Computer Science Flashcards

Paper 1 and 2

1
Q

comp 1.5: what are the 3 types of system software

A

utility/application software, device drivers, operating software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

comp 1.5: what does the operating system do

A

a piece of software that controls system hardware, it has mangers for each piece of hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

comp 1.5: name all of the managers used by the operating system

A

memory manager, user manager, process manager, file manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

comp 1.5: what is a CLI

A

it is a command line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

comp 1.5: what is a GUI

A

it is a graphical user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

comp 1.5 what is a WIMP

A

stands for Windows Icons Mice and pull down menus, it is a system of software features designed to simplify system operation for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

comp 1.5: name 4 types of utility software

A

defragmentation, encryption, compression, backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

comp 1.5: what is a single user OS

A

it is an operating system interned to only have a single user at a time, although more than one user can use the OS at different times, the user manager keeps track of this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

comp 1.4: what is social engineering

A

someone being influenced into giving away info that could grant access to accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

comp 1.4: what is an insider attack

A

it is an attack by someone on the inside where the give away vunerable info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

comp 1.4: what is an active attack

A

using a technical method, such as malware or other to compromise a networks security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

comp 1.4: what is a passive attack

A

this is an attack where attackers eavesdrop by ‘sniffing’ data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

comp 1.4: what is a penetration test

A

this is where an organization performs a controlled attack on itself to identify its weak spots, this can be performed by ‘ethical hackers’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

comp 1.4: name all of the types of malware

A

viruses - program in a program that spread
worms - code that spreads across a network without a host
trojan hoarse - pretends to be a program its not
ransomware - encrypts data on system, only decrypts when money is sent
spyware - tracks activity and gathers info
rootkit - modifies OS so antivirus does not work
backdoor - opens access to a computer that another malware takes advantage of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

comp 1.4: what are and what do firewalls do

A

they are either hardware or software that ‘sits’ between the user and the internet that filter packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

comp 1.4: what are the 4 types of active attacks

A

brute force - tries many combos of numbers and letters to find a password, this is slow
dictionary - tries many common passwords
DoS - denial of service attack, floods a server with many usless requests, can be blocked by a firewall blocking a certain ip,
DDoS - distributed denial of service attack, used to unban an ip, requests are sent from a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

comp 1.4: what methods do firewalls use to filter packets

A

ip filtering - insert here
packet filtering - inspects data packets to see whether they meet a certain criteria
port blocking - blocks certain ports that can be used by hackers to gain access, such as port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a protocol

A

a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

comp 1.4 what are the 4 methods of data interception

A

MITM - a man in the middle attack intercepts data by intercepting the users connection to the internet and viewing network traffic
insider attack
packet sniffing - a hacker intercepting data transfered across a network
SQL - structured query language, this is an attack where lines of code are inserted into a field in the website/other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

comp 1.4: what are botnets

A

they are many machines infected with malware that can be used for DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

comp 1.3: what is a switch in networks

A

it is a device that connects serval devices to make a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

comp 1.3: what is a network layer

A

they break up the sending of packets into different components, each component handles a different part of the communication(TCP/IP model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

comp 1.3: what is a NIC

A

a network interface controller is a device that provides connection between a device and the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

comp 1.3: what is a router

A

this is a piece of hardware that connects networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

comp 1.3: what is a wireless access point

A

a piece of hardware which connects to a switch and allows WiFi devices to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

comp 1.3: what is a twister pair cable

A

ethernet cable, made of eight wires twister into pairs to reduce interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

comp 1.3: what is a LAN

A

local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

comp 1.3: what is a client server model

A

the server is in control of the network, the client askes and it gives a response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

comp 1.3: what is a WAN

A

wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

comp 1.3: what is a pier to pier (P2P) server model

A

this relies on each user to make sure they stay connected to the server, each pier can act as a client to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

comp 1.3: what is the process of a client server model

A

first the client asks the server then the porosesses the request and then responds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

comp 1.3: what are the advantages of the pier to pier server model

A

cheaper, more robust, and it commonly used for streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

comp 1.3: how does the internet work

A

the router provides the internet connection, it connects to a ISP (internet service provider) which then connects to a DNS (domain name service) which is the backbone of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

comp 1.3: what is the star network topology

A

all clients are connected to the central switch or server. if one client falls off all of them don’t, often used for LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

comp 1.3: what is the mesh network topology

A

no central server which can fail, all of the computers are connected to all of the rest, can be very expensive if its wired, no one point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

