Finals Flashcards

(66 cards)

1
Q

Backup policies

A

Predefined, set schedule whereby information is copied to disk and/or tape to ensure data recoverability in the event of accidental deletion, corrupted info or some kind of system outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Database index

A

Data structure that improves the speed of data retrieval operations on a database table at the cost additional writing and storage space to maintain the index data structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database administrators

A

Use specialised software that store and organise data.

Their roles may include:
- capacity planning
- installation
- configuration
- database design
- migration
- performance monitoring
- security
- troubleshooting
- backup and data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages of installing SQL on the database

A

High speed:
the user can quickly retrieve large amounts of records from the database

No coding needed:
It is easy to manage the database system and doesn’t require alot of code

Portability:
Can be used in laptops, PCs, servers and some mobile phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Principles of good database management

A
  • Outline business goals
  • Focus on data quality
  • Reduce duplicate data
  • Ensure data is readily accessible
  • Priorities data protection and security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Full backup

A

Complete type of of backup where at least one additional copy of all selected data and files that an organisation wishes to protect is done in a single backup operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incremental backup

A

The first backup is full backup but the rest will only store changes to files and data that have changed since the previous backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

types of CSS

A
  • Inline CSS
  • Internal CSS
  • External CSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

<object>
</object>

A
  • Defines an embedded object within an HTML
  • Can also be used to embed another webpage into an HTML document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<style>

</style>
A
  • Used to define style info for an HTML document
  • Inside the element you specify how HTML elements should render in a browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<select></select>

A

used to create a drop down list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stages of the web site development process

A

Gather Information:
This is to get a clear understanding of future website purposes, the main goals one wishes to achieve and the target audience of the site

Planning:
Developer creates the data that will allow a customer to judge what the entire site will look like

Design:
All visual content is created

Content writing and assembly:
put in writing the essence of what one would like to communicate and add calls to action

Coding:
One can start creating the actual website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Factors that make a poor website

A

A website that does not tell user what a company does and why they should choose it

A website that is not mobile friendly

If the website takes more than 3 seconds to load

The font size is too small and are not user friendly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Importance of storyboarding

A

makes the design process easier and more efficient
helps you visualise the result of the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to improve security of a private wireless network

A

Change the name of the default home network. This will make it harder for hackers to know what type of router you are using

Ensure that you have a strong and unique password

Activate network encryption

Turn off your WIFI when you’re not at home, so that hackers cannot try to access it while you’re away

Change your WIFIs default IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Instrusion detection system

A

System that monitors network traffic for suspicious activity and alerts when such activity is discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intrusion prevention system

A

System that monitors a network for malicious activities such as security threats or policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VPN

A

private network that encrypts and transmits data while it travels from one place to another on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anti virus software programs

A

Bitdefender Antivirus
Norton Antivirus
Avast Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Home directory

A
  • the directory or folder given to a user on a network or Unix or Linux varient operating system
  • this directory is where the user stors all their personal info and files and login scripts and user info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virtual directory

A
  • path within a website that refers users to another directory where the data is hosted
  • also used if the admin wants to publish from these directories in addition to the home directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Star topology

A

topology for LAN where all nodes are individually connected to a central connection point, like a hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bus topology

A

network setup where each computer and network device is connected to a single cable or backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ring topology

A

network configuration in which device connections create a circular path
each network device is connected to two other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Forward lookup zone
DNS zone in which host name to IP address relations are stored When a computer asks the IP address of a specific host name, the forward lookup zone is checked and the desired result is returned
26
Proxy server
verifies and forwards incoming client requests to other servers for further info the proxy server's most important role is providing security
27
DNS
translates domain names into IP addresses that computers can understand also provides a list of mail servers which accepts emails for each domain name
28
Apache server
an open source amd free wen server software that powers around half of websites around the world allows website owners to serve content on the web
29
Domain controller
A domain is a security system used to authenticate users on a network. All users on the network connection sign up to the domain controller, using their user account and password
30
Password history policy
will set how often an old password can be reused it should be implemented with a minimum of 10 previous password remembered
31
Password complexity policy
Passwords may not contain the username or parts of the user's full name passwords must include at least three of four character types: Lowercase, Uppercase, numbers and symbols
32
Log in attempts
creates a condition where a user must wait a period before making additional login attempts prevents random computer generated login attempts that occur many times a second
33
Password age policy
determines the period that a password can be used before the system requires the user to change it
34
Purpose of a server
Computer that provides client computers or workstations with shared resources. The main purpose of a server is to support and most servers are dedicated servers and fulfill only one function
35
Advantages of using a DBMS
- Increased end user productivity - Better data integration - Improved data access - Improved data sharing - Improved data security
36
One to one relationship
a row in one table can only relate to one row in the table on the other side of their relationship and vice versa
37
One to many
one record in a table can be associated with one or more records in another table
38
Many to many
refers to a relationship between tables in database when a parent row in one table contains several child rows in the second table and vice versa
39
Display the employee's name and company name
SELECT Employee.Name, Company.Company_Name FROM Employee,Company WHERE Employee.Emp_No = Company.Emp__No;
40
Display the employee's name and company name and salary of all employess whole salary > 100000
SELECT Employee.Name, Employee.Emp_City, Company.Company_name, Company.Salary FROM Employee.Company WHERE Company.Salary > 100000;
41
SQL code for full backup
Backup database Future_Bank To disk - 'C:\\future_bank';
42
Aspects that should be considered during the planning phase of a website
Simplicity: putting too many elements on the page usually distracts visitors from the main purpose of the page Consistency: Plan everything like the fonts, colour, button, text etc Mobile compatibility: Make sure your website can work well on mobile phone and tablets Easy loading: Make sure the website doesnt take too long to load Audience: The website must be designed to attract the target audience Text and images; These keep the users interested and help with navigation
43
Steps involved in the development of a website
- conceptualization - analysis - design - production - testing - launch - maintenance - evaluation
44
elements that included in the Header Section
- brand - logo - title
45
elements that included in the Footer Section
- copyright - creation date - revision date
46
Navigation tools on websites
- drop down menu - left navigational columns
47
HTML for checkbox form

