Year 13 Theory Test 1 Flashcards

1
Q

What are the features of Serial Files?

A
  • Data is stored in the order in which it is entered.
  • No order to the data is maintained.
  • Useful for storing transactional data and initialisation files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the features of Sequential Files?

A
  • Store data in order of a key field.
  • The order is maintained when new records are added.
  • Useful for storing master files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Database?

A

A structured, persistent collection of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the advantages of Databases?

A
  • Makes processing more efficient.
  • Reduces storage requirements.
  • Avoids redundancy.
  • Allows different users to only see relevant data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does DBMS Stand for?

A

DataBase Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DataBase Management System?

A

A software system that enables the definition, creation and maintenance of a database and which provides controlled access to this database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Table?

A

A collection of related data and is made up of Records and Fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Field?

A

Used in a database to provide category headings for each item of data in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Record?

A

A collection of data for one object, person, or thing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Primary Key?

A

An attribute or set of attributes which uniqely identifies a tuple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Composite Key?

A

A combination of attributes that uniquely identifies a tuple/ record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Foreign Key?

A

An attribute in one table that is a primary key in another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Data Model?

A

An abstract model for organising data and its relationship in real world entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Entity-Relationship Modelling?

A

A method of abstractly describing the data tables and the relationships between them visually. They can be used to reduce redundancy and construct a relational database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Attribute?

A

A characteristic specification that defines a property or feature about an entity stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Relational Database?

A

A database where separate tables are made for each entity, and the relationships between entities are represented by foreign keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Normalisation?

A

The formal process of optimally designing data tables by reducing data redundancy and repitition by converting them into normal forms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is First Normal Form (1NF)?

A

A table with no repeating attributes. The intersection of each record and attribute produces exactly one value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Second Normal Form (2NF)?

A

A table in 1NF that has data that repeats across multiple records removed and put into a new table with appropriate relationships (no partial dependencies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Third Normal Form (3NF)?

A

A table in 2NF where all attribures that are not the primary key are fully dependent on the primary key, meaning there are no non-key dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is SQL?

A

A language for relational database management and manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Client Server Database?

A

A system that provides simultaneous access to the database for multiple clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Router?

A

A device that receives packets from one host or router and uses the destination IP address that they contain to pass them correctly ormated to another host, or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Gateway?

A

A device used to connect networks using different protocols so that information can be successfully passed from one system to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Domain Name?

A

The name that locates a domain on the internet. It is included as part of a URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does DNS stand for?

A

Domain Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Domain Name Server System?

A

A hierarchical and decentralised naming system for computer systems connected to the internet. It contains the IP addresses of all domain names on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does FQDN stand for?

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Fully Qualified Domain Name?

A

A domain name specifying the exact location of a domain in the Domain Name Server System hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the Internet?

A

A global network of computer systems communicating using TCP/ IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are Internet Registries?

A

Organisations responsible for the allocation of Domain Names and IP Addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does IP stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is an IP Address?

A

A numerical address assigned to any device communicating via Internet Protocol on a network that identifies its host and addresses its location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Packet?

A

A block of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Packet Switching?

A

A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the Process of Packet Switching.

A
  1. Data is split into equally-sized packets.
  2. They are attached with a header for error checking.
  3. They are given an IP address and then sent across the network.
  4. Each packet generally takes different routes depending on the levels of traffic at each route.
  5. The packets are checked for errors and the recipient requests the packet to be resent if there is an error.
  6. The packets will usually be out of order when they arrive, so are put back into order when they all arrive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does URL stand for?

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a URL?

A

A reference to a resource on the internet that is able to locate and retrieve it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a Firewall?

A

a security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent exteranl users from gaining unauthorised access between two networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Asymmetric Encryption

A

An encryption tecnhique where a public key available to everyone is used to encrypt the data, and the data is decrypted by the paired private key known only by the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is Symmetric Encryption?

A

An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a Digital Certificate?

A

An electronic docmument providing ownership of a public key and hence authenticating your identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is a Digital Signature?

A

A mathematical scheme for producing a unique signature, that verifies the authenticity of encrypted digital messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is a Certification Authority?

A

A trusted organisation which is responsible for providing digital certificates,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the process of applying a Digital Signiture?

A
  1. Apply a hash function to the plaintext message to produce a message digest.
  2. Use the private key to encrypt the message digest. The encrypted digest becomes the digital signiture.
  3. Attach the digital signature to the plaintext message and encrypt the whole thing with Public Key.
    4, Decrypt with the recipient;s private key.
  4. Extract the digital signature with the recipient’s public key.
  5. The message digest is regenerated by applying the hash function to the plaintext message.
  6. Compare the regenerated message digest with the original digest.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does Malware stand for?

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is Malware?

