Comp 1002 Pre-Midterm Flashcards
What are the 4 steps in the data processing cycle?
Input -> Process -> output ->Storage
Describe the “input” step in the data processing cycle
raw data is inputted from periphery devices, hardware, network etc in a format the computer understands. This data is not usable by humans
Describe the “Processing” step in the data processing cycle
Software program receives data stream and uses pre-programmed instructions that tell the computer how to convert the raw data into useful information
Describe the “output” step in the data processing cycle
Depending on software instructions various types of output and information can be generated such as a picture, editable text file, graphics
Describe the “storage” step in the data processing cycle
Data has been processed by the into information can be stored as a data file for future re-use
What are the 3 characteristics of data so that it can be stored?
Unambiguous - mist be able to ifferentiate between different states
Consistent - must be able to consistently represent data using different elsectronic and mechanical components
flexible - Must be able to represent all the desired data types
What are 3 ways that values/states can be represented via electronic or mechanical methods?
Electronic - circuits
Mechanical CD/DVD/Blueray and disk drives
What is a bit and how is it denoted?
one binary digit - either a 1 or a 0 (b)
What is a byte and how is it denoted?
8 bits (B)
Whats the difference between hardware and software?
tangible vs intangible
What does the motherboard do?
Central element of a computers main processing hardware (also known system board or main board). The motherboard hosts the CPU, memory, clock, storage controllers an expansion slots as well as connecting circuitry betweeen them
What is read only memory (ROM)?
non-volatile memory used to start up a computer using either BIOS or EFI that is stored in the CMOS
What does BIOS stand for?
Basic input output system
What does EFI stand for/ what it is???
Extensible firmware interface - used for starting up a computer
What is the difference between BIOS and EFI?
EFI is more advanced and supports 32 bit an 64 bit operating sytems where BIOS was designed for `16 bit. BIOS is text interface only where as EFI can you use GUI interfaces
What is CMOS and what does it stand for?
Complimentary metal oxide semiconductor - Stores system configuration and is run by a battery on the main board
What are 3 storage hardware options?
Magnetic, Optical and Solid state storage
What are some examples of magnetic storage options?
Hard Drive, Floppy Disk or Tape. Stores the equivalent on 1s and 0s as as positvely or negatively charged particles
What is an example of circuit storage?
Solid state drives, USBs or memory cards. Stores the equivalent of 1s and 0s as open circuits and closed circuits
What is an example of Optical storage?
CDs, Blurays and DVDs. Stores data as light and dark spots on the disk. Lasers reflecting off the pits an lans provides the equivalent of 1s and 0s
What is RAM?
Temporary “working area” for processor. Since reading off the hard drive is too slow RAM is used to load program files when launching programs. From the RAM instructions or data is sent to the cache memory on the processor.
What is the micro-processor?
Teh brain of the computer (also known as CPU). Performs the arithmetic computations and logical comparisons to manipulate data into information. The CPU contains two parts - Control unit and Arithmetic/logic unit (ALU)
What does the Control unit (CU) and Arithmetic/Logic Unit (ALU) do?
in the CPU the CU fetches instructions and data and the ALU performs the instructions
What is cache memory
Memory inside the processor, very fast, expensive and temporary memory used to hold instructions for processing. The processor predicts what data is needed and load it from the RAM onto the cache. Cache memory. Often the biggest difference between expensive and cheap processors
What is clock speed?
The number of transactions per second a CPU can perform
What is turbo boost?
allows a CPU to temporarily increase clock speed - creates more heat which if allowed to buil up will cause the computer to crash
What is hyper threading?
duplicates certain part of the processor to allow parallel proccessing ie when feeding info to the processor there is sometimes very small (billio9nth of a second lags), by adding another “feeder” to the processor it increase processing speed becasue during the lags the second “feeder” will give data
What is 64 bit vs 32 bit
determines the amount of data that a processor can process
What is a thudnerbolt port?
Combines PCI express and DisplayPort to allow simple connections of external harddrives and extra displays with 20+ GBPS speed
Why do we need an operating system>?
