H446 Section 5 Networks and Web Technologies

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/95

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

Internet

A global network of networks that allows computers to communicate using standardized protocols, enabling data exchange and access to information.

2
New cards

ARPANET

1960s US defence project to enable distant departments to collaborate.

3
New cards

World Wide Web

A system of interlinked hypertext documents and multimedia content accessed via the Internet, allowing users to navigate and share information using web browsers.

4
New cards

Internet Service Providers

Companies that provide access to the Internet, allowing individuals and organizations to connect and use online services.

5
New cards

Uniform Resource Locator

(URL) is a reference or address used to access resources on the Internet, specifying the location of a resource and the protocol used to retrieve it.

6
New cards

Internet registrar

An organization that manages the reservation of Internet domain names, ensuring that domain names are unique and facilitating the registration process for individuals and businesses.

7
New cards

Internet Registries

Organizations that maintain databases of registered domain names and their associated information, ensuring the integrity and availability of the domain name system.

8
New cards

ICANN

The Internet Corporation for Assigned Names and Numbers, a nonprofit organization responsible for coordinating the global domain name system and ensuring the stability of the Internet.

9
New cards

Domain Name System

A hierarchical system for naming resources on the Internet, allowing users to access websites using human-readable addresses instead of numerical IP addresses.

10
New cards

IP address

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

11
New cards

IPv4 format

A 32-bit numerical address format used in the Internet Protocol version 4, typically represented in decimal as four octets separated by periods.

12
New cards

IPv6 format

A 128-bit address format used in the Internet Protocol version 6, represented as eight groups of four hexadecimal digits separated by colons.

13
New cards

Fully Qualified Domain Name

A complete domain name that specifies its exact location within the Domain Name System (DNS), including the top-level domain and all subdomains. Includes the host server name e.g. www, mail or ftp depending on whether the resource is on a web, mail or ftp server.

14
New cards

Router

A device that forwards data packets between computer networks, directing traffic on the Internet and ensuring data reaches its destination.

15
New cards

Packet

A formatted unit of data carried by a packet-switched network, which contains both control information and user data.

16
New cards

LAN

A Local Area Network that connects computers and devices within a limited geographical area, such as a home, school, or office.

17
New cards

WAN

A Wide Area Network that covers a large geographical area, connecting multiple local area networks (LANs) and enabling communication over long distances.

18
New cards

Topology

The arrangement of different elements within a network, including how devices are interconnected and how data flows between them. Common types include star, ring, and bus topologies.

19
New cards

Bus topology

A network topology where all devices are connected to a single central cable, known as the bus, allowing data to be transmitted in both directions. This setup is simple and cost-effective but can lead to performance issues if the bus fails.

20
New cards

Star topology

A network topology where all devices are connected to a central hub or switch, allowing for easy management and failure isolation.

21
New cards

Logical topology

Refers to the way data flows within a network, regardless of its physical layout. It defines how devices communicate over the network and can differ from the physical connections.

22
New cards

Physical Toppology

The physical arrangement of devices and cables in a network, showing how they are physically connected. It illustrates the layout and structure of the network components.

23
New cards

WiFi

A technology that allows electronic devices to connect to a network wirelessly using radio waves, enabling internet access without physical cables.

24
New cards

WAP

A Wireless Access Point that allows wireless devices to connect to a wired network using WiFi.

25
New cards

Mesh Topology

A network configuration where each device is connected to multiple other devices, allowing for multiple pathways for data to travel, enhancing reliability and redundancy.

26
New cards

Circuit switching

A method of communication where a dedicated circuit is established for the duration of the transmission, ensuring a constant connection between parties.

27
New cards

Packet switching

A method of data transmission where data is broken into packets and sent over a shared network, allowing for efficient use of bandwidth and flexibility in routing.

28
New cards

Data packet

A formatted unit of data carried by a packet-switched network, consisting of headers and payload. Data packets enable efficient communication by breaking down larger messages into manageable pieces.

29
New cards

Header

The part of a data packet that contains control information, such as source and destination addresses, and protocol information, which is crucial for routing and delivering the packet correctly.

30
New cards

Payload

The part of a data packet that contains the actual message or data being transmitted, excluding headers and metadata.

31
New cards

Checksum

A value used to verify the integrity of data packets by calculating a numerical summary of the packet's contents. If the checksum does not match upon receipt, it indicates potential data corruption.

