[go: up one dir, main page]

0% found this document useful (0 votes)
59 views4 pages

Sen 102 Revision Guide

The document provides a study guide covering various topics related to the Internet and web development. It includes definitions and explanations of key terms like the token bucket mechanism for congestion control, the architecture of the Internet, the Domain Name System (DNS), cybercrime, antivirus software, the digital divide, HTML, CSS, and the CSS box model. The study guide also provides brief histories of the Internet and World Wide Web, and differentiates between concepts such as the Internet and World Wide Web, as well as fixed and mobile internet access.

Uploaded by

Wande Israel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views4 pages

Sen 102 Revision Guide

The document provides a study guide covering various topics related to the Internet and web development. It includes definitions and explanations of key terms like the token bucket mechanism for congestion control, the architecture of the Internet, the Domain Name System (DNS), cybercrime, antivirus software, the digital divide, HTML, CSS, and the CSS box model. The study guide also provides brief histories of the Internet and World Wide Web, and differentiates between concepts such as the Internet and World Wide Web, as well as fixed and mobile internet access.

Uploaded by

Wande Israel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SEN 102 - Revision/Study Guide

1. Describe the “token bucket” mechanism for congestion control.


Solution
The token bucket approach to congestion tries to limit the impact of bursts of network packets on
routers along the path, while retaining some flexibility in terms of allowing a brief increase in
traffic in response to sudden demands/bursts.
2. Internet Definition and History
Solution
Answer: The Internet is a global network of interconnected computers and networks that
communicate using standardized protocols. It enables the exchange of information and resources
across different locations.
The Internet originated from a project called ARPANET in the late 1960s, funded by the U.S.
Department of Defense. It expanded over time, connecting more computers and evolving into the
global network we know today. The World Wide Web was introduced in the early 1990s, further
revolutionizing Internet usage.
3. Differentiate between the World Wide Web and the Internet.
Solution
The Internet is the global network infrastructure that connects computers and networks worldwide.
The World Wide Web, on the other hand, is an application that operates over the Internet. It is a
system of interconnected documents and resources accessed through web browsers. 4. Explain the
architecture of the Internet.
Solution
The Internet follows a decentralized architecture, consisting of interconnected networks. It uses
the TCP/IP protocol suite as the foundation for communication. The architecture includes routers,
switches, and various network protocols that enable data transmission across the network. 5. What
is the Domain Name System (DNS) and why is it important?
Solution
The Domain Name System (DNS) translates human-readable domain names (like
www.example.com) into IP addresses used by computers to communicate on the Internet. It is
important as it enables users to access websites using memorable domain names instead of
numerical IP addresses.
6. Differentiate between fixed internet access and portable/mobile internet access.
Solution
Fixed internet access refers to connectivity provided through fixed lines, such as DSL or cable,
which are typically used at a fixed location like homes or offices. Portable/mobile internet access
refers to wireless connections, such as cellular networks or Wi-Fi hotspots, that allow access
from anywhere within their coverage areas.
7. Define the term "cybercrime" and provide examples.
Solution
Cybercrime refers to criminal activities conducted over the Internet or using computer systems.
Examples include hacking, identity theft, online fraud, phishing, malware distribution, and
unauthorized data access.
Marking guide:
8. What is the role of antivirus software in web and internet security?
Solution
Antivirus software detects, prevents, and removes malicious software (such as viruses, worms,
and Trojans) from computer systems. It helps protect against known and unknown threats, scans
files and emails for potential infections, and provides real-time protection.
9. Explain the concept of the "digital divide" and its implications.
Solution
The digital divide refers to the gap between those who have access to technology, particularly the
Internet, and those who do not. It encompasses disparities in connectivity, digital skills, and
access to online resources. The implications include unequal access to information, limited
opportunities, and furthering social and economic inequalities.
10. Describe the impact of social networking on individuals and society.
Solution
Social networking has transformed how people connect, communicate, and share information. It
has facilitated global connections, allowed for the dissemination of ideas, fostered virtual
communities, and provided new avenues for collaboration. However, it has also raised concerns
about privacy, online harassment, and the spread of misinformation.
11. What is the Internet?
Solution
The Internet is a global network of interconnected computers and networks that communicate
using standardized protocols. It enables the exchange of information and resources across
different locations.
12. Provide a brief history of the Internet.
Solution
The Internet originated from a project called ARPANET in the late 1960s, funded by the U.S.
Department of Defense. It expanded over time, connecting more computers and evolving into the
global network we know today. The World Wide Web was introduced in the early 1990s, further
revolutionizing Internet usage.
13. Define the role of a firewall.
Solution
In defining the role of a firewall, you should discuss the techniques that a firewall uses at
different levels to prevent external attacks on the network and control traffic flow through the
firewall. - The role of a Firewall in network security is to ensure network security by inhibiting
the external threats coming from potent sources such as hackers and avoid any kind of
connection between the two. Along with it, it guards the internal infrastructure of the network
by occluding the viruses and malware
- denying connection requests to known ports, such as ftp, send mail on hosts within the
local network
- packet filtering based on keywords or encryption status
- suspicious packet traffic patterns that represent denial of service or packet spoofing
attacks on local hosts from external IP addresses
- an exceptional answer might note that wireless networking often bypasses firewalls
and represents a possible security hole
14. draw a diagram that shows where a firewall should be positioned with relation to protecting
a local network.
Solution
15. What is HTML, and what is its primary purpose in web development?
Solution
HTML stands for Hypertext Markup Language. It is the standard markup language used to create
the structure and content of webpages. The primary purpose of HTML in web development is to
define the layout, headings, paragraphs, images, links, and other elements that make up a
webpage's content.
16. List three essential HTML tags and briefly describe their functionalities.
Solution
• <p> tag: Used to define paragraphs and create text blocks.
• <img> tag: Used to embed images into a webpage.
• <a> tag: Used to create hyperlinks to other webpages or resources.
17. What is CSS, and what role does it play in web development?
Solution
CSS stands for Cascaded Style Sheets. It is a style sheet language used to control the
presentation and layout of HTML documents. CSS allows web developers to apply styles such as
colors, fonts, spacing, and positioning to HTML elements, enhancing the visual appearance of
webpages. 18. Describe the difference between inline CSS and external CSS.
Solution
Inline CSS is applied directly to individual HTML elements using the style attribute. External
CSS is defined in a separate CSS file and linked to the HTML document using the <link> tag.
The main difference is that inline CSS affects only specific elements, while external CSS can be
applied to multiple pages and keeps the HTML code cleaner and more maintainable.
19. Explain the purpose of CSS selectors and provide an example of each: class selector, ID
selector, and element selector.
Solution
CSS selectors are patterns used to select and style HTML elements.
• Class Selector: Selects elements based on their class attribute. Example: .my-class {
color: blue; }
• ID Selector: Selects a single element based on its unique ID attribute. Example: #my id
{ font-size: 18px; }
• Element Selector: Selects all instances of a specific HTML element. Example: p { font
family: Arial, sans-serif; }
20. Describe the CSS Box Model and its components.
Solution
The CSS Box Model is a layout model that defines how elements are structured in CSS. It
consists of four components:
• Content: The actual content area of an element, where text and images are displayed. •
Padding: The space between the content and the element's border.
• Border: The border that surrounds the padding and content area.
• Margin: The space between the element's border and other neighboring elements.

You might also like