coExtra Flashcards

1
Q

High level

A

Less efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

White box

A

Knows source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do viruses do

A

Damage or delete data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Regulations online to

A

Keep kids safw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the link layer?

A

This is where the network hardware is located. This layer attaches the MAC addresses of the sender and recipient so the packet can be directed to a specific device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some of the positives of networks?

A

User profiles and security can all be managed centrally.
All files can be backed up centrally.

Software can be distributed without it having to be installed every time.
Printers can be shares.
internet connection can be shares and files can be stored on a file server so they can be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the negatives of a network?

A

ardware can be expensive
If file server goes down, nobody can access their files

Could lead to loss of data
Viruses can spread easier
Hard to manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some advantages of bus network?

A

Cheap to set up
Easy to set up

Good for smaller or short term
No reliance on central node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the negatives of star network?

A

Expensive to install
Extra hardware is required
Harder to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some positives or star topology?

A

Faster transmission of data
Less likely to experience errors/data traffic problems
A faulty connections disables one computer unless it is the hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cyber security?

A

Protecting networks, computers, data and programs from attack damage or unauthorized access and is done through processes practices and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phising

A

Impersonating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the positives of databases?

A

Makes processing more efficient, reduces storage requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Characteristics of flat file databases.

A

Very inefficient, difficult to query and used for small/trivial data sets. Data is often duplicated, also suffers inconsistencies between records. This can compromise the integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between using a GUI and CLI?

A

Command line interface is much quicker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between system and application software?

A

System is run by system in background for example OS or encryption whereas application is run by user to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIOS

A

Controlling hardware at start up sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two main types of system software?

A

Operating systems and utility software.(just software is like basic applications like games or browsers which is in the other ring).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the operating system do things

A

User authentication, makes sure users must prove who they are, protect against malware, blocks access to specific vulnerable areas of the pc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does WAN have to use

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Draw the two round dots symbolising the terminators at the end of each side of the BUS.

A

okay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why does everything stop working if the bus goes down?

A

The cable splits so there are two open ends with no terminators so the data is not absorbed at the end which causes it to reflect and cause problems. Star only impact one node/device UNLESS it is central hub or switch or server as they are connected individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PAN

A

not always wireless but does not need extra hardware unless it is wired as WAP is always required anyway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the advantages of hydrogen fuel cells?

A

They will produce electricity for as long as you provide hydrogen. They do not get less efficient the more they run and they can be a source of drinkable water for example on a space craft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the disadvantages or rechargeable batteries?

A

They run out and need to be recharged, they can also store less energy the more charging cycles they go through and eventually need to be replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the disadvantages of hydrogen fuel cells?

A

Run on hydrogen which is explosive and difficult to store safely they produce a relatively low potential difference or voltage so several are needed together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the advantages of rechargeable batteries?

A

They can produce a large potential difference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is another positive of closed source for the user?

A

Often will have more online help and support as they realised their code is unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

pipette.

A

Small volume of solution in bottom to make it accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are anti bumping granules for?

A

To make the liquid boil more smoothly-small bubbles of vapour form on the corners of the granules and reduce the risk of the liquid boiling over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is bandwith?

A

The maximum rate of data transfer across a given path. The more people online, the more bandwidth is used up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Make sure electrodes dont touch.

A

This would create a dangerous short circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What do you always need to say?

A

Without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is an example of lossless compression?

A

.gif

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is an example of lossy compression?

A

.jpg and .mp3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is not compression.

A

.bmp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is RLE stored as?

A

Frequency/data pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is system software?

A

Programs that are needed to enable the computer to function, including the OS, utilities and programming language translators and library routines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does the OS manage?

A

Processors, memory, input/output, applications, security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How does the OS manage processors?

A

anages the use of the processors resources, task manager, the OS provides a tiny slice of processor time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How does the OS manage memory?

A

OS manages where in memory each program and the data it needs will go.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How does the OS manage input/output devices?