comp 1.3: what is a partial mesh network topology

A

the same as a mesh network topology but not all of the computers are connected to all of the others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

comp 1.3: what is WIFI

A

it is a set of protocolos that enables devices to communicate across radiowaves, there are different standards of wifi that opperate ove different frequencies and speeds, its official name is IEEE 802.11x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

comp 1.3: what is WEP

A

wired equivalent protection is the weakest protection and is protected by one password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

comp 1.3: what is WPA protection

A

WIFI protected access is better than WEP, it uses one password and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

comp 1.3: what is WPA2 protection

A

WIFI protected access v2 is better WPA bc it uses better encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

comp 1.3: what is the IP

A

internet protocol, defines how packages should be transmitted over a wireless network, an IP header is attatched to the data to store the sourse and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

comp 1.3: what is the ethernet protocol

A

this is a protocol that defines how data should be transmitted over a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

comp 1.3: what is the TCP

A

transport control protocol, this splits data into small packets each with a header that defines the destination and how it reaches there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

comp 1.3: what is the cloud

A

these are large datacentres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

comp 1.3: what is a mac address

A

every network interface controller is has a media access control address that is globally unique and allows data to be sent to individual users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

comp 1.3: what is a public ip address

A

routers that connect to WAN have a public ip so devices on the WAN can send data to devices on the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

comp 1.3: what is HTTP

A

hypertext transfer protocol is a protocol that determines how data is transferred between browser and web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

comp 1.3: what is a private ip address

A

a private ip adress is the IP for devices on a LAN to sue on that LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

comp 1.3: what is FTP

A

file transfer protocol determines how binary data and text data are requested and sent to the client from the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

comp 1.3: what is HTTPS

A

HTTPS is secure HTTP that uses SSL (secure socket layer) in order to encrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

comp 1.3: what is SMTP

A

simple mail transfer protocol determine how email data is sent from clients to servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

comp 1.3: what is POP

A

post office protocol is a protocol that determines how emails are retrieved from servers:
emails not in sync with the server
inbox is not kept consistern between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

comp 1.3: what is IMAP

A

internet message access protocol is a protocol that determines how emails are retrieved from servers, it allows emails to be kept in sync, the inbox is consistent between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

comp 2.1: what is decomposition

A

breaking the problem down into smaller parts to simplify it, the smaller problems can be called sub-problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

comp 2.1: what is a structure diagram

A

they are used to represent decomposition, they are divided into nodes, the smallest node contains one task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

comp 2.1: what is algorithmic thinking

A

this is a way of finding a solution by finding the individual steps needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

comp 2.1: what is abstraction

A

where you remove the unnecessary details from a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

comp 2.1: what is a linear search

A

this searches through a dataset and matches the first letter and then the next and the next until it finds a match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

comp 2.1: what is a binary search

A

finds a midpoint in the data sees if what you want is higher or lower and then half again until it finds a match, only works in an ordered list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

comp 2.1: what is a bubble sort

A

a bubble sort is a sort that orders a list by letting the things floaty to the top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

comp 2.1: what is a merge sort

A

a merge sort idk look it up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Comp 1.1: what is the PC and what does it do

A

The program counter is the part of the CPU that holds the address of the next instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Comp 1.1: what is the MAR

A

The memory address register is the part of the CPU that stores the memory address of where details to be stored of fetched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Comp 1.1: what is the MDR

A

The memory data register is the part of the CPU that holds data fetched from or to be stored to main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Comp 1.1: what is the ACC

A

The accumulator hoods the results of calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Comp 1.1: what is the ALU

A

The algorithmic logic unit performs calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Comp 1.1: what is the control unit

A

The control unit decodes instructions and signals to control how data moves around the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Comp 1.1: what does the cache do

A

Stores commonly used instructions so they are faster to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Comp 1.1: what do registers do

A

Registers store small amounts of data needed for processing, they are very fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Comp 1.1: what are the 4 types of register in the CPU

A

MAR, MDR, PC, ACC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Comp 1.1: what is primary memory

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Comp 1.1: what is BIOS and what does it stand for

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Comp 1.2: what does the rom do

A

Read only memory, this helps yo wake up the computer and performs the post cycle, it helps to wake up the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Comp 1.2: what is virtual memory

A

When to computer runs out of primary storage it can make up for this with secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Comp 1.2: what are the 3 types of secondary storage

A

Magnetic, optical, solid state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

comp 1.2: what is the difference between a full and a full incremental backup

A
  • a full backup is one that records the whole dataset
  • a full incremental takes an existing backup and replaces it with updated info
63
Q

comp: what is the DNS lookup

A

the DNS lookup is the prosess that matches ip to url so data can be transmitted between the client and website

