Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Network Services

Final

QuestionAnswer
1) What is an Intranet? A network connecting an affiliated set of clients using standard internet protocols, and is generally connected via VPNs
2) What is an Extranet? Refer to Q45 from 1st midterm A business-to-business intranet that allows for limited, control, and secure access between a company’s intranet to be used by authenticated users from remote locations
3) What is the World Wide Web? The catch all term for the public internet, which generally defines websites, but also includes any other publicly available network device The World Wide Web comprises all HTTP nodes on the public Internet
4) What is an example of a program we used that would be considered groupware? Microsoft SharePoint
5) What are some features of groupware? Groupware is the term used to describe collaborative computing, generally which includes document sharing, collaborative authoring, versioning, messaging, secure access, etc
6) What is MIME? Refer to Q14 from 1st midterm Multipurpose Internet Mail Extensions, it defines how Content-Type headers should be set by website administrators, and how web browsers should display the non-textual data of the website (i.e. an image).
7) What is XML? Refer to Q46 from 1st midterm Extensible Markup Language, is it considered to be the next generation of internet applications
8) What is LDAP? Refer to Q10 from 1st midterm Lightweight Directory Access Protocol, is a usable subnet of the ponderous but universally accepted X.500 standard
9) What is IPsec? IPsec is a competing wire-level security protocol along with PPTP
10) What is ADSL? Refer to Q11 from 1st midterm Asymmetric Digital Subscriber Line, is a high-speed modem protocol put forth by telephone companies to compete with cable modems
11) What is IMAP? Refer to Q12 from 1st midterm Internet Message Access Protocol, was developed in 1986 which offers more features compared to POP, such as searching emails on a server based on keywords, and accessing mail directly from the server to manage
12) What is a VPN? Virtual Private Network, is a method of creating an encrypted tunnel between two devices, usually used in businesses over the public internet to allow for access to internal resources, or in order to keep browsing habits secretive
13) What is a Proxy? Proxys are generally used to improve the performance of websites through caching responses, as well as to filter network requests. They can also be used as CDNs
14) What is a Firewall? Refer to Q13 from 1st midterm A system designed to prevent unauthorized access to or from a private network. Firewalls can be both software, hardware, or a combination of both
15) What is MAPI? Messaging Application Programing Interface, also known as X.400. Was a standard developed by the CCITT to provide a universal way of addressing messages
16) What is ASCII? ASCII was the original character set used on the internet, and supports 128 characters encoded over 8 bits (7 of which are usable)
17) What is an issue with a 7‐bit character set? Although having 7 bits to represent the English alphabet was fine, European and Asian languages resulted in a rapid increase of required displayable languages, something that needed much more than 128 characters
18) What is UNICODE? UNICODE is widely considered to be the replacement for ASCII, as it uses 16 bits in order to represent characters, allowing for more than 65,000 unique characters
19) What is POP? Post Office Protocol, the old method of retrieving mail from server, developed in the 1980’s. Supports basic messaging features, such as downloading the message to the computer and handling all mods locally before publishing them to the mail server
20) What is the advantage of IMAP over POP? IMAP supports many features that POP does not, such as searching through mail for keywords, making messages as read or unread, and downloading messages to the computer only when required
21) What is SMTP? Simple Mail Transfer Protocol, is a protocol for sending messages between mail servers
22) What ports does SMTP use by default? 25, 465, and 587
23) What is an MTA? Mail Transfer Agent, is responsible for receiving incoming e-mails and delivering them to individual users
24) Give an example of an MTA Unix Sendmail, Microsoft Exchange, Axigen, etc
25) What is an MUA? Mail User Agent, is responsible for allowing access to a user’s e-mail, allowing for it to be remotely managed without logging in onto the mail server directly
26) Give an example of an MUA. Thunderbird, Outlook, etc
27) What are advantages of running your own mail server? Implementing one’s own mail server allows for greater customization, flexibility, as well as cost savings
28) What are disadvantages of running your own mail server? Disadvantages of running your own mail server include increased support cost and increased possibility of security breaches
29) What is SSL? Secure Sockets Layer, allows for the use of encryption keys in order to privately transfer data between a client and a server, generally either an e-mail server or website. Now widely known as TLS
30) What is RSA? Rivest-Shamir-Adleman, was one of the first public-key cryptosystems and is widely used for secure data transmission. Uses both public and private keys
31) What is S/MIME? Secure/MIME, is a version of MIME that supports encryption, and is actually based off of the RSA key system
32) What is SPAM? Electronic junk mail or junk newsgroup postings, generally auto-filtered into its own bin for user decision
33) What is an Open Relay? Open relays are used in order to forward SMTP messages that are not for any local users to the appropriate domain
34) Why is an Open Relay bad? Open Relays are generally bad as they allow for spammers to send out large volumes of e-mails in a somewhat obscure way, making them hard to track down
35) What is an Autoresponder? A mail utility which automatically replies to an e-mail message with a pre-written response. Usually used when the user will not be there to respond to the mail themselves
36) What is e‐mail aliasing? The practice of having multiple e-mail addresses resolve to a single e-mail address (i.e. root@example.com actually sends mail to sysadmin@example.com)
37) What is e‐mail spoofing? E-mail spoofing is the process of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source
38) What is SPF? Sender Policy Framework, is an extension of SMTP that stops e-mail spammers from forging the “from” fields in an e-mail
39) Where are SPF records published? SPF records are published in the domains DNS records
40) What is a Hard Bounce? When an e-mail has bounced back while being processed by the recipient’s mail server
41) What is a Soft Bounce? When an e-mail has bounced back while being processed by the recipient’s mail server
42) What is phishing? The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information
43) What is NNTP? Network News Transfer Protocol, used in order to distribute Usenet news articles between news servers and clients, and generally uses port 119 and 563
