The Internet Flashcards

1
Q

What is the internet?

A

The internet is “a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communications on protocols.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a website?

A

A website is “a location connected to the internet that maintains one or more web pages.”

For example: Extravaganzas website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a web page?

A

A web page is “a hyper text document connected to the world wide web.”

For example: the about page on extravaganzas website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three basic web technologies?

A

Hyper Text Transfer Protocol (HTTP) - HTTP is text which is linked to other content, also transmitting hypermedia documents e.g HTML

Hyper Text Mark up Language (HTML) - HTML is a set of tagged elements used to provide/give content on a web page

Cascading Style Sheet (CSS) - CCS describes the appearance of web content and external style sheets can control layouts of multiple web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the request methods of HTTP (Hyper Text Transfer Protocol) ?

A

-GET
The GET method requests a representation of the specified resource. Requests using GET should only retrieve data.

  • POST
    The POST method is used to submit an entity to the specified resource, often causing a change in state or side effects on the server.
  • HEAD
    The HEAD method asks for a response identical to that of a GET request, but without the response body.
  • PUT
    The PUT method replaces all current representations of the target resource with the request payload.
  • DELETE
    The DELETE method deletes the specified resource.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does HTML stand for?

A

Hyper Text Mark-Up Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does HTML do?

A

HTML Creates a set of tagged elements ( <h1> Hello </h1> ) used to render content on a web page. it also describes a structure of a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does CSS stand for?

A

Cascading Style Sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does CSS do?

A

It describes the appearance of web content

An external style sheet can control the layout of multiple web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whats Cipher Text?

A

In cryptography, cipher text is the result of encryption performed on plain text using algorithm, called a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between Symmetric and Asymmetrical Encryption?

A

Symmetric Encryption uses the same key to encrypt and decrypt, also known as being used with a secret key.

Also Called Secret Key

Used for:

  • encrypted emails
  • file and drive encryption e.g BitLocker & TrueCrypt

Asymmetric Encryption uses different keys to encrypt and decrypt, also known to be used in public key infrastructure to secure web traffic.

Used for:

  • Creating secure sessions
  • Secure communication across the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SSL?

A

Secure Socket Layer (SSL) is an internet protocol that ensures the security of data using encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TSL?

A

TLS stands for Transport Layer Security.

The TSL protocol aims primarily to provide privacy and data integrity between two communicating computer applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does HTTPS mean?

A

HTTPS is a secured version of HTTP and can be thought of as Hyper Text Transfer Protocol (HTTP) mixed with Secure Socket Layer (SSL) or Transport Layer Security (TLS) to make a secure HTTP

HTTPS uses a digital certificate and PKI (public key infrastructure)

It provides authentication (proof of origin) and encryption (protection of data)

Protects against main-in-the-middle attacks ( a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. )

ISPs known to have injected ads into HTTP pages (so it stops that)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Different examples of Protocols?

A

FTP- File Transfer Protocol
FTP transfers files over the internet, is un-secure.

FTPS provides secure file transfer protocols using secure socket layer and transport layer security

SMTP - Simple Mail Transfer Protocol
SMTP sends emails between servers

NNTP- Network Transfer Protocol
Delivers news articles for news feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Whats a web server?

A

A web server is a programme that uses HTTP to serve the files that form web pages to users, in response to their requests which are forwarded by their computers’ HTTP clients.

Internet Information Services is an extensible web server created by Microsoft for use with the Windows NT family. IIS supports HTTP, HTTP/2, HTTPS, FTP, FTPS, SMTP and NNTP.

Web hosting software is available with windows server operating systems.

A web server delivers content or services to end users over the internet consisting of a:

  • Physical server
  • Software used to facilitate HTTP communication
  • Server Operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Lamp Stack?

A

Lamp Stack is a model of web service stacks associated with Linux.

Named as an acronym of the names of its original four open-source components:

  • Linux operating system
  • Apache HTTP server
  • MYSQL relational database management system (RDBMS)
  • PHP server wide web based programming language
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LAMP alternatives?

A

WAMP - Windows Apache MySQL PHP

MAMP- Mac Apache MySQL PHP

XAMPP - Cross Platform Apache Maria DB PHP Perl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is LAMP?

A

LAMP is a software bundle. Its a model of web service stacks, names as an acronym of the names of its orginal four source open components

L- Linux ( operating system )
A- Apache ( server )
M- MYSQL (database)
P - PHP- (coding)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Phishing?

A

A severe crime targeted at users via email and phone (conned!)

Attackers will obtain phishing kits from the dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which web technology is used to define web pages, including colours, layouts and fonts?

A

CSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is ISS?

A

Internet Information Services

Windows specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is CMS?

A

Content Management System which has multiple users to manage content and create content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Whats SharePoint?

A

A windows based web server used for teams to collaborate to allow staff to post comments, files, messages & complete team work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Whats Pharming?

A

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Whats Spyware?

A

Spyware is a piece of malware that tricks you into installing it on a piece of desirable software or disguising itself as one.

Spyware begins by installing itself on a computer and automatically compiling data from it without the users knowledge. The data is then sent to the authors of the attack with a a variety of motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Whats MITM/MITB?

A

Also known as “Man In The Middle” & “Man In The Browser”

This is one of the most dangerous attacks a cyber criminal can use. This method employs the usage of similar malware to gain important information from users of websites, especially banking and credit card information.