63
Q

comp: what is a url

A

this is a uniform recourse locator and it is contains info about the location of the webpage

63
Q

comp: what is a intranet

A

a local restricted communication network

64
Q

comp: what is lossless compression and what can i be used for

A

it is a form of compression that does not diminish the quality of the media, it can be used for mant

65
Q

comp 1.2: what is lossy compression and what can it be used for

A

it is a form of compression that used and algorithm in order to compress videos and photos (not text) by removing data deemed less important

66
Q

comp 1.2: what is compression

A

it is a method that is used to reduse file size

67
Q

comp 1.2: what is bit depth in sound storage

A

it determines the number of amplitudes values can be stored per sample

68
Q

comp 1.2: what is sampling in audio storage

A

where the mic measures the audio a certain amount of times a second

69
Q

comp 1.1: what are the 4 registers in the cpu

A

MDR, MAR, ACC, PC

70
Q

comp 1.1: what 2 parts of the FDE cycle does the control unit perform

A

fetches the instruction
decodes the instruction

71
Q

comp 1.1: what 2 parts of the FDE cycle does the ALU perform

A

it gets the data for the instruction and executes it

72
Q

comp 1.1: what is the address buss

A

carries memory addresses from the processor to other components such as primary storage and input/output devices

73
Q

comp 1.1: what are the steps of the FDE cycle

A

Fetch decode exicute

74
Q

comp 1.1: what does the control bus do

A

it carries control instructions

75
Q

comp 1.1: what does the data bus do

A

it carries data

76
Q

comp 1.5: what is a process manager and what does it do

A

the process manager is the manager that controls the allocation of CPU resources

77
Q

comp: what is a modem

A

the modem takes signals from the ISP and changes them into signals that your devices can understand

78
Q

comp: how do you prevent data interception

A

you use encryption to make the data safe

79
Q

comp: what is a macro

A

it is a piece of software that is given permission to run by the user

80
Q

comp: what is 2fa

A

two factor authentication, it requires to forms of authentication to provide access

81
Q

comp: what is the tcp/ip model

A

it defines how devices should transfer data between each other, divides data into packets and the combines it at the end to form the whole dataset

82
Q

comp: what do registers do

A

store small amounts of data used when processing

83
Q

comp: what does cache do

A

stores commonly used instructions

83
Q

comp: what is pseudocode

A

it is fact code that makes development easier

84
Q

comp: how much can a floppy disk store

A

100KB - 1.44MB

85
Q

comp: how much can a CD store

A

700MB

86
Q

comp: how much can a DVD store

A

standard layer (one layer) can hold 4.7GB and a double layer disk can store 8.5GB of data

87
Q

comp: how much can a blu ray disk store

A

single layer blu ray can hold 25GB and double layer can hold 50GB

88
Q

comp: how much can a caset tape store

A

lots (don’t use on exam)

89
Q

comp: what is a syntax error

A

a syntax error is an error in which a grammatical error within the programming language occurs

90
Q

comp: what is a logic error

A

it is an error in which an unexpected output occurs, they do not stop the program from working

91
Q

comp: what is a trace table

A

it is a method of checking a program that involves going through it and recording each change in a new column of the table

92
Q

comp: how is a URL converted into a IP

A

the URL is sent to a DNS, DNS looks up the IP of the URL and sends it to the user, if it is not found the DNS sends it to a higher level DNS

93
Q

comp 2.4: how do transistors function

A

by using superconductors

94
Q

comp 2.4: what component in the computer uses transistors to temporarily store data

A

the RAM (primary storage)

95
Q

comp 2.4: what are electrically controlled switches called

A

transistors

96
Q

comp 2.4: what are logic circuits composed of, where are they in the computer and what do they do

A

transistors, CPU and they perform calculations

97
Q

comp 2.4: what form logic gates or “switches”

A

transistors

98
Q

comp 2.4: how many transistors are in the CPU

A

3 bn

99
Q

comp 2.4: true or false, logic gates selectively allow electrisity to flow

A

true

100
Q

comp 2.4: what do logic gates form in the CPU

A

logic circuits that perform calculations

101
Q

comp 2.4: do you perform the operations in brackets first in Boolean order of operations

