H446 Section 5 Networks and Web Technologies

studied byStudied by 3 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 95

96 Terms

1

Internet

A global network of networks that allows computers to communicate using standardized protocols, enabling data exchange and access to information.

New cards
2

ARPANET

1960s US defence project to enable distant departments to collaborate.

New cards
3

World Wide Web

A system of interlinked hypertext documents and multimedia content accessed via the Internet, allowing users to navigate and share information using web browsers.

New cards
4

Internet Service Providers

Companies that provide access to the Internet, allowing individuals and organizations to connect and use online services.

New cards
5

Uniform Resource Locator

(URL) is a reference or address used to access resources on the Internet, specifying the location of a resource and the protocol used to retrieve it.

New cards
6

Internet registrar

An organization that manages the reservation of Internet domain names, ensuring that domain names are unique and facilitating the registration process for individuals and businesses.

New cards
7

Internet Registries

Organizations that maintain databases of registered domain names and their associated information, ensuring the integrity and availability of the domain name system.

New cards
8

ICANN

The Internet Corporation for Assigned Names and Numbers, a nonprofit organization responsible for coordinating the global domain name system and ensuring the stability of the Internet.

New cards
9

Domain Name System

A hierarchical system for naming resources on the Internet, allowing users to access websites using human-readable addresses instead of numerical IP addresses.

New cards
10

IP address

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New cards
11

IPv4 format

A 32-bit numerical address format used in the Internet Protocol version 4, typically represented in decimal as four octets separated by periods.

New cards
12

IPv6 format

A 128-bit address format used in the Internet Protocol version 6, represented as eight groups of four hexadecimal digits separated by colons.

New cards
13

Fully Qualified Domain Name

A complete domain name that specifies its exact location within the Domain Name System (DNS), including the top-level domain and all subdomains. Includes the host server name e.g. www, mail or ftp depending on whether the resource is on a web, mail or ftp server.

New cards
14

Router

A device that forwards data packets between computer networks, directing traffic on the Internet and ensuring data reaches its destination.

New cards
15

Packet

A formatted unit of data carried by a packet-switched network, which contains both control information and user data.

New cards
16

LAN

A Local Area Network that connects computers and devices within a limited geographical area, such as a home, school, or office.

New cards
17

WAN

A Wide Area Network that covers a large geographical area, connecting multiple local area networks (LANs) and enabling communication over long distances.

New cards
18

Topology

The arrangement of different elements within a network, including how devices are interconnected and how data flows between them. Common types include star, ring, and bus topologies.

New cards
19

Bus topology

A network topology where all devices are connected to a single central cable, known as the bus, allowing data to be transmitted in both directions. This setup is simple and cost-effective but can lead to performance issues if the bus fails.

New cards
20

Star topology

A network topology where all devices are connected to a central hub or switch, allowing for easy management and failure isolation.

New cards
21

Logical topology

Refers to the way data flows within a network, regardless of its physical layout. It defines how devices communicate over the network and can differ from the physical connections.

New cards
22

Physical Toppology

The physical arrangement of devices and cables in a network, showing how they are physically connected. It illustrates the layout and structure of the network components.

New cards
23

WiFi

A technology that allows electronic devices to connect to a network wirelessly using radio waves, enabling internet access without physical cables.

New cards
24

WAP

A Wireless Access Point that allows wireless devices to connect to a wired network using WiFi.

New cards
25

Mesh Topology

A network configuration where each device is connected to multiple other devices, allowing for multiple pathways for data to travel, enhancing reliability and redundancy.

New cards
26

Circuit switching

A method of communication where a dedicated circuit is established for the duration of the transmission, ensuring a constant connection between parties.

New cards
27

Packet switching

A method of data transmission where data is broken into packets and sent over a shared network, allowing for efficient use of bandwidth and flexibility in routing.

New cards
28

Data packet

A formatted unit of data carried by a packet-switched network, consisting of headers and payload. Data packets enable efficient communication by breaking down larger messages into manageable pieces.

New cards
29

Header

The part of a data packet that contains control information, such as source and destination addresses, and protocol information, which is crucial for routing and delivering the packet correctly.

New cards
30

Payload

The part of a data packet that contains the actual message or data being transmitted, excluding headers and metadata.

New cards
31

Checksum

A value used to verify the integrity of data packets by calculating a numerical summary of the packet's contents. If the checksum does not match upon receipt, it indicates potential data corruption.