A

A broad catch all term to describe any software which has been written with an intent to cause damage/ harm/ corruption/ nuisance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a Trojan?

A

A malware that hides within another file and misleads the user of its true intnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a Virus?

A

A program that attaches itself to antoher computer file to infect a computer system by replicating itself and inserting its code into other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a Worm?

A

A standalone virus capable of spreading and infecting a computer without being attached to a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a Port?

A

A communication endpoint that addresses a service on a network. It is used to represent services or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a Socket?

A

A softwar that serves as an endpoint for sending and receiving data cross a network.

54
Q

What does TCP/IP Stand For

A

Transmission Control Protocol/ Internet Protocol

55
Q

What is the TCP/IP Stack?

A

A suite of networking protocols that allow networked computers to communicate, consisting of 4 connected layers. Incoming and outgoing data packets are passed through these layers.

56
Q

What is Layer 1 in the TCP/IP Stack?

A

Application Layer.

57
Q

What is the Application Layer?

A

Used to provide services for applications that want to communicate across a networ, often the internet.

58
Q

What is Layer 2 in the TCP/IP Stack?

A

Transport Layer

59
Q

What is the Transport Layer?

A

Uses the Transmission Control Protocol to establish an end-to-end connection with the recipient computer.

60
Q

What is Layer 3 in the TCP/IP Stack?

A

Network Layer

61
Q

What is the Network Layer?

A

Uses the Internet Protocol to address packets with the source and destination IP addresses.

62
Q

What is Layer 4 in the TCP/IP Stack?

A

Link Layer

63
Q

What is the Link Layer?

A

Operates across a physical connection.

64
Q

What happens in the Application Layer (Layer 1) of the TCP/IP Stack?

A
  • Uses high-level protocols that set an agreed standard between the communicating end-points.
  • Does not actually determine how the data is transmitted, rather specifies the rules of what should be sent.
65
Q

What happens in the Transport Layer (Layer 2) of the TCP/IP Stack?

A
  • Splits data into packets and numbers then sequentially.
  • Adds the port number to be used based on HTTP protocol.
  • At the receiving end this layer confirms that packets have been received and requests any missing packets to be resent.
66
Q

What happens in the Network Layer (Layer 3) of the TCP/IP Stack?

A
  • A router forwards each packet towards an endpoint called a sockt, defined by the combination of IP address and port number.
  • Each router uses a routing table to instruct the next hop.
67
Q

What happens in the Link layer (Layer 4) of the TCP/IP Stack?

A
  • Adds the MAC address of hte physical NIC that packets should be sent to, based on the destination IP Address.
  • MAC Addresses change with each hop.
68
Q

What is an Email Server?

A

A computer system on a network designated to handle emails being sent and received by other computers on the network.

69
Q

What does FTP stand for?

A

File Transfer Protocol

70
Q

What is the File Transfer Protocol?

A

A protocol used for downloading or uploading files from a computer system.

71
Q

What does HTTP stand for?

A

Hyper-Text Transfer Protocol

72
Q

What is the HTTP protocol?

A

A protocol used to fetch, render and transmit webpages.

73
Q

What does HTTPS stand for?

A

Hyper-Text Transfer Protocol Secure

74
Q

What is the HTTPS protocol?

A

An encrypted version of HTTP.

75
Q

What does POP3 Stand for?

A

Post Office Protocol Version 3

76
Q

What is the POP3 Protocol?

A

An application-layer internet standard protocol used to receive emails from a server.

77
Q

What is a Secure Shell?

A

An encrypted protocol that allows secure communication between nodes across a network.

78
Q

What is Secure Shell Tunneling

A

SSH can be used to create a tunnel through a network. This tunnel can be used to pass through data that might otherwise be blocked.

79
Q

What does SMTP Stand for?

A

Simple Mail Transfer Protocol

80
Q

What is the SMTP Protocol?

A

An internet standard communication protocol for sending emails.

81
Q

What des IMAP Stand for?

A

Internet Message Access Protocol

82
Q

What is the IMAP Protocol?

A

Controls the download/ upload of emails to and from the mail server.

83
Q

What is the Port Number for FTP?

A

20 - FTP DATA
21 - FTP CONTROL

84
Q

What is the Port Number for Secure Shell?

A

22 - Secure Shell Remote Login

85
Q

What is the Port Number for Telnet?

A

23 - Telnet (unencrypted) Remote Login.

86
Q

What is the Port Number for HTTP?

A

80 or 8080 - HyperText Transfer Protocol

87
Q

What is the Port Number for POP3?

A

110 - Post Office Protocol Version 3

88
Q

What is the Port number for IMAP?

A

143 - Internet Mail Access Protocol

89
Q

What is the Port Number for HTTPS?

A

443 - HyperText Transfer Protcol Secure

90
Q

What is a Web Browser?

A

An application software used to view webpages a computer system has requested from a web server.