Manages acces to the computer hardware so programs can use it without developers having to worry about it. The oS provides a consistent environment for applications to run in a varietyy of hardware configurations
What does API stand for?
Application Programming Interface
What does the OS do?
Provides a user interface, Manages system harware for the applications, manages memeory allocation and protection, manages system hardware, managers processor resources such (multitasking), Manages aditional peripheral devices, manages system security and integrity, returns messages to the user as needa bout the system
What are some examples of user interfaces?
Command line interface (CLI) such as powershell or DOS - inputs are done through the computer
GUI - input via mouse
What does “pre-emptive” refer to in relation to multitasking an the processor?
tasks can be interrupted (no matter what the task was trying to perform) so that other tasks can be processed
What’s the difference between hyper threading and multi-threading?
They are not related.
hyper threading allows comps to process a little faster via reducing downtime between feeding inputs to the processor
Multi threading allows tasks to run independently so that independant threads can handle separate parts of a process ie load different elements of a web page or manage screen redraws/ mouse inputs while other processes are happening - each of these threads can be multitasked
Whats multiprocessing?
Supported by modern OS’ but traditionally was done by the motherboard with multiple processor slots but now multiple processors are incorporate into single packaeges referred to as cores, individual processes or threads can be run simultaneously on each processor/core
Whats a benefit of virtualization?
Virtualization creates a a virtual instance of an OS so you dont have to worry about corrupting computer settings
What is a windows domain account?
An account created on servers and can be used to access computers belonging to that company
Microsoft accounts are created online T or F?
True
What is a jump list?
list from the start bar or task bar that lets you “jump” to other apps etc
What is continuum?
The concept that applications and OS can adjust their interface and functionality to suit the device
What is tablet mode?
implementation of continuum in windows for convertible devices that to adjust when the keyboard is disconnected
In windows what is timeline?
shows all your past activities and can sync between your devices if you have a microsoft account
What are some benefits to virtual machines?
Allows you to extend your workplace to organize and access groups of windows. Using Timeline you can button you can add and switch desktops and move applications between desktops
How does the snap feature work when you drag a window to the edge versus the the corner of the screen?
Drag to the edge re-sizes to 50% and the corner resizes to 25%.
What is windows sandbox?
Runs an aenvironement that allows you to run a mini virtual desktop
What is sandbox useful for?
USed ot test/run temporary or risky applications and visit risky websites
What is type two virtualization (this is a guess based off the notes) ***
Runs on top of the existing OS. The host app is on top of that and then a guest OS running guest apps. All of the above is over the underlying infrastructure.
What is type one virtualization? ***
Infrastructure with a hypervisor an multiple guest OS’ running at the same time each running multiiple guest apps
What is containers? ***
Applications that are isolated but share an underlying operating system.
Higher density than VMs because there is only one instance of the OS
More isolated and portable than applications installed directly on the OS.
what is a file?
A collection of data with a name and a physical and logical location
What is a file system?
Methods/data structures that operating systems use to track files on a storage device
What are directory files?
Stores info about the files including other directory files - their location, name and metadata
does each folder have their own directory file or nah?
Oh yeah bud each file has its own directory file, how else would the computer locate stuff?
What are the files systems that are run for computers and why? ***
NTFS (Windows)
APFS (MAC)
Ext4 (Linux)
bruh man dood Im not really sure why but probs because they are the gamers that invented them for their own purposes - right speed, compression, security and encryption features
What is formatting? And why is it SCARY?
Formatting is prepping your device to to store data and choosing a file system> its Scary because it will wipe all information on the media (the storage device)
What the max file name is?
260…. for now soon to be much, much bigger like 10k or somthing
What is a filename extension?
3-5 character at the end of the file .txt for examp. Is added by the program and is what Windows uses to determine the default app to open the file. (defauolt apps can be changed under settings > Apps > Default Apps
What are 4 FILE properties and and attributes?
read-only
hidden
compressed
encrypted
What is sequential selection?
Hold the first object in list and hold the shift key - click the last item
What is non contiguous selection?