New cards
32

Cyclical Redundancy Check

A method used to detect errors in data transmission by applying a polynomial division algorithm to the data. It generates a checksum that is sent along with the data, allowing the receiver to check for integrity.

New cards
33

Hop

The act of passing through a network device, such as a router or switch, to reach the destination in a network.

New cards
34

Dijkstra’s Algorithm

A graph search algorithm used to find the shortest path between nodes in a weighted graph, commonly applied in routing and navigation.

New cards
35

Gateway

A network node that serves as an access point to another network, often translating communication protocols between different networks.

New cards
36

MAC address

A unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network.

New cards
37

MAC address format

Typically represented as six pairs of hexadecimal digits.

New cards
38

HTTP

An application protocol used for transferring hypertext requests and information on the internet.

New cards
39

TCP/IP

A set of communication protocols used for the internet and similar networks, comprising Transmission Control Protocol (TCP) and Internet Protocol (IP).

New cards
40

Application layer

The topmost layer in the TCP/IP model, responsible for providing network services directly to applications. It enables communication between software applications and the underlying network.

New cards
41

Transport Layer

The layer responsible for end-to-end communication and data transfer between devices over a network, ensuring reliable delivery of messages.

New cards
42

Network Layer

The layer in the TCP/IP model that manages packet forwarding, routing, and addressing between devices across different networks.

New cards
43

Link Layer

The layer responsible for the physical transmission of data over a network, including framing, error detection, and access to the physical medium.

New cards
44

Socket

A combination of an IP address and a port number that enables communication between applications over a network.

New cards
45

Network Interface Card

A hardware component that connects a computer to a network, enabling communication and data transfer.

New cards
46

File Transfer Protocol

A standard network protocol used for transferring files between a client and server over a TCP/IP network.

New cards
47

Mail Server

A computer system that handles the sending, receiving, and storage of email for users, typically using protocols like SMTP, POP3, or IMAP.

New cards
48

POP3

A protocol used by email clients to retrieve emails from a mail server, allowing users to download messages for offline viewing. Once downloaded they are deleted from the server.

New cards
49

IMAP

A protocol used by email clients to access and manage emails on a mail server, allowing users to view and organize messages without downloading them. Unlike POP3, emails remain on the server.

New cards
50

SMTP

A protocol used for sending emails from a client to a mail server or between mail servers, ensuring the delivery of messages over the Internet.

New cards
51

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between a trusted internal network and untrusted external networks.

New cards
52

Packet filters

are devices or software that inspect network packets and allow or block them based on specified security rules, often used in firewalls to enhance network security.

New cards
53

Static Filtering

A method of packet filtering where rules are applied to packets based on predetermined criteria, such as source and destination IP addresses and port numbers, without considering the state of the connection.

New cards
54

Port

A communication endpoint used for sending and receiving data in network protocols, identified by a number that specifies a particular service or application on a device.

New cards
55

Proxy Server

A server that acts as an intermediary between a client and another server, forwarding requests and responses to enhance security, performance, and anonymity.

New cards
56

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems, often deployed through various means such as email attachments or malicious websites.

New cards
57

Virus

A type of malware that replicates itself by infecting other computer programs or files, often causing harm to systems and data.

New cards
58

Worm

A type of malware that replicates itself to spread to other computers, often exploiting vulnerabilities in software or networks without user intervention.

New cards
59

Trojan

A type of malware that disguises itself as legitimate software to trick users into installing it, allowing unauthorized access to systems.

New cards
60

Passwords

Secret phrases used for authentication to protect access to accounts and systems.

New cards
61

Blagging

The act of manipulating individuals to disclose personal information or access to systems through deception, often using social engineering techniques.

New cards
62

Social Engineering

A manipulation technique that exploits human psychology to gain confidential information or access to systems.

New cards
63

Phishing

A fraudulent attempt to obtain sensitive information, such as usernames and passwords, by disguising as a trustworthy entity in electronic communications.

New cards
64

HTML

A markup language used for creating web pages and web applications, defining the structure and layout of content.

New cards
65

CSS

Cascading Style Sheets, a stylesheet language used to describe the presentation of a document written in HTML or XML.

New cards
66

HTML Tag

An element used in HTML to define the structure and content of a web page, typically enclosed in angle brackets.

