Computer Science - Paper 2

0.0(0)
studied byStudied by 20 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/326

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

327 Terms

1
New cards

What does TCP/IP stand for?

Transmission Control Protocol / Internet Protocol

2
New cards

What does MAC stand for?

Media Access Control

3
New cards

What are the main 4 network layers?

  • Application

  • Transport

  • Network

  • Link

ATNL A TuNneL

4
New cards

What does FTP stand for?

FTP — (File Transfer Protocol)

<p>FTP — (File Transfer Protocol)</p>
5
New cards

What does HTTP/S stand for?

HTTP/S — (Hyper Text Transfer Protocol / Secure)

<p>HTTP/S — (Hyper Text Transfer Protocol / Secure)</p>
6
New cards

What does POP3 stand for?

POP3 — (Post Office Protocol v3)

<p>POP3 — (Post Office Protocol v3)</p>
7
New cards

What does SMTP stand for?

SMTP — (Simple Mail Transfer Protocol)

<p>SMTP — (Simple Mail Transfer Protocol)</p>
8
New cards

What does SSH stand for?

SSH — (Secure Shell)

(Allows for Secure Shell Tunnelling Port)

<p>SSH — (Secure Shell)</p><p>(Allows for Secure Shell Tunnelling Port)</p>
9
New cards

What does DHCP stand for?

DHCP — (Dynamic Host Configuration Protocol)

10
New cards

What does NAT stand for?

Network Address Translation

11
New cards

What does CRUD stand for?

Create, Retrieve, Update, Delete

12
New cards

What does REST do?

Allows for CRUD to become available for database mapping functions.

<p>Allows for CRUD to become available for database mapping functions.</p>
13
New cards

What does the Application layer do?

The Application layer somewhat being featured in the name is responsible for selection and use of correct protocols like using right protocols for User interacted application software.

<p>The Application layer somewhat being featured in the name is responsible for selection and use of correct protocols like using right protocols for User interacted application software.</p>
14
New cards

What does the Transport layer do?

The Transport layer establishes Transport funny enough technically making a virtual path and e2e encryption like featured on whatsapp.

in addition of course what’s required for networking is not one massive payload but instead all of the possible millions of packets to be sent according to the size for the data to be transmitted.

<p>The Transport layer establishes Transport funny enough technically making a virtual path and e2e encryption like featured on whatsapp.</p><p>in addition of course what’s required for networking is not one massive payload but instead all of the possible millions of packets to be sent according to the size for the data to be transmitted.</p>
15
New cards

What does the Network layer do?

The Network layer simply is what allows for networking being the provider which assigns the correct IP address to each packet source and destination.

Routers work in Unison here in order to accomplish successful sending to set destinations.

<p>The Network layer simply is what allows for networking being the provider which assigns the correct IP address to each packet source and destination.</p><p>Routers work in Unison here in order to accomplish successful sending to set destinations.</p>
16
New cards

What does the Link layer do?

Finally the link layer once again does exactly as described making the physical link between pieces of hardware then to the network.

This adds the personal MAC to the packets received to the network layer and for security each hop changes to the then brand new corresponding MAC address.

17
New cards

What happens once the user receives their data?

  1. The packet gets stripped of extra detail

  2. link layer removes MAC of course to add the new one

  3. Network removes IP for security

  4. Transport then uses packet port to see correct port to send through and packet number to see if in the correct order.

  5. Finally application layer shows user their requested data.

18
New cards

What is a socket address?

An IP combined with a port number.

Example :

Socket Address : 114.26.20.199:443
IP : 114.26.20.199
Port : 443

19
New cards

What does a Socket Address do?

Identifies what application the packet should get sent to.

20
New cards

What ports do FTP use?

20&21

21
New cards

What port does SSH use?

22

22
New cards

What port does HTTP use?

80

23
New cards

What port does HTTPS use?

443

24
New cards

What ports does POP3 use?

110&995

25
New cards

What port does SMTP use?

25&587&465

26
New cards

What are the 2 parts of an IP Address?