32
New cards

Cyclical Redundancy Check

A method used to detect errors in data transmission by applying a polynomial division algorithm to the data. It generates a checksum that is sent along with the data, allowing the receiver to check for integrity.

33
New cards

Hop

The act of passing through a network device, such as a router or switch, to reach the destination in a network.

34
New cards

Dijkstra’s Algorithm

A graph search algorithm used to find the shortest path between nodes in a weighted graph, commonly applied in routing and navigation.

35
New cards

Gateway

A network node that serves as an access point to another network, often translating communication protocols between different networks.

36
New cards

MAC address

A unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network.

37
New cards

MAC address format

Typically represented as six pairs of hexadecimal digits.

38
New cards

HTTP

An application protocol used for transferring hypertext requests and information on the internet.

39
New cards

TCP/IP

A set of communication protocols used for the internet and similar networks, comprising Transmission Control Protocol (TCP) and Internet Protocol (IP).

40
New cards

Application layer

The topmost layer in the TCP/IP model, responsible for providing network services directly to applications. It enables communication between software applications and the underlying network.

41
New cards

Transport Layer

The layer responsible for end-to-end communication and data transfer between devices over a network, ensuring reliable delivery of messages.

42
New cards

Network Layer

The layer in the TCP/IP model that manages packet forwarding, routing, and addressing between devices across different networks.

43
New cards

Link Layer

The layer responsible for the physical transmission of data over a network, including framing, error detection, and access to the physical medium.

44
New cards

Socket

A combination of an IP address and a port number that enables communication between applications over a network.

45
New cards

Network Interface Card

A hardware component that connects a computer to a network, enabling communication and data transfer.

46
New cards

File Transfer Protocol

A standard network protocol used for transferring files between a client and server over a TCP/IP network.

47
New cards

Mail Server

A computer system that handles the sending, receiving, and storage of email for users, typically using protocols like SMTP, POP3, or IMAP.

48
New cards

POP3

A protocol used by email clients to retrieve emails from a mail server, allowing users to download messages for offline viewing. Once downloaded they are deleted from the server.

49
New cards

IMAP

A protocol used by email clients to access and manage emails on a mail server, allowing users to view and organize messages without downloading them. Unlike POP3, emails remain on the server.

50
New cards

SMTP

A protocol used for sending emails from a client to a mail server or between mail servers, ensuring the delivery of messages over the Internet.

51
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between a trusted internal network and untrusted external networks.

52
New cards

Packet filters

are devices or software that inspect network packets and allow or block them based on specified security rules, often used in firewalls to enhance network security.

53
New cards

Static Filtering

A method of packet filtering where rules are applied to packets based on predetermined criteria, such as source and destination IP addresses and port numbers, without considering the state of the connection.

54
New cards

Port

A communication endpoint used for sending and receiving data in network protocols, identified by a number that specifies a particular service or application on a device.

55
New cards

Proxy Server

A server that acts as an intermediary between a client and another server, forwarding requests and responses to enhance security, performance, and anonymity.

56
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems, often deployed through various means such as email attachments or malicious websites.

57
New cards

Virus

A type of malware that replicates itself by infecting other computer programs or files, often causing harm to systems and data.

58
New cards

Worm

A type of malware that replicates itself to spread to other computers, often exploiting vulnerabilities in software or networks without user intervention.

59
New cards

Trojan

A type of malware that disguises itself as legitimate software to trick users into installing it, allowing unauthorized access to systems.

60
New cards

Passwords

Secret phrases used for authentication to protect access to accounts and systems.

61
New cards

Blagging

The act of manipulating individuals to disclose personal information or access to systems through deception, often using social engineering techniques.

62
New cards

Social Engineering

A manipulation technique that exploits human psychology to gain confidential information or access to systems.

63
New cards

Phishing

A fraudulent attempt to obtain sensitive information, such as usernames and passwords, by disguising as a trustworthy entity in electronic communications.

64
New cards

HTML

A markup language used for creating web pages and web applications, defining the structure and layout of content.

65
New cards

CSS

Cascading Style Sheets, a stylesheet language used to describe the presentation of a document written in HTML or XML.

66
New cards

HTML Tag

An element used in HTML to define the structure and content of a web page, typically enclosed in angle brackets.

