Comp 1002 Pre-Midterm Flashcards

1
Q

What are the 4 steps in the data processing cycle?

A

Input -> Process -> output ->Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the “input” step in the data processing cycle

A

raw data is inputted from periphery devices, hardware, network etc in a format the computer understands. This data is not usable by humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the “Processing” step in the data processing cycle

A

Software program receives data stream and uses pre-programmed instructions that tell the computer how to convert the raw data into useful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the “output” step in the data processing cycle

A

Depending on software instructions various types of output and information can be generated such as a picture, editable text file, graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the “storage” step in the data processing cycle

A

Data has been processed by the into information can be stored as a data file for future re-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 characteristics of data so that it can be stored?

A

Unambiguous - mist be able to ifferentiate between different states
Consistent - must be able to consistently represent data using different elsectronic and mechanical components
flexible - Must be able to represent all the desired data types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 ways that values/states can be represented via electronic or mechanical methods?

A

Electronic - circuits

Mechanical CD/DVD/Blueray and disk drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a bit and how is it denoted?

A

one binary digit - either a 1 or a 0 (b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a byte and how is it denoted?

A

8 bits (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats the difference between hardware and software?

A

tangible vs intangible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the motherboard do?

A

Central element of a computers main processing hardware (also known system board or main board). The motherboard hosts the CPU, memory, clock, storage controllers an expansion slots as well as connecting circuitry betweeen them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is read only memory (ROM)?

A

non-volatile memory used to start up a computer using either BIOS or EFI that is stored in the CMOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does BIOS stand for?

A

Basic input output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does EFI stand for/ what it is???

A

Extensible firmware interface - used for starting up a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between BIOS and EFI?

A

EFI is more advanced and supports 32 bit an 64 bit operating sytems where BIOS was designed for `16 bit. BIOS is text interface only where as EFI can you use GUI interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CMOS and what does it stand for?

A

Complimentary metal oxide semiconductor - Stores system configuration and is run by a battery on the main board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are 3 storage hardware options?

A

Magnetic, Optical and Solid state storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some examples of magnetic storage options?

A

Hard Drive, Floppy Disk or Tape. Stores the equivalent on 1s and 0s as as positvely or negatively charged particles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an example of circuit storage?

A

Solid state drives, USBs or memory cards. Stores the equivalent of 1s and 0s as open circuits and closed circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an example of Optical storage?

A

CDs, Blurays and DVDs. Stores data as light and dark spots on the disk. Lasers reflecting off the pits an lans provides the equivalent of 1s and 0s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is RAM?

A

Temporary “working area” for processor. Since reading off the hard drive is too slow RAM is used to load program files when launching programs. From the RAM instructions or data is sent to the cache memory on the processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the micro-processor?

A

Teh brain of the computer (also known as CPU). Performs the arithmetic computations and logical comparisons to manipulate data into information. The CPU contains two parts - Control unit and Arithmetic/logic unit (ALU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does the Control unit (CU) and Arithmetic/Logic Unit (ALU) do?

A

in the CPU the CU fetches instructions and data and the ALU performs the instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is cache memory

A

Memory inside the processor, very fast, expensive and temporary memory used to hold instructions for processing. The processor predicts what data is needed and load it from the RAM onto the cache. Cache memory. Often the biggest difference between expensive and cheap processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is clock speed?

A

The number of transactions per second a CPU can perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is turbo boost?

A

allows a CPU to temporarily increase clock speed - creates more heat which if allowed to buil up will cause the computer to crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is hyper threading?

A

duplicates certain part of the processor to allow parallel proccessing ie when feeding info to the processor there is sometimes very small (billio9nth of a second lags), by adding another “feeder” to the processor it increase processing speed becasue during the lags the second “feeder” will give data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is 64 bit vs 32 bit

A

determines the amount of data that a processor can process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a thudnerbolt port?

A

Combines PCI express and DisplayPort to allow simple connections of external harddrives and extra displays with 20+ GBPS speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why do we need an operating system>?

A

Manages acces to the computer hardware so programs can use it without developers having to worry about it. The oS provides a consistent environment for applications to run in a varietyy of hardware configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does API stand for?

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does the OS do?

A

Provides a user interface, Manages system harware for the applications, manages memeory allocation and protection, manages system hardware, managers processor resources such (multitasking), Manages aditional peripheral devices, manages system security and integrity, returns messages to the user as needa bout the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are some examples of user interfaces?