  • Network Identifier

  • Host Identifier

27
New cards

What are subnets?

Subnets are broken down networks with the requirement that different network identifiers are used.

28
New cards

How do you find the network identifier?

Through use of the subnet mask.

<p>Through use of the subnet mask.</p>
29
New cards

What is the link between Binary and subnets?

They’re similar in the fact that floating point has the choice between Size of precision and this is featured also with subnet IPs where you can either have more networks or more hosts/users.

30
New cards

What are the 2 types of IPs?

  • IPv4

  • IPv6

(Internet Protocol version 4/6)

31
New cards

What is the difference between IPv4 and IPv6?

The difference between them relates to overall size of IPs that can be stored/used with IPv4 storing over 4 billion while IPV6 is able to use 10^ 37.

This being a requirement because there are 8 billion people on the planet meaning IPv4 is not enough.

32
New cards

How does DHCP work?

For example if a Device turns on but then is forgotten their assigned IP would be wasted making it so that Devices once they leave they lose their IP adding it to a pool of available IPs to be granted to whoever requires. Dynamic IPs

33
New cards

How can a private IP access the internet when its IP is not accessible?

Through the use of a NAT as with a Network Address Translation somewhat like a Hash Table it will store them both separately and technically assign the private IP a public one of which it will remember the conversion for when the time comes to receive the output.

34
New cards

What is port forwarding?

Port forwarding is used when a client is attempting to communicate with a server that is connect to a private network.

Similar to the problem that NAT fixes instead with Port Forwarding it works on a larger level allowing for entire client to gain access to the private network.

35
New cards

What does API stand for?

Application Programming Interface

36
New cards

What is an API?

A set of protocols which handle how different apps talk with each other.

The WebSocket protocol is an example.

37
New cards

What does it mean if a WebSocket protocol is full-duplex?

Means that data can be transmitted in both directions simultaneously.

38
New cards

What does REST stand for?

REpresentational State Transfer

39
New cards

What does XML stand for?

eXtensible Markup Language

40
New cards

What does JSON stand for?

JavaScript Object Notation

41
New cards

What is the difference between XML and JSON?

They are both simply styles of writing HTML with each to their benefit.

42
New cards

What is the difference between Thin and Thick-client networks?

Thin-client networks and thick-client networks are somewhat described in their name with thin-clients stating that they’re pretty thin and don’t really have that much too them being pretty simple and cheap with the main server handling pretty much everything compared to the thick-clients where they’re pretty well supplied and can overall handling everything theirself.

43
New cards

What does URL stand for?

Uniform Resource Locator

44
New cards

What does FQDN stand for?

Fully Qualified Domain Name

45
New cards

What does DNS stand for?

Domain Name Server

46
New cards

What does ISP stand for?

Internet Service Provider

47
New cards

What does TTL stand for?

Time-To Live

48
New cards

What are key 5 parts of a packet?

  • Sender Address

  • Receiver Address

  • Packet Contents

  • TTL

  • Sequence Number

<ul><li><p>Sender Address</p></li><li><p>Receiver Address</p></li><li><p>Packet Contents</p></li><li><p>TTL</p></li><li><p>Sequence Number</p></li></ul>
49
New cards

What does hop mean in networking?

It refers to that every time a packet has been passed through a router it counts as a hop which has a limit for security reason designated within each packet.

50
New cards

What is the difference between Routers and Gateways?

Routers working on a smaller level compared to gateways where routers connect computers together and gateways connect entire networks together and one of the possible features of a gateway is to be able to change protocols of packets.

51
New cards

What are the 7 possible parts to a URL?

For example:

https://www.bbc.co.uk/news/technology/index.html — FQDN

https:// — Protocol
www. — Subdomain
bbc.co.uk — Domain

You’ll see this bit looks alot like file management and thats because it is this URL pretty much is accessing a servers folder/file.
/new — Directory
/technology — Sudirectory
/index — Name of file
.html — File extension

52
New cards

What are the main 3 parts of a URL?

