Component 1 Flashcards

1
Q

What is software

A

Software is the non-physical layer where all the programs and applications run on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are dedicated systems?

A

Computer systems which are created to carry out one funtion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hardware?

A

The hardware of a computer makes up the physical components such as the CPU, RAM, mouse etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a computer?

A

A computer is a machine that processes data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an embedded system?

A

An embedded system is a computer which is built into other devices like microwaves. They are a type of dedicated system as they only carry out a few tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Pros of an embedded system?

A

1.More effecient
2.Cheaper
3.Easter to design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the CPU do?

A

The CPU carries out all the instructions given to it by the system and handles all the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What factors affect the power of a CPU?

A

Clock speed, number of cores and cache size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Von Neumann architecture?

A

Von Neumann architecture is how modern computers work. It breaks down how a CPU runs programs and instructions using memory addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 main componenets of a CPU?

A

The CU, ALU and Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the CU do?

A
  1. The Control Unit Coordinates the processor
  2. Decodes instructions
  3. Runs the F - D - E cycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the ALU do

A
  1. Performs logic and arithmetic calculations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Cache

A

It is a small block of very fast temporary memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the cache do?

A

It stores instructions or data most used or used recently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What the difference between L1 and L2 cache.

A

L1 cache is faster, and is in the CPU
L2 Cache is slower but has more storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 registers?

A

1.PC (Program Counter)
2.ACC (Accumulator)
3.MAR (Memory Adress Register)
4.MDR (Memory Data Register)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the MAR do?

A

Holds the memory location of the data that needs to be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the MDR do?

A

Holds the data found at the address in the MAR, or holds data which is to be transferred to primary memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what does the ACC do?

A

It is where the intermediate arithmetic and logic results are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the PC do?

A

Contains the address of the next instruction to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the CIR do?

A

The CIR is a part of the CU and contains the current instruction during decoding or execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What happens during the Fetch cycle?

A
  1. Copy memory address form the PC to the MAR
  2. Copy Instructions from the MAR into MDR
  3. Increment PC to next instruction ready for next cycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What happens during the decode cycle?

A

1.Instructions in the MDR is decoded by the CPU
2.CPU might decide to load the next step from the MAR/MDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens during the execute cycle?

A
  1. Instructions are performed
  2. Could be reading, writing or halting a program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is RAM

A

RAM is volatile memory and holds the data required for the program which is currently running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why is RAM used instead of the hard drive

A

RAM is much faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is virtual memory?

A

Virtual memory is when the RAM is full, a part of secondary storage is used as extra storage for CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why is virtual memory slower?

A

The data has to be written into secondary storage and back into RAM back and forth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is ROM

A

The ROM is a small chip on the motherboard that is non - volatile, which cannot be written to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does the ROM do?

A

The ROM stores the BIOS and stores all the instructions on how to start the computer. The CPU reads the ROM to perform checks on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What factors affect the CPU performance?

A

Clock speed, No. Of cores and cache size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is OS for?

A
  1. Allows for communication with internal and external hardware, vie device drivers.
  2. Provides UI
  3. Provides platform for applications to run
  4. Allows the computer to multi-task, by controlling memory resources/CPU
  5. Deals with file/disk management
  6. Manages system security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a driver?

A

A piece of software, wich allows the OS to communcate with intenal hardware or peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the difference between GUI and command line interface?

A
  1. GUI for normal users, it is visual
  2. GUI is simpler for people
  3. Command line is text based
  4. Command line is less resource heavy, and can be used to automate processes using scripts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is secondary vs primary storage?

A
  1. primary is the memory that the CPU can access very quickly, like RAM or caches, it is mostly volatile, but very fast.
  2. Secondary is the memory where all data is stored when not in used. It is slower but non-volatile
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are different versions of secondary storage?

A
  1. HDD - data is stored magnetically in small areas on the disk’s tracks
  2. SSD - have no moving parts, and use flash memory, so it is faster.
  3. Optical discs
  4. Magnetic tapes- for archiving as it has very low cost/GB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the pros of HDDs vs SSDs

A
  1. SSDs are faster, don’t need defragmenting, shock-proof and silent
  2. HDDs are cheaper, longer read/write life and usually higher capacity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the 3 types of utility software?

