Communication and Internet technologies Flashcards

(31 cards)

1
Q

BitTorrent

A

a peer-to-peer protocol used to transfer and share large files across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User Rights

A

rules about what a user is allowed to do with files but an administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does BitTorrent work?

A
  • install software
  • Link it into a folder it is going to transfer files from
  • list of contents of folder sent to BitTorrent server
  • doesn’t actually contain a file but a list of where to download it
  • ‘seeders’ share file
  • more seeders faster download
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Benefits of BitTorrent’s

A
  • reduces cost to host
  • forces equality through sharing
  • usually free
  • effective uses of download bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks of BitTorrent’s

A
  • little protection against malware
  • legal only if you have a license
  • you are not anonymous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

online storage

A

Storage space is available on a server-connected storage medium accessed via the internet, requiring login credentials for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TWO advantages of installing a wireless network.

A
  • No cables used
  • Cost saving
  • Easy to setup/connect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TWO reasons why a peer-to-peer network is less suitable for a
company with many users.

A
  • Difficult to manage a large number of computers
  • More prone to the spread of malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

role of a server

A
  • A server provides resources (software, storage, etc.)
  • Serves as a log-on controller
  • Manages security settings on a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a switch and name a advantage and disadvantage

A

Switch = used to connect computers in a network to a central location for communication
Disadvantage = When a switch fails, all the computers connected to the switch will not be able to access the network
Advantage = They increase the available bandwidth of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIC

A

network interface controller
= allows communication wirelessly or via a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADSL

A
  • permanent connection via telephone line
  • can be used for small and large networks
  • different bandwidth specifications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP/HTTPS

A
  • defines how web pages and their content are transferred across the web
  • secure communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Archiving

A

store non-changeable files onto a secondary system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disk defragmentation

A

reorganise part of files to speed up your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GIGO

A

Garbage in Garbage out
quality of output is directly related to the quality of the input

17
Q

SEO

A

Search engine optimization
To ensure high ranking in search results/increase the amount of
traffic on a website  by changing the design of webpages.

18
Q

File sharing

A

need to send a link so they can access it
gets around file size limitations.

19
Q

file syncing

A

Choose a folder that is linked to your server and as you edit it the software makes changes on the online one
- access even when offline
- Always have the latest file
- copied to cloud service automatically

20
Q

VPN

A

Virtual private network
creates a secure encrypted connection between your computer and a target network.

21
Q

Encryption

A

the scrambling of text or data using a specific set of rules to ensure privacy of data

22
Q

local encryption

A

protection of local files from unauthorized access and malware

23
Q

automatic encryption

A

built into various hardware and software devices .. without the user’s awareness like ATM transactions, etc

24
Q

SSL

A

secure sockets layer
- encrypts data that is sent over the internet using public key encryption

25
Public key encryption
mathematical algorithms 2 separate keys. public plain text private keys decrypt
26
sematic search
where the semantic web allows computers to intelligently search though metadata
27
Internet of things
the concept that more devices are being connected to the internet and are able to communicate
28
Mediated Search
managed by humans rather than algorithms. fewer more useful results
29
how would a sematic search work
A search will take place using the metadata of the relevant content on the internet and will relate it to the user’s contextual information to present a search result uniquely suited to the user.
30
AJAX
asynchronous JavaScript and XML combines Java with a browser to download data without refreshing the page
31
CSS
Cascading Style Sheets (CSS) separates the formatting of HTML and consolidates it in a single .css file. This allows for easy modification of website formatting by simply updating the CSS file, which will automatically update all web pages.