sem 1 exam revision Flashcards

(31 cards)

1
Q

DoD TCP/IP Layer 4

A

Application Layer: Enables the user to interact with the app or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoD TCP/IP Layer 3

A

Transport Layer: Transfers data across a network uses protocols like TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DoD TCP/IP Layer 2

A

Internet Layer: Handles packaging, addressing and routing of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoD TCP/IP Layer 1

A

Network Access Layer: handles moving data into and out of a network (Wi-Fi, cables).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Layer 7

A

Application Layer: Interface for the user, supports services like HTTP, SMTP, FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Layer 6

A

Presentation Layer: Ensures data is transferred through the network in a suitable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Layer 5

A

Session Layer: Manages connections (sessions), between local and remote applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Layer 4

A

Transport Layer: Ensures complete data transfer, handles errors and flow control, uses TCP and UDP protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI Layer 3

A

Network Layer: Handles IP addressing and routing of data packets across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI Layer 2

A

Data Link Layer: Uses MAC addresses, prepares data for physical layer, handles error-free transfer of data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Layer 1

A

Physical Layer: Transfers raw bits over a medium like cables or radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2D arrays

A

array within an array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

creating instances from classes

A

my_pet = Pet(“Buddy”, 3, “John Doe”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

calling methods from classes

A

my_pet.show_owner()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

inheritance

A

where one class (child) has the same attributes as another class (parent)

an example is a dog class (child) has some attributes from pet class (parent) but has its own additional attributes (like breed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

polymorphism

A

method of an object which allows it to take multiple forms

17
Q

instantiation

A

blueprint that defines attributes and methods that objects will have

18
Q

abstraction

A

hiding complex implementation details

19
Q

encapsulation

A

bundling of data (variables) and methods that operate into a single unit - a class

20
Q

bubble sort

A
  • comparison-based sorting algorithm that swap elements next to each other if in the wrong order
    1. start at the beginning of list
    2. compare each pair of elements in a list
    3. if they are in the wrong order, swap them
    4. repeat steps 2-3 until the end of list is reached
    5. if any swaps was made in the previous pass, repeat steps 1-4
  • time complexity of O(n^2)
21
Q

insertion sort

A
  1. start with second element of list
  2. compare current element with elements to the left
  3. if current element is smaller, shift larger elements to the right
  4. repeat steps 2-3 until current element is in correct position
22
Q

acceptance testing

A

-focuses on verifying whether the new system meets the needs and requirements of its intended users
- involves testing the systems functionality, usability and performance to ensure it aligns with the expectations of end-users

23
Q

mix of transaction types

A
  • simulating various transaction scenarios ensures the system can handle them correctly under a variety of different circumstances
  • an example is a banking system
24
Q

breakpoints

A

pausing the execution of code and examine the code

25
desk checking
- mentally executing the code line by line - helps identifying errors by keeping track of the variables
26
viruses
Malicious code that attaches to other programs and replicates, spreading from computer to computer.
27
worms
Similar to viruses but spread independently without attaching to other files.
28
trojans
Disguised as legitimate software, allowing attackers remote access and control upon installation.
29
spyware
Monitors and collects user activity (browsing history, keystrokes, personal information).
30
ransomware
Encrypts files and demands ransom for decryption.
31
adware
Displays unwanted advertisements.