A
  1. Compression
  2. Defragmentation
  3. Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Compression software?

A
  1. reduces file size permanently/temporarily by removing data
  2. Compression files take up less space and are quicker to donwload
  3. .zip or .rar
  4. Must be extracted before use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is encryption software?

A
  1. Encrypts data to stop third-parties from accessing it.
  2. To decrypt, a special key is needed, which is then used to bring the data back.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is defragmentation software?

A
  1. Reorganises data on the hard drive, by putting fragmented files back together.
  2. Moves the files to collect all free space together, to prevent further fragmentation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Why do we need defragmentation software?

A
  1. As files are moved, deleted or changed, small gaps appear on the disk
  2. So when new files are written, the OS splits it into smaller blocks to fill the gaps. This causes fragmentation.
  3. This fragmentation makes reading/writing slower.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is an overflow error?

A

It is when a number has too many bits, resolve it by storing the extra bit elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which way is multiple and divide when shifting binary

A

Left is multiply, for every place shifted it doubles
Right is the opposite, so divide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is 1 Hexadecimal digit equal to?

A
  1. Denary 1-15
  2. A nibble
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Why do programmers prefer Hex?

A
  1. Simpler to remember large numbers
  2. Less chance of input error
  3. Easier to convert between binary and hex than binary and denary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a character set?

A
  1. collections of characters that a computer recognises from their binary representation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are 2 examples of character sets?

A

ASCII and Unicode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is ASCII?

A
  1. A character set in the english speaking world
  2. Each ASCII character is given a 7 bit code, so it can represent 128 characters, including commands.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How do you work out the size of a text file?

A

File size = no. of bits per character x no. of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is colour depth?

A

The number of bits per pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How do you work out the number of colours in a bitmap?

A

No. of colours = 2^n

Where n = no. of bits per pixel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What colour depth do most devices use?

A

24 bit colour depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How do you find the file size of an image?

A

file size = image resolution x colour depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is metadata?

A

The information stored in an image file, which helps the computer recreate the image on screen from binary data in each pixel.
Includes - file format, height, width, colour depth and resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How is sound stored digitally?

A
  1. Sound is recorded by an analogue signal microphone
  2. This is converted into digital data by analogue to digital converters.
  3. The process is called sampling.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How does sampling work?

A
  1. We sample the amplitude of the wave at regular intervals, once the device has sampled it, the curve is recreated using blocks of data from where each sample was taken.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

what is bit depth for sound?

A

Number of bits available for each sample

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How do you calculate the size of a sound file?

A

file size = sample rate x bit depth x length(seconds)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What are the uses of compression?

A
  1. Smaller files take up less space
  2. Streaming and downloading from the internet is faster as it uses less bandwidth
  3. Allows web pages to load quicker
  4. Allows to send the same content with a smaller file size by email.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What are the 2 types of compression?

A

1.Lossy - Works by permanently remobing data from the file, this limits the number of bits the file needs, so reduces the size.
2.Lossless - makes the file smaller by temporarily removing data to store the file and restores it when opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What are the pros of lossy?

A
  1. greatly reduces file size
  2. takes up less bandwidth
  3. Commonly used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the cons of lossy?

A
  1. loses data
  2. can’t be used on text or software files
  3. Worse quality than original, although usually unnoticable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are common lossy file types?

A
1.JPEG 
2.AAC
3.MP3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What are the pros of lossless ?

A
  1. data is only removed temporarily
  2. Can be decompressed
  3. Can be used on text and software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the cons of lossless?

A
  1. smaller reduction in file size.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are examples of lossless file types?

A
1. FLAC
2. TIFF
3. PNG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is a PAN?

A

A personal area network (PAN) connects electronic devices within a user’s immediate area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a LAN?

A

1.A Local Area Network, covers a small geographical area on a single site, and connects devices within it.
2.All the hardware for a LAN is owned by the organisation that uses it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Why use a LAN?

A
  1. Sharing files is easier
  2. Share hardware
  3. Internet can be shared
  4. Can install updates all at once
  5. Communication ischeap and easy
  6. User accounts can be stored centrally, so anyone can login from anywhere in the LAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is a WAN?

A

A Wide Area Network, it covers a large geographical area, connects LANs

72
Q

Why do companies hire WAN infrastructure?

A

WANs are very expensive compared to LANs, so they hire dedicated Telecommunication companies

73
Q

How are WANs connected?

A
  1. fibre/copper telephone lines
  2. satellites
  3. radio
74
Q

WHAT IS AN NIC

my jiggydrilla12345.

A
  1. A Nework Interface Controller, allows devices to connect to a network.
  2. Usually built into the motherboard
  3. Used for wired and wireless conections.
75
Q

What is a switch?

A

A switch connects devices on a LAN, they receive data (in frames) from one device and transmit it to the device with the correct MAC address.

76
Q

What is a router?

A
  1. Routers transmit data between networks.
  2. They direct packets to their destination on the internet
  3. Used in homes/offices to connect the LAN to the internet
77
Q

What are the 2 types of ethernet cables, and what is their structure?

A
  1. CAT 5e and CAT 6
  2. They are twisted pair cables, containing four paris of copper wires, twisted together to reduce interference.
78
Q

What are coaxial cables made of?

A

A copper wire surrounded by a plastic layer of insulation and a metallic mesh, to provide shielding from interference.

79
Q

What are fibre-optic

A

1.They transmit data as light
2.They are high performance, and don’t suffer interference and can transmit over very large distances without loss of signal quality.

80
Q

What is bluetooth?

A
  1. direct connection between 2 devices so data can be shared
  2. usually 10 metres
  3. low bandwidth
81
Q

What is Wi-Fi?

A
  1. used by multiple devices to connect to a LAN
  2. usually 40-100 metres range
  3. Higher bandwidth
82
Q

What is a WAP?

A

A Wireless Access Point is a switch but for wireless devices.

83
Q

What are the different types of network attacks?

A

1.Passive attack
2.Active attack
3.Insider attack
4.Brute force attack
5.DoS attack

84
Q

What is a passive attack?

Explain what and how to defend

A

1.where someone monitors data travelling on a netwrok and intercepts sensitive info
2.They use netwrok-monitoring hardware and software like packet sniffers.
3.Hard to detect
4.Best defence is encryption

85
Q

What is an active attack?

Explain what and how to defend

A

1.When someone attacks a network with malware or other planned attacks
2.Use a firewall

86
Q

What is an insider attack?

Explain what and how to defend

A

1.Someone within an organisation uses network acces to steal info
2.Use passwords and user access levels

87
Q

What is a brute force attack?

Explain what and how to defend

A
  1. Cracking passwords through trial and error.
  2. Brute force attacks use automated software to produce likely password combos.
  3. Locking accounts after a certain number of attempts and using strong passwords will reduce risk
88
Q

What is a DoS attack?

Explain what and how to defend

A
  1. A denial of Service attack, where a hacker tries to stop users from accessing a part of network or website, by flooding network with useless traffic
89
Q

YOKO GERI

A

SIDE THRUST KICK

90
Q

What is malware?

A

Malicious software installed on someone’s device without knowledge or consent

91
Q

What can malware do?

A

1.Delete/modify files
2.scareware
3.lock files(ransomware)
4.Spyware
5.Rootkits altering permission
6.open backdoors.

92
Q

What does clock speed mean?

A
  1. number of instructions a single processor can carry out per second
93
Q

What are cores?

A

A core is a part of the CPU which can process data independently of the rest, the more cores, the more instructions it can carry out at once

94
Q

What are GPUs?

A

a GPU (Graphics Processing Unit) is a specialised piece of hardare which handles graphics and image processing, and relives the load on the CPU.

95
Q

how do you convert hex into denary?

A
  1. multiply the first digit by 16 then the next on by 1 and add them together
96
Q

How do you convert binary into hex?

A
  1. Split the binary number into nibbles
  2. Draw a table with column labled 1248, for as many nibbles as there are
  3. Fill the table with binary number
  4. Sum the value of each nibble
  5. Convert these sums into the hex version
  6. Labosh
97
Q

What is Unicode?

A
  1. A character set which comes in several different forms and tries to cover every letter or symbol possible
  2. It uses multiple bytes per character
98
Q

What factors affect network speed?

A
  1. Bandwidth - the more the better
  2. Mode of connection - wired better than wireless
  3. Signal quality - range, interference or physical obstructions
  4. Network topology
99
Q

What are the different network topologies?

A

1.Star
2.Bus
3.Ring
4.Mesh

100
Q

What is a client server network?

A

1.A network which is managed by a central server, which the clients all connect to
2.Files and software are stored centrally on the server
3.Most of the internet runs on this topology

101
Q

How does a client server network work?

A
  1. Clients send a request to the server
  2. The server processes the request and responds
  3. This is the client server relationship
102
Q

What are the pros of client server networks?

A

1.Easy to keep track of files
2.Easy to perform backups
3.Easier to install and update software
4.Easier to manage network security
5.Servers are reliable

103
Q

What are the cons of client server networks?

A
  1. Expensive to set up and needs IT specialists to maintain
  2. Server dependence
  3. The server could become overloaded if too many clients are accessing at once
104
Q

What is a P2P (Peer to peer) network

A

1.All the devices are equal and connect directly to eachother without a central server
2.Often used in homes to connect devices and printer

105
Q

How does a P2P network work?

A

The files are stored on individual devices and are shared with others

106
Q

What are the pros of P2P

A

1.Easy to maintain - no experts required
2.No server dependence

107
Q

What are the cons of P2P

A

1.No centralised management - important software must be installed individually
2.Backups are harder to make
3.Hard to keep track of files
4.Data may be lost if a client fails
5.Machines slow down when other devices access them

108
Q

What is STAR topology?

A

1.All devices are connected to a central switch or server which controls the network
2.The central switch allows many devices to access the server simultaneously
3.Star networks may be wired or wireless

109
Q

What are the pros of star topology?

A

1.If a device fails or a cable is disconnected, the rest of the network is ok
2.It’s simple to add more devices
3.Better performance as data goes straight to the central device so all devices can transmit at once.
4.Few data collisions

110
Q

What are the cons of a Star topology?

A
  1. In a wired network, every device requires a cable which is expensive
  2. If there is a problem with the server/switch, the whole network is affected.
111
Q

What is bus topology?

A

1.All the devices are arranged in a line and connected to a backbone cable
2.Devices then send data in both directions along this cable to other devices

112
Q

What is the problem with bus topology?

A

There is a lot of data travelling in different difections on a single wire, this causes data collisions, slowing the network

113
Q

What is Ring topoology?

A
  1. Data moves in one direction around a ring which connects all devices
  2. This prevents collisions
114
Q

What is the problem with ring topology?

A

1.Only one device can send data at a time, and data passes through many devices before reaching its destination.
2.If there is a problem with 1 cable/device it breaks

115
Q

What is a mesh topology?

A

1.A mesh topology is a relatively new network layout
2.It is decentralised, where all devices are either indirectly or directly connected to eachother without a server or switch

116
Q

How does a mesh topology work?

A

1.They send data along the fastest route to its destination using the connection available.

117
Q

What are the pros of mesh topology

A
  1. There is no single point where the network can fail as data can take multiple routes to its destination
  2. Wireless technology make it a very practical option
118
Q

What are the cons of mesh topology?

A

1.Used to be very expensive, as you need a lot of wires to connect the devices

119
Q

What is the difference between full/partial mesh

A
  1. full is where the devices are all connected together perfectly
  2. Partial is where the device are not all connected to eachother.
120
Q

What is a network standard?

A

A set of agreed requirements for hardware and software

121
Q

Why are network standards important?

A

so that manufacturers can create products/programs which are compatible with other products/programs from other manufacturers.

122
Q

What is a network protocol?

A

a set of rules for how devices communicate and how data is transmitted across a network.

123
Q

What are communication protocols?

A

These specify how communication between 2 devices must start and end, how the data must be organised and what the devices must do if data goes missing.

124
Q

What are MAC addresses?

A

MAC addresses are unique, unchangeable 48/64 bit codes which are assigned to all network enabled devices by the manufacturer.

125
Q

How are MAC addresses made easier to use?

A

we convert them into hexadecimal.

126
Q

Where are MAC addresses used?

A
  1. When communication occurs on a single network
  2. Mainly used by the ethernet protocol on LANs. The LAN switches read the MAC addresses and use them to direct data to the right device.
127
Q

When are IP addresses used?

A

When sending data between TCP/IP networks (When sending data between different networks)
Eg - the internet

128
Q

How are IP addresses assigned?

A

They are either assigned manually or automatically before the device can access the network.

129
Q

What are the 2 versions of IP addresses?

A

IPv6 (128 bits) and IPv4 (32 bits)

130
Q

Why was IPv6 created?

A

There were too many devices which needed a unique IP address.

131
Q

How many IPv4 vs IPv6 addresses are there?

A

IPv4 = 2^32
IPv6 = 2^128

132
Q

How are IPv4/6 addresses split?

A
  1. IPv4 is split into 8 bit chunks, and each one is given as a denary number
  2. IPv6 is split into 16 bit chunks, and each one is given as a hexadecimal number
133
Q

What is TCP/IP

A

1.Transmission Control Protocol/Internet Protocol dictates how data is sent between networks, eg the internet
2.It is made up of 2 protocols.

134
Q

What 2 protocols is TCP/IP made of?

A

1.TCP - Transmission Control Protocol
2.IP - Internet Protocol

135
Q

What does TCP do?

A
  1. Sets the rules for how devices connect on the network.
  2. It splits data into packets and reassembles these packets into the original data once they reacch the destination
  3. It checks wether the data is correctly sent/delivered
136
Q

What does IP (protocol) do?

A

Internet Protocol is responsible for directing packets to their destination across a network.

137
Q

What network protocols are there?

A

1.TCP
2.IP
3.HTTP
4.HTTPS
5.FTP
6.POP3
7.IMAP
8.SMTP

138
Q

What does HTTP and HTTPS do?

A

1.HTTP - Hyper Text Transfer Protocol is used by web browsers to access websites and communicate with web servers
2.HTTPS - Hyper Text Transfer Protocol Secure - Same as HTTP but encrypts all information sent and received

139
Q

What does FTP do?

A

File Transfer Protocol is used to access, edit and move files between devices on a network.
Eg - file from server to client

140
Q

What does POP3 do?

A

Post Office Protocol version 3 is used to retrieve emails from a server. The server holds the email until you download it, at which point it is deleted.

141
Q

What does IMAP do?

A

Internet Message Access Protocol is used to retreive emails from a server. The server holds the email until you actually delete it - you only download a copy. This is used by most web based email clients.

142
Q

What does SMTP do?

A

Simple Mail Transfer Protocol is used to sent emails. It’s also used to transfer emails between servers

143
Q

What is a network layer?

A

A group of protocols which have similar functions and are self contained.

144
Q

What are the advantages of using layers?

A
  1. It breaks the network communication into manageable pieces. This helps developers concentrate on only one are of the network.
  2. As layers are self contained, they can be changed without the other layers being affected
  3. Having standards for each layer forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way.
145
Q

What is a URL?

A

Uniform Resource Locators are addresses used to access web servers and resources on them.

146
Q

What is the WWW

A

The World Wide Web is a collection of websites that are hosted on web servers and accessed through the HTTP protocol.

147
Q

What is DNS

A

Domain Name Service is used to translate websites domain names into IP addresses. It uses a Domain Name Server which stores the IP addresses which match to the correct domain names.

148
Q

What are the pros of the Cloud?

A
  1. Users can access files and apps from any connected device
  2. Easy to increase how much storage is available
  3. No need to buy expensive hardware to store data or run complex apps
  4. No need to pay IT staff to manage the hardware
  5. Cloud host provides security and backups
  6. Cloud software will be updated automatically.
149
Q

What are the cons of the Cloud?

A

1.Need a connection to the internet to access files or apps
2.Dependent on host for security and backups
3.Data stored in the cloud can be culnerable to hackers
4.Unclear who has ownership over cloud data
5.Subscription fees for using cloud storage and apps may be expensive.

150
Q

What are the 3 types of malware?

A

1.Virus
2.Trojan
3.Worms

151
Q

What is a virus?

A

1.Malware which attaches by copying itself into certain files.
2.Users spread them by copying infected files and activate them by opening the file.

152
Q

What are worms?

A

1.Like viruses but they self replicate without any user help, meaning they can spread quickly.
2.They exploit weaknesses in network security.

153
Q

What are trojans?

A

1.Malware disguised as legit software. Unlike viruses and worms, trojans don’t replicate themselves. Users install them not realising they have a hidden purpose.

154
Q

What is scareware?

A

Malware which tells the user their computer is infected with loads of viruses, and scares them into following instructions

155
Q

What is ransomware

A

Malware which encrypts all the files on a computer, the data is held at ransom in exchange for a key.

156
Q

What are rootkits?

A

Malware which alter permissions, giving malware and hackers admin level access

157
Q

What is phishing?

A

When criminals send emails or texts to people claiming to be from a well known business. They then request the user to perform a task for their personal gain.

158
Q

What is social engineering?

A

The way of gaining sensitive info or illegal access to networks by influencing people.

159
Q

What are SQL injections?

A

Pieves of SQL typed into a website’s input boc which then reveal sensitive information.

160
Q

What can organisations do to protect their networks?

A

1.Regularly text the network to fin and fix weaknesses
2.Use passwords
3.Enforce user access levels
4.Instal anti malware and a firewall
5.Encrypt sensinsitive data.

161
Q

What is penetration testing?

A

1.when organisations employ specialists to simulate potential attacks on their network
2.It is used to identify possible weaknesses in a network’s security.

162
Q

What physical security options are there?

A
  1. using locks and passcodes to restrict access to important physical areas like server rooms.
  2. Use CCTV
163
Q

What are firewalls/

A

Firewalls block unauthorised access by examining all data entering and leaving the network.

164
Q

What is encrypted text called?

A

cipher text

165
Q

What health problems can be caused by tech?

A

1.repetitive strain injury (RSI)
2.Eyestrain
3.Back problems

166
Q

what is RSI

A

Repetitive strain injury, where repetitive movements damage parts of the body, eg carpal tunnel

167
Q

What are the 3 computer legislation laws?

A

1.Data Protection Act 2018
2.Copyright, Designs and Patents Act 1988
3.The Computer Misuse Act 1990

168
Q

What are the 6 parts to the Data Protection Act 2018

A
  1. data must only be used lawfully
  2. data must only be used for the specified pupose
  3. data should be adequate, relevant and not excessive
  4. Data must be kept up to date
  5. data should not be kept longer than necessary
  6. Data should be kept safe and secure
169
Q

What 4 things does the Computer Misuse Act 1990 prevent?

A
  1. gaining unauthorised access to a private network or device
  2. Gaining unauthorised a network or device in order to commit a crime
  3. Unauthorised modification of computer material eg deleting or changing files
  4. Making, supplying or obtaining malware.
170
Q

What is open source software?

A
  1. Software where the source code is made freely available.
  2. Users can legally modify the source code to create their own version, which can be shared under the same terms as the original
171
Q

What are the pros of Open source software?

A
  1. Usually free
  2. Made for the greater good, not profit
  3. Software can be changed to suit your needs
  4. Popular software can easily be fixed due to the large community
172
Q

What are the cons of Open source software?

A

1.Small projects
2.could be buggy
3.security flaws
4.no warranties
5.no dedicated customer support
6.Some companies won’t be able to keep their code secret

173
Q

What is proprietary software?

A

Software where only the compiled code is released. The source code is a guarded secret.

174
Q

What are the pros of proprietary software?

A
  1. Comes with warranties and customer support
  2. Should be well tested and reliable.
  3. Updates are more regular
  4. cheaper for companies, rather than developing their own
175
Q

what are the cons of proprietary software?

A
  1. Can be expensive
  2. Software may not fit user’s needs
  3. May not get updates after a while