It is a piece of code that alters and adds different input fields to a web page you are visiting.

There are two types: MITB/MITM which involves being within physical proximity to the intended target.

With a traditional MITM attack, the attacker needs to have access to an unsecured or poorly secured WIFI router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Whats Key Logging?

A

Software which records key presses such as passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Whats SQL Injection?

A

This refers to a “Injection Attack” where an attacker can execute malicious SQL statements that control web applications database server

The danger of this is that it could affect any website application that makes use of SQL based database which an attacker could retrieve the data base contents and either add,modify or delete records - overall affecting data integrity and data protection

Prevent using firewall, updating software regularly & encrypt passwords and confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does SQL stand for?

A

Structured Query Language

SQL lets you access and manipulate databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Whats Spoofing?

A

This is the occurrence of a security attack where an attacker will create a “shadow copy” of the web by having all the victims traffic go through their machine.

The dangers of this is the attacker being able to obtain victims information

Ways to prevent:

  • Use an access control list to deny private IP addresses on your downstream interface
  • Implement filtering both inbound and outbound traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Whats a Web Server?

A

A web server is a programme that uses HTTP to serve the files that form web pages to users, in response to their requests, which are forwarded by their computers’ HTTP clients.

A web server delivers content/services to end users over the internet.

A web server typically supports content using: HTTP, HTTPS, FTP, FTPS, SMTP, NNTP

Consists of:
Physical Server
Server Operating System (OS)
Software facilitate HTTP communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Whats an Application Server?

A

An application server is a software framework providing facilities to create web applications and a server environment to run them.

Ab application server acts as a set of a components accessible through a standard API defines for the platform itself.

For web applications components are usually the same running environment as the web server(s)

An application servers main job is to support the construction of dynamic pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Key functions if RDBMS?

A

Relational Database rules can be simplified as:

  • Data must be stored and presented as relations (i.e tables that have relationships with each other are primary/foreign keys. (Primary is the key that cannot be changed and its unique, whereas the foreign key is whats linked)
  • To manipulate the data stored in the tables a system provide relational operators
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does CMS stand for?

A

Content Management Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Whats CMS?

A

CMS is a software used to create and manage digital content.

It typically supports multi-users and collaboration to get work done.

A CMS typically provides:

  • SEO friendly URLs
  • Integrated and online help
  • Modularity and extensibility
  • Templating support for changing designs
  • Install and upgrade wizards
  • Integrated audit logos
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Examples of web servers?

A
  • Microsoft Internet Information Server (ISS)
  • Lighttpd
  • Sun Java System Web Server
  • Jigsaw Server
  • Apache HTTP Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Examples of a Content management systems?

A

Share Point

BoostHQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Whats Internet Governance?

A

Internet governance is the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures and programmers that shape the evolution and use of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Whats is W3C?

A

World Wide Web Consortium (W3C) - improving the experience/accessibility

  • W3C is a international community working together to develop web standards
  • Community is made up of the member organization, full-time staff and the public
  • W3C’s mission is to lead the web to its full potential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Whats ICANN?

A

Internet Corporation for assigned names and numbers (ICANN) - Make sure the IANA are able to fulfill their role

  • Performs the actual technical maintenance work under the IANA
  • This Includes:
  • Co-ordinating the maintenance and procedures of several databases related to the name spaces of the internet
  • Ensuring the networks stable and secure operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Whats IANA?

A

Internet Assigned Numbers Authority (IANA) - governs DNS and IP addresses

  • US based organisation
  • Tasked with overseeing the allocation of IP addresses in a fair and consistent manner
  • Global co-ordination of DNS, IP addressing, and other Internet protocol resources
  • Including domain names
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Whats IETF?

A

Internet Engineering Task Force (IETF) - connectivity of the internet and the way it works

  • A non profit organisation ran by volunteers of a large open community in promoting Internet Standards.
  • The common purpose that brings the IETF together is that “The Internet must work”.
  • The IETF look at common, open networking infrastructures that can be used for a multitude of purposes, bringing the benefits of communication to bear on a variety of tasks.
  • The people who run IETF are in what way concerned with the evolution of internet architecture and the smooth operation of the internet
  • Community made up of network designers, operators, vendors and researchers
  • In particular the standards that comprise the internet protocol suite (TCP, IP)

TCP: Transmission Control Protocol
IP: Internet Protocol
If the IETF didn’t exist their would be many issues with the internet and they way in which is works. Connections may get lost and connectivity may be slow. The internet is more vunerable to hackers and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Whats a web client?

A

Web Client: Is an application with access to the internet. ( What your using to access the web )

e.g browser, browser plug ins, web enables apps

for example a web client is google chrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Whats a web browser?

A

A web browser is a software application used to retrieve, present and traverse information resources on the world wide web.

  • Resources could be webpage, image,video or other content
  • Resources can be identified using Universal Resource Locators/Indicators
  • URL or URI

Hyperlinks are presented in resources enable users easily to navigate their browsers to related resources

The different software programmes used to view websites or files : Edge, Firefox, Chrome

WEB BROWSERS READ HTML DOCUMENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Whats a web application?

A

Web Application: An application for which the client (or user interface) runs in a web browser.
e.g Web Mail, Messengers (FB Messenger), eCommerce applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does a web browser consist of?