A

The input is processed and the computer will generate outputs. The OS takes over and controls the sending of data. Each I AND O has a device driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How does the OS manage applications?

A

The OS interacts with applications through an Applications program interface(API) which allows the application to communicate with the operating system. Once an application is installed, it will need t communicate with the operating system to execute modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does the OS manage security?

A

Controls access to ta computer by setting up passwords for different users, this blocks access to files and software without password. Sets up access rights and privileges for different users. Encrypts files stored on the hard disk and automatically downloads updates to ensure security loopholes are patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What do embedded systems use?

A

No OS and a microprocessor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are some strange things about embedded systems?

A

System held in non-volatile memory and some firmware devices are permanently installed and cannot be changed after manufacture. It is not possible to update hardware or attach peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is good about embedded systems?

A

More reliable, optimised and efficient. And use less resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Star topology positive?

A

Consistent performance even when the network is heavily used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

IMAP.

A

Stores email messages on a server and allows users to view and manipulate the messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

SMTP?

A

Sending email messages between servers, used for relaying or forwarding messages form one mail server to another if there are different email service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is firmware?

A

Permanent software in read only memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What has a lower boiling point nitrogen or oxygen?

A

Nitrogen.

53
Q

Why would a company not want to make their source code of the software available?

A

So third parties cannot insert/modify code and pass it off as original as it affects profitability. Algorithms cannot be copyrighted and therefore need to be protected to preserve commercial advantages. Hacking/cyber security as hackers could identify vulnerabilities in the source code and use them to create targeted attacks. Copyright of code-they may not want others to have access to what they have developed.

54
Q

What are some advantages of star topology compared to bus?

A

Less likely to experience transmission errors/data traffic problems(contention issues). Faster transmission data. Fewer/no collisions if a switch is used rather than a hub. Also better security potentially as data is not broadcasted to all machines if a switch is used.

55
Q

What are some negatives of star topology as oppose to bus?

A

It is harder to install and requires more cable. It is more expensive to install as more cable and hardware is needed. Switch/hub/central device may fail breaking the entire network.

56
Q

What are the positives of a network?

A

Sharing of resources such as printers and storage space. Managed/central backing up of data. Central installation and management of software by network admin. Monitoring of users and network activity centrally by network admin. Hot Desking/users can log onto any machine. Ability to use communication tools between computers and centrally managed access rights. Rapid data sharing and it allows decentralised/home working.

57
Q

What are the negatives of networks?

A

Spreading of malware and cost of infrastructure. Cost of network admin required to run network and dependency on network hardware.

58
Q

Difference between PAN and lan.

A

you have to cover both to actually state a difference. For example PANs are centred round one person whereas LANs cover a limited geographical area/ larger area. Or one person v more than one usually.

59
Q

What can networks do?

A

Increase available storage.

60
Q

What are the reasons for growth of cloud storage?

A

Higher bandwidth mobile networks like 4g and there is an increased availability of mobile devices. Reduction in cost of large capacity storage devices and improvements in network security so people have a higher trust in cloud storage. Improvements in web browser software and increased availability of super computers for cloud processing. Companies have managed to develop business models based on cloud computing that allow them to make a profit.

61
Q

What are the advantages of cloud storage?

A

Enables the user to access their data from more places/devices and enables the user to more easily share data with others as you can make parts of your cloud storage publicly available. Increases amount of storage available and reduced cost of computing devices for users as no need for as much built in-secondary storage.

62
Q

What was it like before von neuman?

A

Instructions had to be hard wired and data went through physical switches.

63
Q

Advantages of star compared to bus?

A

ess likely to experience transmission errors/data traffic problems(contention issues). Faster transmission data. Fewer/no collisions if a switch is used rather than a hub. Also better security potentially as data is not broadcasted to all machines if a switch is used.

64
Q

What is data stored on for optical?

A

Singal spiral tracks.

65
Q

Iterative testing?

