Computer Science - Unit 10: The Internet

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/80

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

81 Terms

1
New cards

Internet

A network of interconnected computer networks that allows users worldwide to communicate and share resources using an end-to-end communication protocol.

2
New cards

World Wide Web (WWW)

A collection of resources organized as websites and webpages, accessible via the Internet.

3
New cards

Internet Backbone

The main part of the Internet, made up of dedicated connections linking large networks globally. Each backbone point connects to several regional networks to provide access to users.

4
New cards

Internet Service Providers (ISPs)

Companies directly connected to the Internet backbone that provide Internet access to users through regional networks.

5
New cards

IP Address

A unique identifier for each resource on a network, used to send data to the correct destination.

6
New cards

IPv4

Internet Protocol version 4, consisting of 4 numbers (0-255) separated by dots (e.g., 14.35.146.50). Provides about 4.3 billion unique addresses.

7
New cards

IPv6

Internet Protocol version 6, consisting of 8 groups of 4 hexadecimal digits separated by colons. It provides vastly more unique addresses than IPv4.

8
New cards

Fully Qualified Domain Name (FQDN)

A combination of a resource's host name and domain name (e.g., www.google.com).

9
New cards

Uniform Resource Locator (URL)

Specifies how a resource is found on the Internet, including the protocol and FQDN (e.g., https://www.google.com).

10
New cards

Internet Registries

The five global organizations that manage the allocation of IP addresses, prioritizing reuse of unused addresses.

11
New cards

Domain Name System (DNS)

A hierarchy of domain types (.com, .uk, .edu, etc.) used to locate Internet resources.

12
New cards

DNS Lookup Process

The domain name search starts at a local DNS server and moves up the hierarchy until the address is found. The server then returns webpage data to the requester.

13
New cards

Packet

A chunk of data transmitted over networks, containing a header, payload, and trailer.

14
New cards

Packet Switching

Dividing data into packets that travel along shared lines, allowing simultaneous transfers.

15
New cards

Packet Components

Sender's and recipient's addresses, Packet sequence number, Payload (data), Time To Live (TTL)/Hop Limit, and Checksum/CRC (error checking).

16
New cards

Router

A device that connects different networks and directs packets via the fastest route (fewest hops or least congestion).

17
New cards

Hop

Each packet forwarding by a router.

18
New cards

Gateway

A device that reformats packet headers between networks using different protocols/media; often combined with routers.

19
New cards

Firewall

A security system that filters packets between a device and the Internet, blocking malicious or unauthorized access.

20
New cards

Packet Filtering

Blocking packets based on source IP, protocol, or port number.

21
New cards

Stateful Inspection

Filtering packets based on their contents and connection state, only allowing expected packets.

22
New cards

Proxy Server

A server that makes web requests on behalf of a computer, hiding its address.

23
New cards

Proxy Server Benefits

Enables anonymous surfing, filters undesirable content, logs user requests, and caches previously visited sites.

24
New cards

Encryption

Scrambling data before transmission to prevent unauthorized access.

25
New cards

Plaintext and Ciphertext

Plaintext = original data; Ciphertext = encrypted data.

26
New cards

Symmetric Encryption

Uses the same key for encryption and decryption; key must be privately shared.

27
New cards

Asymmetric Encryption

Uses public and private key pairs; sender encrypts with recipient's public key, and only recipient can decrypt with their private key.

28
New cards

Hybrid Encryption

Uses asymmetric encryption to share a symmetric key, then symmetric encryption for faster communication.

29
New cards

Digital Signature

Confirms a message's sender and ensures it hasn't been tampered with.

30
New cards

Digital Signature Creation Process

  1. Digest (hash) calculated from message; 2. Digest encrypted with sender's private key; 3. Encrypted digest added to message; 4. Message encrypted with recipient's public key.
31
New cards

Digital Certificate

Verifies the identity of a public key owner and contains the key itself. Used by HTTPS sites.

32
New cards

Digital Certificate Contents

Serial number, Certificate Authority (CA) name, Expiry date, Subject (holder name), Subject's public key, and CA's digital signature.

33
New cards

Worms

Self-replicating malicious programs that spread between devices without user action.

34
New cards

Trojans

Malicious programs disguised as harmless software that rely on user installation.

35
New cards

Viruses

Malicious code embedded in executable files that activate when the file is run.

36
New cards

Buffer Overflow Attack

Occurs when excess data overwrites memory, allowing attackers to execute malicious code.

