WWL/HTML Flashcards

(32 cards)

1
Q

Who invented WWW

A

Tim Berner Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is WW?

A
  • A way of accessing the information on the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is information encapsulated and viewed in?

A
  • Information is encapsulated in a web page and viewed in web browser (e.g google chrome)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Client-Server Model

A
  • Describes the interaction of networked computers
  • Clients request information from servers
  • Servers respond with the information (if applicable)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the web server?

A
  • A computer set up to respond to requests for web pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server Codes

A

Web Server; HTTP
File Server: FTP
Mail Server: SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP (Hyper Text Transfer Protocol)

A
  • Method of requesting and transmitting web pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does communication between client computers and web servers happen?

A
  • Done by sending HTTP Requests and receiving HTTP Responses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens when a clicks on a link or enters a URL in a browser?

A
  • A request is sent to the HTTP port (80 or 8080) of the associated web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are web analytics?

A
  • Collection and analysis of data regarding website usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are web analytics used?

A
  • Used by website owners to track the number and

behavior of users visiting their sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is HTML? (HyperText Markup Language)

A
  • Defines content of web page as text file with .html extension
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Escape Characters

A
  • Characters that are used in HTML in addition to
    ordinary text and need to be represented
    by a character sequence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Special Characters

A
  • A character that is not an alphabetic or numeric character.
  • Entered in unicode using hex/dec notation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three components of a webpage?

A

-HTML (Content and Strucutre, CSS (Presentation), Javascript (behaviour)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forms

A
  • Allow users to provide information that is sent to a server for storage (e.g., creating a new account) and processing (e.g., making an online purchase)
17
Q

What are the three ways CSS can be added to HTML elements?

A
  1. Inline - by using the style attribute in HTML elements
  2. Internal - by using a element in the section
  3. External - by using an external CSS file
18
Q

Inline CSS

A
  • An inline CSS is used to apply a unique style to a single HTML element.
19
Q

Internal CSS

A
  • An internal CSS is used to define a style for a single HTML page.
20
Q

What can Java Script Change?

A
  • Browser characteristics (e.g., display size, orientation, device)
  • User actions (e.g., mouse movement, clicks, scrolling)
21
Q

What are Cookies used for?

A
  • Cookies are used to store permanent ID about a client’s visit to a specific web server such as:
  • Identification information (e.g., username and credentials)
    • Display preferences (e.g., preferred shopping categories)
    • Shopping information (e.g., items browsed, items in your cart)
    • Regional and language preference
22
Q

Tracking Mechanisms:

A
  1. Cookies
  2. Browser Fingerprinting
    - browser version, language preference, installed fonts, plug-ins, … may (uniquely) identify you without the use of cookies
  3. Javascript
  4. Web Beacon/Web bug
23
Q

Security Risks- Clients

A
  1. Phishing
  2. Malware
  3. Trojan
  4. Vrius
  5. Worm
24
Q

Types of Malicious Software

A
  • Virus
  • Worm
  • Trojan
25
Trojan
- Invade your computer disguised as a real, operational program.
26
Types of Malicious Actions by Trojan
1. RAT (Remote Administration Tool): can activate and broadcast images from a webcam 2. Key logger: capture and transfer typed data (passwords) 3. Backdoor: Provide remote access and control 4. Ransomware: encrypt user data to extort money from owner
27
Virus
- Can corrupt, delete, or steal data; can disrupt computer system - Spreads by “infecting” (attaching itself to) other files that are shared between computers
28
Worm
- Does not attach itself to a file to spread | - Able to replicate itself autonomously over networks
29
Security Risks-Server
- An attack meant to shut down a machine or network, making it inaccessible to its intended users
30
Distributed Denial of Service Attack
- DoS attack from hundreds, thousands, or millions of clients from many different computers
31
Security Risks-Communication
1. Man-in the middle | - Typically uses lure of “free Wi-Fi” in coffee shops, airports, etc.
32
Security Risks-Communication Migitation Measures
- Use HTTPs connections when avaiable | - Use a virtual private network (VPN) service