A

yes

102
Q

Comp 2.4: what is this symbol in Boolean logic ^

A

It is AND

103
Q

Comp 2.4: what is this symbol in Boolean logic ¬

A

NOT

104
Q

Comp 2.4: what is this symbol is Boolean logic V

A

It is OR

105
Q

comp 1.6: what is the data protection act of 1998

A
  • it determines what companies can do with information they collect and the rights of the user to that data
  • it has 8 rules
    1. data must be used and processed in a fair an lawful way
    2. data must only be used for the stated purposes
    3. data must be adequate relevant and non excessive
    4. data must be accurate
106
Q

comp 1.6: what is the computer misuse act of 1990

A

it forbids people to access a computer without authorisation, it is also illegal to modify destroy or access data or accounts physically or through the internet

107
Q

comp 1.6: what is the copyright designs and patents act of 1988 and what is it illegal to do under the act

A

copyright affects all creative work and requires no registration
under the act it is illegal to
- make copies
- share the material
- use unlicensed software
- plagiarise creative work
patents are legal protections of work

108
Q

comp 1.6: what is the freedom of information act of 2000

A

a public body is an organisation that provides a public service
the FOI act dictates that regulatory bodies must regularly publish certain info. info that can be requested includes:
- activity logs
- financial information
- statistics
- CCTV

109
Q

comp 1.6: what is the computer misuse act of 2018

A

The Computer Misuse Act defines the following as illegal and will prosecute: Unauthorised, or malicious, access to material stored on a computer. Intentional harm, or crime, using computer systems. Modifying, removing, or ransoming data.

110
Q

comp 2.4: what is the order of precedence for Boolean logic

A

Not, And, Or

111
Q

comp 2.5: what is a HLL

A

it is a high level language and often resembles English, they can be very portable

112
Q

comp 2.5: what are the pros and cons of HLLs

A

pro: they often resemble English
con: they are not always as fast as they require more translation

113
Q

comp 2.5: what is an LLL

A

it is a low level language, they require less translation (lowe levels of abstraction from machine language)

114
Q

comp 2.5: what are compilers

A

they translate a whole code at once, errors do not stop the code from being compiled and will all show up when the compiling is done, they create an exicutable file

115
Q

comp 2.5: what is an interpreter

A

they translate high level code into executable programs one line at a time, they stop when they find and error

116
Q

comp 2.5: what is an assembler

A

they translate assembly code into binary, they run fast.

117
Q

comp 2.5: what is an IDE

A

Integrated development environments, they are software that facilitate software development

118
Q

comp 2.5: in terms of IDEs what are debug tools

A

error diagnostics that highlight errors in code

118
Q

comp 2.5: in terms of IDEs what are code editors

A

they allow code to be written

119
Q

comp 2.5: in terms of IDEs what are translators

A

a program that converts source code into object code
they also facilitate the ‘RUN’ button

120
Q

comp 2.5: what are the pros and cons of LLL

A

pros: faster, they need less translation
cons: they are hard to read

121
Q

comp 2.5: what are the pros and cons of Compilers

A

pros: - they provide a list of errors and aren’t stopped by a single one
- this can make debugging easier
- they produce an executable program that can help to protect copyright
cons: they can be very slow

122
Q

comp 2.5: what are the pros and cons of Assemblers

A

pro:
- they only work on assembly language
- they provide direct control over the hardware
con:
- they are very difficult to use

123
Q

comp 2.5: what are 3 features of IDEs

A

debug tools, code editors, translators

124
Q

comp 2.5: what are 3 types of translators

A

compilers, interpreters, assemblers

125
Q

comp 1.1: what happens in the first stage of the FDE cycle

A

During the first stage of the FDE cycle the instruction is Fetched from primary storage and its location stored in the MAR

126
Q

comp 1.1: what happens in the second stage of the FDE cycle

A

during the decode stage of the FDE cycle the CU interprets the instruction then code for the instruction is fetched from memory

127
Q

comp 1.1: what happens in the third stage of the FDE cycle

A

the operation is performed

128
Q

comp 1.1: what are the 3 factors that affect CPU performance

A
  • clock speed
  • cores
  • cache memory
129
Q

comp 1.3: what are 4 properties of flash memory

A
  • non-volatile
  • short lifetime
  • fast access
  • robust, it has no moving parts
130
Q

comp 1.2: what are some drawbacks of virtual memory

A
  • negative impacts on performance
  • negative impacts on health of SSD
  • there might be limited space in secondary storage
131
Q

comp 1.2: what is paging in terms of virtual storage

A

memory can be split into ‘pages’
virtual memory works by moving these pages into secondary storage when they are not in use
when they page is required again it needs to be moved back into the ram