67
New cards

Embedded CSS

A method of applying CSS styles directly within an HTML document using the <code><style></code> tag, allowing for specific styling of elements within that page. This method enables customization of styles without external files, making it useful for single-page applications.

68
New cards

Inline CSS

A method of applying CSS styles directly within an HTML element using the "style" attribute, allowing for unique styling of individual elements without needing a separate stylesheet.

69
New cards

External Style Sheet

A separate CSS file linked to an HTML document using the <link> tag, allowing for consistent styling across multiple pages by keeping styles centralized.

70
New cards

Identifier

A name used to identify a specific element in HTML or CSS, allowing for targeted styling or scripting. Identifiers are typically defined using the "id" attribute in HTML.

71
New cards

Selector

A pattern used in CSS to select and apply styles to HTML elements, which can be based on element type, class, ID, or other attributes.

72
New cards

Class

A way to group multiple HTML elements for styling purposes in CSS, defined using the "class" attribute. Classes allow for the application of the same styles to different elements.

73
New cards

Web form

An interactive element on a webpage that allows users to input and submit data, often including fields such as text boxes, checkboxes, and buttons.

74
New cards

Behaviours

The actions or responses that elements on a webpage can exhibit in response to user interactions, often defined through JavaScript or CSS.

75
New cards

JavaScript

A programming language used to create dynamic and interactive content on websites, enabling features like animations, form validations, and user interface enhancements.

76
New cards

Validation

The process of checking user input in a web form to ensure it meets specified criteria before submission, often implemented through JavaScript.

77
New cards

Search Engine

A software system designed to search for information on the World Wide Web, retrieving and indexing data to provide relevant results based on user queries.

78
New cards

Search Engine Indexing

The process of organizing and storing web pages and their content in a search engine's database, enabling efficient retrieval of relevant information in response to user queries.

79
New cards

Key Words

The process of identifying and selecting significant words or phrases that are relevant to a webpage's content, used to improve search engine optimization and indexing.

80
New cards

Meta Tags

HTML tags used to provide structured metadata about a webpage, such as description, keywords, and author, which help search engines understand the page's content.

81
New cards

Description

A brief summary of a webpage's content, typically included in the meta tags, which informs search engines and users about the page's purpose and relevance.

82
New cards

Google PageRank Algorithm

A system used by Google to rank webpages in its search results based on their importance and relevance, determined by analyzing the quantity and quality of links to a page.

83
New cards

Directed Graph

A graph where each edge has a direction, indicating a one-way relationship between nodes, commonly used to represent structures such as networks and workflows. In the context of web technologies, it can represent links between webpages.

84
New cards

Damping Factor

A value used in the PageRank algorithm to account for the probability that a user will continue clicking on links rather than stopping, ensuring that all pages receive some rank even if they are not linked to.

85
New cards

Client-server network

A network architecture where client devices request resources or services from centralized servers, which provide the requested data or functionality. This model is fundamental in web technologies for enabling communication and resource sharing.

86
New cards

Client

A device or application that accesses services or resources provided by a server in a client-server network architecture, often used to request data or perform tasks.

87
New cards

Server

A computer or system that provides resources, data, or services to other computers, known as clients, over a network.

88
New cards

Cloud Computing

A model that enables on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications) over the internet, allowing for scalable and flexible resource management.

89
New cards

SaaS

Software as a Service, a cloud computing model that delivers software applications over the internet on a subscription basis, allowing users to access and use them without installation.

90
New cards

Peer-to-Peer network

A decentralized network architecture where each participant, or peer, can act as both a client and a server, sharing resources directly with one another without a central server.

91
New cards

Client-side processing

Refers to operations performed by a client device, such as a web browser, where data is processed locally rather than on a server. This allows for faster response times and reduced server load.

92
New cards

Server-side processing

Refers to operations performed on a server, where data is processed before being sent to the client. This approach allows for centralized control and can handle complex computations or database interactions.

93
New cards

API

A set of rules and protocols for building and interacting with software applications, allowing different programs to communicate with each other.

94
New cards

Thin-client computing

A network architecture where most processing occurs on a server, with minimal processing done on the client device. This setup reduces resource requirements on client machines and centralizes data management.

95
New cards

Thick-client computing

A network architecture where the client device performs significant processing and storage tasks, reducing the load on the server. This allows for richer user experiences and local data management.

96
New cards