A
  • User Interface
  • Layout Engine - takes into account window size - determines what window size your device is
  • Rendering Engine - Visual representation of HTML & CSS
  • JavaScript interpreter - Executes JS
  • UI (user interface) back end - Draws widgets such as combo boxes and windows
  • Networking component - retrieve URLs using web protocols
  • Data persistence component - Enables ability to run “sessions”
  • Other functionality and compatibility achieved with browser extensions / plugins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Compatibility - Different File Formats:

A
  • Browsers read HTML documents
  • Extensions/Plugins required for compatibility with other file formats
  • Document Plugins: Adobe Reader for PDF, Office Online extensions for Microsoft Office Documents
  • ActiveX to run ActiveX controls
  • Multi-media requires Codecs to decode digital data streams : Adobe Flash Player, QuickTime, Windows Formats (WMA/WMV) and MP4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Whats is Search Engine Optimization?

A

The process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When a search engine is performed, the search engine does what?

A
  • Returns only results relevant to the search query

- Ranks those results by popularity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a web crawler?

A

A web crawler is also known as a web spider
The web spiders uses hyperlinks on pages to “crawl” the web and collects documents to build searchable index. Theirs potential thousands of instances running at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Step by steps to a web crawler:

A
  1. Crawler visits URL
  2. Look for robots.txt file
  3. Crawls the site pages
  4. Indexes text and other content
  5. Follows hyperlinks to external pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is session data?

A

A session can be defined as a server-side storage of information that is desired to persist throughout the user’s interaction with the web site or web application.

Storing session data allows personalisation and recall of user input
Ecommerce basket contents
USer settings and prefrences
Tracking usage and hits authentication
Data can be stored locally (in cookies) or as a session data within a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is a cookie?

.

A

A cookie is a small piece of text stored on a user’s browser. Common uses for cookies are authentication, storing of site preferences, shopping cart items, and server session identification.

  • Data sent from a website and stored in a users web browsers while the user is browsing that website
  • Small text document stored on users machine to save session data
  • Cookies are limited to 4096 bytes (4KB) and 20 per site
  • Cookies are used for a variety of purposes including to remember user preferences in including user preferences on a site, how users are using a site and for logging into a service or to make sure users are logged in securely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the 4 common cookie issues with security and privacy?

A
  • Most cookies do not usually contain personally identifiable information, but can identify a computer
  • Cookies do not and cannot hold code
  • Cookies can be harvested - Meaning that the attacker can try to impersonate a website by accepting cookies from the users. Once the attacker gets the cookies, they can use these harvested cookies for websites that accept third-party cookies.
  • Cookies can be manipulated for malicious purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are third party cookies?

A

Third party cookies come from a site other than the one the user is browsing.

It can also be used to allow communication between sites. For example:

  • a like button on a page that stores Facebook cookies indicate likes
  • an advertising cookie that tracks user browsing to target marketing
  • if an unauthorized, this may be considered spyware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Whats session data storage provide?

A
  • Storing session data allows personalisation and recall of user input
  • e-commerce basket contents
  • user settings and preferences
  • tracking usage and hits
  • authentication
  • Data can be sorted locally
  • Session Storage stores data only for a session, meaning that the data is stored until the browser (or tab) is closed.
  • Data is never transferred to the server.
  • Storage limit is larger than a cookie (at least 5MB).

Programming language in used to define methods of implementing session data storage

  • HTML web storage objects
  • PHP $_session variables
  • JavaScript DOM storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Whats the difference between static and dynamic web pages?

A

Static web pages have fixed content

  • coded in html
  • displays same information for every visitor
  • do not require any web programming or data base design
  • scripting language

Dynamic web pages are generated in real time

  • use web scripting code (e.g PHP or ASP.net)
  • code within the page is parsed (run) on access
  • page usually access information in a database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

what is the difference between java and javascript?

A

Key differences between Java and JavaScript: Java is an OOP programming language while Java Script is an OOP scripting language. Java creates applications that run in a virtual machine or browser while JavaScript code is run on a browser only. Java code needs to be compiled while JavaScript code are all in text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Whats an mpeg file?

A

A file with the MPEG file extension (pronounced as “em-peg”) is an MPEG (Moving Picture Experts Group) Video file.

Videos in this format are compressed using either MPEG-1 or MPEG-2 compression. This makes MPEG files popular for online distribution—they can be streamed and downloaded quicker than some other video formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Whats the difference between mp3 & mp4?

A

The most fundamental difference between MP3 and MP4 is the type of data they store.

MP3 files can only be used for audio, whereas MP4 files can store audio, video, still images, subtitles, and text. In technical terms, MP3 is an “audio coding” format while MP4 is a “digital multimedia container” format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Whats the purpose of hosting and serving?

A

Answer: Web hosts are what make websites accessible over the Internet. This means they keep all the webpages of the hosted site on their server, they take care of all the setup and technical issues, and they have a very high-speed connection to the Internet.1 F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are the factors that affect SEO?

A
  • Using the wrong keywords
  • Mobile compatibility
  • Not facilitating the content distribution
  • Good UX
  • Not including a call-to-action
  • Quality inbound links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What does HTML stand for?

