The document provides a study guide covering various topics related to the Internet and web development. It includes definitions and explanations of key terms like the token bucket mechanism for congestion control, the architecture of the Internet, the Domain Name System (DNS), cybercrime, antivirus software, the digital divide, HTML, CSS, and the CSS box model. The study guide also provides brief histories of the Internet and World Wide Web, and differentiates between concepts such as the Internet and World Wide Web, as well as fixed and mobile internet access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
59 views4 pages
Sen 102 Revision Guide
The document provides a study guide covering various topics related to the Internet and web development. It includes definitions and explanations of key terms like the token bucket mechanism for congestion control, the architecture of the Internet, the Domain Name System (DNS), cybercrime, antivirus software, the digital divide, HTML, CSS, and the CSS box model. The study guide also provides brief histories of the Internet and World Wide Web, and differentiates between concepts such as the Internet and World Wide Web, as well as fixed and mobile internet access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
SEN 102 - Revision/Study Guide
1. Describe the “token bucket” mechanism for congestion control.
Solution The token bucket approach to congestion tries to limit the impact of bursts of network packets on routers along the path, while retaining some flexibility in terms of allowing a brief increase in traffic in response to sudden demands/bursts. 2. Internet Definition and History Solution Answer: The Internet is a global network of interconnected computers and networks that communicate using standardized protocols. It enables the exchange of information and resources across different locations. The Internet originated from a project called ARPANET in the late 1960s, funded by the U.S. Department of Defense. It expanded over time, connecting more computers and evolving into the global network we know today. The World Wide Web was introduced in the early 1990s, further revolutionizing Internet usage. 3. Differentiate between the World Wide Web and the Internet. Solution The Internet is the global network infrastructure that connects computers and networks worldwide. The World Wide Web, on the other hand, is an application that operates over the Internet. It is a system of interconnected documents and resources accessed through web browsers. 4. Explain the architecture of the Internet. Solution The Internet follows a decentralized architecture, consisting of interconnected networks. It uses the TCP/IP protocol suite as the foundation for communication. The architecture includes routers, switches, and various network protocols that enable data transmission across the network. 5. What is the Domain Name System (DNS) and why is it important? Solution The Domain Name System (DNS) translates human-readable domain names (like www.example.com) into IP addresses used by computers to communicate on the Internet. It is important as it enables users to access websites using memorable domain names instead of numerical IP addresses. 6. Differentiate between fixed internet access and portable/mobile internet access. Solution Fixed internet access refers to connectivity provided through fixed lines, such as DSL or cable, which are typically used at a fixed location like homes or offices. Portable/mobile internet access refers to wireless connections, such as cellular networks or Wi-Fi hotspots, that allow access from anywhere within their coverage areas. 7. Define the term "cybercrime" and provide examples. Solution Cybercrime refers to criminal activities conducted over the Internet or using computer systems. Examples include hacking, identity theft, online fraud, phishing, malware distribution, and unauthorized data access. Marking guide: 8. What is the role of antivirus software in web and internet security? Solution Antivirus software detects, prevents, and removes malicious software (such as viruses, worms, and Trojans) from computer systems. It helps protect against known and unknown threats, scans files and emails for potential infections, and provides real-time protection. 9. Explain the concept of the "digital divide" and its implications. Solution The digital divide refers to the gap between those who have access to technology, particularly the Internet, and those who do not. It encompasses disparities in connectivity, digital skills, and access to online resources. The implications include unequal access to information, limited opportunities, and furthering social and economic inequalities. 10. Describe the impact of social networking on individuals and society. Solution Social networking has transformed how people connect, communicate, and share information. It has facilitated global connections, allowed for the dissemination of ideas, fostered virtual communities, and provided new avenues for collaboration. However, it has also raised concerns about privacy, online harassment, and the spread of misinformation. 11. What is the Internet? Solution The Internet is a global network of interconnected computers and networks that communicate using standardized protocols. It enables the exchange of information and resources across different locations. 12. Provide a brief history of the Internet. Solution The Internet originated from a project called ARPANET in the late 1960s, funded by the U.S. Department of Defense. It expanded over time, connecting more computers and evolving into the global network we know today. The World Wide Web was introduced in the early 1990s, further revolutionizing Internet usage. 13. Define the role of a firewall. Solution In defining the role of a firewall, you should discuss the techniques that a firewall uses at different levels to prevent external attacks on the network and control traffic flow through the firewall. - The role of a Firewall in network security is to ensure network security by inhibiting the external threats coming from potent sources such as hackers and avoid any kind of connection between the two. Along with it, it guards the internal infrastructure of the network by occluding the viruses and malware - denying connection requests to known ports, such as ftp, send mail on hosts within the local network - packet filtering based on keywords or encryption status - suspicious packet traffic patterns that represent denial of service or packet spoofing attacks on local hosts from external IP addresses - an exceptional answer might note that wireless networking often bypasses firewalls and represents a possible security hole 14. draw a diagram that shows where a firewall should be positioned with relation to protecting a local network. Solution 15. What is HTML, and what is its primary purpose in web development? Solution HTML stands for Hypertext Markup Language. It is the standard markup language used to create the structure and content of webpages. The primary purpose of HTML in web development is to define the layout, headings, paragraphs, images, links, and other elements that make up a webpage's content. 16. List three essential HTML tags and briefly describe their functionalities. Solution • <p> tag: Used to define paragraphs and create text blocks. • <img> tag: Used to embed images into a webpage. • <a> tag: Used to create hyperlinks to other webpages or resources. 17. What is CSS, and what role does it play in web development? Solution CSS stands for Cascaded Style Sheets. It is a style sheet language used to control the presentation and layout of HTML documents. CSS allows web developers to apply styles such as colors, fonts, spacing, and positioning to HTML elements, enhancing the visual appearance of webpages. 18. Describe the difference between inline CSS and external CSS. Solution Inline CSS is applied directly to individual HTML elements using the style attribute. External CSS is defined in a separate CSS file and linked to the HTML document using the <link> tag. The main difference is that inline CSS affects only specific elements, while external CSS can be applied to multiple pages and keeps the HTML code cleaner and more maintainable. 19. Explain the purpose of CSS selectors and provide an example of each: class selector, ID selector, and element selector. Solution CSS selectors are patterns used to select and style HTML elements. • Class Selector: Selects elements based on their class attribute. Example: .my-class { color: blue; } • ID Selector: Selects a single element based on its unique ID attribute. Example: #my id { font-size: 18px; } • Element Selector: Selects all instances of a specific HTML element. Example: p { font family: Arial, sans-serif; } 20. Describe the CSS Box Model and its components. Solution The CSS Box Model is a layout model that defines how elements are structured in CSS. It consists of four components: • Content: The actual content area of an element, where text and images are displayed. • Padding: The space between the content and the element's border. • Border: The border that surrounds the padding and content area. • Margin: The space between the element's border and other neighboring elements.
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)