unit 5 Flashcards

1
Q

what is the internet

A

huge public network of computer systems
allows for the flow of information between devices
made up of computers, servers, switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the world wide web

A

the collection of resources that exist on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a URL(Uniform resource locator)

A

they are text based addresses for web pages
used instead of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are URL’s made of

A

protocol(HTTP OR HTTPS)
domain name
web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is HTTP(Hypertext transfer protocol)

A

used to transfer resources
uses request codes to send and recieve data and perform other tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the different request codes

A

GET, POST, DELETE, PUT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the GET request code

A

request the web server to transmit a specific resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the POST request code

A

requests to add content or data to a new page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the DELETE request code

A

removes the specified resource form the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the PUT request code

A

modifies an existing resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a disadvantage of HTTP

A

any data sent by this protocol can be read by anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is HTTPS(Hypertext transfer protocol secure)

A

secure method of sending data
done through asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are web browsers

A

allows us to surf the web and view web pages
they render HTML web pages and display the content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are functions of web browsers

A

storing bookmarks and favorites
recording user history
allowing use of multiple tabs
storing cookies
providing navigation tools
providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a DNS server

A

domain name system
keeps record of all domains in existence and maps each of these domains to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what happens if the DNS server does not have the requested IP address

A

it will request it from another DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a web server

A

a computer system connected to the internet which stores multiple resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what do web servers store

A

web pages
images
videos
audio files
interactive content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what happens when the web browser wants a resource

A

the web browser finds the correct IP address and then request the resource from the web server
it will then send the HTML which the browser turns into a readable form for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are cookies and what do they do

A

small pieces of data that are stored on the users computer system
saves personal details
tracks user preferences
holds items in online shopping
stores login details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are persistent cookies

A

they remove the need to alter settings on every visit to a website
they are stored on the HDD

22
Q

what are session cookies

A

stored temporarily on the computer system
stored in RAM
used to track the user in particular websites

23
Q

what is digital currency

A

a form of currency that only exists digitally

24
Q

what are characteristics of digital currency

A

decentralised- not controlled by any banks or authorities
irreversible and public- they are on a public record and only the person who owns their currency can move it
anonymous-sending and recieving digital currency is anonymous
limited supply- there is limited supply and circulation of digital currency

25
advantages of digital currency
anonymous decentralised anyone can access it no middle man taking the cut cannot be manipulated
26
disadvantages of digital currency
uses lots of resources to compute the hashes required some digital currencies are not accepted widely not a traditional bank investors have turned digital currency into a commodity value tends to fluctuate
27
what is blockchain
a worldwide, synchronised system of digital ledgers completely tamper proof
28
what happens when data needs to be added to blockchain
when data is added a new block is added to the chain each connecting block is linked to one another which provides a reliable record of events
29
what do the blocks contain in blockchain
sender wallet address receiver wallet address amount sent network fee timestamp number of confirmations
30
what is social engineering
the art of manipulating individuals into giving away private information
31
what is phishing
when a malicious email is sent to a target user with the intent of stealing information away from them
32
what are brute force attacks
hackers go through a list of commonly used passwords
33
how to stop brute force attacks
having very strong passwords
34
what is malware
software that can cause harm to a computer system
35
what can be done to stop malware
anti virus software should be installed on all computers automatic updates are commonly used to keep anti virus software up to date firewalls should be set up users trained to avoid malware
36
what is DDoS( Distributed Denial of Service) attack
when a number of computer systems send a large amount of internet traffic towards a single server or system the server gets knocked offline and becomes inaccessible to users
37
what is hacking
general term for gaining access to a computer system without authorisation
38
what is pharming
form of fraud that takes place online through malicious websites user is sent to a fake website
39
what is data interception
when a malicious attacker intercepts data in transmit
40
what are access levels
ensures that users can only access their personal documents and documents that are related to them
41
what are count controlled loops
repeats loops a set number of times
42
what are pre controlled loops
repeats loop while a condition is true
43
what are post condition loops
repeats loop until a condition is true
44
what are the benefits of using files for file storage
reusability(output can be imported back into programs) large storage capacity portability
45
how can files be opened in python
open(,)
46
how can files be closed in python
file.close()
47
what are the different modes with which files can be opened
read(r) write(w) append(a) read/write(r+)
48
how to open file in pseudo code
OPENFILE FOR
49
how to close files in pseudocode
CLOSEFILE
50
command to write to files in python
file.write("\nwriteanything")