A

Tweaked each time it is tested to improve it.

66
Q

What are the electrodes made of?

A

Porous carbon.

67
Q

Shouldering

A

PHYSICAL

68
Q

What is a paging algorithm?

A

Memory management scheme.

69
Q

What is it called when multiple instructions are being executed at once?

A

Concurrent.

70
Q

What else does the OS do?

A

Scheduling algo.

71
Q

What is a scheduling algo?

A

makes sure each instruction get s a slice of cpu time.

72
Q

What is pipelining?

A

Method used by CPU to split up tasks and overlap tasks if possible.

73
Q

What is a positive of client server?

A

Central backups.

74
Q

IPV4

A

32

75
Q

IPV6

A

128

76
Q

Why might a company not give out daTA

A

It could affect a court case.

77
Q

What is the first way anti malware detects malware?

A

Compares definition with definition stored in database of known malware.

78
Q

What is the second way ant malware detects malware?

A

Uses a set of rules to detect suspicious behaviour which could suggest a file is malware.

79
Q

What can heart implants do

A

May include electrodes for regulating heartbeat, warn of heart attacks and monitor the effects of treatment.

80
Q

What implants can a quadroplegic get?

A

Electrodes implanted in his brain which enable him to control a robotic arm, getting it to bring a cup to his mouth simply by thinking about doing it

81
Q

What are the environmental impacts of cloud storage?

A

It uses much more energy to keep its storage equipment running, cooling systems also use lots of energy. Cloud storage does save energy for companies that need to store large amounts of data.

82
Q

What is recognised under the computer missue act?

A

Unathourised access to computer material, with intent to commit or faciliate a crime and modification of a computer.
Making, supplying or obtaining anything which can be used in computer misuse offences.

83
Q

What is end-to-end encryption?

A

It ensures that during transmission, only you, and the person you send the message to can read it.
Used in whatsapp.

84
Q

What is the problem with organisations or governments using this backdoor?

A

Providing any backdoor would potentially enable it to be opened by anyone, meaning that anyone’s confidential messages could fall into the wrong hands.

85
Q

What do you say in SQL to sort?

A

ORDER BY

86
Q

What is concurrency in a database?

A

Many users can query data at the same time.

87
Q

How do you insert another record in SQL?

A

INSERT INTO cakes Vaules(..).

88
Q

What is a transaction?

A

Change in database.

89
Q

How does the OS do interface?

A

User/software and software/hardware

90
Q

How does the OS do cpu?

A

Pipelining, scheduling to allow for optimal cpu usage.

91
Q

How does the CPU do memory management?

A

Moves data and instruction sbetween primary+secondary storage and also disk defrag.

92
Q

How does the OS do security?

A

User profiles/access levels and encyption.

93
Q

Faster what?

A

Read write speeds

94
Q

How do you update SQL?

A

UPDATE students
SET surname=”Kennedy”
WHERE firstname=”Mark”

95
Q

How do you make a new record SQL

A

INSERT into students

VALUES (“Mark”,”Kennedy”,”15”)

96
Q

How do you delete SQL?

A

DELETE from students

Where firstname=”Mark”

97
Q

What is an entity?

A

Real world data about which data is stored about-whole table-song

98
Q

What is an attribute?

A

A field-song name

99
Q

Two things about peer to peer

A

Equal status and share data.

100
Q

Select and from?

A

When saying select we dont care about where it comes from but with from we do

101
Q

Query?

A

Access specific data quickly

102
Q

What things can DBMS do?

A

Create a DB, add data, delete data, edit data and search data

103
Q

Record

A

Collection of data about a single entity

104
Q

Field

A

A unique piece of data about an entity

105
Q

First principle of GDPR?

A

must be used for reason it was acquired with the persons consent

106
Q

Second

A

Data must only be collected for specified, explicit and legitimate reasons

107
Q

thurd

A

Data must be relevant, not excessive and not be held longer than needed

108
Q

Fourth

A

Data must be accurate and up to date

109
Q

fifth?

