Exam Prep Flashcards

(50 cards)

1
Q

History: the internet started in… ?

A

the 60s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IP?

A

IP is the fundamental protocol defining the Internet

Communication protocol: how computers talk - Transfer data packets from source to destination
host. If destination is unknown (e.g. host is in another
LAN), packet is sent to a gateway that connects to
more than one network

32-bit number (in IPv4)

Limitations of IP:
– No guarantee of packet delivery (packets can be
dropped without reporting an error)
– Communication is one-way (source to destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TCP?

A

Transmission Control Protocol - Vinton Cerf et al. wrote 1st TCP spec in 1974

TCP adds the notion of a connection,
implemented on top of IP
– Provides guarantee that packets delivered
– Provide two-way (full duplex) communication
– More like telephone than postal network

also adds concept of a port
– TCP header contains port number representing an
application program on the destination computer
– Some port numbers have standard meanings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is UDP?

A

User Datagram Protocol

– Builds on IP
– Provides port concept
– No connection concept
– No transmission guarantee

Advantage of UDP vs. TCP:
– Lightweight, so faster for one-time messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DNS?

A

Domain Name Service - the “phone book” for the Internet

Map between host names and IP addresses

DNS often uses UDP for communication

Labels separated by dots, e.g., www.example.org

Final label is top-level domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is FTP?

A

communication between ftp client and ftp server for interactive file
transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is HTTP

A

communication between web client (browser) and web server for file
transfer on the web

Normally implemented over a TCP connection

URL schemes are http,
https, ftp, mailto, and file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is World Wide Web?

A

Invented at CERN in 1989 by a software
engineer named Tim Berners-Lee

Distinctive feature of Web: support for hypertext
(text containing links)
– Locating documents using Uniform Resource
Locators (URL)
– Document representation using Hypertext Markup
Language (HTML, lecture 2,3)
– Communication via Hypertext Transport Protocol
(HTTP, 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a URI?

A

Uniform Resource Identifier

two types:
- Uniform Resource Name: Can be used to identify resources with unique names,
such as books (which have unique ISBN’s)
- Uniform Resource Locator: Specifies location at which a resource can be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

who invented html? when? how many tags did it have vs now?

A

Tim Berners-Lee, a physicist at the CERN research institute in Switzerland invented HTML in 1991. This first version consisted of 18 HTML tags. Now, there are currently about 140 HTML tags, although not all of them are supported by modern browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are some key advantages and disadvantages of JavaScript?

A

adv: speed, simplicity, popularity, interoperability, server load, rich interfaces, extended functionality, versatility, updates
dis: client-side security and browser support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are typical examples of JavaScript usage

A

web development/applications, presentations, server applications, web servers, games, art, smartwatch/mobile applications, flying robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is DOM?

A

When writing web pages and apps, one of the most common things you’ll want to do is manipulate the document structure in some way.

This is usually done by using the Document Object Model (DOM), a set of APIs for controlling HTML and styling information that makes heavy use of the Document object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are events + event handlers + host objects?

A

JavaScript lets you execute code when events are detected. HTML allows event handler attributes, with JavaScript code, to be added to HTML elements.

JavaScript event handlers designed to process events such as those listed above, with the object(s) that can support each event

Host objects are supplied by other environment through a connection. The Host Objects are can not be same always because of the environment. Any object which is not native is a host object, basically Host Objects are provided by the browser environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the main differences between JavaScript and languages such as Python or C++

A

Python is a better-designed language that makes it easy to maintain, whereas JavaScript is poor.

Python is not good for mobile development, whereas Java-Script is good.

Python is slow to run compared to JavaScript.

Python provides a huge standard library, whereas JavaScript has a limited standard library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

underlying concepts of development, testing and debugging of JavaScript code

A

JavaScript development tools have been slow to materialize, but there are various options available today.

The Chrome Developer Tools are a quick way to debug your JavaScript code.

Visual Studio Code includes built-in JavaScript IntelliSense, debugging, formatting, code navigation, refactorings, and many other advanced language features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

key advantages and disadvantages of AJAX technology

A

adv: reduce server traffic and increase speed, Enable asynchronous calls, XMLHttpRequest, Reduce bandwidth usage, Form Validation
dis: Open-source, Search Engines cannot index Ajax pages, difficulties for your web pages to debug as well as make them prone to possible security issues in the future, considerable dependency on JavaScript, challenging to bookmark a specific state of the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

typical examples of AJAX usage

A

Create a XMLHttpRequest with a callback function, and retrieve data from a TXT file.

