Comp Flashcards

1
Q

What is WAP

A

Wireless access point allows wireless devices to connect to wired networks using wi-fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a switch

A

A switch is used to connect all devices to a network and a switch will send a message to its intented location in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is router

A

A router is a networking device that forwards data packets between computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a modem used for

A

A modem is used to modulate the electrical signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some ways to reduce the chance of cyber attack succeeding

A

Audit trail
Use secure operating system
Provide effective network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHat is white box penetration testing

A

White box penetration testing approach, also known as an assumed breach, clear box, or transparent box testing, is where the penetration tester has full access and complete knowledge of the target that is being tested and its features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is black box penetration testing

A

In a black box penetration test, no information is provided to the tester at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ethical hacking

A

Ethical hacking is when a person hacks into a system but doesn’t cause any harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 ways to identify vulnerabilities

A

penetration testing
Ethical hacking
commercial analysis tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a eavesdropping attack

A

Eavesdropping attack is when someone intercepts data being sent from one computer to another computer. Eavesdropping is just reading the data but not copying it or stealing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a unpatched software

A

It is basically a sofware that is very vurnerable to malware attacks because the person who made it has to see the weaknesses of his software by putting it on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shoulder surfing

A

Shouldering involves a attacker watching victim over their shoulder while they provide personal infomation (For example passcode for phone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming

A

The term pharming refers to a user being sent a fake website that the user believes is real and the users are tricked into entering their personal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing

A

Phishing is a attack in which a victim recieves a message disguised to look like it is from a reputable source (for example Bank). THe message will contain a link when clicked will trick victim into giving personal information or initiate the installation of a malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 types of cyberattacks

A

Phising
Pharming
Shoulder surfing
Unpatched software
USB device
Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantage of cloud storage

A

You are relying on third party stroage provider if company shuts down data may be lost.
Internet is required to access data
security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advantage of cloud

A

You can change to amount of storage you need at anytime

Stored data can be accessed from anywhere

Cloud storage can back up data hourly or daily so data can be restored if there is hardware failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a firewall

A

A firewall is something that sits inbetween a trusted network (e.g. Home network) and a un-trusted network (e.g. Internet) and the firewall will attempt to prevent malicious traffic entering the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a runtime error

A

A runtime error is when a program encounters issues with some operations during runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a logic error

A

A logic error is when a program does not do what it was intended to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a syntax error

A

A syntax error is where a program statement does not obey the grammatical rules of the programming language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a compiler

A

Translates a high-level program to machine code.
If a program contains a syntax error, a comprehensive list of all syntax errors is produced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 2 types of low-level language

A

Assembly language and Machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Advantage and disadvantage of Mesh

A

Advantage: Multiple path between devices
Disadvantage: Expensive, complicated to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Advantage and disadvantage of Star

A

Advantage: Reliable, no collision
Disadvantage:Expensive, central device fails = everything fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Advantage and disadvantage of ring network

A

Advantage: Fast, no data collision(one direction flow)
Disadvantage: One fail = all fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Advantage and disadvantage of bus

A

Advantage: cheap and easy
Disadvantage:
One point of failure
More devices –> slower
All devices can see the data(security risk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Name the 4 network topologies

A

Bus
Ring
Star
Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Name the 4 layers of TCP/IP model from top to bottom

A

Application
Transport
Internet
Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is IP

A

IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is UDP

A

User Datagram Protocol. Data is split into packets (as with TCP). However, this is an unreliable transmission protocol. If any packets arrive out of sequence or are missing, they are ignored. UDP is suitable where data does not have to be 100% accurate but speed is important, e.g., with some video streaming services or VOIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is TCP

A

Transmission Control Protocol (TCP) is a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is DHCP

A

Dynamic Host Configuration Protocol. Used to assign IP addresses and other configuration options to devices in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is IMAP

A

Internet Message Access Protocol. Used to synchronise a client email account with an account on a mail server. The server returns new emails (if there are any) and deletes any emails that were deleted locally on the client application. This allows a user to use multiple devices to access their email account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is POP

A

Post Office Protocol. Used to request any new emails for a specific email account. The server returns the emails (if there are any).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is SMTP

A

Simple Mail Transfer Protocol. Used to send an email to an email server. The server returns a code indicating whether or not the email could be delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is FTP

A

File Transfer Protocol. Used to upload or download a file. The server opens a data connection (over which the file will be transferred) or sends an error code if there was a problem with the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is HTTPS

A

Hypertext Transfer Protocol Secure. Sends an encrypted request for a webpage. The server returns the encrypted page or an error code if there was a problem with the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is HTTP

A

Hypertext Transfer Protocol. Used to make a request for a webpage. The server returns the page or an error code if there was a problem with the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Name the 3 types of networks and state some examples

A

PAN: Bluetooth
LAN: Office or school
WAN: Wide geographic areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Difference between compiler and interpreter

A

interpreter: translate one at a time
execution time slow
no object code produced

compiler: scans entire thing and translate it
execution time fast
object code is produced

42
Q

What does the utility software
Basic tools do?

A

Calculator, command prompt, notepad etc

43
Q

Name 4 things Operating system do

A

Processor management
Inputs, outputs, and interrupts
Memory management
Security

44
Q

Name 4 operating systems

A

Windows
MacOS
Linux
Android or IOS

45
Q

Name the 3 components in a Magnetic storage

A

platter, track and read/write head

46
Q

Factors to consider before buying secondary storage

A

Capacity
Speed
Cost
Portability
Compatibility

47
Q

What does a bus do

A

A bus transfers data and signals between components inside a computer.