Hold the control key and click on an object to select or de-select
What does holing CTRL while dragging a file do?
File is copied
What does holding SHIFT key while dragging do?
File is moved
What does Right drag do and HOW on EARTH do you do it?
Results in in context sensitive sub menu (recommended) over other moving/copying shortcuts. You do it by right clicking, duh.
Which is older, Windows settings or the control panel?
Ackshually its called windows 10 Settings and it therefroe it newer than that windows 7 control panel GARBAGE
What is under Display related settings?
Text and app scaling to better support high res displays
Notification settings - what app can notify you and about what?
Tablet mode - auto or nah?
Multitasking - Snap functioanlity and virtual desktops
Focus assist - li it notifications
POwert and battery - sleep mode settings and battery optimizations
Whats “the problem” with encryption?
If one party picks a key and transmits it it could be intercepted\
If both parties always use the same key it could eventually be determined
What is Public key encryption?
A “public” key is created by multiplying 2 large prime numbers and the initial 2 numbers become the key. The owner of this key can make it public while still guaranteeing secure communication
- both parties need to know the algorithm and one party needs to know the public key and the other party knows the private key
How does online banking use HTTP encryption?
Combo of piblic and private key
- browser determines it is connecting to a secure siteand receives a certificate from the bank
- 3rd party confirms validity of the certificate
- Browser retrieves the public key from the certificate
- browser randomly generates 256 bit symmetric encryption key
- Browser uses the public key to encrypt the key it just generated and sends it back to the bank server
- Bank decrypts the symmetric key using their private key
- Can now encrypt using symmetric key encryption
- Key is discarded when the session ends
What is EFS (encryped File System?)
for encrypting folders/files - right click on folder -> properties -> advanced put a checkmark next to encrypt contents to secure the data
BitLocker - what it is?
On windows 10 enterprise and Pro it allows for full volume encryption,
What is uner Project and Sharing?
Allow other deviced to project their screen to this device, allow phones to sen messaged to your computer, share with nearby devices
Why is Windows file access control not totally effective?
There are physical access loopholes that people can exploit
What is the so called “sniffer data”?
Can read data sent over networks
What is an algorithm?
Mathmatical formula that can be used ot scramble data and has an associated formula that can be used to de-scramble the ata
What is a “key” with encryption context?
A number or pair of numbers used in the algorithm along with the data
What are 3 layers of security used to protect the computer and its data?
- Account and password
- Account Type restrictions
- File access control (files system controls for limmited access and file encryption)
What are 3 sources of login accounts?
Local - username and pasword stored on the comp
Microsoft account - created online and can be used among numerous PCs
A domain account - is created on servers at your workplace an can be used to access computers belonging to the company
How is a microsoft account authenticated? What are the benefits of a microsoft account?
Email address authentication. Benefits include complete integration of all microsoft services into a single account between all devices
What privileges does the administrator account type have?
Create, changes and deletes user accounts and groups
Installs applications and programs
Sets folder sharing and permissions
Full access to all files
Grants rights to other accounts and themselves
Installs or removes hardware devices
Cannot be restricted
What is DefaultAccount & WDAGUtility?
A system created account used by the OS for pacific tasks
Why are standard accounts limited?
More security AND so a virus can only do as much damage as you can
To remove permission to a folder do you have to remove inheritance or nah man due brah?
Yeah you friggen do. Thems the rules.
Where on earf is are the permissions assigned?
in the properties of an object. right click on the volume, folder or file and ra-ra-right click that shee > Choose properties > Select the security tab
What are the 3 “cardinal” rules of file security?
- When removing inheritance, never choose “remove all inherited permissions” because you is risking locking yourself out of the folder
II) Never use the deny permission. Manage groups better you dum dum head because it is too difficult to troubleshoot. Just manage your groups better to allow access etc
C Never use advanced permissions - way too granular, way too difficult to troubleshoot
What are the steps to resolve a locked out account based on the assumption that there is an attack coming from within the network?
- Disconnect yo compooter form network to prevent it from continually being locked out
- Use local security console policy console to navigate locale polices > Audit policy. Enable auditing of Successes and failure events for account logon events.