Request Header Information

Retrieve Server Data with PHP and ASP

Retrieve Database Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is JSON data

A

Java Script Object Notation.

JSON is a lightweight format for storing and transporting data.

JSON is often used when data is sent from a server to a web page.

JSON is “self-describing” and easy to understand.

values must be one of the following data types: a string. a number. an object (JSON object) an array. a boolean. null. JSON values cannot be one of the following data types: a function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the notion of a Client/Server Model

A

In many network applications, the roles of the
two pieces of software communicating over
the network is really different:
• One piece of software always takes the initiative,
and is called the client
• A second piece of software is always reactive,
and is called the serve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTP requests & response messages

A

Request-response protocol in the client-server computing model

Client submits an HTTP request message to the
server

Server typically provides resources such as
HTML files and other content

Response contains completion status
information

22
Q

what is IRI

A
• Internationalized Resource Identifier
• Modern form of URI
• Is a generalized form of URI
– URI allows only ASCII characters
– IRI allows use of Unicode
23
Q

common http request methods

A

• GET
– Used if link is clicked or address typed in
browser
– No body in request with GET method
• POST
– Used when submit button is clicked on a form
– Form information contained in body of request
• HEAD
– Requests that only header fields (no body) be
returned

24
Q

HTTP request:

sample header fields

A

• Host
– host name from requested URL (required)
• User-Agent
– e.g. type of browser sending the request
• Accept
– Acceptable MIME types and encoding for responses
• Connection
– value close tells server to close connection or not
• Content-Type
– MIME type of POST body, if applicable
• Content-Length
– bytes in body
• Referer
– URL of document containing link that resulted in this request