48
Q

Function of accumulator

A

Stores the result of any calculation

49
Q

Function of memory data register

A

Temporarily holds the data (data values or instructions) that are read from or written to the main memory

50
Q

Function of Memory address register

A

Temporarily stores the memory addresses used when searching for data in RAM

51
Q

What is the purpose of Current instruction registers

A

Holds the current instruction that the processor is executing

52
Q

What does a clock do

A

It sends out clock signal which is used to synchronise the operations of the processor components.

53
Q

Different utility software

A

Basic tools
File management
Security tools

54
Q

Advantage and disadvantage of SSD

A

Advantage: Speed, durable
Disadvantage: Number of times it is written is limited

55
Q

How is data stored in a optical disc

A

Data is stored on the reflective surface of an optical disc. A laser is used to burn small marks into the surface and binary data is represented in the two states of pits/troughs (burns) and lands/peaks (no burn).

56
Q

Advantages and disadvantages of optical storage

A

Advantage: Portable, cheap, reliable
Disadvantage: Slow seek time, low capcity

57
Q

Advantages and disadvantages of magnetic storage

A

Advantages: Cost and capacity
Disadvantage: Not portable, very fragile

58
Q

Name the 4 secondary storages

A

Magnetic storage
Optical
SSD
Cloud

59
Q

What is the control unit responsible of

A

Ensures the execution of instructions in the correct sequence
Decodes every instruction that the processor will execute
Sends and receives control signals to and from other components
Checks that signals have been delivered successfully
Makes sure that data goes to the correct place at the correct time

60
Q

Function of ALU

A

Arithmetic calculations: addition, subtraction, division, and multiplication
Logical operations: such as AND, OR, NOT
Comparisons between values, such as greater than, less than, equal to

61
Q

What is a control bus

A

the control bus, is used to synchronise and control operations

62
Q

What is a data bus

A

data bus is used to transfer the contents to/from that location

63
Q

What is a address bus

A

address bus is used to identify the addressed location

64
Q

What does the von neumann architecture have

A

input devices
secondary storage
processor
main memory
output devices
out/in controllers

65
Q

What is a dedicated register

A

Dedicated registers serve a specific purpose in the Fetch-decode-execute cycle.

66
Q

What is a general purpose register

A

General purpose registers are used to temporarily store values generated by instructions if they need to be used again in the next instruction.

67
Q

4 characteristics of ROM

A

It is non-volatile
It is written by the computer manufacturer
Usually stores the BIOS
Smaller capacity than RAM

68
Q

What are the 4 characteristics of RAM

A

It is volatile
You can read and write to it
It is quicker to access than secondary storage
It has the largest capacity of all main memory

69
Q

What is secondary storage

A

Secondary storage is used to permanently store data such as the operating system and the user’s files.

70
Q

What is main memory

A

Main memory is where data and instructions are stored so that they can be accessed directly by the CPU.

71
Q

What is a GPU

A

A graphics processing unit (GPU) is a processor designed specifically to render graphics.

72
Q

Function of proccesser

A

The processor is the part of the computer that processes data by executing programs. It also manages the rest of the hardware.

73
Q

What is cache memory

A

Temporarily stores frequently used instructions and data

74
Q

What is non-volatile memory

A

non-volatile memory, which keeps its contents even without power

75
Q

What is volatile memory

A

volatile memory, which loses its contents when the power is removed

76
Q

3 examples of output devices

A

inkjet printer, laser printer and speaker

77
Q

State 3 examples of input device

A

mouse, keyboard, mircophone

78
Q

Explain what a multi-agent algorithm is

A

In the parallel model, one task is processed by several processors while in the multi-agent model, separate tasks or algorithms are processed by different systems (agents) to perform a particular function.

79
Q

Explain what a parallal computational model

A

In the parallel model, computer processes are distributed between two or more processors in a computer with two or more processors installed.

80
Q

Explain what a sequential computational model

A

Sequential involves following instructions in an algorithm step by step, in order, from start to finish.

81
Q

What is the 3 computational model

A

Sequential
Parallal
Multi-agent

82
Q

Name the 4 different types of encryption algorithm

A

Caeser cipher
Pigpen cipher
Vigenere cipher
Rail fence cipher

83
Q

What is asymmetric encryption

A

asymmetric encryption uses 2 keys that work as a pair to decrypt a message

84
Q

What s symmetrc encrypton

A

The same key is used to decrypt the message

85
Q

Example of a lossy compresson

A

MP3

86
Q

Name an example of an lossless compression algorithm

A

RLE

87
Q

Name an example of lossless

A

zip file

88
Q

What are the 2 types of compression methods

A

lossy and lossless

89
Q

On a sound graph what is the x axis and y axis

A

y = amplitude
x = time/seconds

90
Q

Name 2 file formats of bitmap

A

Bitmap: .bmp
PNG: .png
JPEG: .jpeg
GIF: .gif

91
Q

What is the formula of image file size

A

Width x Height x colour depth

92
Q

What is a pixel

A

A pixel is a square in a bitmap that represents a picture. Each color represents a color.

93
Q

Why is unicode preferred over ASCII

A

ASCII is limited to 256 characthers
While unicode covers all characters

94
Q

How many bits are there in hexadecimal

A

4

95
Q

What is the difference between logical shift and arithmetic

A

Logical shift can multiply and divide unsigned binary numbers
Arithmetic shift can multiply and divide signed numbers

96
Q

What is a binary overflow

A

When a binary number has more than 8 bits

97
Q

how many bits are there in one byte

A

8

98
Q

How many bits are there in one nibble

A

4

99
Q

Order this is in size increasing
byte, gigabyte, nibble, megabyte, bit, terabyte

A

bit, nibble, byte, megabyte, gigabyte, terabyte

100
Q

How do computers produce data

A

They use a transistor which produces 1s when on and 0s when off