A

HTML (Hypertext Markup Language) is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page. The markup tells the Web browser how to display a Web page’s words and images for the user. Each individual markup code is referred to as an element (but many people also refer to it as a tag). Some elements come in pairs that indicate when some display effect is to begin and when it is to end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Whats HTTL ?

A

HTTL stands for Hyper Text Transfer Language

  • HTTL is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.
  • Its a standard markup language used to create static web page content
  • Describes the structure and content of web pages using tags
  • Tags are used by the browser to render the content of a page
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

what does MT mean?

A

Meta Title

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does < a h r e f = “mean? “> < / a >

A

This means Anchor Hyper Text Reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Key functions of JavaScript?

A

JavaScript allows you to change HTML content and provides functionality. It also
provides the ability to create dynamic web content and can be placed inline with the HTML using the and tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which software application for retrieving, presenting and traversing information resources on the world wide web?

A

Web Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is used to identify resources on the world wide web?

A

URI

URL/URI is the address of a World Wide Web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

You want to create a static web page with basic functionality. The content of the page will only change every 3 - 6 months. Which language should be used?

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

You are accessing a PDF file online, but the file keeps failing to load. You have tried in the most up to date versions of both Microsoft Edge and in Google Chrome, but it still does not work. How can you access the file?

A

Download the file and use Adobe Acrobat Reader to view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which file format is most likely to be used for multimedia content such as video?

A

Mp4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

You are purchasing some items on an e-commerce site when your browser crashes and closes unexpectedly. You reopen the browser and find that the contents of your shopping cart is still there. Which web feature has been used to accomplish this?

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the most common way that a search engine operator locates sites to add to their database?

A

Web Crawler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the maximum amount of data you can store in a web cookie?

A

4kb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is NOT possible with web cookies?

A

Storing and running malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the CSS code to set the text alignment of an HTML element to justified?

A

Style=text-align:justify;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which HTML tag can be used to insert JavaScript into the head of a web page?

A

In HTML, JavaScript code must be inserted between and tags.

Example

document.getElementById(“demo”).innerHTML = “My First JavaScript”;

81
Q

what does < ul > mean? < /ul >

A

Bullet pointed list

82
Q

what does < ol > mean? < /ol >

A

Numbered list

83
Q

What does creating a text shadow look like in html?

A

text-shadow: offset-x offset-y [blur-radius] [color];

84
Q

Functions of using text decoration?

A

This property has a number of values:

  • none: no line is drawn, and any existing decoration is removed. This is often used to remove underline from hyperlinks.
  • underline: draws a 1px line across the text at its baseline.
  • line-through: draws a 1px line across the text at its “middle” point.
  • overline: draws a 1px line across the text, directly above its “top” point.
  • inherit: inherits the decoration of the parent

LOOKS LIKE: text-decoration: overline;

85
Q

If you use colours in web what is it?

A

Web colours standards are used to refer to specific colours for use on the web. These can be referred to in a number of ways, but commonly are denoted by:

  • Name (e.g. Red, SkyBlue, SpringGreen)
  • Hexadecimal web colours (e.g. #228B22 is ForestGreen) or
  • RGB values (e.g. 244 164 96 is SandyBrown)
86
Q

What is programming?

A

Programming is:

  • Taking a task and breaking it into a series of steps.
  • Writing instructions to perform those steps
  • Executing those instructions so that each step is performed in specific order.

The act of telling a computer what to do:

  • Describing what we want in a series of steps
  • Write steps using a high-level programming language
  • Compile code (translate) from high level code to low level format the computer is able to understand
  • Execute the series of instructions in binary on the computer

Interpreted Languages - Code runs “on the fly” when programme runs:

  • JavaScript
  • Java
  • PHP
  • Python
  • Visual Basic
  • HTML/CSS

Compiled Languages - Complies into an.exe and installed onto a computer:

  • C /C++/ C#
  • Scala
  • Pascal
  • COBOL
87
Q

Whats an Algorithm?

A

An algorithm is a sequence of instructions.

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

88
Q

What is a programme?

A
  • A sequence of instructions to be carried out
  • Described the process of doing something
  • Doesn’t need to be just for a computer
  • Contains and manipulates data
89
Q

What is Interpreted Languages?

A
  • A code that runs as it happens when the programme runs

Examples of interpreted languages:

  • Javascript
  • Java
  • PHP
  • Python
  • Visual Basic
  • HTML/CSS
90
Q

What is Complied Languages?

A
  • A compiled language is complied into an .exe and installed onto a computer

Examples of complied languages:

  • C
  • C++
  • C#
  • Scala
  • Pascal
  • COBOL
91
Q

Whats a static website?

A

A static website contains Web pages with fixed content. … Static sites are the most basic type of website and are the easiest to create. Unlike dynamic websites, they do not require any Web programming or database design. A static site can be built by simply creating a few HTML pages and publishing them to a Web server.

92
Q

Whats a dynamic website?

A

A dynamic website contains information that changes, depending on the viewer, the time of the day, the time zone, the viewer’s native language, and other factors. For example, the Computer Hope main page is a dynamic website that automatically changes daily.

Java script - effects, animations

93
Q

What is Java?

A
  • Java is a high-level, platform independent programming language and environment (where something is happening/place)
  • Java was first released by sun micro systems (now oracle) in 1955
  • Designed to work in the distributed environment on the internet
  • Platform independent language with very few dependencies
94
Q

What is Java used for?