A

Command line interface (CLI) such as powershell or DOS - inputs are done through the computer
GUI - input via mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does “pre-emptive” refer to in relation to multitasking an the processor?

A

tasks can be interrupted (no matter what the task was trying to perform) so that other tasks can be processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What’s the difference between hyper threading and multi-threading?

A

They are not related.
hyper threading allows comps to process a little faster via reducing downtime between feeding inputs to the processor
Multi threading allows tasks to run independently so that independant threads can handle separate parts of a process ie load different elements of a web page or manage screen redraws/ mouse inputs while other processes are happening - each of these threads can be multitasked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Whats multiprocessing?

A

Supported by modern OS’ but traditionally was done by the motherboard with multiple processor slots but now multiple processors are incorporate into single packaeges referred to as cores, individual processes or threads can be run simultaneously on each processor/core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Whats a benefit of virtualization?

A

Virtualization creates a a virtual instance of an OS so you dont have to worry about corrupting computer settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a windows domain account?

A

An account created on servers and can be used to access computers belonging to that company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Microsoft accounts are created online T or F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a jump list?

A

list from the start bar or task bar that lets you “jump” to other apps etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is continuum?

A

The concept that applications and OS can adjust their interface and functionality to suit the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is tablet mode?

A

implementation of continuum in windows for convertible devices that to adjust when the keyboard is disconnected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In windows what is timeline?

A

shows all your past activities and can sync between your devices if you have a microsoft account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are some benefits to virtual machines?

A

Allows you to extend your workplace to organize and access groups of windows. Using Timeline you can button you can add and switch desktops and move applications between desktops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does the snap feature work when you drag a window to the edge versus the the corner of the screen?

A

Drag to the edge re-sizes to 50% and the corner resizes to 25%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is windows sandbox?

A

Runs an aenvironement that allows you to run a mini virtual desktop

47
Q

What is sandbox useful for?

A

USed ot test/run temporary or risky applications and visit risky websites

48
Q

What is type two virtualization (this is a guess based off the notes) ***

A

Runs on top of the existing OS. The host app is on top of that and then a guest OS running guest apps. All of the above is over the underlying infrastructure.

49
Q

What is type one virtualization? ***

A

Infrastructure with a hypervisor an multiple guest OS’ running at the same time each running multiiple guest apps

50
Q

What is containers? ***

A

Applications that are isolated but share an underlying operating system.
Higher density than VMs because there is only one instance of the OS
More isolated and portable than applications installed directly on the OS.

51
Q

what is a file?

A

A collection of data with a name and a physical and logical location

52
Q

What is a file system?

A

Methods/data structures that operating systems use to track files on a storage device

53
Q

What are directory files?

A

Stores info about the files including other directory files - their location, name and metadata

54
Q

does each folder have their own directory file or nah?

A

Oh yeah bud each file has its own directory file, how else would the computer locate stuff?

55
Q

What are the files systems that are run for computers and why? ***

A

NTFS (Windows)
APFS (MAC)
Ext4 (Linux)
bruh man dood Im not really sure why but probs because they are the gamers that invented them for their own purposes - right speed, compression, security and encryption features

56
Q

What is formatting? And why is it SCARY?

A

Formatting is prepping your device to to store data and choosing a file system> its Scary because it will wipe all information on the media (the storage device)

57
Q

What the max file name is?

A

260…. for now soon to be much, much bigger like 10k or somthing

58
Q

What is a filename extension?

A

3-5 character at the end of the file .txt for examp. Is added by the program and is what Windows uses to determine the default app to open the file. (defauolt apps can be changed under settings > Apps > Default Apps

59
Q

What are 4 FILE properties and and attributes?

A

read-only
hidden
compressed
encrypted

60
Q

What is sequential selection?

A

Hold the first object in list and hold the shift key - click the last item

61
Q

What is non contiguous selection?

A

Hold the control key and click on an object to select or de-select

62
Q

What does holing CTRL while dragging a file do?

A

File is copied

63
Q

What does holding SHIFT key while dragging do?

A

File is moved

64
Q

What does Right drag do and HOW on EARTH do you do it?

A

Results in in context sensitive sub menu (recommended) over other moving/copying shortcuts. You do it by right clicking, duh.

65
Q

Which is older, Windows settings or the control panel?