- Reconnect to the network and allow that attack to continue
- Disconnect a second time
- log in and open computer management console
- Navigate to Event Viewer > Window Logs > Security and search for a logon failure event
- Look through the description at the bottom of the window for Network Information > Workstation. That will show the name of the attackinf computer.
What are the requirements to build a home network?
Network adapter - Provide wired/wireless connectivity to the network
Connection Media - Wired cables or wireless
Aggregation Device - Wireless access point / switch
Hey I have a question for you, you retard
Do you know what overlapping channels are? Didnt think so. Figure it out. Week 8 slide 4 or something
What connects to a switch?
The devices that want to share info, could also be a wireless router or somethin
What is an IP address
When connecting to the internet your device needs to be a unique combination of 4 numbers each between 0 and 255
What is IPv6?
The “new IP address that will alllow for billions and billions and octetiliions and grillions and quadreceticllions and googillions of unique addreses
What is DHCP and what it do?
Dynamic Host Configuration Protocol - Server sends a new compooter the necessary addresses required to function on the network - IP address, DNS (Telerphone book of the internet), Gateway - Door out of the current network to the rest of the worl
What a router do?
Used to connect 2 seperate networks and manage the connection between them. For Home use that it keeps your network separate form the internet and allows the use of private addressing
What is NAT?
Network Address Translation - Converting provate IP addresses on your home network to public ones.
What are the 7 network layers in OSI model?
Physical layer - Wired ethernet, wireless
Data link layer - Switching - SMC, D-link, Linksys
Network layer - Routing, Cisco, Juniper
Transport layer - Windows, MacOS, Linux
Session Layer - ???
Presentation Layer - different encryption methods
Application layer - Internet Explorer, Chrome, firefox
What bandwidth is though?
Ho wmuch data can move from point A to point B in a certain time
Latency is what?
How fast that data moves from one point to another (delays etc)
What are sharing rights?
restrictions based on access through a network
What are Security rights?
restrictions based on local or network access and apply in addition to sharing rights - more restircitve
Where can you track what is shared and who is accessing it?
Computer management tool
Whats an advantage of the cloud?
You only pay for what you use
What is SaaS?
Software as a Service
What is IaaS?
Infrastructure as a service ie servers, you pay for what you use and can scale up and down as needed
What is Paas?
Platform as a Service - a blend of SaaS and LaaS - services are provided and already configured
What are the 4 cornerstones of system protection?
Virus and Malware scanning - ensure that something is installed and up to date
Firewall - Monitor incoming and oputgoing connections
Backup - the only Frricking way to fully protect your data
System Updates - Winows update or OS updated to ensure all apps are up to date
What is System Image?
snapshot of the entiore system at a moment in time for back up reasons - but it quickly becomes outdated and mut be supplement with an actual data backup
What is a virus
Code that replicates and often causes damooge
What is MAlware?
Code that can corrupt data and program files, compromises privacy and secure transactions, Overloads networks and servers, includes viruses but also code that doesnt self replicate
What is a firewall?
Protective Boundary between local and remote networks or between your computer and and a network
Restricts what is transmitted between our PC and Internet /LAN. Can be hardware and software
What are the general steps to troublshooting?
Define what exactly is the problem go from big picture to small detail
Dont make it worse than when you started - Documentt and test ideas one at a time, avoid the shotgun approach, clean up/undo after unsuccessful idears
What are some steps to take when troubleshooting hardware failures?
Determine the damaged components - process of elim, may be obvious odours/burns
Power off then blow out accumulated dust
Check for loose RAM, Pwer, datat cables and reseat
Ensure no diskette in floopy drive or USB kety plugged in ( May cause PC to hang if BIOS set to boot from either)
Keep device rivers up to date
How to troublshoot some software?
Just try uninstalling it, rebooting and re-installing it
May need program compatilibility mode if an older version of windows
Determin what changed since it last worked ie hardware, upgrades, patch, OS upgrade or new app installed
Should I look at the last 8 slides of lesson 10???
Yes.