37
New cards

SQL Injection Attack

Injecting SQL commands into web forms to manipulate or delete database data.

38
New cards

Malware Prevention

Secure coding, strong passwords, two-factor authentication, file access rights, monitoring logs, and updated antivirus software.

39
New cards

TCP/IP

A stack of networking protocols enabling Internet communication.

40
New cards

TCP/IP Layers

Application Layer, Transport Layer, Network Layer, and Link Layer.

41
New cards

Application Layer

Interfaces with the user and app protocols.

42
New cards

Transport Layer

Uses TCP to split data into packets and label them with sequence and port numbers.

43
New cards

Network Layer

Adds source/destination IP addresses; routers operate here.

44
New cards

Link Layer

Handles hardware connections and MAC addressing.

45
New cards

Socket

A combination of IP address and port number (e.g., 42.205.11.140:80).

46
New cards

MAC Address

A unique 12-digit hexadecimal identifier for a device's Network Interface Card (NIC).

47
New cards

TCP/IP Receiving Process

Link Layer removes MAC addresses, Network Layer removes IPs, Transport Layer reorders packets and delivers to correct app, Application Layer presents data to user.

48
New cards

File Transfer Protocol (FTP)

Transfers files between client and server; operates on ports 20, 21.

49
New cards

Secure Shell (SSH)

Secure remote management using encryption; operates on port 22.

50
New cards

Simple Mail Transfer Protocol (SMTP)

Sends and forwards emails; ports 25, 465, 587.

51
New cards

Post Office Protocol 3 (POP3)

Downloads and deletes emails from server; ports 110, 995.

52
New cards

Internet Message Access Protocol (IMAP)

Manages emails on the server; ports 143, 993.

53
New cards

Hypertext Transfer Protocol (HTTP)

Sends website content (unencrypted); port 80.

54
New cards

Hypertext Transfer Protocol Secure (HTTPS)

Sends website content securely (encrypted); port 443.

55
New cards

Network Identifier

Determines the subnet a device belongs to.

56
New cards

Host Identifier

Uniquely identifies a device within a subnet.

57
New cards

Subnet

A smaller network within a larger one, each with a unique network identifier.

58
New cards

Subnet Mask

Distinguishes network and host parts of an IP address (e.g., 255.255.255.0).

59
New cards

Classful Addressing

Fixed divisions between network and host IDs.

60
New cards

Classless Addressing

Division can occur at any point in the address.

61
New cards

Public Address

Globally unique and routable IP address.

62
New cards

Private Address

Used only within local networks.

63
New cards

Dynamic Host Configuration Protocol (DHCP)

Dynamically assigns private IP addresses temporarily from a pool.

64
New cards

Network Address Translation (NAT)

Translates private IPs to a router's public IP for Internet communication.

65
New cards

Port Forwarding

Allows Internet clients to access servers on private networks by mapping ports to internal devices.

66
New cards

Client-Server Model

Clients send requests, servers process them, and return responses.

67
New cards

API (Application Programming Interface)

Defines rules for how software components interact.

68
New cards

WebSocket

An API protocol for full-duplex real-time communication between client and server, reducing packet size and load.

69
New cards

CRUD

Create, Retrieve, Update, Delete - basic database operations.

70
New cards

CRUD in HTTP

GET = Retrieve, POST = Create, PUT = Update, DELETE = Delete.

71
New cards

REST (Representational State Transfer)

Web design method using HTTP request methods to query databases.

72
New cards

REST Process

Client sends HTTP request via browser → JS loads API → server responds in JSON/XML → browser displays data.

73
New cards

JSON (JavaScript Object Notation)

Lightweight, readable data format compatible with JavaScript.

74
New cards

XML (Extensible Markup Language)

Tag-based data format similar to HTML.

75
New cards

JSON vs XML

JSON: Easier, compact, faster, JS compatible, limited data types. XML: Flexible, tag-heavy, slower, supports all data types.

76
New cards

Thick Clients

High-powered standalone computers connected via a network; powerful but costly and require individual maintenance.

77
New cards

Thin Clients

Low-powered terminals connected to a central server; cheaper, easier maintenance, but server-dependent.

78
New cards

Thick Client Pros

Robust, reliable, works offline, handles powerful apps.

79
New cards

Thick Client Cons

Expensive, software installed separately, data integrity issues.

80
New cards

Thin Client Pros

Easy setup, secure, automatic updates, simple OS.

81
New cards

Thin Client Cons

Server-reliant, needs powerful server, high bandwidth demand.