132
Q

comp 1.2: what is 2 bits called

A

a crumb

133
Q

comp 1.2 what is 4 bits called

A

a nibble

134
Q

comp 1.2: what is 8 bits called

A

a byte

135
Q

comp 1.2: what happens when you shift binary to the left

A

you multiply by 2

136
Q

comp 1.2: what happens when you shift binary to the right

A

you divide by 2

137
Q

comp 1.2: how is a bit stored in magnetic storage

A

it is represented by a positively or negatively charged magnetic particle, these particles are part of a disk called a platter

138
Q

comp 1.2: what are 4 properties of magnetic storage

A
  • low cost
  • low speed
  • good reliability
  • high capacity
139
Q

comp 1.2: what are 4 properties of optical storage

A
  • low cost
  • low capacity
  • low speed
  • great reliability, waterproof, shockproof
140
Q

comp 1.2: what are the things that CD-R, DVD-R and BD-RW have in common

A
  • they are optical storage
  • they can only be written to once, the R part
141
Q

comp 1.2: how do you convert from binary to hexadecimal

A
  1. group the binary into 4 bits
  2. covert these bits to denary
  3. convert this number into hex
142
Q

comp 1.2: what is 1100 in hexadecimal

A

E

143
Q

comp 1.2: what is 0101 in hexadecimal

A

5

144
Q

comp 1.2: what is 101 in hexadecimal

A

5

145
Q

comp 1.2: what are 2 uses of hex

A
  • HTML colors
  • MAC address
146
Q

comp 1.2: what happens when you add binary 0 + 0

A

0

147
Q

comp 1.2: what happens when you add binary 0 + 1

A

1

148
Q

comp 1.2: what happens when you add binary 1 + 1

A

0 and carry over the 1

149
Q

comp 1.2: what are overflow errors and when do they occur

A

binary numbers are stored at a fixed length, when adding, if this length is exceeded an overflow error occurs, they lead to inaccurate results to calculations

150
Q

comp 1.2: what does ASCII stand for

A

American Standard Code for Information Interchange

151
Q

comp 1.2: how many different characters does ASCII store

A

128

152
Q

comp 1.2: what are the differences between Unicode and ASCII

A

Unicode uses can represent 32 bits and aims to represent every character in the world, even emojis, and ASCHII uses only uses 8 bits

153
Q

comp 1.3: what 4 things effect network performance

A
  • bandwidth
  • wired or wireless
  • hardware
  • topology
154
Q

comp 1.3: what is packet switching

A

it is the process of breaking down data into packets, sending them across the internet and then re-assembling at the destination

155
Q

comp 1.3: what are the pros of the client server model

A
  • there is a centralized server
  • monitoring, of the clients
  • security, (updates) for the clients
156
Q

comp 1.3: what are the cons of the client server model

A
  • downtime if the server goes down
  • high cost
  • security, servers are often targeted
157
Q

comp 1.3: what are the cons of the pier to pier model

A
  • no central maintenance
  • file duplication, when files are copied from machine to machine they are copied
  • piers may loose connection
158
Q

comp 1.3: what are the pros of the pier to pier model

A
  • easy setup
  • cheap
  • robust
159
Q

comp 1.3: what are the pros of the cloud

A
  • easy access
  • updates, user never has to update their software
  • security
160
Q

comp 1.3: what are the cons of the cloud

A
  • internet connection needed
  • privacy, users have no control over how their data is stored
  • pricing can be changed
161
Q

comp 1.3: what are the pros of the star topology

A
  • simultaneous access to the server
  • reliable
  • scalable
162
Q

comp 1.3: what are the cons of the star topology

A
  • high cost
  • if server or switch goes down bad things
163
Q

comp 1.3: what are the pros of the mesh network topology

A
  • no single point at which the server can fail
164
Q

comp 1.3: what are the cons of the mesh network topology

A
  • high cost (wired)
165
Q

comp 1.3: in star network topology, what are all of the clients connected to

A

server or switch

166
Q

comp 1.3: how many channels are there in the 2.4 GHz band

A

13

167
Q

comp 1.3: how many channels are there in the 5 GHz band

A

24

168
Q

comp 1.3: what is a static IP adress

A

an IP that does not change every time the device connects to the network

169
Q

comp 1.3: what is a dynamic IP adress

A

it is a device that’s IP changes every time it connects to a network

170
Q

comp 1.3: what is a public IP address

A

an IP seen on the WAN

171
Q

comp 1.2: how to convert hexadecimal 7C into denary

A

(16 x 7) + (12(C) x 1) = 124