entire comp sci flashcards

1
Q

main job cpu

A

The Fetch-Decode-Execute cycle is the main job of the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

instructions in fde cycle

A

In a program, each machine code instruction takes up a slot in the main memory. These memory locations each have a unique memory address. The program counter stores the address of each instruction and tells the CPU in what order they should be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does cpu do to execute program

A

To execute a program, the program code is copied from secondary storage into the main memory. The CPU’s program counter is set to the memory location where the first instruction in the program has been stored, and execution begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

process of fde

A

The CPU checks the program counter to see the next instruction to execute.
The program counter gives a memory address to where the next instruction is
The CPU fetches the instruction from this memory address
The instruction is decoded and executed.
The program counter increments by 1
The cycle is repeated indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

job alu

A

Arithmetic calculations
Logical operations
Comparisons between values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

job cu

A

The control unit organises the fetch decode execute cycle, including managing the other components in the processor.

also controls flow of data inside and outside cpu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

registers

A

Small amounts of high-speed memory in the CPU used to store small amounts of data needed for processing
Includes the address of the current instruction, the next instruction to be executed, and the results of calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

job cache

A

A small amount of high-speed memory physically inside the CPU.
Temporarily holds small amounts of data which the CPU will reuse often.
Speeds up the system - does not have to wait for some data in memory to be fetched
Level 1, 2, 3 cache - 1 is the fastest, most expensive, and has the lowest amount of storage, likewise, 3 is the slowest, least expensive but contains the most amount of storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does von neumann arch state

A

Data and instructions are stored as binary
Data and instructions are both stored in primary storage
Instructions are fetched from memory one at a time and in order
The processor decodes and executes an instruction, and then does the same for the next instruction
This will continue until there are no more instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 registers in von neumann arch

A

the program counter (PC)
the memory address register (MAR)
the memory data register (MDR)
the current instruction register (CIR)
the accumulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

program counter

A

the program counter (PC) holds the memory address of the next instruction to be fetched from primary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

mar

A

the memory address register (MAR) holds memory address about to be used by CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cir

A

the current instruction register (CIR) holds the instruction that is currently being decoded and executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mdr

A

the memory data register (MDR) holds data/instruction fetched from memory, or data about to be written to memory (primary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

accumulator

A

the accumulator (ACC) is a special purpose register and is used by the arithmetic logic unit (ALU) to hold the data being processed and the results of its calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

clock spd

A

The clock speed is measured in gigahertz (GHz) and represents how many fetch-decode-execute cycles happen per second. 1 GHz = 1 billion cycles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

too highclock spd

A

However, a CPU which cannot keep up with its clock will corrupt its data. A very fast clock speed will cause the CPU to overheat and thermal throttle, reducing its performance to stop it from melting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

why cache is there

A

Transferring data in and out of memory takes much longer than from cache. Therefore, placing frequently accessed data in the cache results in everything using that function being executed much faster. The more cache there is, the more data can be stored closer to the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

l1 l2 l3 cache

A

L1 is usually part of the CPU chip and is both the smallest and the fastest to access. L2 and L3 caches are bigger than L1. They are extra caches built between the CPU and the RAM. Sometimes L2 is built into the CPU with L1.
L2 and L3 caches take slightly longer to access than L1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

cons of cache

A

However, cache is very expensive (L1 costs ~£1 per kilobyte), is limited by the space of the CPU, and is very small, so cannot be a full replacement for memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

num cores

A

A CPU has multiple cores on it. CPUs with multiple cores have more power to run multiple programs at the same time.

However, doubling cores does not double clock speed. Some headroom is needed to communicate between each core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

embedded system

A

An embedded system is a small computer inside of a larger system.
Embedded systems have one specific function which they run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

prim storge

A

Primary storage consists of RAM (random access memory) and ROM (read-only memory).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

general process comps

A

General process computers are designed to access the Internet, play games, play videos, and write programs. These all require applications to run. Tablets, phones and consoles are now increasingly classed as general process, as they now can run several applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

avantage embd sys

A

Advantages of these systems include they require less power to run and are cheaper to make as their processors are not as powerful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

where can programming be done on embd system

A

They are not reprogrammable either - all the programming is done in manufacturing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

rom

A

ROM is non-volatile (retains its data after being powered off) and is usually often now only used to boot the computer, providing for the BIOS or UEFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

exmpl embd system

A

Examples of embedded systems include GPS systems, digital watches, fitness trackers, washing machines, microwaves and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

sec strgae

A

Secondary storage is non-volatile, meaning it retains the data written to it even when offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ram