Show checkboxes:

I have a HouseA
I have a HouseB
I have a HouseC

48
HTML for radio button form

Please select your age:

0-30
31 - 60
61-100
49
HTML code for form

HTML Forms

First name:

Last name:
<

<
50
More HTML Code
< Email:
Password:
<
51
used to inform a website visitor's browser that the document being rendered is an HTML document.
52
Disadvantages of using frames
- A user is unable to bookmark any of the web pages viewed within a frame. - Frames can make the production of a website complicated - The use of too many frames can put a high workload on the server
53
Two type of image compression
Lossy compression Lossless compression
54
Lossy compression
Refers to making the file size smaller by removing unnecessary bits of information
55
Lossless compression
Refers to compression that uses more memory because it does not change the image
56
Important guidelines for securing a new web server
- Disable FTP service if it is not being used - Delete default data/scripts - Update permissions/ownership of files - Disable windows guest account - Administrator account should have a strong password
57
Controlled detour attack
A controlled detour attack is also called a routing detour attack, it happens when the attacker intercepts the message that travels between the user and the web server and redirects it without the user or web server knowing about it
58
Disadvantages of using an open source Operating system
There is no extensive support in general available for open source software There is a lack of extensive technical support. It is developed by numerous people so there is no clear idea of who can be held liable If the program doesn't function properly or causes damage to hardware.
59
When you should use a digital certificate
* To secure communication between your website and your customer's internet browser. * To secure email communications sent to and from your network (or private email address). * To secure information between servers (both internal and external).
60
Brute force attack
A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
61
Four layers in web browser
Application layer: Programs on your computer communicate directly with the application layer Transport layer: splits the data it receives into smaller pieces of information (called packets), which can be sent over the internet Internet Protocol layer: adds the address of the computer where the information is coming from as well as the computer to which the information is going Network interface layer: receives packets over the internet and sends them to their destination. To do this, it uses the information stored in the packet as well as the information that other computers on the network send to it
62
List and describe the function of six network devices
a network adapter: is a piece of hardware that is added to a computer, allowing it to be connected to a network network cables used to connect a computer to a network or one network to another network An Ethernet hub is a device that allows you to connect multiple computers to the same network. switch sends the information to the correct computer router can assign IP addresses, block certain kinds of traffic, control how much bandwidth any computer can use and complete many other useful network related tasks A modem used to connect you to the internet
63
TCP/IP specifies how data should be
formatted addressed transmitted routed received
64
List and describe the characteristics of a database
self-contained: databases are considered self-contained because they not only contain the data, they also contain information about the data data independence: independence means that the data is independent of the applications using the data. This means that the applications accessing the data cannot make changes to either the data or the structure in which the data is stored. data abstraction: with data abstraction, databases hide the complexity of the database from the final user. This means that the user does not have to see the SQL code or the complex relationships between the data when browsing the database multiple views: SQL databases also allow different users to see different views of the database centralised control: all the data can be controlled from a central position. This means that any changes you make to the data will immediately be made to all the applications that use it
65
What are the six kinds of database structures?
- hierarchical database structure - network database structure - relational database structure - object-oriented database structure - distributed database structure - non-relational database structures
66
List security risks.
- hardware capacity problems - physical damage to hardware - programming bugs in the server software - data loss or corruption due to hardware problems - viruses and malware