A
  • Java is used for creating interactive web content (web apps)
    e. g feeds, social media platforms, chat applications, input enabled content access or write to a database etc.
  • The development of e-commerce software
  • The development of mobile maps (especially android)
  • Creating desktop and entrepreneurial applications
  • Development of small programs to assist in market research and campaigns e.g analyzing market research data, automating creation of personalized or location specific emails .
  • Mine craft was developed in Java
95
Q

What is OOP programming?

A

(OOP) is object-oriented programming language model organized around “objects” rather than actions and data rather than logic.

  • Its based on the concept of objects that have attributes
96
Q

An example of Java

A

public program {
public static void main(string [ ] args) {

….code goes here….
….code goes here….

97
Q

The main (string [] args) methods is used to make what?

A

Makes the class executable on its own

98
Q

How many comments types are in JAVA?

A

three types

99
Q

Java method names are in?

A

lowercase

100
Q

Java keywords are?

A

lowercase and colour coded

101
Q

What are variables?

A
  • Variables are used to store information to be references and used by programs
  • It must be declared before use (declaration must include a name and the type of data being stored)
102
Q

What are variable data types?

A

Int - whole number e.g 1,2,3,15,75

Float- numbers with decimal places e.g 1.5, 2.25, 3.1415

Boolean- logical data which either is true or false and are used within comparison and relational operators

Char- Text character separated by apostrophes e.g a, b, c and string is a series of character in quote mark e.g “Hello Everyone”

103
Q

What are the 4 Java Mathematical Operators and their symbols?

A
  • addition (+)
  • subtraction (-)
  • division (/)
  • Modulus division (%)
104
Q

What is a conditional operator/statement?

A

A conditional operator/statement allows decision making in a programme.

e.g use if/else statements, comparison operators and boolean logic in java

Conditional operators are used to evaluate a condition that’s applied to one or two boolean expressions. The result of the evaluation is either true or false.

105
Q

What are the relational operators in boolean values?

A

relational operators are used to compare values for if statements and produce a boolean value (true or false)

>  greater than
>=  greater than or equal to
<  less than
<=  less than or equal to
==  equal to
!=  not equal to
106
Q

Whats a boo lean?

A

Boolean Operators are used to connect and define the relationship between your search terms. When searching electronic databases, you can use Boolean operators to either narrow or broaden your record sets. The three Boolean operators are AND, OR and NOT.

107
Q

What are boo lean operators?

A
  • Mathematical process to enable operations on true or false
  • Focusing searched for more ‘on-target’ results that are more appropriate to your needs, eliminating unsuitable or inappropriate
108
Q

What does OOP mean?

A

Object Oriented Programming

109
Q

What type of programming language is Java?

A

Intepreted

110
Q

Which of the following is a valid class name in Java?

A

Class names start with a capital letter

111
Q

Which of the following indicates a single line comment in Java?

A

//

112
Q

Which type of variable should be used to store customer names?

A

String

113
Q

What type of variable stores a stock level

A

Int

114
Q

Which type of variable stores logical data which is either true or false?

A

Boolean

115
Q

Which type of java variable sets numbers to a decimal place?

A

Float

116
Q

Which Java feature will allow decision making?

A

if else

117
Q

What are the BOOLEAN operators?

A
AND = &amp;
OR = |
XOR = ^
NOT = !
118
Q

What are the CONDITIONAL operators?

A
AND = &amp;&amp;
OR = | |
119
Q

Whats the process of SEO ?

A

Aiming to maximize (increase) the number of visitors to a particular website by ensuring that the site appears high on the list of results on the internet returned by a search engine

120
Q

What are the key things to do in HTML when adding an image to a website?

A

Add:

  • Meta Title
  • Meta Disc
  • URL
  • Headings <h1>
  • Alt-text

IN HTML example: </h1>

121
Q

What does SERP stand for?

A

Search Engine Results Page (SERP) is the page displayed by a web search engine in response to a query by a searcher.

122
Q

When a search engine is performed what happens?

A
  • Returns ONLY results relevant to the search query
  • Ranks the results by popularity

Search engines also use complex algorithms to determine relevance and popularity by using ranking factors

123
Q

what are googles four recommendations for SEO

A
  1. Make pages for users not for search engines
  2. Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link
  3. Create useful information and write pages that clearly and accuratley describe content.
  4. Use keywords to create descriptive, human friendly URLs.
124
Q

Whats a widget?

A

an application, or a component of an interface,that enables a user to perform a function or access a service.

For example a twitter feed widget

125
Q

Whats an API and what are API Keys?

A

API stands for Application programming interface

Process:
API is a set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service.

API Keys:
API Keys are used to protect and track use of API based news feeds. An application programming interface key (API key) is a code passed in by computer programs calling an application programming interface (API) to identify the calling program, its developer, or its user to the Web site.

API Keys act as a form of authentication which leads to access control (e.g a product key of a office Microsoft voucher)

126
Q

Whats a social media feed?

A

A social media feed:

  • Gathers and publishes social media content.
  • Items typically consist of a headline link and summary of content
  • Used to link to social media or related content
  • Often uses an RSS widget (RSS stands for Really Simple Syndication)
127
Q

How can social media feeds be put onto a site?