25
what are MIME types?
``` • Standard identifier used to indicate the type of data that a file contains – used for Web data, email attachments, … • IANA manages the official registry of media types • Format of MIME types: type/subtype – text/html – image/png – video/mp4 ```
26
HTTP response: | status codes?
``` • Three-digit number • First digit is class of the status code: 1=Informational 2=Success 3=Redirection (alternate URL is supplied) 4=Client Error 5=Server Error • Other two digits provide additional information ``` 200 The request was succesful. The client can read the result of the request in the body and the headers of the response. 201 The request succeeded, and a new resource was created as a result. 400 The server could not understand the request due to invalid syntax. 401 Bad or expired token. This can happen if the user revoked a token or the access token has expired. You should re-authenticate the user. 403 The web browser does not have permission. 404 The server can not find the requested resource. In an API, this can also mean that the endpoint is valid but the resource itself does not exist. 500 The server has encountered a situation it does not know how to handle.
27
Virtual Hosts?
hosting multiple web sites on a single server
28
Principles of REST network architectures?
1. All pieces of information are resources that are uniquely addressable using a URI 2. Both client and server do not need to be aware of intermediate proxies or caches nor how the server generates/client renders the representation of the resource 3. There is no communication state (stateless) simplifies global design and improves performance but sometimes makes server programming more difficult
29
what are safe and idempotent HTTP methods?
HTTP GET method should be safe: no side-effects Other methods than GET and POST should be idempotent: requesting the same resource multiple times will yield the same result and no further side effects as a single request
30
web "cookies" and how they relate to HTTP state
HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and more than one cookie may be placed on a user's device during a session.
31
Same origin policy VS cross origin resource sharing
Site A provides AJAX web services to support Web pages from site A – But: does not want a script on a page from site B to also make calls to site A – Users might have used site A before, and site B might be trying to steal information from site A about the user – But requests to A come from the client, and A doesn’t know if the client is running a script from A or B! – Only the browser knows it is running a script from B calling A – So the browser will block calls to A on pages from B (except when A opts in explicitly: CORS) Was considered safe before AJAX – HTML from site B often uses resources from A: • GET: Images, CSS style sheets, JavaScript libraries • POST: form submissions – Harder to abuse than in the AJAX case • E.g. requesting privacy sensitive data • Opt-in policy using CORS http headers
32
Common Log Format?
standardized text file format used by web servers when generating server log files. Because the format is standardized, the files can be readily analyzed by a variety of web analysis programs, Each line in a file stored in the Common Log Format has the following syntax: host ident author date request status bytes
33
explain the difference between an information need and a search query
information need is the topic about which the user desires to know more, and is differentiated from a query, which is what the user conveys to the computer in an attempt to communicate the information need.
34
define the notion of relevance in this context
relevant if it is one that the user perceives as containing information of value with respect to their personal information need. Our example above was rather artificial in that the information need was defined in terms of particular words, whereas usually a user is interested in a topic like “pipeline leaks” and would like to find relevant documents regardless of whether they precisely use those words or express the concept with other words such as pipeline rupture
35
define the evaluations metrics precision and recall in relation to the notion of relevance
Precision: What fraction of the returned results are relevant to the information need? Recall: What fraction of the relevant documents in the collection were returned by the system?
36
define the notion of precision at N
When the number of results grows larger, it | might not be relevant what the precision over the entire set is, but only first N results
37
describe the advantage of ranking based | on tf.idf scores over ranking based on raw term counts
Ranking - State of the art search engines use all kinds of tricks for ranking Example weighting scheme: tf.idf Every word is assigned a weight for a document. Some words are more important than others.
38
explain how Zipf's law and Heaps' law related to word frequencies in natural text
Zipf’s law - The most frequent word will occur approximately twice as often as the second most frequent word, three times as often as the third most frequent word, etc. Formally: the frequency of a word is inversely proportional to its rank in the frequency table. Heaps’ Law - By scanning the text we will hit upon the most common words rather quickly, but we will, (increasingly slower), continue to encounter (infrequent) new words
39
explain what a small world network is
The web has the nice property that there are very few pages that link to many others and a lot of pages that link to very few other pages
40
Schneiderman's definition of Web Science.
the “science of decentralized information systems”
41
define net neutrality
Tim Wu, Columbia University media law professor, coining the term in 2003 "Network neutrality is best defined as a network design principle. The idea is that a maximally useful public information network aspires to treat all content, sites, and platforms equally.
42
summarize the key arguments of the parties in favour of net neutrality and those who oppose it.
Netherlands - Second country with Network Neutrality Law (after Chile) 2011-2013 USA - Title II Net Neutrality rules passed
43
the motivation for, and concepts underlying Linked Open Data
Motivation: connect data across silos Rules of Linked Data: 1. Use HTTP URI (Uniform Resource Identifiers) as names for things 2. When someone looks up a URI, provide useful information, using the standards (RDF) 3. Include links to other URIs. so that they can discover more things.
44
the motivation for, and concepts underlying re-decentralization of the Web and the Solid framework.
Re-decentralizing the Web and Solid - “Solid (derived from "social linked data") is a proposed set of conventions and tools for building decentralized social applications based on Linked Data principles. Solid is modular and extensible and it relies as much as possible on existing W3C standards and protocols.” Instead of hosting your data at the service provider you own your data and choose apps to manage it
45
the difference between a research question and a hypothesis
``` A research question is: • Also called Problem Statement • Always a question (ends with a "?") • Sometimes more than one. • Has practical and/or theoretical relevance. ``` HYPOTHESIS: • Describes the assumed relation between at least two variables • “If X, then Y.” • “The larger X, the smaller Y.” • Website-Layout A enables users to find better relevant information than Layout B. • Variables can be any attribute or property of humans, objects or systems
46
what dependent and independent variables are
Independent Variable (cause) influences Dependent Variable (effect) In HCI often technology is one independent variable (e.g. website layout)
47
what explorative, descriptive and explanatory research is
Explorative (what is related?) • What factors determine if people come back to visit a website a second time? • Is there a correlations between characteristics of my visitors and the types of errors that they make? Descriptive (what happens?) • What percentage of people find my website through Google? • What percentage by typing in the URL directly? Explanatory (why does it happen?) • Does the addition of a login function mean that more people come back to my website a second time? • Did the revision of the link structure of my website make visitors find what they were looking for quicker?
48
the difference between quantitative and qualitative research
* Qualitative: non numerical, e.g. words, text, pictures or objects * Quantitative: analysis of numerical data * For quantitative data * Use descriptive statistics to describe your results. * Use inferential statistics to validate your hypothesis. * For qualitative data * Use text analysis * Affinity diagramming
49
what A/B testing is
A/B testing (also known as bucket testing or split-run testing) is a user experience research methodology. A/B tests consist of a randomized experiment with two variants, A and B. It includes application of statistical hypothesis testing or "two-sample hypothesis testing" as used in the field of statistics.
50
main concepts from the WCAG 2.0
accessibility, accessibility guidelines, the principle of perceivability, impact of accessibility on website development.