91
Q

What is a Web Server?

A

A computer system on a network designated to handle web requests through HTTP(S).

92
Q

What is a Host Identifier?

A

A series of bits that form part of hte IP Address that uniquely identify the computer on the network it is in.

93
Q

What is a Network Identifier?

A

A series of bits that form part of hte IP address and identify the network the computer connected to the internet is on.

94
Q

What is a Subnet?

A

A smallernetwork that forms a subset of a whole network.

95
Q

What are the ranges of iPv4?

A

0.0.0.0 to 255.255.255.255

96
Q

What do these IP Addresses represent?
- 10.x.y.z
- 172.16.0.1 to 172.31.255.255
- 192.168.y.z

A

Private, non-routable addresses used for LANs or Private WANs only.

97
Q

What do these IP Addresses represent?
- x.y.z.0

A

The Whole Network.

98
Q

What is the last address in a network reserved as?

A

The broadcast address on that network, for sending data simultaneously to all hosts on that network.

99
Q

What do these IP Addresses Represent?
- 127.x.y.z

A

Reserved for loopback, in which a host’s IP software treats an ongoing packet as incoming.

100
Q

What is a Non-Routable IP Address?

A

A private IP Address sued for a device on a private network hidden behind a router or firewall.

101
Q

What is a Routable IP Address?

A

A public IP address that is registered under the DNS.

102
Q

What does DHCP stnad for?

A

Dynamic Host Configuration Protocol

103
Q

What is the DHCP Protocol?

A

A protocol for allocating unique dynamic IP addresses for computers on a local netork when the local network attempts to connect to the internet.

104
Q

What does NAT stand for?

A

Network Address Translation

105
Q

What is the Network Address Translation?

A

The process o mapping a private IP address to a public IP address by modifying the address information in the packet header when the packet is sent through the router.

106
Q

What is Port Forwarding?

A

The process of routing data through additional ports to allow a server in a non-routable network to provide services to the Internet.

107
Q

What is the Client Server Model?

A

A model where the client sends a request message to the server, and the server responds to the request by replying with a response message to the client.

108
Q

What is CRUD?

A

A web application with create, retrieve, update and delete functionality.

109
Q

What are the 4 operations of CRUD?

A
  • Create
  • Retreive
  • Update
  • Delete
110
Q

What does XML stand for?

A

Extension Markup Language

111
Q

What is XML?

A

A markup language for encoding documents to be sent over a network in a human-readable and machine-readable format.

112
Q

What does JSON stand for?

A

JavaSript Object Notation

113
Q

What is JSON?

A

A human-readable file format used for transmitting information in attribute-value pairs and arrays.

114
Q

What are the Advantages of XML?

A
  • Any data type allowed so more flexible.
115
Q

What are the Disadvantages of XML?

A
  • Expansive use of tags make it more difficult to follow.
116
Q

What are the Advantages of JSON?

A
  • Easier for a human to read, write and maintain.
  • More compact so reuqires less storage and quicker to transmit and process.
  • Can be directly manipulated by JavaScript.
117
Q

What are the disadvantages of JSON?

A

Works with a limited range of data types.

118
Q

What does REST stand for?

A

REpresentational State Transfer

119
Q

What is REST?

A

A Representational State Transfer methodology used to map a network’s functionality to database operations.

120
Q

What is the Web Socket Protocol?

A

A protocol specification which defines an API, establishing a full-duplex ‘socket’ connection between a web browser and a server over TCP. This creates a persistent connection between client and server.

121
Q

What is Thick Client Computing?

A

A network where the clients have sufficient processing power and storage to handle its requests, while the server acts as external storage.

122
Q

What is Thin Client Computing?

A

A network where a powerful, central server computer contains the majority of the processing power and storage capacity to handle client requests.

123
Q

What is a Proxy Server?

A

A Proxy Server sits between the client devices and the firewall, providing anonymity to the clients, keeping their true IP Addresses hidden. It also speeds up performance by caching websites.

124
Q

What is Stateless Inspection also known as?

A

Static Filtering

125
Q

What is Stateless Inspection?

A

Uses a simple list of IP Addresses, ports and protocols to block unwanted traffic.

126
Q

What is Stateful Inspection also known as?

A

Dynamic Filtering

127
Q

What is Stateful Inspection?

A

It keeps track of open conversations in a connection table, and checks the packet payloads for suspicious activity. Is more effective against cyberattacks.

128
Q

What does API stand for?

A

Application Programming Interface

129
Q

What is an API?

A

An API is a set of protocols which define how two applications can interact with each other.
It outlines the format that messages can occur both in terms of the requests it is happy to receive and the responds it can send.

130
Q

What is the WebSocket Protocol?

A

An example of a modern API used for comunication, typically, but not limited to use with a webserver.