A

RAM is smaller storage than 2ndry, but is much faster as it does not have moving parts or have to retain that information.
The more RAM a computer has, the more programs and instructions it can store simultaneously.
it is volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

virt mem

A

Virtual memory is an area of secondary storage which is used as an overflow for when memory is filled up.
When RAM is full, data which would have gone to memory goes to an area of the disk drive. However, virtual memory is very slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

hdd

A

An HDD (magnetic) has high capacity and involves flipping magnetic polarity to store bits. It is fairly fast to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

usb

A

A USB drive (solid state) is tiny in comparison but very portable so is useful for transferring files between people and their computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ssd

A

An SSD (solid-state) has high capacity and involves trapping electrons to store bits. They are extremely fast to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

optical

A

Optical storage devices like CDs and DVDs use a laser to scan the tracks, and when light reflects back, it will either reflect from ‘lands’ - representing 1, or not reflect in ‘pits’ - representing 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

do embd sys have 2nd strg

A

Embedded systems may not need these as the instructions to run them are usually in ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

formua 4sound file size

A

Sound file size = sample rate x duration (s) x bit depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

formula text file size

A

Text file size = bits per character x number of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

formula image file size

A

Image file size = colour depth x image height (px) x image width (px)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

hex to denary/binary

A

write down the hex digits, and convert them into nibbles which can then easily convert into denary.

F is 15 (1111 in binary)
0 is 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

denary/binary to hex

A

opposite of hex to binary/denary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

adding binary digits

A

0 + 0 = 0
0 + 1 = 1
1 + 1 = 0, carry 1
1 + 1 + carried 1 = 1, carry 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

binary shift

A

A shift of 1 to the left means multiply by 2.
A shift of 3 to the left means multiply by 2^3 = 8
A shift of 1 to the right means divide by 2
A shift of 3 to the right means divide by 2^3 = 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

character set

A

character sets are collections of characters a computer recognises from their binary representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ASCII

A

7bit binary code
reperesnts 128 total characters
extra bit added to start of binary code (0) so the character is 1 byte storage e.g
( (0 - extra bit) 1111111)

good for english lang

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Xtended ascii

A

8 bit binary code
256 characters represnted

good for langs with slightly more letters like french which has é

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

unicode

A

16bit/32bit binary code
millions of represntable characters

e.g all langs, emojis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

image

A

An image is represented as a series of pixels, again, represented as binary. Each pixel has a specific colour, represented by a specific code (can be a hex value).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

img size+quality affected by

A

the image’s size and quality can be affected by the colour depth and resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

working out colour depth from bit depth

A

A black and white image has a bit depth of 1. This means it can only represent two colours - 2^1 = 2 colours.
An image which uses 10-bit depth can represent 2^10 = 1024 colours.

Colour depth = range of colours available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

size of img

A

Size, or dimensions, is how many pixels the image contains, in terms of height by width.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

esimting size of file

A

The size of an image file can be estimated using:

the image height in pixels
the image width in pixels
the colour depth per pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

resolution

A

Resolution is used to describe how densely packed the pixels are.

high resolution - lots of pixels, large file size
low res - little num of pixels, small file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

metadata

A

Files contain extra data called metadata. Metadata includes data about the file itself, such as file type, date created, author, geolocation and camera and image data itself, such as the height and width of the image, the resolution and the colour depth.

This allows for software to more easily interpret and decode the image file correctly, and output it to a monitor, for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

what does metadata allow

A

This allows for software to more easily interpret and decode the image file correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

sample rate

A

Sample rate is the number of samples recorded in a second. It is measured in hertz. The higher the sample rate, the closer the recorded digital signal is to the original, analogue sound.

Higher the sample rate, higher the file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

sound - bit depth

A

Bit depth is the number of bits used to record each sample. The higher the bit depth, the more accurately the sound can be recorded but the higher the file size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

sound - bit rate

A

Bit rate is the amount of data processed per second.
calculated by sample rate x bit depth, and is in bits per second.
Higher bit rate = higher quality sound, and also the file size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

recording sound

A

To record an audio file, analogue sound must first be captured by an input device, like a microphone, and then converted into a digital file to store on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

first stage of rcording sound

A

Firstly, the microphone picks up sound and converts it into an electrical signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

third stage recording sound

A

This is represented as a binary sequence called Pulse Code Modulation (PCM), and saved to a file. The raw data of the converted signal is uncompressed (using WAV/FLAC/AIFF formats).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

second stgae recording sound

A

This is then used by the ADC (analogue-digital converter, typically located in a system’s sound card) and sampled at regular intervals which directly represent the sound wave’s traits, such as amplitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

what happens when sound file read

A

When the file is read, the binary PCM sequence is passed through the DAC (digital-analogue converter) which uses the data to reconstruct an analogue waveform, as close to the original as possible, which is then played.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

lossy

A

Lossy - some data is removed, reducing the overall data and quality and therefore size of the file.