A

Ackshually its called windows 10 Settings and it therefroe it newer than that windows 7 control panel GARBAGE

66
Q

What is under Display related settings?

A

Text and app scaling to better support high res displays
Notification settings - what app can notify you and about what?
Tablet mode - auto or nah?
Multitasking - Snap functioanlity and virtual desktops
Focus assist - li it notifications
POwert and battery - sleep mode settings and battery optimizations

67
Q

Whats “the problem” with encryption?

A

If one party picks a key and transmits it it could be intercepted\
If both parties always use the same key it could eventually be determined

68
Q

What is Public key encryption?

A

A “public” key is created by multiplying 2 large prime numbers and the initial 2 numbers become the key. The owner of this key can make it public while still guaranteeing secure communication
- both parties need to know the algorithm and one party needs to know the public key and the other party knows the private key

69
Q

How does online banking use HTTP encryption?

A

Combo of piblic and private key

  1. browser determines it is connecting to a secure siteand receives a certificate from the bank
  2. 3rd party confirms validity of the certificate
  3. Browser retrieves the public key from the certificate
  4. browser randomly generates 256 bit symmetric encryption key
  5. Browser uses the public key to encrypt the key it just generated and sends it back to the bank server
  6. Bank decrypts the symmetric key using their private key
  7. Can now encrypt using symmetric key encryption
  8. Key is discarded when the session ends
70
Q

What is EFS (encryped File System?)

A

for encrypting folders/files - right click on folder -> properties -> advanced put a checkmark next to encrypt contents to secure the data

71
Q

BitLocker - what it is?

A

On windows 10 enterprise and Pro it allows for full volume encryption,

72
Q

What is uner Project and Sharing?

A

Allow other deviced to project their screen to this device, allow phones to sen messaged to your computer, share with nearby devices

73
Q

Why is Windows file access control not totally effective?

A

There are physical access loopholes that people can exploit

74
Q

What is the so called “sniffer data”?

A

Can read data sent over networks

75
Q

What is an algorithm?

A

Mathmatical formula that can be used ot scramble data and has an associated formula that can be used to de-scramble the ata

76
Q

What is a “key” with encryption context?

A

A number or pair of numbers used in the algorithm along with the data

77
Q

What are 3 layers of security used to protect the computer and its data?

A
  1. Account and password
  2. Account Type restrictions
  3. File access control (files system controls for limmited access and file encryption)
78
Q

What are 3 sources of login accounts?

A

Local - username and pasword stored on the comp
Microsoft account - created online and can be used among numerous PCs
A domain account - is created on servers at your workplace an can be used to access computers belonging to the company

79
Q

How is a microsoft account authenticated? What are the benefits of a microsoft account?

A

Email address authentication. Benefits include complete integration of all microsoft services into a single account between all devices

80
Q

What privileges does the administrator account type have?

A

Create, changes and deletes user accounts and groups
Installs applications and programs
Sets folder sharing and permissions
Full access to all files
Grants rights to other accounts and themselves
Installs or removes hardware devices
Cannot be restricted

81
Q

What is DefaultAccount & WDAGUtility?

A

A system created account used by the OS for pacific tasks

82
Q

Why are standard accounts limited?

A

More security AND so a virus can only do as much damage as you can

83
Q

To remove permission to a folder do you have to remove inheritance or nah man due brah?

A

Yeah you friggen do. Thems the rules.

84
Q

Where on earf is are the permissions assigned?

A

in the properties of an object. right click on the volume, folder or file and ra-ra-right click that shee > Choose properties > Select the security tab

85
Q

What are the 3 “cardinal” rules of file security?

A
  1. When removing inheritance, never choose “remove all inherited permissions” because you is risking locking yourself out of the folder
    II) Never use the deny permission. Manage groups better you dum dum head because it is too difficult to troubleshoot. Just manage your groups better to allow access etc
    C Never use advanced permissions - way too granular, way too difficult to troubleshoot
86
Q

What are the steps to resolve a locked out account based on the assumption that there is an attack coming from within the network?

A
  1. Disconnect yo compooter form network to prevent it from continually being locked out
  2. Use local security console policy console to navigate locale polices > Audit policy. Enable auditing of Successes and failure events for account logon events.
  3. Reconnect to the network and allow that attack to continue
  4. Disconnect a second time
  5. log in and open computer management console
  6. Navigate to Event Viewer > Window Logs > Security and search for a logon failure event
  7. Look through the description at the bottom of the window for Network Information > Workstation. That will show the name of the attackinf computer.
87
Q

What are the requirements to build a home network?