A

They can be put on using:

  • Browser Plug-ins (readers
  • Application Program Interfaces (API’s)
128
Q

Two different third party tools to allow social content to be collected from multiple SM sites?

A
  • Juicer

- POWr

129
Q

What are API Keys and what is the process of using them?

A

API Keys were created as somewhat of a fix to the early authentication issues of HTTP Basic Authentication and other such systems. When the user attempts to re-enter the system, their unique key (sometimes generated from their hardware combination and IP data, and other times randomly generated by the server which knows them) is used to prove that they’re the same user as before.

API keys use standard hash function to validate origin and prevent tampering

  1. The process is to take the text of your request and your secret key and apply the HMAC function
  2. You then add that authentication header to your request and send it to Amazon
  3. Service providers would then look up their copy of the secret key and then the text
    you sent and applies the HMAC function to decrypt.
  4. If the result matches, they know that you have same secret key
130
Q

What are the stages required to generate a commission code? (SDLC)

A

The software development life cycle (SDLC) is the name of the overall process of developing software from start to finish.

This is a theoretical model describing phases required to initiate, develop and maintain software.

  1. Requirement gathering and analysis
  2. Design
  3. Implementation or coding
  4. Testing
  5. Deployment
  6. Maintenance
131
Q

What Is an Object?

In Object-Oriented Programming Concepts

A

An object is a software bundle of related state and behavior. Software objects are often used to model the real-world objects that you find in everyday life.

132
Q

What Is a Class?

In Object-Oriented Programming Concepts

A

A class is a blueprint or prototype from which objects are created.

133
Q

What Is Inheritance?

In Object-Oriented Programming Concepts

A

Inheritance provides a powerful and natural mechanism for organizing and structuring your software.

134
Q

What Is an Interface?

In Object-Oriented Programming Concepts

A

An interface is a contract between a class and the outside world. When a class implements an interface, it promises to provide the behavior published by that interface.

135
Q

What Is a Package?

In Object-Oriented Programming Concepts

A

A package is a namespace for organizing classes and interfaces in a logical manner. Placing your code into packages makes large software projects easier to manage.

136
Q

What is concurrency programming?

A

(Part of an OOP Method)

  • Concurrency programming is when multiple sequences of operations are run in overlapping periods of time. In the realm of programming, concurrency is a pretty complex subject. Dealing with constructs such as threads and locks and avoiding issues like race conditions and deadlocks can be quite cumbersome, making concurrent programs difficult to write. Through concurrency, programs can be designed as independent processes working together in a specific composition.
137
Q

What is class-based programming?

A

(Part of an OOP Method)

  • Class-based programming is achieved by defining classes of objects rather than specific objects.
  • Class-based object oriented programming is a style that gains inheritance by processing classes as objects. The most prominent style of OOP is class-based instead of object-based. With the class-based OOP system, objects are units that merge states, identities, and behaviors.
138
Q

What is Cloaking in SEO terms?

A

Cloaking is a search engine optimization technique in which the content or information presented to the user is different from that presented to search engine crawlers (i.e. spiders or bots) for better indexing. In other words, cloak definition is, the web server is specially programmed to return different content to search engines than it returns to regular users, in an attempt to distort search engine rankings by making a cloak content. You might have understood now that cloaking is an illegal practice and is considered a Black hat SEO. The Search engine may permanently ban from our index any sites or site authors that engage in cloaking.

139
Q

Whats RSS stand for?

A

RSS ( Really Simple Syndication ) is a standardized system for the distribution of content from an online publisher to Internet users.

140
Q

Which of the following encryption mechanisms are used with programming interfaces to authenticate users?

A

Hashing

141
Q

what can web development companies, employ as an extra layer of security for 3rd party developers who are using their programming interface

A

API Key

142
Q

You have been asked to create a dynamic web page and include a range of effects, animations and provide some user interaction to maintain customer focus. Which of the following languages should you choose to provide these features?

A

JavaScript

143
Q

What does the use of an API do for a web application?

A

Makes the application more secure

144
Q

What is Apache TomCat?

A

A web server

145
Q

What is the waterfall software development process?

A

The waterfall model is a series of steps that can be used as design guidelines in the software development process. It conceptualizes the steps as beginning at the top level and “flowing down” to lower levels as progress is made.

146
Q

The list of software development processes

A
Agile Software Development
Crystal Methods
Dynamic Systems Development Model (DSDM)
Extreme Programming (XP)
Feature Driven Development (FDD)
Joint Application Development (JAD)
Lean Development (LD)
Rapid Application Development (RAD)
Rational Unified Process (RUP)
Scrum
Spiral
Systems Development Life Cycle (SDLC)
Waterfall (a.k.a. Traditional)
147
Q

Which software development methodology provides a flexible framework for managing projects which suits the changing work of software design well?

A

Agile

148
Q

In Java, which of the following symbols is used to represent the Boolean logic function OR?

A

|

149
Q

What is Apache Tom Cat?

A

Application Server

150
Q

What are the HTTP server for web hosting?

A
  • Apache Server

- NginX

151
Q

What is an application server?

A

An application software framework that provides facilities to create web applications and a server environment to run them.

Application servers act as a set of components accessible through standard API defined for the platform itself.

