q

Digital Certificates

A

Sign public keys to ensure they are authentic