A

Data must be kep secure

110
Q

sixth?

A

god knows

111
Q

What else does the link layer do?

A

Attaches the mac adress

112
Q

What do databases do

A

Reduce storage requirements

113
Q

What is an array?

A

in computer science, an array data structure, or simply an array, is a data structure consisting of a collection of elements, each identified by at least one array index or key. An array is stored such that the position of each element can be computed from its index tuple by a mathematical formula

114
Q

What is a record

A

A record is any document - in any format (paper or electronic, and yes even video) - created or received by you or your department - that allows you to conduct business. The value of a record is determined by content, not by format.

115
Q

Can a record be in an array?

A

Yes

116
Q

Where are records stored?

A

Hard disk

117
Q

Where are arrays stored?

A

RAM

118
Q

RECORDS SEACRH

A

requires linear search as can be any data type

119
Q

etter to number ch

A

ord(‘f”)

120
Q

number to letter ch

A

chr(102)

121
Q

Showing how Rle works

A

• the number of consecutive pixels/data points/characters of the same
colour/value/character would need to be counted;
• (pairs of values would be stored), which would consist of a run length and the
colour/value/character of the pixels/data points/text in the run;
Example (max 1 mark)
• Image example of how the specific row of pixels would be compressed eg 9
Black, 11 Red, 8 White;
• Text example of how the specific run of characters would be compressed eg 7
G, 6 Y, 12 $

122
Q

How is main memory used

A

it stores instructions whilst a program is being executed;
• it stores data whilst a program is being executed;
• each unique memory location in memory holds one value;
• every memory location has a unique address;
• once data has been stored in memory it can be found again later (when it’s
needed);
• data and instructions are replaced in memory as needed;

123
Q

What is malware

A
  • (Malware is a blanket/umbrella term for) computer software/program/code;
  • with malicious/hostile/intrusive intent;
124
Q

Explain box two reasons why software companies usually do not make their source code
publicly available. Source code is the code they wrote to create the software.

A

 Algorithms cannot be copyrighted; and therefore need to be protected to
preserve commercial advantage;
 Copyright of code; the company has paid for development of the code and
therefore own the code. They may not want others to have access to what
they have developed;
 Hacking/cyber security; hackers could identify vulnerabilities in the source
code and use them to create targeted attacks;
 So third parties cannot insert/modify code and pass it off as original; as it
affects profitability;

125
Q

Is black 0

A

ye

126
Q

Describe one difference between system software and application software.

A

System software manages the computer hardware/application software whereas application software is for end-user tasks

127
Q

Many organisations provide free public access to a wireless network. box
Explain three ethical, legal or data privacy issues that an organisation should be
aware of when allowing this access.

A

 Websites – any inappropriate websites ie pornography, drugs, guns,
terrorism etc. e.g. is it acceptable for the organisation to allow access to this
sort of material when you can’t control who is accessing the service?
 Time – limit amount of time, they may not want to provide indefinite access
or may want to charge for access after the time limit has expired.
 Preventing file sharing and illegal sharing\use of copyrighted materials.
 Accountability – identification of users and actions on a network by
preventing anonymous access.
 Prevention of illegal activities such as terrorism and fraud.
 The responsibility to keep children safe and protected.
 Responsibility to keep users (customers) data safe and secure.
 Spoofing of websites, phishing. Responsibility of organisation to put some
kind of protection in place, eg filtering of known fraudulent sites.
 Recording of private messages or details if not encrypted.
 Recording of usernames and passwords that the user may also use to
access other systems.
 Responsibility of organisation to secure their systems from possible attack.
 Sales and marketing – providing sales leads to market products

128
Q

hex more or less space

A

same

129
Q

Explain why it would not be appropriate for the café to use MAC address filtering on
their wireless network.

A

Network is made available to members of the public;

Won’t know the MAC addresses for (most) of the devices connecting to the network