  • Protocol

  • subdomain

  • domain

FQDN must contain all these

53
New cards

How does a Domain work?

A Domain name like zedf.co.uk is the English version to where what it actually looks like is a IP Address and the reason we simply don’t just use the address is because you wont remember it compared to a nice domain and how this is all handled is then done through the DNS.

54
New cards

What are 3 types of security featured by a proper firewall?

  • Packet Filtering

  • Stateful Inspection

  • Proxy Server

55
New cards

What does a packet filter do? :D

it simply will filter packets accepting good and blocking bad depending entirely on their IP and protocol which they are using.

Use of a whitelist would also suffice for this.

56
New cards

What does stateful inspection do?

Stateful inspection pretty much will inspect the data being sent for example what data is within a packet to see whether it is harmful or not.

57
New cards

What is a proxy server?

A proxy server is like a substitute server that works for the primary server and acts somewhat as a middle-person / mask

58
New cards

What is the difference between Symmetric and Asymmetric encryption?

Symmetric means that both the sender and receiver obtain the same private key. (able to encrypt and decrypt data) while Asymmetric encryption makes use of four different keys with two coming from each user (a public and private)

59
New cards

How does Symmetric Encryption work?

Firstly both users in the ordeal must agree to sharing their keys each having their own copy which allows for the process to work as then they can both decrypt however if anyone else has this key then they can easily intercept which Asymmetric solves

<p>Firstly both users in the ordeal must agree to sharing their keys each having their own copy which allows for the process to work as then they can both decrypt however if anyone else has this key then they can easily intercept which Asymmetric solves</p>
60
New cards

How does Asymmetric Encryption work?

When a message gets encrypted with a public key then only the corresponding private key is even able to decrypt it vise versa.

This gets done before sending to the recipient of which the recipients public key is used so then only they can view it because only they have access to their corresponding private key.

It acts like those boat transmission things to where they have to place you in that holding place to where then they fill it with water so you can move on.

<p>When a message gets encrypted with a public key then only the corresponding private key is even able to decrypt it vise versa.</p><p>This gets done before sending to the recipient of which the recipients public key is used so then only they can view it because only they have access to their corresponding private key.</p><p>It acts like those boat transmission things to where they have to place you in that holding place to where then they fill it with water so you can move on.</p>
61
New cards

What does a Digital Signature do?

A Digital Signature allows for Asymmetric encryption to verify the sender of the message so that when they do unbox the sent message with their private key it isn’t something that is malicious.

62
New cards

How does a Digital Signature work?

  1. Message hashed for unique value.

  2. Hash encrypted with private key.

  3. Encrypted hash attached to message.

  4. Recipient decrypts hash with sender's public key.

  5. Compares decrypted hash with rehashed message for verification.

63
New cards

What is a digital certificate?

Quite literally acting like professional paper/documents which get sent along in asymmetric encryption which acts as another step proving whoever is sending is rightful which again shows how it solves the interception problem featured on symmetric encryption.

64
New cards

What are 3 main types of Malware?

  • Worms

  • Trojan

  • Viruses

65
New cards

What does Malware stand for?

Malicious Software

66
New cards

What is a worm?

Worms have the ability to self replicate within a network spreading or rather digging or via users downloading/executing the worm programs.

67
New cards

What is a trojan?

just like the real thing it pretends to be the real thing tricking users to open it and these are usually sent to users through email where it all begins.

68
New cards

What is a virus?

Viruses truly acting like one from biology acts with living hosts just like the real thing where a host cell must emody the virus and once they’ve been caught like an illness its too late to of which they’re usually found as .exe so it may be there for a very long time but until it truly is triggered it will just wait somewhat like cancer.

69
New cards

What are two types of topology?

  • Physical

  • Logical

70
New cards

What is a physical network topology?

Considering a physical network topology this refers to the actual architecture of the network.

71
New cards

What are 2 types of physical network topology?

  • Star

  • Bus

72
New cards

How does a physical star network topology function?