For Web Applications:
They support the construction of dynamic pages
- Components are usually in the same running environment as the web server(s)

E.g:

  • Apache Tom Cat Server
  • Django app development platform
152
Q

What is Relationship Database Management Service

A

It stands for RDMS (Relationship Database Management Service) and is based on the relational model from Edgar.Codd

Relational Database rules can be simplified as:

  • Data being stored and presented as relations, i.e tables that have relationships with each other e.g primary/foreign keys
  • To manipulate the data stored in tables, as system should provide relational operators.

e. g
- MySQL

153
Q

Content Management System

A
  • A (CMS) is software used to create and manage digital content.
  • It typically supports multiple users and collaborations
  • It also typically provides the following features such as
    SEO friendly URLS, Integrated and online help,
    modularity and extensibility, templating support for changing designs, install and upgrade wizards and integrated audit logs.

Template support for changing designs:

e. g
- Word Press
- OpenCMS
- Moodle

154
Q

Comments in Java?

A
/* ....... */- multi line
// - single line 
/** ..... */- java doc documentation comment
155
Q

How mark up languages render hyperlinks?

A

CSS: change the font colour and can change the text-decoration
HTML: blue and underlined as (default)
JavaScript - Creation of buttons with the hyperlink

156
Q

Text decoration for italics is?

A

<em> and <i> </i></em>

157
Q

Whats a Primary Key?

A

Primary keys is used to enforce data integrity in SQL Server tables.

A table typically has a column or combination of columns that contain values that uniquely identify each row in the table. This column, or columns, is called the primary key (PK) of the table and enforces the entity integrity of the table.

A table can contain only one primary key constraint.

158
Q

Whats a Secondary Key?

A

Foreign Keys are used to enforce data integrity in SQL Server tables.

A foreign key (FK) is a column or combination of columns that is used to establish and enforce a link between the data in two tables to control the data that can be stored in the foreign key table.

159
Q

What an Agile Model ?

A

A life cycle model that’s used as software development process.

  • flexible
  • self-organization and motivation are important, as are interactions like co-location and pair programming
  • quick responses to change and continuous development

Examples of an agile model:

  • SCRUM
  • XP Agile
160
Q

Whats a Linear Model

A

Linear models describe a continuous response variable as a function of one or more predictor variables. They can help you understand and predict the behavior of complex systems or analyze experimental, financial, and biological data.

- The relationship between between a dependent variable, y, and independent variable or variables, X. 
Examples of a linear model:
- PRINT2
- Waterfall
- SPRINT
161
Q

Why Codecs Are Required?

A
  • Video and music files are large, which means they are usually difficult to quickly transfer them over the internet. To help speed up downloads, mathematical codecs were built to encode, or shrink, a signal for transmission and then decode it for viewing or editing.
  • Without codecs, downloads would take three to five times longer than they do now.
162
Q

Whats GET stand for in HTTP request methods?

A

The GET method requests a representation of the specified resource. Requests using GET should only retrieve data.

163
Q

Whats POST stand for in HTTP request methods?

A

POST
The POST method is used to submit an entity to the specified resource, often causing a change in state or side effects on the server.

164
Q

Whats PUT stand for in HTTP request methods?

A

The PUT method replaces all current representations of the target resource with the request payload.

165
Q

Whats HEAD stand for in HTTP request methods?

A

The HEAD method asks for a response identical to that of a GET request, but without the response body.

166
Q

Why do search engines use complex algorithms to determine relevance and popularity?

A

Ranking Factors

167
Q

What does google recommend as being the best for better rankings?

A
  • Make the pages primarily for users and not for search engines.
  • Make the site with a clear hierarchy and text links, (every page should be reachable from at least one static text link) - A static link is a hard-coded link containing a Web page uniform resource locator (URL) that is permanent or unchangeable.
  • Create a useful, information rich-site and write pages that clearly and accurately described your content. Make sure your elements and ALT attributes are descriptive and accurate.
  • Use keywords to create descriptive, human-friendly URLS.
168
Q

What is a social media feed?

A
  • A social media feed gathers and publishes social media content
  • They typically consist of a headline link and summary of the content
  • Used to link social media pages or related content
  • Often uses an RSS widget (Rich site summary, often called Really Simple Syndication)
169
Q

What are API Keys?

A

An application programming interface key(API keys) are used to track and control how the API is being used, for example to prevent malicious use or abuse of the API

The process of API keys is:

  • You take the text of your request and your secret key and then apply the HMAC function (Hash message authentication code) involving a cryptographic hash function and a secret cryptographic key.
  • You add that authentication header to your request and sent it to amazon
  • The service provider looks up their copy of the secret key and the text you just sent and applies the HMAC function
  • If the results match they know you have the same secret key.
170
Q

API keys are used for what?

A
  • They are used to protect and track use of API based news feeds
  • Its a unique identifier and secret token for authentication
  • The secret token submitted alongside web service requests to identify the origin of the request
  • Acts as a form of authentication which can lead to access control :
    (- restricts access to certain API actions on who is performing the request
  • Method of tracking who is using the API for billing purposes
  • Prevent abuse in the case of a too-high request volumes by blocking specific keys)
171
Q

What is the theoretical model that described the phases required to initiate, develop and maintain software?

A

The Software Development Life Cycle (SDLC)

  1. Requirement Gathering ad analysis
  2. Design
  3. Implementation of coding
  4. Testing
  5. Deployment
  6. Maintenance
172
Q

What are the two software development methodologies?

