Computing Year 8 End of Year Exam Flashcards
What does a strong password consist of?
Between 10 and 15 characters as hackers can hack passwords shorter than this in under 4 hrs
A mixture of numbers, lowercase and uppercase characters and symbols as it makes it harder to guess.
What is black and white box testing
In black box testing, testers are give n no information about company they’re testing have to try and hack
In white box testing testers are given ‘insider’ information in order to see how much damage employees could do to systems.
What are black hat and white hat hackers?
Black hat - Hackers with criminal intent
White-hat - Ethical hackers that are employed to find faults in systems
What are grey hat hackers?
Grey hats - Frequently seek out system vulnerabilities without authorisation from system owners and then those are reported to the company for a ransom fee or are broadcasted on the internet.
What is malware
Short for malicious software - computer programs designed to infiltrate and damage computers
What is adware
Any software application in which advertising banners are displayed. Its justification is that it helps recover programming costs and it keeps software ‘free’ for the user.
What is spyware
Unwanted software that infiltrates computing device, stealing sensitive information. Classified as a type of malware.
What is phishing?
An online scam in which a victim receives a realistic-looking email e.g. from a bank with a link that can be used by the criminal to collect sensitive information
What is blagging?
Phycological techniques used by criminals to make a user more likely to act through the use of impersonation of friends or family.
What is shouldering?
Physically observing people putting in sensitive information into computers in order to gain that information e.g. looking at someone when they put their pin in at a cashpoint.
What is brute force?
A hacking method that uses trial and error to gain access to an account through guessing a password.
What is a virus?
A piece of malicious software that destroys computers and spreads between computers on a data system if accidently downloaded
What are worms?
A piece of malware that duplicates itself across many devices while remaining active on the original infected device
What are trojans?
A legitimate-looking piece of software that can take control of computers.
What are bots?
Software applications that are programmed to do certain tasks e.g. befriending someone in an online game.
What is a firewall?
A security system that monitors and controls incoming network traffic on a computer, preventing it from being hacked.
How to add binary numbers
Set up the problem vertically, and add the digits in the ones place. Since you are only adding two digits, the possible sum is either 0, 1, or 2. If the sum is 0, write a 0 in the answer’s ones place. If the sum is 1, write a 1 in the answer’s ones place. If the sum is 2, write a 0 in the answer’s ones place, and carry a 1 into the twos column.[6]
For example, if adding 0111 and 1110, for the ones column you would add 1 one plus 0 ones = 1, so place a 1 in the answer’s ones column.
How to read binary?
Look a the different places, if there’s a one it means the number contains that value. If there’s a 0, it doesn’t contain the value. Each place value doubles in size.
How to convert from binary to hexadecimal:
Split binary into blocks of four and convert each block to normal decimal system. If each block is 9 or lower, give it a normal letter however if it’s above 9 give it letter from A(11) to F(15).