• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back

What is the internet?

It is a network of networks set up to allow computers to communicate to each other globally.

What is a Uniform Resource Locator (URL) ?

It is the full address for an internet resource. It specifies the location of a resource on the internet, including the name and usually the file type so that a browser can go and request it from the website server.

What does a URL contain?

Method, Host, Location, Resource

Why do we need Internet Registrar/Registraries?

To ensure that a particular domain name is only used by one organisation.

What is the purpose of a Domain Name?

It identifies the area or domain that an internet resource is located in. (eg: .co.UK is in the UK)

What is a Fuly Qualified Domain Name? (FQDN)

It is one that includes the host server name (eg: WWW, FTP...)

What is an Internet Protocol? (IP)

An IP address is a 4 byte number that indicates where a packet of data is to be sent or where it has been sent from.

What is an Internet Protocol address? (IP address)

An IP address is a 4 byte number that indicates where a packet of data is to be sent or where it has been sent from.

What is Packet Switching?

It is a method of communicating packets of data across a network on which other similar communications are happening simultaneously.

What is Packet Switching?

It is a method of communicating packets of data across a network on which other similar communications are happening simultaneously.

What does a data packet consist of?

Header, Payload and Trailer.

What is in the header of a packet?

IP's and Packet Sequence number.

What is in the trailer of a packet?

Error checking

What are Routers used for?

To connect at least 2 networks, commonly 2 LANs together.

What are Routers used for?

To connect at least 2 networks, commonly 2 LANs together.

What is the job of a Router?

To read the IP address in each packet and forward it on to the destination via the fastest and least congested route to the next router, then repeat.

What is the job of a Router?

To read the IP address in each packet and forward it on to the destination via the fastest and least congested route to the next router, then repeat.

What is the job of a Router?

To read the IP address in each packet and forward it on to the destination via the fastest and least congested route to the next router, then repeat.

What is a firewall?

It is a security checkpoint designed to prevent unauthorised access between 2 networks. A router may contain a firwall.

What does Packet Filtering do?

It controls network access according to network administrator rules by examining the source and destination IP addresses in packet headers. If the IP addresses match the whitelist they are allowed in.

What does a proxy server do?

It intercepts all packets entering and leaving the network, hiding the true network addresses of the source from the sender. This enables privacy and anonymous surfing.

What is Encryption?

It is the process of scrambling data so that it becomes very difficult to unscramble and interpret without the correct key.

What is Symmetric Encryption?

It is when you use the same key to encrypt and decrypt data. This means the key must be sent with the data which causes obvious security risks.

What is Asymmetric (Public Key) Encryption?

It uses 2 different seperate but related keys. One key, known as the public key is made public so that others wishing to send you data can use this to encrypt it. Only your private key (only known by you) can decrypt the data.

What is a Digital Signature?

It is the equivalent of a handwritten signature or security stamp but offers even greater security

What is the process of a Digital Signature?

1) A mathmatical value is created from the unencrypted data (hash total/checksum). This means any change in the message changes the Hash Total.


2) Sender uses their private key to encrypt the hash total and the whole message is encrypted by the recievers public key.


3) Decrypts using the other keys then compares the Hash total produced with the one total in the digital signature. If the same, the message has not been intercepted

What is the process of a Digital Signature? (3 steps)

1) A mathmatical value is created from the unencrypted data (hash total/checksum). This means any change in the message changes the Hash Total.


2) Sender uses their private key to encrypt the hash total and the whole message is encrypted by the recievers public key.


3) Decrypts using the other keys then compares the Hash total produced with the one total in the digital signature. If the same, the message has not been intercepted

Worms, Trojans and Viruses are part of what type of software?

Malware / Malicious Software

What is Malware / Malicious Software designed to do?

To cause inconvenience and loss or damage to programs, data or computer systems.

What is a Transmission Control Protocol / Internet Protocol? (TCP/IP)

It is a set of networking protocols that work together as 4 connected layers, passing incoming and outgoing data packets up and down the layers of network communication.

What are the 4 layers of the TCP/IP?

1) Application Layer


2) Transport Layer


3) Network Layer


4) Link Layer

What are the 4 layers of the TCP/IP?

1) Application Layer


2) Transport Layer


3) Network Layer


4) Link Layer

What is the Application Layer used for?

It uses protocols relating to the application being used to transmit the data.

What is the Transport Layer used for?

It uses the TCP to establish an end to end connection with the recievers computer. The data gets split into packets and labelled with a number, the total packets and the port number.

What does the port number do?

It determines which application may deal with a data packet as it enters your computer.

What is the Network Layer used for?

It adds the source and destination IP addresses to the packets.

What is the Link Layer used for?

It is the physical connection between network nodes and adds the unique Media Access Control (MAC) addresses identifying the Network Interface Cards (NIC) of the source and destination devices. This means that once the packet finds the correct network via the IP, it can locate the correct piece of hardware (eg pc, phone etc).

What is a MAC Address?

A unique 12-digit hexadecimal code that is hardcoded on every Network Interface Card during manufacture. This identifies a particular printer phone, pc etc anywhere in the world so that data packets can be routed to them.

What does the FTP do?

It is used to efficiently transfer data across a network, often the internet.

What is Secure Shell (SSH) used for?

It is used to remotely access and manage a computer from another device.

What is Secure Shell (SSH) used for?

It is used to remotely access and manage a computer from another device.

What does a Web Server do?

It hosts a website and handles client requests, typically through HTTP to send content to users wanting to view pages of the site.

3 Advantages of a Thin-Client.

1) Easy to set up, maintain and add terminals.


2) Software and updates can be installed on server and automatically distributed to each client terminal.


3) More secure as data is all kept centurally in 1 place.

4 disadvantages of Thin-Clients.

1) Reliant on the server.


2) Requires a very powerful and reliable server which is expensive.


3) Server demand and bandwidth increased.


4) Consumes more power.

3 advantages of Thick-Clients.

1) Reliable providing more uptime.


2) Can operate without a continuous connection to the server.


3) Better for running more powerful software applications.

3 disadvantages of Thick-Clients.

1) More expensive, higher spec pcs required.


2) Installation of software required on each terminal seperately.


3) Integrity issues with distributed data.

What is Thick-Client Computing?

The Thickness of a client computer refers to the level of processing and storage that it does compared with the server it is connected to. The more processing the server does, the thinner the client becomes.