A
  • The Linear model
    ( Waterfall, Prince2 )

The waterfall model is one in which each phase of a product’s life cycle takes place in sequence, so that progress flows steadily downwards through these phases like a waterfall.

  • The Agile model
    ( Scrum, DSDM, XP Agile)

An Agile software development methodology – such as Scrum – is one which eschews a linear, sequential approach in favour of an incremental, iterative one.

Instead of extensive planning and design up front, Agile methodologies allow for changing requirements over time by using cross-functional teams – incorporating planners, designers, developers and testers – which work on successive iterations of the product over fixed time periods (timeboxes).

173
Q

What is HTTP?

A

HTTP stands for Hyper Text Transfer Protocol and it uses a set of rules for transferring files such as (text, graphic images, sound, video and other multi-media files) on the WWW (world wide web).

174
Q

Security procedures with HTTP.

A

HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network.

In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS or HTTP over SSL.

  • The Internet is publicly accessible
  • Web traffic often contains personally identifiable or sensitive information
  • Web traffic can be captured and read or altered (Man in the middle attack)
  • HTTP is not encrypted
175
Q

What does FTP mean?

A

File Transfer Protocol (FTP)

It transfers files over the internet and providing secure FTP files using SSL and TSL

176
Q

What does SMTP mean?

A

Simple Mail Transfer Protocol (SMTP)

This protocol sends emails between email servers

177
Q

What does NNTP mean?

A

Network News Transfer Protocol (NNTP)

This protocol delivers news articles for news feeds and the server manager finds another server administrator who’ll “feed” news to them.

178
Q

Benefits of encryption with HTTPS

A
  • Provides secure web traffic
  • Provides secure authentication
  • Provides encryption
  • Provides digital - certificates
  • Provides security against ISP ads
179
Q

Examples of Microsoft Web Services?

A

Application Server:

  • Web Application Server
  • IIS
  • SharePoint

RDMS:
-SQL Server

Content management server:
-SharePoint

180
Q

What is class-based java?

A

Class-based programming, or more commonly class-orientation, is a style of (OOP) object-oriented programming in which inheritance is achieved by defining classes of objects. As opposed to the objects themselves .

181
Q

What is concurrent java?

A

Several computations are executed during overlapping time periods instead of sequentially.

182
Q

What does a mutli - line java comment look like?

A
/*
.............
*/
183
Q

What does a single-line java comment look like?

A

// ……….

184
Q

What are the different compatibility file formats?

A
  • Browsers read HTML documents
  • Extensions/Plugins required for compatibility with other file formats
  • Document plugins read as: Adobe Reader PDFS or Office Online Extension for Microsoft Office Documents
  • ActiveX to run ActiveX controls
  • Multi-media requires codec to decode digital data streams e.g adobe flash player, quick time, windows formats (WMA / WMV) and MP4
185
Q

What is a search engine?

A

A search engine is a programme that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the WWW.

Search Engines Provide:

  1. Provide users the ability to find a site
  2. Search providers generate a database of a site
  3. Search sites may provide additional functionality e.g filtering tools, advance search features, security/privacy features.
  4. Searched performed using key words
  5. May allow use of BOOLEAN operators
186
Q

What is the purpose of cookies?

A
  • To remember user preferences on site
  • To understand how users are using the site
  • For logging into a service or to make sure users are logged in securely
187
Q

What does the ‘POST’ request method in HTTP stand for?

A

Submits data to be processed by a specified source

188
Q

What does the HTTP request method ‘HEAD’ stand for?

A

The HTTP HEAD method requests header for a resource but without the body of response ( useful for retrieving metadata written in headers )

189
Q

Whats does the HTTP request method PUT explain?

A

It uploads a representation of the specified URL

190
Q

What does delete mean in the HTTP request methods?

A

It means it deletes the resource

191
Q

4 points to why the internet may not be safe?

A

Its publicly accessible

HTTP is not always encrypted

Web traffic can be captured and read or altered using cyber attacks such as (MITM - Man in the middle attack)

Web traffic also contains sensitive information

192
Q

What is Encryption?

A

Encryption is the process if converting information/data into a code. This is to prevent unauthorised access.

193
Q

What is LAMP stack?

A

A model of a web service which is associated with:

L- Linux ( operating system )
A - Apache (server)
M- MySQL (data base)
P- PHP (programming language)

194
Q

What does the request method ‘GET’ stand for?

A

Its requesting data from a specified resource

196
Q

What is hashing?

A

Hashing is used with a database to enable items to be retrieved more quickly.

Hashing can also be used in the encryption and decryption of digital signatures. The hash function transforms the digital signature, then both the hash value and signature are sent to the receiver. The receiver uses the same hash function to generate the hash value and then compares it to that received with the message. If the hash values are the same, it is likely that the message was transmitted without errors.

197
Q

What type of variable should be used to store customer names?

A

STRING (names)

198
Q

What type of variable should be used to store stock levels?

A

INT (Integer) - non decimal numbers

199
Q

Which type of variable stores logical data which is either true or false?

A

BOOLEAN (booleans are often used in conditional testing)

200
Q

What is the variable which uses decimal points?

A

FLOAT ( a programming language to define a fractional value )