In a physical star network each client is connected to a central hub and have their own direct connection so they all can receive and talk to the central hub with new connections easily being made and broken however if the central hub goes down they all do.

73
New cards

How does a physical bus network topology function?

A physical bus connects the clients through a single cable quite similar to a star however instead of a central hub they all rely on the cable (Backbone)

74
New cards

What is a logical network topology?

For logical networking this instead of focusing on the actuality instead looks at logically what is actually happening like where the packets are going and how they move within the network.

75
New cards

Are you able to combine/mix topologies?

Yes, a physical star is able to logically even work like a bus even if the hardware doesn’t match all you would need to do for this logical idea is then make use of bus protocols.

76
New cards

What are 2 types of networking between hosts?

  • Client Sever

  • P2P (Peer-2-Peer)

77
New cards

What does WPA stand for?

WiFi Protected Access

78
New cards

What does SSID stand for?

Service Set IDentifier

79
New cards

How can Wi-Fi be made more secure?

  • WPA/WPA2 — any sussy business will not go un-noticed

  • Disabling SSID Broadcasting making it invisible to the unknowing eye. — only those which know the name can add

  • Addition of MAC Address filter — Only those allowed may join

80
New cards

What does CSMA/CA stand for?

Carrier Sense Multiple Access / Collision Avoidance

81
New cards

Why is use of CSMA/CA done?

CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) is used in order to avoid any possible data collisions

<p>CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) is used in order to avoid any possible data collisions</p>
82
New cards

What does RTS stand for?

Request To Send

83
New cards

What does CTS stand for?

Clear To Send

84
New cards

What is Baud Rate?

Baud Rate refers to the overall amount/speed of which channels change every second.

85
New cards

What is Bit Rate?

Bit Rate refers to the overall speed/amount of which bits are being transferred every second.

86
New cards

What is Bandwidth?

Bandwidth refers to the total width of the amount of overall data can be handled/worked with at one single time.

87
New cards

What is Latency?

Latency refers to the time delay between doing something and the actual response then finally ocurring.

88
New cards

What is a Protocol?

A protocol is a rule that is set/used across networking etc. in order to organise/control everything.

89
New cards

What is a symbol?

A symbol is simply a pattern of bits.

90
New cards

How do you calculate the Bit Rate?

Bit Rate - Baud Rate X Number of Bits per signal.

91
New cards

What is the difference between Serial and Parallel Data Transmission?

overall its the abilities provided from both with Serial being able to work over longer distances and parallel working with more at one single time.

92
New cards

What are two possible issues caused by Parallel Data Transmission?

  • Skew

  • Crosstalk

93
New cards

What is skew?

Skew refers to the wires used in a parallel data transmission because as not everything can be perfect by trying to perfectly make a set of wires to be used within a parallel transmission is incredibly difficult and this effects the overall quality being a feature it relies on with all supposedly arriving at the same time but if one wire is off then this is all wrong.

94
New cards

What is crosstalk?

Crosstalk refers to these wires being so close together that it is possible the frequencies could overlap ending up crosstalking and overriding the data only getting worse over longer distances.

95
New cards

What is the difference between Synchronous and Asynchronous transmission?

Synchronous transmission and asynchronous overall refers to how data is sent with when it is done in sync it means that the data is sent inline with the clock pulse meaning that it can be slower but is overall more ordered which then compared to being asynchronous which will just send data as soon as possible whenever possible which could get messy but also pretty fast.

96
New cards

What are the 5 main components of the CPU?

  • Arithmetic & Logical Unit (ALU)

  • Control Unit

  • Clock

  • General-Purpose Registers

  • Dedicated Registers

97
New cards

What does CU stand for?

Control Unit

98
New cards

What does ALU stand for?

Arithmetic & Logical Unit

99
New cards

What does CPU stand for?

Central Processing Unit

100
New cards

What are the key 5 dedicated registers?

  • Program Counter

  • CIR — Current Instruction Register

  • MAR — Memory Address Register

  • MDR or MBR — Memory Data or Buffer Register

  • Status Register