New cards
67

Embedded CSS

A method of applying CSS styles directly within an HTML document using the <code><style></code> tag, allowing for specific styling of elements within that page. This method enables customization of styles without external files, making it useful for single-page applications.

New cards
68

Inline CSS

A method of applying CSS styles directly within an HTML element using the "style" attribute, allowing for unique styling of individual elements without needing a separate stylesheet.

New cards
69

External Style Sheet

A separate CSS file linked to an HTML document using the <link> tag, allowing for consistent styling across multiple pages by keeping styles centralized.

New cards
70

Identifier

A name used to identify a specific element in HTML or CSS, allowing for targeted styling or scripting. Identifiers are typically defined using the "id" attribute in HTML.

New cards
71

Selector

A pattern used in CSS to select and apply styles to HTML elements, which can be based on element type, class, ID, or other attributes.

New cards
72

Class

A way to group multiple HTML elements for styling purposes in CSS, defined using the "class" attribute. Classes allow for the application of the same styles to different elements.

New cards
73

Web form

An interactive element on a webpage that allows users to input and submit data, often including fields such as text boxes, checkboxes, and buttons.

New cards
74

Behaviours

The actions or responses that elements on a webpage can exhibit in response to user interactions, often defined through JavaScript or CSS.

New cards
75

JavaScript

A programming language used to create dynamic and interactive content on websites, enabling features like animations, form validations, and user interface enhancements.

New cards
76

Validation

The process of checking user input in a web form to ensure it meets specified criteria before submission, often implemented through JavaScript.

New cards
77

Search Engine

A software system designed to search for information on the World Wide Web, retrieving and indexing data to provide relevant results based on user queries.

New cards
78

Search Engine Indexing

The process of organizing and storing web pages and their content in a search engine's database, enabling efficient retrieval of relevant information in response to user queries.

New cards
79

Key Words

The process of identifying and selecting significant words or phrases that are relevant to a webpage's content, used to improve search engine optimization and indexing.

New cards
80

Meta Tags

HTML tags used to provide structured metadata about a webpage, such as description, keywords, and author, which help search engines understand the page's content.

New cards
81

Description

A brief summary of a webpage's content, typically included in the meta tags, which informs search engines and users about the page's purpose and relevance.

New cards
82

Google PageRank Algorithm

A system used by Google to rank webpages in its search results based on their importance and relevance, determined by analyzing the quantity and quality of links to a page.

New cards
83

Directed Graph

A graph where each edge has a direction, indicating a one-way relationship between nodes, commonly used to represent structures such as networks and workflows. In the context of web technologies, it can represent links between webpages.

New cards
84

Damping Factor

A value used in the PageRank algorithm to account for the probability that a user will continue clicking on links rather than stopping, ensuring that all pages receive some rank even if they are not linked to.

New cards
85

Client-server network

A network architecture where client devices request resources or services from centralized servers, which provide the requested data or functionality. This model is fundamental in web technologies for enabling communication and resource sharing.

New cards
86

Client

A device or application that accesses services or resources provided by a server in a client-server network architecture, often used to request data or perform tasks.

New cards
87

Server

A computer or system that provides resources, data, or services to other computers, known as clients, over a network.

New cards
88

Cloud Computing

A model that enables on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications) over the internet, allowing for scalable and flexible resource management.

New cards
89

SaaS

Software as a Service, a cloud computing model that delivers software applications over the internet on a subscription basis, allowing users to access and use them without installation.

New cards
90

Peer-to-Peer network

A decentralized network architecture where each participant, or peer, can act as both a client and a server, sharing resources directly with one another without a central server.

New cards
91

Client-side processing

Refers to operations performed by a client device, such as a web browser, where data is processed locally rather than on a server. This allows for faster response times and reduced server load.

New cards
92

Server-side processing

Refers to operations performed on a server, where data is processed before being sent to the client. This approach allows for centralized control and can handle complex computations or database interactions.

New cards
93

API

A set of rules and protocols for building and interacting with software applications, allowing different programs to communicate with each other.

New cards
94

Thin-client computing

A network architecture where most processing occurs on a server, with minimal processing done on the client device. This setup reduces resource requirements on client machines and centralizes data management.

New cards
95

Thick-client computing

A network architecture where the client device performs significant processing and storage tasks, reducing the load on the server. This allows for richer user experiences and local data management.

New cards
96
New cards
robot