A

Network adapter - Provide wired/wireless connectivity to the network
Connection Media - Wired cables or wireless
Aggregation Device - Wireless access point / switch

88
Q

Hey I have a question for you, you retard

A

Do you know what overlapping channels are? Didnt think so. Figure it out. Week 8 slide 4 or something

89
Q

What connects to a switch?

A

The devices that want to share info, could also be a wireless router or somethin

90
Q

What is an IP address

A

When connecting to the internet your device needs to be a unique combination of 4 numbers each between 0 and 255

91
Q

What is IPv6?

A

The “new IP address that will alllow for billions and billions and octetiliions and grillions and quadreceticllions and googillions of unique addreses

92
Q

What is DHCP and what it do?

A

Dynamic Host Configuration Protocol - Server sends a new compooter the necessary addresses required to function on the network - IP address, DNS (Telerphone book of the internet), Gateway - Door out of the current network to the rest of the worl

93
Q

What a router do?

A

Used to connect 2 seperate networks and manage the connection between them. For Home use that it keeps your network separate form the internet and allows the use of private addressing

94
Q

What is NAT?

A

Network Address Translation - Converting provate IP addresses on your home network to public ones.

95
Q

What are the 7 network layers in OSI model?

A

Physical layer - Wired ethernet, wireless
Data link layer - Switching - SMC, D-link, Linksys
Network layer - Routing, Cisco, Juniper
Transport layer - Windows, MacOS, Linux
Session Layer - ???
Presentation Layer - different encryption methods
Application layer - Internet Explorer, Chrome, firefox

96
Q

What bandwidth is though?

A

Ho wmuch data can move from point A to point B in a certain time

97
Q

Latency is what?

A

How fast that data moves from one point to another (delays etc)

98
Q

What are sharing rights?

A

restrictions based on access through a network

99
Q

What are Security rights?

A

restrictions based on local or network access and apply in addition to sharing rights - more restircitve

100
Q

Where can you track what is shared and who is accessing it?

A

Computer management tool

101
Q

Whats an advantage of the cloud?

A

You only pay for what you use

102
Q

What is SaaS?

A

Software as a Service

103
Q

What is IaaS?

A

Infrastructure as a service ie servers, you pay for what you use and can scale up and down as needed

104
Q

What is Paas?

A

Platform as a Service - a blend of SaaS and LaaS - services are provided and already configured

105
Q

What are the 4 cornerstones of system protection?

A

Virus and Malware scanning - ensure that something is installed and up to date
Firewall - Monitor incoming and oputgoing connections
Backup - the only Frricking way to fully protect your data
System Updates - Winows update or OS updated to ensure all apps are up to date

106
Q

What is System Image?

A

snapshot of the entiore system at a moment in time for back up reasons - but it quickly becomes outdated and mut be supplement with an actual data backup

107
Q

What is a virus

A

Code that replicates and often causes damooge

108
Q

What is MAlware?

A

Code that can corrupt data and program files, compromises privacy and secure transactions, Overloads networks and servers, includes viruses but also code that doesnt self replicate

109
Q

What is a firewall?

A

Protective Boundary between local and remote networks or between your computer and and a network
Restricts what is transmitted between our PC and Internet /LAN. Can be hardware and software

110
Q

What are the general steps to troublshooting?

A

Define what exactly is the problem go from big picture to small detail
Dont make it worse than when you started - Documentt and test ideas one at a time, avoid the shotgun approach, clean up/undo after unsuccessful idears

111
Q

What are some steps to take when troubleshooting hardware failures?

A

Determine the damaged components - process of elim, may be obvious odours/burns
Power off then blow out accumulated dust
Check for loose RAM, Pwer, datat cables and reseat
Ensure no diskette in floopy drive or USB kety plugged in ( May cause PC to hang if BIOS set to boot from either)
Keep device rivers up to date

112
Q

How to troublshoot some software?

A

Just try uninstalling it, rebooting and re-installing it
May need program compatilibility mode if an older version of windows
Determin what changed since it last worked ie hardware, upgrades, patch, OS upgrade or new app installed

113
Q

Should I look at the last 8 slides of lesson 10???

A

Yes.