{"id":1074,"date":"2024-02-24T09:00:15","date_gmt":"2024-02-24T09:00:15","guid":{"rendered":"https:\/\/learnlearn.uk\/ibcs\/?page_id=1074"},"modified":"2024-02-24T09:32:02","modified_gmt":"2024-02-24T09:32:02","slug":"computer-roles-in-ict-systems","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/","title":{"rendered":"Computer Roles in ICT Systems"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Client<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Client<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-1078 alignright\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance-300x300.webp\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance-300x300.webp 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance-150x150.webp 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance-768x768.webp 768w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance.webp 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Computers acting as clients typically request services, resources, or data from other computers on the network, such as servers.<\/p>\n<p>They are often used for tasks like accessing web pages, sending emails, or running applications that rely on centralized resources.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Server<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Server<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-951 alignright\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2023\/11\/transaction-isolation-database-transactions-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2023\/11\/transaction-isolation-database-transactions-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2023\/11\/transaction-isolation-database-transactions-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2023\/11\/transaction-isolation-database-transactions-768x768.jpg 768w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2023\/11\/transaction-isolation-database-transactions.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Servers provide services, resources, or data to other computers on the network, known as clients.<\/p>\n<p>They can fulfill various roles such as:<\/p>\n<ul>\n<li>file servers (storing and sharing files)<\/li>\n<li>web servers (hosting websites)<\/li>\n<li>email servers (managing email communication)<\/li>\n<li>database servers (storing and managing data), and more.<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">Peer<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Peer<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-1079 alignright\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/p2p-client-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/p2p-client-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/p2p-client-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/p2p-client.jpg 432w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>In peer-to-peer (P2P) networks, computers can act as both clients and servers, sharing resources and services directly with other peers without the need for centralized servers.<\/p>\n<p>This distributed approach is commonly used for file sharing, collaborative computing, and decentralized applications.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Router<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Router<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-1080 alignright\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router2-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router2-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router2-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router2-768x768.jpg 768w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router2.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Routers are network devices responsible for directing data packets between different networks. They analyze network traffic, determine the best path for data transmission, and forward packets accordingly.<\/p>\n<p>Routers play a crucial role in connecting computers and networks to the internet and facilitating communication between them.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Switch<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Switch<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-1081 alignright\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/router.jpg 432w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Switches are network devices that connect multiple computers within a local area network (LAN) and facilitate communication between them.<\/p>\n<p>They operate at the data link layer of the OSI model and use MAC addresses to forward data packets to the appropriate destination device.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Firewall<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Firewall<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-1082\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/firewall2-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/firewall2-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/firewall2-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/firewall2-768x768.jpg 768w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/firewall2.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Firewalls are security devices or software applications that monitor and control incoming and outgoing network traffic based on predetermined security rules.<\/p>\n<p>They help protect computers and networks from unauthorized access, malicious attacks, and other security threats.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Gateway<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Gateway<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-1083\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/gatewayj-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/gatewayj-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/gatewayj-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/gatewayj-768x768.jpg 768w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/gatewayj.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Gateways are devices or software programs that connect different types of networks or protocols, enabling communication between them. They translate data formats, protocols, or addressing schemes to facilitate interoperability between disparate networks, such as connecting a LAN to the internet or translating between IPv4 and IPv6.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Proxy<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Proxy<\/h3>\n<p>&nbsp;<\/p>\n<p>Proxies act as intermediaries between clients and servers, intercepting and forwarding network requests on behalf of clients. They can provide various functions such as caching frequently accessed web content, filtering internet traffic, enhancing security, and improving performance.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Terminal<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Terminal<\/h3>\n<p>&nbsp;<\/p>\n<p>Terminals are devices or software applications that enable users to access and interact with remote computers or servers over a network.<\/p>\n<p>They provide a user interface for inputting commands and receiving output from the remote system, facilitating tasks like remote administration, accessing cloud resources, or virtual desktop infrastructure (VDI) sessions.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Endpoint<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Endpoint<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-1084\" src=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/endpoint-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/endpoint-300x300.jpg 300w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/endpoint-150x150.jpg 150w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/endpoint-768x768.jpg 768w, https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/endpoint.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Endpoints refer to individual devices connected to a network, such as desktop computers, laptops, smartphones, tablets, and IoT (Internet of Things) devices.<\/p>\n<p>They interact with network services, exchange data, and perform various tasks according to their capabilities and configurations.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Client Computers acting as clients typically request services, resources, or data from other computers on the network, such as servers. They are often used for tasks like accessing web pages, sending emails, or running applications that rely on centralized resources. Server Servers provide services, resources, or data to other computers on the network, known as&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Computer Roles in ICT Systems<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Roles in ICT Systems - IB Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Roles in ICT Systems - IB Computer Science\" \/>\n<meta property=\"og:description\" content=\"Client Computers acting as clients typically request services, resources, or data from other computers on the network, such as servers. They are often used for tasks like accessing web pages, sending emails, or running applications that rely on centralized resources. Server Servers provide services, resources, or data to other computers on the network, known as&hellip;&nbsp;Read More &raquo;Computer Roles in ICT Systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"IB Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-24T09:32:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance-300x300.webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/\",\"name\":\"Computer Roles in ICT Systems - IB Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\"},\"datePublished\":\"2024-02-24T09:00:15+00:00\",\"dateModified\":\"2024-02-24T09:32:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IB Computer Science\",\"item\":\"https:\/\/learnlearn.uk\/ibcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Roles in ICT Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"name\":\"IB Computer Science\",\"description\":\"- learnlearn..uk\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\",\"name\":\"IB Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"width\":300,\"height\":41,\"caption\":\"IB Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Roles in ICT Systems - IB Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/","og_locale":"en_GB","og_type":"article","og_title":"Computer Roles in ICT Systems - IB Computer Science","og_description":"Client Computers acting as clients typically request services, resources, or data from other computers on the network, such as servers. They are often used for tasks like accessing web pages, sending emails, or running applications that rely on centralized resources. Server Servers provide services, resources, or data to other computers on the network, known as&hellip;&nbsp;Read More &raquo;Computer Roles in ICT Systems","og_url":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/","og_site_name":"IB Computer Science","article_modified_time":"2024-02-24T09:32:02+00:00","og_image":[{"url":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2024\/02\/dba-performance-300x300.webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/","url":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/","name":"Computer Roles in ICT Systems - IB Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#website"},"datePublished":"2024-02-24T09:00:15+00:00","dateModified":"2024-02-24T09:32:02+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/ibcs\/computer-roles-in-ict-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IB Computer Science","item":"https:\/\/learnlearn.uk\/ibcs\/"},{"@type":"ListItem","position":2,"name":"Computer Roles in ICT Systems"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/ibcs\/#website","url":"https:\/\/learnlearn.uk\/ibcs\/","name":"IB Computer Science","description":"- learnlearn..uk","publisher":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/ibcs\/#organization","name":"IB Computer Science","url":"https:\/\/learnlearn.uk\/ibcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","contentUrl":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","width":300,"height":41,"caption":"IB Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/ibcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Client Computers acting as clients typically request services, resources, or data from other computers on the network, such as servers. They are often used for tasks like accessing web pages, sending emails, or running applications that rely on centralized resources. Server Servers provide services, resources, or data to other computers on the network, known as&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/1074"}],"collection":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/comments?post=1074"}],"version-history":[{"count":3,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/1074\/revisions"}],"predecessor-version":[{"id":1085,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/1074\/revisions\/1085"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/media?parent=1074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}