Examples of lossy compression include JPEG, MPEG (or MP4) and MP3 files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

what gets compressed in image audio and video files

A

In an image, reducing colour depth, colour depth, resolution.
Bit depth can be reduced in audio files to reduce the file size.
Remember, in bit depth, it squares every time. A bit depth of 4 would mean 2^4 bits, or 16 potential colours or audio bits.

In video, frame rates and resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

what is network toplogy

A

A network’s topology is how different nodes (a device connected to a network) are arranged in it. All nodes are either wired or wirelessly connected.

67
Q

whats a router

A

connects one network to another
sends and receives data packets between networks
maintains a routing table
identifies most effieicnt path to desination IP address
assigns IP addresses to nodes/devices
converts packets from one protocol to another

68
Q

what is switch job

A

sends data packets between devices in a LAN
sotres MAC addresses of devices in a LAN
forwards data packets to correct device

ensures data packets are delivered correctly and resends any not delivered due to errors/collisions

69
Q

what are mac address used for

A

(MAC (Media Access Control) addresses are used to identify a device on the local network assigned by its Network Interface Card)

70
Q

job WAP

A

lets device connect to network using WIFI

bridges wired and wireless netowrk

extends network range

roaming and handover

71
Q

WAP - roaming and handover

A

when wireless device moves beyond range of one access point, it is handed over to next access point, allowing seamless roaming

72
Q

extension of network range - WAP

A

the access point functions as a hub that links all stations together, increasing communication range of wireless users

73
Q

bridging wired and wireless network - WAP

A

an access point bridges wired and wireless networks, providing network access to wireless devices

74
Q

whats packet switching

A

a method of breaking up data, and sending it using the most efficient route.

For example, if you send an image, it will be broken up into ‘packets’ of around 1000 bytes each (if the image is 1 MB then there’ll be 1000 packets) and then sent.

75
Q

what is done to ensure packets arent corrupted

A

To ensure data is not corrupted on route to the destination, each packet contains the following in a header: the IP address it is going to, the IP address it has come from, the sequence number of the packet, the number of packets in the whole communication, and error checking data

76
Q

whats dns

A

Domain Name System. How domain names are translated to IP addresses. When you go to a site, your device will make a request to a DNS server asking for the actual IP address to connect to.

77
Q

what happens if the dns server doesnt have the ip address you need

A

If a DNS server does not contain the IP address, your request will be forwarded to a bigger DNS server, and finally, a root DNS server containing every single domain’s IP address.

78
Q

star toplogy

A

Used in many networks
Used by client-server networks - all data sent from clients pass through (a) central server(s).
All computers can communicate with each other through the central switch.

79
Q

avantage star tology

A

If a node or its connection fails, other nodes can still communicate
New nodes can be added by connecting it to the switch
Any incoming data from the Internet can be forwarded directly to the intended node.
Fast data transfer to the hub as each wire isn’t shared with other computers

80
Q

disavantage star tology

A

The entire network will go down if the switch fails
Can be expensive to set up - requires additional hardware such as the central switch and lots of network cables

81
Q

where are star toplogy used

A

They are used anywhere, from company buildings to your home right now. Your ‘router’ is currently acting as the switch, router and WAP for all the nodes connected in your house.

82
Q

mesh tolpogy

A

Full meshes are when every device is connected to every other device. Partial meshes are when every device is connected to at least another device, which shares a connection with other devices (the original device is indirectly connected with every other device)

83
Q

avantge mesh toplogy

A

No single point of failure – resilient to attacks
Messages can be received more quickly if the route to the intended recipient is short
Expansion and modification can be done without disrupting the network
Data can be transmitted from different devices simultaneously

84
Q

disavanrge mesh toplogy

A

Can involve redundant connections
Expensive to install cabling if using wired connections
Network maintenance and administration is difficult
Full mesh networks are impractical to set up because of the high number of connections needed

85
Q

what is netowrk and 2 way the communicjante

A

A network is a group of two or more computers connected together to communicate. There are 2 ways for them to communicate: wired (ethernet) and wireless (Wi-Fi, Bluetooth).

86
Q

beenfits of being in netowrk

A

benefits of being in a network include accessing and sharing resources, sharing hardware like printers, communications via email, text or video, and roaming profile (can access your files from any computer in the network).

87
Q

what can be implemented on larger netowrks

A

In larger networks, antiviruses and firewalls can be implemented network-wide instead of on individual computers, improving security and cost-effectiveness.

88
Q

what can admins do n netowrk

A

Admins can monitor what people do on these networks, and give them rights (User Access Levels) to restrict access

89
Q

cons network

A

However, networks can cost a lot as equipment like dedicated cables or switches are needed to communicate, and malware can spread more quickly if a network has poor security.

90
Q

ipv4

A

The 32-bit IP address system is also known as IPv4. It allows for over 4 billion addresses (2^32 = 4,294,967,296 addresses)

91
Q

ipv6

A

IPv6’s adoption is increasing now. IPv6 uses 16 bits (hexadecimal represention) for each section of the address, creating a 128-bit address. This allows almost 80 octillion unique IP addresses.

92
Q

mac address vs ip address

A

A MAC address is different to an IP address - it is assigned to devices within a network. It can’t be changed by the user, as it’s on the network card on the device.

93
Q

what is prootocl

A

Remember, a protocol is a set of rules that governs the transmission of data. For example, HTTPS.

94
Q

what do standards allow

A

Standards allow hardware/software to interact across different manufacturers/producers. For example, HDMI or USB-C

95
Q

encryption

A

Encryption is the process of changing a message so that it can only be understood by the intended recipient, through the use of a public and a private key (also known as asymmetric encryption).

96
Q

job of public and private key

A

A public key can be given to anyone - it can be used to encrypt a message. but it cannot decrypt a message - only the second key (the private key) can do that.

97
Q

how cna message be unencypted illegally

A

The message will remain encrypted unless the private key is compromised, either by giving it out or by brute forcing it.

98
Q

what r unecnrypted and encrypted messages called

A

Unencrypted messages are referred to as plaintext messages. Encrypted messages are known as ciphertext.

99
Q

TCP/IP

A

TCP/IP (Transmission Control Protocol/Internet Protocol)
Used for accessing the Internet. Set of rules describing how packets are sent. All packets have source IP, destination IP, packet reassembly sequence, the actual data (or payload), and error-checking details

100
Q

HTTP

A

HTTP (Hyper Text Transfer Protocol)
Sends web pages from the webserver to your browser.

101
Q

HTTPS

A

HTTPS (Hyper Text Transfer Protocol Secure)
Sends web pages securely encrypted from the webserver to your browser.

102
Q

FTP

A

FTP (File Transfer Protocol)
Transfer files. You can upload a file to a FTP server and someone else can download it.

103
Q

POP

A

POP (Post Office Protocol)
Used to download email to a device, then delete it from the server.

104
Q

IMAP

A

IMAP (Internet Message Access Protocol)
Used to download email from the server, but caching it on-device. Doesn’t delete from a web server.

105
Q

SMTP

A

SMTP (Simple Mail Transfer Protocol)
Used to send the email

106
Q

layering

A

Layering means the breakdown of the sending of messages into separate components and activities, with each component handling a different part of communication. Therefore, it allows standards to be put in place and is simply adapted as new hardware and software are developed.

107
Q

4 layers

A

Application layer - applications and protocols.
Transport layer - breakdown into packets
Network (internet) layer - adds sender and receiver’s IP addresses to packets and sends over the network
(Data) link layer - the NIC and drivers are here and then send the packets to another computer

108
Q

def malware

A

Malware is an umbrella term for malicious software designed to compromise a system

109
Q

viruses

A

often embedded in another file. When run, they replicate and can spread throughout a network. They usually delete or modify other data, including personal documents or critical system files. Can upload your files to a server.

110
Q

worms

A

similar to viruses with the ability to replicate and spread, but are often completely standalone programs which exploit vulnerabilities in a system, not requiring a host file. Typically distributed by email. They may not initially damage systems, but try and spread rapidly to other systems.

111
Q

trojans

A

a malicious application pretending to be a useful application. A user must run it to spread.

112
Q

spyware

A

monitors a user’s activities and sends them back to a server. This could include websites visited, passwords, usernames and applications opened. This can then be used by advertising agencies to market more targeted ads to a user.

113
Q

rasnomware

A

encrypts files and requires a ransom to be paid to access them. Very easily spreads through the network if run as an administrator.

114
Q

what is the weak point in a security system

A

people

115
Q

phishnig

A

Emails which try to deceive users to give their personal details. Designed to look like a genuine email from a useful service, like a bank, and will have a link to a website (still looking like a real bank) where there will be a username/password field, and maybe even credit card numbers. Of course, when you enter the data, it’s just sent to someone else.

116
Q

brute force

A

A program is used to systematically try all possible combinations of a username and password until the correct one is ‘cracked’.

117
Q

DOS AND DDOS

A

Where a computer sends loads of requests to a server to overwhelm it. The server will become overwhelmed and legitimate requests will no longer work.

Multiple computers doing this concurrently is called a distributed denial of service attack, or DDoS. They usually only last a few seconds but send tens of millions of requests.

118
Q

data interception

A

Data interception is when data is intercepted while being transferred, using a special software called a ‘packet sniffer’. It can identify what packets are doing and their destination across the Internet or in a network. They are usually difficult to detect, as the data still reaches its intended destination.

119
Q

sql

A

SQL is widely used in databases to ensure their structures are maintained and to quickly read a value in it. SQL code can be entered as a data input in, for example, a username/password field, which can cause errors.

120
Q

peentration testing

A

Pen testing is when authorised users probe a network for weaknesses, and attempt to exploit them.

It is used to check how resistant a network is against malicious attacks by trying to identify security issues before they are exploited.

121
Q

anti malware

A

Anti-malware detects installed malware, prevents malware from being installed and removes malware from a device. It scans through all files that are run or modified and sees if one matches a list of known malicious files. However, if the antimalware software is not updated, it may not be able to correctly identify new, zero-day threats to which the system is exposed.

122
Q

firewalls

A

Firewalls monitor traffic and allow it to pass through or deny it. It can be placed in front of the network, or can be placed in front of an individual device. Legitimate programs require the firewall to allow a program or port to communicate with other devices. Firewalls can be hardware or software-based:
hardware-based firewalls are more effective but cost more than software-based implementations.

123
Q

user access levels

A

User access levels only allow a user to do certain things, including running software, accessing the Internet, installing new software and editing the accounts of other users.

124
Q

viruses - user access levels

A

This reduces the risks as if a student downloads a virus, it will not be able to access any other device, as it is effectively isolated from managing network devices. However, if an admin gets infected, it would mean disaster for the network…

125
Q

passwords

A

Passwords are used to verify a user’s identity. Secure passwords could include a password policy to ensure it is secure and difficult to guess, and one changes regularly. They should ideally be unique across different websites, so if one website account is compromised, the same passwords cannot be used to login to your account on another site which you might want to be kept secure, like a bank.

126
Q

data encryption

A

The process of changing data from plaintext to ciphertext so it cannot be understood.

A private key is needed to decode the ciphertext.

127
Q

physical secuirty

A

server rooms should be looked + only accessed by authorised ppl. cctv used to protect sevrer romms as well.

also dont put passwords in places easy to see e.g sticky note on computer

128
Q

what is os

A

An operating system is a suite of programs that controls the general operation of a computer, and provides an easy way for users to interact with computers and run applications.

129
Q

what can os do and exmaples of os

A

OSes can control hardware components, provide a UI, manage memory,users and files in a file system
and even provide multitasking. Examples are Windows and Linux for desktops, and iOS and Android for mobile devices.

130
Q

UIs - user interfces

A

UIs are program(s) that allow a user to interact with the computer. The GUI is the most popular as they include desktops and icons for ease of use, with menus and a mouse to interact with it. They are easy to use but use more processing power. CLIs are text-based programs (like command prompt in Windows) which are very powerful and require little processing power to display due to their simplicity. However, they are difficult for most people to use. Mobile UIs are basically the same as GUIs but replace the mouse with touch and gestures to navigate.

131
Q

multitasking and memory management

A

Multitasking is a classic example of OS’ evolution over the years. With CLIs, a user could only do one process. Now, a user can multitask. This requires an OS to support it and enough memory to run multiple processes. The OS manages memory used to prioritise running processes, and when another process closes, this extra available memory gets allocated to the running program.

132
Q

peripherals

A

Peripherals are hardware devices physically connected to a computer like mice, monitors, printers, etc etc

133
Q

device drivers

A

OSes use drivers to control peripherals.
They manage interactions between user and computer.
Every device has its own associated driver.
Any device can be used with a computer, as long as standards are met and a driver is available.
Drivers are frequently updated to improve the hardware device’s performance or to fix a bug.

134
Q

what does os control

A

The OS controls user management functions, e.g.:
Creating, modifying, and deletion of an account
Access rights (admin, or normal user)
Logging actions

and handling files

Create, modify and delete files
Allocating to folders
Moving and renaming between folders
Copying and pasting
Searching
Access rights (read-only)
Sorting (date modified, name)
Overall file system for organising (NTFS)

135
Q

ulitity software

A

Utility software helps maintain the system. It includes programs involving encryption software, defragmentation and data compression tools. Computers often come with this software built in.

136
Q

encryption software

A

Encryption software is used to scramble the contents of files to everyone unless you have a private key. It can encrypt individual files or even the entire disk! This is useful for government organisations or banks which have private and sensitive data stored.

137
Q

what are hdds split into

A

Hard disk drives are separated into thousands of tracks, with thousands of segments in these tracks.

138
Q

fragmented datta

A

Fragmented data is when data is unordered on a hard drive. Bad for performace as it takes more read/write cycles to find all the data.

139
Q

what does defragmenting do

A

Defragging moves the files from all these parts to one consecutive track, where possible

140
Q

compresion software

A

Compression software reduces the size of a file on secondary storage to make it easier to send (as lower file size = lower packets needed) and allows more files to be stored (as lower file size = more free space). Note that most compression will need to be lossless, as you can’t just get rid of a bit of a program and hope it’ll work. Examples of compressed data are ZIP files.

141
Q

backup software

A

Backup software takes a copy of the files on a computer to either a high-capacity secondary storage device (usually removable so a USB drive or big HDD) or uploaded to the cloud.

142
Q

full backup vs incremental backup

A

A full backup is making a copy of every single file on a device, so will take a lot of time and storage space. Incremental backups only take a copy of new and modified files since the last backup, so they’re cheaper and faster.

143
Q

cloud storage

A

long download time
accesible anywhere

144
Q

what is ethical issue

A

Ethical issues occur when a given decision, scenario or activity creates a conflict with a society’s moral principles.

145
Q

whats legal issue

A

A legal issue is something that happens that has legal implications and may need the help of a lawyer to sort out - a question or problem that is answered or resolved by the law.

146
Q

whts cultural issue

A

Cultural issues are problems that occur when culture conflicts with systems, goals or other cultures. (e.g religion, ethnicity, generation)

147
Q

environmental issues

A

Environmental issues are defined as harmful effects on Earth and its natural systems due to the actions of humans. (e.g pollution, animals dying, poisoning of the environment, deforestation)

148
Q

exmple of privacy issue

A

Privacy issues include companies using your personal data for their gain

149
Q

data protetion act

A

The Data Protection Act 2018
Controls how your personal information is used by companies, organisations or the Government.

150
Q

computer misuese act

A

Computer Misuse Act 1990
For securing computer material against unauthorised access or modification

151
Q

copyright designs and patents act

A

Copyright Designs and Patents Act 1988
Gives the author or creator the right to copy, adapt, communicate, lend or sell copies of their work (can be sold or transferred)

152
Q

software licences

A

can b open ssource or proprietary
A software license agreement describes how the software should be used, and any restrictions it may have from the author, the provider and end users.

153
Q

open source

A

Open source means providing access to the source code and the ability to change the software if you want. Groups of programmers often work together to provide support for users and develop the software further. These products are often tested by contributors in public. FREE TO USE, FOR ANYONE.

154
Q

proprietary

A

Proprietary means no access to the source code (already compiled), purchased commonly as ‘off-the-shelf’ for example games. Also known as closed-source. It remains the legal property of whoever made it. Source code is usually not released, and may require a license key to use it in return for money.

155
Q

tasks of cu

A

The control unit is responsible for the following tasks:

Ensures the execution of instructions in the correct sequence
Decodes every instruction that the processor will execute
Sends and receives control signals to and from other components
Checks that signals have been delivered successfully
Makes sure that data goes to the correct place at the correct time
The control unit also contains the clock. This is a tiny component that controls the rate at which instructions are executed in the processor.

156
Q
A
157
Q
A
158
Q
A
159
Q
A
160
Q
A
161
Q
A
162
Q
A
163
Q
A
164
Q
A