44) What is Outlook? Microsoft Outlook is one of the more popular MUAs, and is used in order to read and respond to mail
45) What is CGI? Common Gateway Interface, defines how a web server should run programs locally and transmit their output through the web server to the user’s browser which has requested dynamic content
46) What is HTTPS? The second important advance in web technologies, as it allows for a secure, encrypted communication between a client’s web browser and the web server
47) What protocols can be used to create dynamic content? CGI, ASP, Java Servlets, PHP, Mod_Perl
48) What is ASP? Active Server Pages, a protocol developed by Microsoft in order to increase the performance of dynamic pages, and consists of an embedded VBScript interpreter into ISS servers
49) What is Apache? A high-end, enterprise-level web server for Unix and Windows platforms. It is one of the most common web servers as it is rock-solid stable, high performance metrics, and rich set of features
50) What is XML? Extensible Markup Language, is it considered to be the next generation of internet applications
51) What is multi‐threading? The a-synchronous processing of tasks, spread across multiple CPU cores. (i.e. One CPU core can calculate 1+6, while the other core can process 2*3, and then combined by one core, requiring a total
52) What is inetd? A form of multi-processing on the Unix platform
53) What is reverse proxy? Reverse proxies intercept requests from clients and then proxies those requests onto the web server, caching the response itself the server sends back to the client, resulting in a decreased load on the webserver
54) What is TLS? Transport Layer Security, an algorithm generally used in order to secure web traffic between a client and a server
55) What is HTML? Hypertext Markup Language, is the standard markup language for creating web pages and web applications, is currently on its fifth iteration. It supports CSS, JavaScript, and more
56) What is PHP? A web-based language similar to JSP and ASP, but was not based off of any pre-existing coding language
57) What is Perl? A programing language that was the basses for CGI, is also now included in Apache which speeds up the execution of Perl scripts
58) What is a disadvantage of CGI? CGI tends to be slow because each request for a dynamic document requires a new process
59) What is JSP? JavaServer Pages, was originally released by Sun Microsystems (now owned by Oracle) in 1999. It allowed for dynamic web pages based on HTML or XML, and was written in the Java programing language
60) Using Netcraft survey for Nov 2016, what company produced the software that ran the most Web Servers? According to the Netcraft survey from November 2016, Apache ran the most web servers, followed by Microsoft IIS
61) What is ISAPI? Internet Server Application Programming Interface, an N-tier API of IIS that has been ported over to other web servers such as Apache, and allows for extensions and filters that modify how the web server handles requests
62) What is SNMP? Simple Network Management Protocol, is a set of protocols for managing complex networks
63) What is a relational database? A database which the organization of the data incorporates the way data items are related to each other. It is considered the most stable, and has standards set out by the ISO and ANSI
64) What is SQL? Structured Query Language, was a standard developed by IBM which was used for English-like database queries
65) What is a query? An SQL query is the process of a client or script asking the SQL server for information, and is generally returned in an HTML format
66) What is a DBMS? Database Management System, is the program or set of programs used to create the database and provide access to it
67) What is Scalability? The ability to handle high, variable, and non-predictable transaction throughput
68) What is Availability? The ability to support non-stop (24*7*365) operations
69) What is normalization? The process of organizing data to minimize redundancy
70) What is failover clustering? A backup method for databases that allow databases to constantly stay up-to-date and available, even if the main SQL server has gone offline
71) What is a differential backup? A backup method that only backs up the data that has changed since the last full backup
72) What is an incremental backup? A backup method that only backs up the portion that has changed since the previous backup
73) What is a transaction log? A mechanism to compensate for database changes made during the period of time between backups
74) What is a rollback? The process of rolling back changes to the database that have been committed
75) What does it mean to be committed? The process of making the change to the SQL database
76) What is Ping? A simple network tool which tests end-to-end connectivity between two different devices via the TCP/IP or ICMP protocols
77) What is FTP? File Transfer Protocol, allows for the unsecure transferring of files between a server and a client
78) What is Telnet? An unsecure remote management protocol based on the TCP/IP protocol, and sends each character to the server as it is typed
79) What is DB2? A product family developed by IBM to run on non-IBM products. It was one of the popular database server software’s
80) What is MySQL? An open source database system that is used widely around the world
81) What is Oracle? The software company responsible for developing many different database and application servers but is more commonly known for the development of the Java operating system.
82) What is middleware? Applications servers that fit between the database server and the end user
83) What is J2EE? Java 2 Platform Enterprise Edition, a platform-independent, Java-centric environment from Sun for developing, building, and deploying Web-based enterprise applications online
84) What is an API? Application Program Interface, allows for the communication between two pieces of software through pre-defined programing calls
85) What does it mean to be platform‐independent? That no matter which operating system you are running, you will be able to run a piece of software without making any modifications
86) What does it mean to be Java‐cetric? The environment which is being worked in is solely based on the Java programing language
87) What are EJBs? Enterprise JavaBeans, provides the layer where the platform’s logic is stored. An EJB server provided functionality such as threading, concurrent, security, and memory management, all which are transparent to the author
88) What is JDBC? Java Database Connectivity, the Java equivalent of ODBC, and is the standard interface for Java databases
89) What is ODBC? Open Database Connectivity, is the standard application programing interface for accessing database management systems
90) What is SOAP? Refer to Q31 from 1st midterm Simple Object Access Protocol, is a protocol which provided applications a way to communicate with each other over the Internet, independent of platform
Created by: Dankmeme369
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards