Computer Science 1.1-1.6 (Paper 1) Flashcards

You can edit cards if I forgot something, flashcards based on the OCR J277 spec document

1
Q

1.1.1 - What happens in the Fetch stage of the FDE cycle?

A

Address of next instruction is loaded into MAR and PC is incremented by 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1.1 - What is the ALU and what does it do?

A

Arithmetic Logic Unit - performs arithmetic and logical calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1.1 - What is the CU and what does it do?

A

Control Unit - Decodes instructions and organises the other registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.1.1 - What is the cache and what does it do?

A

Smaller, volatile primary storage which is faster to access than the RAM and stores frequently used instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.1.1 - What are registers?

A

Specialised units in the CPU which store one piece of information each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.1.1 - What is the MAR and what does it do?

A

Memory Address Register - stores the current memory address where data is to be retrieved from or stored to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.1.1 - What is the MDR and what does it do?

A

Memory Data Register - stores the data that’s been retrieved from or will be stored to memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.1.1 - What is the PC and what does it do?

A

Program Counter - keeps track of the current instruction and increments which each clock cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.1.1 - What does the accumulator do?

A

Stores the results of calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.1.1 - What is the difference between data and an address?

A

Data is a value used in calculations, whereas an address describes where in memory the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.1.2 - What are the 3 factors affecting CPU speed?

A

Clock speed, cache size, number of cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.1.2 - How does clock speed affect CPU performance?

A

A higher clock speed means more FDE cycles can be performed every second, so the CPU performs better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.1.2 - How does cache size affect CPU performance?

A

A larger cache means more instructions can be stored with a faster access time, so it takes less time to retrieve instructions on average, leading to each instruction taking less time to execute on average ==> higher CPU performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.1.2 - How does number of cores affect CPU performance?

A

More cores allow the CPU to run more FDE cycles in parallel, increasing the CPU performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.1.3 - What is an embedded system?

A

A computer system which is designed for a specific purpose, e.g. automatic thermostat in a fridge, traffic lights. It is also part of another machine or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.1.3 - What are the typical characteristics of embedded systems?

A

Fast and efficient, streamlined for one task, low memory capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1.2.1 - Why do computers have primary storage?

A

It is faster to access than secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

1.2.1 - What is RAM and what are its characteristics?

A

Random Access Memory - volatile, fast access time, random access (any part of it can be accessed at any time), low storage (usually around 4-16GB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

1.2.1 - What is ROM and what are its characteristics?

A

Read Only Memory - non-volatile, very small (a few MB), contains the boot loader which loads the OS from secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

1.2.1 - Why might virtual memory be needed in a system?

A

So the system doesn’t crash if it runs out of space in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

1.2.1 - What is virtual memory?

A

When the RAM is full, part of the secondary storage is used as temporary RAM - processes currently in use have priority to be in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

1.2.2 - Why do computers have secondary storage?

A

To be able to store information in a non-volatile way, i.e. it won’t get wiped when the computer switches off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

1.2.2 - Name 3 types of secondary storage

A

Optical, Magnetic, Solid-state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1.2.2 - What are the advantages of optical storage?

A

Shock resistant, lightweight, portable, low cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

1.2.2 - What are the disadvantages of optical storage?

A

Low capacity, vulnerable to scratches, requires an external device to read/write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

1.2.2 - What are the advantages of magnetic storage?

A

Durable, high capacity, medium cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

1.2.2 - What are the disadvantages of magnetic storage?

A

Moving parts so vulnerable to shocks, not very portable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

1.2.2 - What are the advantages of solid state storage?

A

Portable (USB flash memory), high capacity, shock resistant since no moving parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

1.2.2 - What are the disadvantages of solid state storage?

A

High cost, limited number of read/write cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

1.2.3 - Why is data stored in binary?

A

Binary can be represented by on/off switches, making calculations and storage easier and more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

1.2.3 - How many bits are in a nibble?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

1.2.3 - How many nibbles are in a byte?

A

2 (8 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

1.2.3 - How many bytes are in a kilobyte?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

1.2.3 - How many kilobytes are in a megabyte?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

1.2.3 - How many megabytes are in a gigabyte?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

1.2.3 - How many gigabytes are in a terabyte?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

1.2.3 - How many terabytes are in a petabyte?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

1.2.3 - Order the data units from bit to petabyte

A

bit, nibble, B, KB, MB, GB, TB, PB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

1.2.3 - How do you calculate required storage capacity given a number of files and their size?

A

file size x number of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

1.2.3 - How do you calculate the size of a sound file?

A

Duration (s) x Sample rate x bit depth (+ metadata)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

1.2.3 - How do you calculate the size of an image file?

A

Colour Depth x Width x Height (+ metadata)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

1.2.3 - How do you calculate the size of a text file?

A

Bits per character x Number of characters (+ metadata)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

1.2.4 - What is the range of one byte of data in denary, binary and hexadecimal?

A

255, 11111111, FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

1.2.4 - What is the most significant bit and why?

A

The leftmost bit because it has the highest value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

1.2.4 - What is the least significant bit and why?

A

The rightmost bit because it has the lowest value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

1.2.4 - How do you peform a binary left shift?

A

Move each bit to the left, ‘chop off’ the remainder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

1.2.4 - What is the effect of a binary left shift?

A

Multiplies the number by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

1.2.4 - How do you perform a binary right shift?

A

Move each bit one place to the right, ‘chop off’ the remainder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

1.2.4 - What is the effect of a binary right shift?

A

Divides the number by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

1.2.4 - How are characters represented in binary?

A

A character set is used, so that each character corresponds to one binary value taking up a certain amount of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

1.2.4 - How is the number of different characters stored in a character set limited by the bits available?

A

One byte for each character only allows for 256 different values, or 256 characters, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

1.2.4 - Describe ASCII

A

ASCII uses 1B per character, allowing for 256 different characters, however only using 128, which doesn’t allow for international languages or all punctuation signs, but is more memory efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

1.2.4 - Describe Unicode

A

Unicode uses 2B per character, allowing for 65,536 possible characters, allowing for all international characters and emojis, but is less memory efficient than ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

1.2.4 - How are character sets logically ordered?

A

The value of B is one more than A, the value of 7 is one more than 6, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

1.2.4 - How are pixels stored in binary?

A

Each pixel has a specific colour, represented by a specific binary code (hex codes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

1.2.4 - What is the effect of changing the colour depth of an image?

A

Increasing the colour depth increases the quality and increases the image size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

1.2.4 - What is the effect of changing the resolution of an image?

A

Increasing the resolution increases the quality and increases the image size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

1.2.4 - What does metadata do?

A

It stores additional information about the file, such as file type, image width, bit depth, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

1.2.4 - How is analogue sound stored in binary?

A

The amplitude of the sound wave is taken at specific intervals and stored as a binary value, the size of which depends on bit depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

1.2.4 - What is sample rate measured in?

A

Hertz (Hz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

1.2.4 - What is bit depth?

A

The number of bits available to store each sample in an audio file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

1.2.5 - Where may compression be needed?

A

Transportation of files, uploading and downloading files from the internet, archiving files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

1.2.5 - What are the advantages of lossy compression?

A

Makes the file smaller than lossless compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

1.2.5 - What are the disadvantages of lossy compression?

A

Some information is permanently lost; file quality decreases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

1.2.5 - What are the advantages of lossless compression?

A

The same quality is retained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

1.2.5 - What are the disadvantages of lossless compression?

A

File is made less small than lossy compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

1.3.1 - What is a LAN and what are its characteristics?

A

Local Area Network - a network of devices in a single building, or a group of buildings

68
Q

1.3.1 - What is a WAN and what are its characteristics?

A

Wide Area Network - a network of LANs and decides across a larger area such as a region or country

69
Q

1.3.1 - How does the number of connected devices affect the performance of a network?

A

More connected devices mean more requests sent, leading to an overall decrease in performance

70
Q

1.3.1 - How does bandwidth affect the performance of a network?

A

Higher bandwidth means more requests and responses can be sent at once, increasing the performance

71
Q

1.3.1 - How does a client-server network work?

A

Clients send requests to a central server, which replies with responses

72
Q

1.3.1 - How does a peer-to-peer network work?

A

Any device can send requests or responses to any other device

73
Q

1.3.1 - What hardware is needed to connect stand-alone computers in a LAN?

A

Wireless Access Point (WAP), Router, Switch, Network Interface Controller/Card, Transmission Media

74
Q

1.3.1 - What is a WAP and what does it do?

A

Wireless Access Point - provides a link between wireless and wired networks

75
Q

1.3.1 - What does a router do?

A

Transfers data packets between networks using IP addresses

76
Q

1.3.1 - What does a switch do?

A

Connects devices together on a LAN using MAC addresses to send data packets to their destination device

77
Q

1.3.1 - What is an NIC and what does it do?

A

Network Interface Controller/Card - hardware required for a device to join a network, has a MAC address

78
Q

1.3.1 - What is transmission media?

A

The communication channel on a network, wired or wireless

79
Q

1.3.1 - What is the Internet?

A

A network of computer networks spanning the entire world

80
Q

1.3.1 - What is a DNS?

A

Domain Name Service - made up of multiple Domain Name Servers

81
Q

1.3.1 - How does a DNS convert a URL to an IP address?

A

The domain extension is used to locate the correct domain name server, where the domain name is mapped to the URL and returned back to the client

82
Q

1.3.1 - What does a web server provide?

A

Web pages

83
Q

1.3.1 - What server provides web pages?

A

Web server

84
Q

1.3.1 - What does a file server provide?

A

File storage/retrieval

85
Q

1.3.1 - What server provides file storage and retrieval?

A

File server

86
Q

1.3.1 - How do servers provide services?

A

The client makes a request, and they carry out their function and provide a useful response, e.g. DNS returning an IP address

87
Q

1.3.1 - What is the Cloud?

A

When data and software is stored and run in a remote cloud server, which can be accessed at any time

88
Q

1.3.1 - What are the advantages of the Cloud?

A

Data can be accessed from any device, less money needs to be spent on secondary storage

88
Q

1.3.1 - What are the disadvantages of the Cloud?

A

You don’t have full control over who can access your data, can cost money, large servers are bad for the environment, data could be lost

89
Q

1.3.1 - What is a star topology?

A

A network where each device is connected to the central server, but not to each other

90
Q

1.3.1 - What is a mesh topology?

A

A network where each device is connected to every other device

91
Q

1.3.1 - What is a partial mesh topology?

A

A network where each device is connected to a few other devices, i.e. multiple different pathways, but not as many as a mesh topology

92
Q

1.3.1 - What are the advantages of a star topology?

A

Less wiring needed for wired networks, the server can filter packets and provide better security

93
Q

1.3.1 - What are the disadvantages of a star topology?

A

If the server fails, all devices are disconnected from the network, and if one connection breaks, that device is completely disconnected from the network

94
Q

1.3.1 - What are the advantages of a mesh topology?

A

If one connection breaks, devices can still communicate, and alternative pathways can be used if there are a lot of requests/responses

95
Q

1.3.1 - What are the disadvantages of a mesh topology?

A

Expensive for a wired network, worse security due to multiple transmission pathways which need to be monitored

96
Q

1.3.2 - Name the wired mode of connection

A

Ethernet – twisted pair cables

97
Q

1.3.2 - Name the wireless modes of connection

A

Wi-Fi and Bluetooth

98
Q

1.3.2 - What is the range of Wi-Fi?

A

100m

99
Q

1.3.2 - What is the range of Bluetooth?

A

10m

100
Q

1.3.2 - What are the advantages of wired networks?

A

Better security, faster, higher bandwidth

101
Q

1.3.2 - What are the disadvantages of wired networks?

A

Lots of cables can be expensive, harder to rewire the network or add/remove devices

102
Q

1.3.2 - What are the advantages of wireless networks?

A

Easy to add/remove devices, no cables required

103
Q

1.3.2 - What are the disadvantages of wireless networks?

A

Poorer security, multiple WAPs may be needed due to limited range, slower, lower bandwidth

104
Q

1.3.2 - What is encryption?

A

Scrambling of data using a key to prevent interception across network connections

105
Q

1.3.2 - What is an IP address?

A

The address of a LAN used by routers to communicate across the Internet

106
Q

1.3.2 - Name the two IP standards

A

IPv4 and IPv6

107
Q

1.3.2 - How are IP addresses formatted?

A

IPv4 is 32 bits; IPv6 is 8 groups of 4 hexadecimal digits

108
Q

1.3.2 - What is a MAC address?

A

The local address of a device in a LAN – used by the switch

109
Q

1.3.2 - How is a MAC address formatted?

A

48 bits, usually represented as a string of 12 hexadecimal digits (6 pairs separated by colons)

110
Q

1.3.2 - What is a standard?

A

A way to format addresses, etc. to provide global rules for areas of computing

111
Q

1.3.2 - What does a standard allow?

A

For different hardware/software made by different manufacturers/producers to be able to communicate

112
Q

1.3.2 - Name the 7 common protocols

A

TCP/IP, HTTP, HTTPS, FTP, POP, IMAP, SMTP

113
Q

1.3.2 - What is TCP/IP and what is it used for?

A

Transmission Control Protocol/Internet Protocol - Communication across the Internet

114
Q

1.3.2 - What is HTTP and what is it used for?

A

Hyper Text Transfer Protocol - transferring files over the Internet

115
Q

1.3.2 - What is HTTPS and what is it used for?

A

Hyper Text Transfer Protocol Secure - transferring secure files over the Internet and uses encryption

116
Q

1.3.2 - What is FTP and what is it used for?

A

File Transfer Protocol - transfer of files in a client-server network

117
Q

1.3.2 - What is POP and what is it used for?

A

Post Office Protocol - accessing messages from the Internet - messages are deleted from the mail server after a copy is sent to the requesting client

118
Q

1.3.2 - What is IMAP and what is it used for?

A

Internet Message Access Protocol - accessing messages from the Internet - messages are not deleted from the mail server after a copy is sent to the requesting client, allowing for access from multiple devices

119
Q

1.3.2 - What is SMTP and what is it used for?

A

Simple Mail Transfer Protocol - sending messages across the Internet

120
Q

1.3.2 - What is layering?

A

Different levels of a network only have to access or change certain information, without needing access to other information, e.g. the 4 layer TCP/IP model

121
Q

1.3.2 - Why is layering useful?

A

It allows software developers to specialise and work on their own areas without having to worry about other parts, like decomposition

122
Q

1.4.1 - What is malware?

A

Software used to compromise or break into a system

123
Q

1.4.1 - What is social engineering?

A

Using people as the weak point in a network, manipulating them into giving away important information

124
Q

1.4.1 - What is a brute-force attack?

A

Trying every possible password to try and hack into a system

125
Q

1.4.1 - What is a dictionary attack?

A

Trying every potential password in a set list, e.g. words in a dictionary, to try and hack into a system

126
Q

1.4.1 - What is a DoS attack?

A

Denial of Service - flooding a network with useless requests to shut it down

127
Q

1.4.1 - What is a DDoS attack?

A

Distributed Denial of Service - flooding a network with useless requests from multiple sources to shut it down

128
Q

1.4.1 - What is data interception/theft?

A

Intercepting data as it is transmitted, usually through packet sniffing, to gain unauthorised access to important company files

129
Q

1.4.1 - What is SQL injection?

A

Pasting code into an input box to get the system to do something else, e.g. return a list of all usernames and passwords in a company

130
Q

1.4.1 - Name the different forms of attack

A

Malware, Brute force, Dictionary, DoS, DDoS, Data interception (packet sniffing), SQL injection

131
Q

1.4.2 - Name the ways to prevent attacks

A

Penetration testing, Anti-malware software, Firewalls, User access levels, Passwords, Encryption, Physical Security

132
Q

1.4.2 - How does penetration testing prevent attacks?

A

It allows companies to identify and fix security weaknesses before they are found by hackers

133
Q

1.4.2 - How does anti-malware software prevent attacks?

A

It stops malware from harming the network

134
Q

1.4.2 - How do firewalls prevent attacks?

A

They stop malware entering the network and doing damage

135
Q

1.4.2 - How do user access levels prevent attacks?

A

They make sure as few people have access to important files as necessary, reducing the chance of them escaping

136
Q

1.4.2 - How do passwords prevent attacks?

A

They reduce the likelihood of unauthorised access to important files

137
Q

1.4.2 - How does encryption prevent attacks?

A

It stops intercepters from being able to read important files when they’re being transmitted

138
Q

1.4.2 - How does physical security prevent attacks?

A

It prevents attackers from being able to access important information physically, e.g. walking into the data centre with a USB stick

139
Q

1.5.1 - Name the parts of an operating system

A

User interface, Memory management & multitasking, Peripheral management & drivers, User management, File management

140
Q

1.5.1 - What does a user interface do?

A

It provides an interface through which the user can control the computer and navigate its systems

141
Q

1.5.1 - What are the features of a user interface?

A

WIMP model - Window, Icon, Menu, Pointer

142
Q

1.5.1 - What does memory management do?

A

It manages the transfer of data between memory, the allocation of memory to applications, and multitasking

143
Q

1.5.1 - What is multitasking?

A

Quickly switching between processes to give the illusion of them happening simultaneously

144
Q

1.5.1 - What does peripheral management do?

A

It manages the transmission of data between the computer and its peripherals, e.g. printers, keyboard

145
Q

1.5.1 - What do device drivers do?

A

They allow peripherals made by different manufacturers to still be able to communicate with the computer in a language both the computer and peripheral can understand

146
Q

1.5.1 - What does user management control?

A

The allocation of an account, Access rights and Security

147
Q

1.5.1 - What does file management control?

A

Naming files, Allocating files to folders, Moving files, Saving files, etc.

148
Q

1.5.2 - Name the types of utility software

A

Encryption, Defragmentation, Data compression

149
Q

1.5.2 - Why is encryption software needed?

A

To allow secure transmission and prevent sensitive information being intercepted

150
Q

1.5.2 - What is defragmentation software?

A

Rearranging secondary storage so it is in order and all the empty space is at one end

151
Q

1.5.2 - Why is defragmentation software needed?

A

To reduce read/write time - only for hard disk drives with moving parts, provides no benefit for solid state drives

152
Q

1.5.2 - Why is compression software needed?

A

To allow for more efficient storage and faster uploading of files to the Internet

153
Q

1.5.2 - Why is utility software needed?

A

To perform tasks which may not be carried out by the operating system

154
Q

1.6.1 - Name the different issues with digital technology

A

Ethical, Legal, Cultural, Environmental, Privacy

155
Q

1.6.1 - When was the Data Protection Act?

A

2018

156
Q

1.6.1 - What did the Data Protection Act do?

A

Protects personal data - it must be fairly & lawfully processed, obtained for specific purposes, adequate & relevant, accurate & up to date, kept for no longer than necessary, processes in line with your rights, and held securely

157
Q

1.6.1 - When was the Computer Misuse Act?

A

1990

158
Q

1.6.1 - What did the Computer Misuse Act do?

A

It makes it illegal to seek or gain unauthorised access to computer material, steal data or destroy information unauthorised, modify data unauthorised, and make or supply anything to allow the above

159
Q

1.6.1 - When was the Copyright Designs and Patents Act?

A

1988

160
Q

1.6.1 - What did the Copyright Designs and Patents Act do?

A

It gives creators of digital media the rights to control how their work is used and distributed

161
Q

1.6.1 - What is software licensing?

A

Proprietary software can only be used or distributed with a license

162
Q

1.6.1 - What are the advantages of open source software?

A

Free, source code can be accessed and modified, support provided by the community

163
Q

1.6.1 - What are the disadvantages of open source software?

A

May not be fully tested, may not have extensive support

164
Q

1.6.1 - What are the advantages of proprietary software?

A

Will be extensively tested and supported, will be regularly patched

165
Q

1.6.1 - What are the disadvantages of proprietary software?

A

Need to pay for a license, can’t access the source code