Basic Concepts Flashcards
(84 cards)
What are Bits and Bytes?
Digital data consists of numbers, which makes storing and transmitting data easier, more efficient, and more immune to errors. In computers, those numbers are in binary form (i.e., a number that uses only two digits).
The smallest unit of data inside the computer is a bit, which stands for binary digit. Information in the form of numbers, characters, text, sound, images, video, etc., is stored as binary digits (bits).
A bit can have only one of two values:
• 0 (off)
• 1 (on)
In that sense, it is like an on/off switch or a light bulb.
But bits can also be described as the building blocks of data, and given the vast amount of information, we need to use a lot of bits. To make that more manageable, bits are placed into groups of 8. Each group of 8 is called a byte.
A byte is the unit of measurement used in digital data. For example, a size of a file may be 2 gigabytes (GB).
What is Non-Textual Data?
Nontextual data come in a variety of standards, also known as file formats. Here are some examples of file formats:
• graphics and images: JPEG, GIF, PNG
• music and audio: MP3, WAV, FLAC
• video: AVI, MOV
What is the Evolution of Communication Systems?
Systems used to communicate over long distances are continually evolving. Consider the transformation of communication systems from human messengers, smoke signals, and telegraphs to cell phones, e-mail, and video.
Why do you think communication systems are continually changing? The following factors seem to be the main drivers of the evolution of communication systems:
• Quality: The message sent and message received are exactly the same.
• Cost: Lower cost of communication results in greater exchange of information.
• Cost: Lower cost of communication results in greater exchange of information.
What are Computer Networks?
- Computer networks are collections of devices (or nodes) connected to each other via different types of communication channels to share resources. Computer networks can be categorized by their conceptual structure, or topology, and by its size, or coverage area.
- Network topology defines how the devices are connected and coverage area defines how far apart the devices are. Coverage area refers to the geographical space, such as room, a building, a city, or an area much larger than a city.
What are Connecting Cables?
There are several types of cables that connect nodes. Two examples are shown below:
• RJ45 Connector—The RJ45 (Registered Jack 45) Connector is used for common ethernet cables. It is currently the most common connector that joins computers to networks.
• Optical Fibers—Optical fibers are used for faster networks because they can handle many communication channels at a very fast rate. Optical-fiber cables require additional equipment for converting the electrical signal to light, and vice versa.
What are Network Devices?
There are other devices—called network devices—that are normally used in the network’s intermediate nodes. Below are some examples of network devices:
What is a Hub?
• Hub—The hub connects different devices. It is used to implement the bus topology, where all the nodes are directly connected. For example, consider a USB hub where the data is fed into the input port and then broadcasted to the other ports.
What is a repeater?
• Repeater—A repeater is similar to the hub but with additional features. Repeaters are used in places where the amplification of input signals is necessary. It regenerates the input signal and amplifies only the desirable signal, eliminating the noise component.
What is a Switch?
• Switch—A switch is an intelligent device capable of connecting multiple computers and peripherals with other networks. The switch can provide almost exactly the same speed for all the devices connected to it. Switches can be used with the star topology to provide a centralized point of connection for a LAN to another network.
What is a Bridge?
• Bridge—A bridge is a switch that connects two local area networks (LANs), or two segments of the same LAN. The two LANs being connected can be alike or dissimilar. For example, a bridge can connect an ethernet with a token-ring network.
What is a Router?
• Router—A router is a device used to connect multiple networks. It is used in mesh topology and can give data the best path to its destination based on different configurations, such as the shortest path. By choosing the best path, routers can prevent congestion and communication slowdowns.
What is a Gateway?
• Gateway—A gateway connects a network to the Internet or public network. Gateways therefore include more complex technologies for security and the logging of traffic as well as for allowing virtual private networks.
What is TCP/IP?
The Internet is based on the TCP/IP protocol. To better understand how it works, we need to take a closer look at the underlying TCP/IP model and its 5 layers.
What is the TCP/IP Layer 1?
Layer 1
– Hardware/Physical Layer In TCP/IP, the physical layer and the data link layer together form the network interface, which is realized as the network interface
card (NIC) in computers.
What is the TCP/IP Layer 2?
Layer 2
– Data Link Layer (DLL) This layer is implemented in hardware as opposed to the other layers, which are implemented in software.This layer is in charge of delivery of the “frames” of data from one node of the network to the next node.
What is the TCP/IP Layer 3?
Layer 3
– Internet Protocol (IP) Layer In this layer, IP directs packets to a specific computer using an IP address
What is the TCP/IP Layer 4?
Layer 4
– Transmission Control Protocol (TCP) In this layer, TCP directs packets to a specific application on a computer using a port number.
What is the TCP/IP Layer 5?
Layer 5
– Application Protocol Layer This layer refers to user applications such as
WWW, e-mail, and FTP. This is where messages begin
What are Firewalls?
A firewall is a software utility, hardware device, or a combination of the two, through which all traffic between an internal network and an external network (usually the Internet) must pass.
This mechanism is used to protect a trusted network from an untrusted network by allowing only authorized traffic to continue to the other side.
“Authorized” traffic is defined by the firewall owner’s security policy.
What are SQL Injections?
Structured Query Language, or SQL, is a special language used to tell a database what to do. An SQL injection is a form of attack on a database-driven website to steal information.
In such an attack, a query (set of instructions) might have parameters (data) inserted into it that are then interpreted as instructions, causing the website to malfunction.
For example, a hacker might insert malicious SQL statements into an entry field for
execution that instructs the database to dump its contents to the attacker.
To avoid this problem, we must separate the instructions and data in a way that the
database can easily distinguish. This is usually done by sending them separately.
In SQL, this technique is known as parameterized queries.
What are Web Security Issues?
Web applications provide consumers and businesses significant convenience
, as banking applications, e-commerce, e-business, etc., are conducted via
web applications. Since critical consumer and business information is exchanged through these web applications, their security is a major issue for everyone.
When we access our bank account or purchase an item on the web, our data has to be exchanged with back-end databases, which are then major targets of hackers due to the critical information stored in them. In addition, hackers go after personal
information directly by redirecting consumers to their malicious sites. The top two issues related to web applications include SQL injection and cross-site scripting.
What is Cross-Site Scripting?
Cross-site scripting (XSS) enables attackers to inject client-side script into web pages viewed by other users.
For example, imagine a victim is using a web application (e.g., e-mail or an e-commerce site) and is currently logged in to her account. If malicious code is present while she is logged in, that code sends the session information to the attacker’ s e-mail account. The attacker can then tap into the user’ s session and log in while the victim is still using the application. This is an example of session hijacking using XSS.
What are Mail Servers?
Every e-mail you send passes through a series of mail servers along its way to your intended recipient. Mail servers can be broken down into two main categories: outgoing mail servers and incoming mail servers.
What are outgoing mail servers denoted?
• SMTP (Simple Mail Transfer Protocol)
Moved to example.org.
). Example: Basic HTML Structure
Enter your name: