Everything 1 Flashcards

1
Q

What do computers do to data?

A

process it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is the basic building block of all computers

A

binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a microprocessor?

A

Same role as CPU but smaller scale // usually for a specific task // AKA embedded system // example are traffic lights, digital alarm clocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a CPU?

A

Central processing unit // performs thousands of tasks and complex instructions // example smartphones or laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s von Neumann architecture?

A

CPU access memory directly // memory stores programs and data // programs are series of instructions carried out in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the fetch decode execute cycle?

A

Everytime a computer performs a task or runs a program it runs the FDE cycle // Fetches the instruction into the CPU // CPU decodes the instruction // Instruction is executed by CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in the fetch step of FDE cycle?

A

PC contains address of memory location of next instruction // address is copied from PC to MAR via address bus // instruction at address contained in MAR temporarily copied to MDR using data bus // instruction of MDR copied into CIR // PC incrememts by 1, points to next instruction // instruction gets decoded then executed by signals via control bus to other parts of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FETCH - What happens after the PC gets first instruction?

A

Address copied from PC to MAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FETCH - What happens after MAR receives instruction via address bus?

A

Instruction copied to MDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FETCH - Where do instructions go after MDR?

A

CIR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When instructions are executed by CPU, what component performs maths and logic calculations?

A

Arithmetic Logic Unit (ALU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the ALU’s special register for storing interim calculations called?

A

Accumulator (ACC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 3 types of buses in CPU

A

data bus, control bus, address bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the CIR do?

A

stores the current instructions being decoded and executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the MAR do? (Memory address register)

A

stores the address of the memory location currently being read from/written to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the MDR do? (Memory data register)

A

stores data which has just been read from memory/data and is about to be written to memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the PC do? (program counter)

A

stores the address where the next instruction to be read can be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the CU do? (control unit)

A

sends control signals that manages the execution of instructions in the cpu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe the address bus

A

Carries addresses throughout the computer (unidirectional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the data bus

A

Alllows data to be sent through the computer (bi-directional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe the control bus

A

Carries signals from the control unit to all other components (bi-directional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Another name for RAM is

A

IAS Immediate Access Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Convert 12 to binary?

A

1100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Convert 23 to binary

A

10111

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Convert 43 to binary

A

101011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Convert 62 to binary

A

111110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Convert 15 to binary

A

1111

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Convert 8 to binary

A

1000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Convert 0110 to denary

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Convert 01101 to denary

A

13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Convert 101010 to denary

A

42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Convert 11111 to denary

A

31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Convert 1011101 to denary

A

93

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Convert 6 to binary

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the 8 bit binary placeholders?

A

128 / 64 / 32 / 16 / 8 / 4 / 2 / 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the 12 bit binary placeholders?

A

2048 / 1024 / 512 / 256 / 128 / 64 / 32 / 16 / 8 / 4 / 2 / 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Hexadecimal is base ___

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Example of a 4 digit Hex number

A

A23F or 12FF or 79BB etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

_________ is base 16

A

hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In hexadecimal A to F represent…

A

A = 10, B = 11, C = 12, D = 13, E = 14, F = 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How to convert hex to denary?

A

Convert to hex to binary -> binary to denary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How to convert denary to hex?

A

Convert denary to binary -> binary to hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Convert A0 to binary

A

1010000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Convert 1C to binary

A

0001 1100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Convert 50 (hex) to binary

A

0101 0000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Convert AA to binary

A

10101010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Convert A00 to binary

A

1010 0000 0000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Convert 1001 1011 to hex

A

9B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Convert 1100 1010 to hex

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does the system clock do?

A

Defines the clock cycle that synchronises all computer operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which bus transmits timing signals ensuring sychronisation?

A

Control bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What defines the clock cycle that synchronises all computer operations?

A

System clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What happens if you increase clock speed?

A

Processing speed is also increased - but NOT NECESSARILY overall performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

3.5 Ghz is equivalent to

A

3.5 billion clock cycles per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What hardware factors improve overall performance of a computer?

A

Number of cores, size of cache and speed of clock can affect performance of CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How do you increase processor speed (but not necessarily overall performance)?

A

Increase clock speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What happens if you increase Number of cores, size of cache and speed of clock?

A

Improve overall computer performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Increasing clock speed is known as

A

overclocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Overclocking higher than design limits leads to…

A

unsynchronised operations, crashing, overheating of CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

If your computer has unsynchronised operations, crashing and overheating of CPU, what might be the cause?

A

Overclocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Unlike RAM, cache memory is located in

A

the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Cache memory has ______ access times than RAM

A

faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What has faster access times than RAM

A

cache memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What does cache memory store?

A

frequently used instructions and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

When a CPU wants to check memory, it checks ______ first then _____

A

cache first, then RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Larger cache memory =

A

better CPU performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The use of a different number of ______ can improve computer performance

A

cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

One core is made up of an ____ , ____ ___ and _______

A

ALU, control unit and registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What’s made up of an ALU, control unit and registers?

A

A core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Using more cores means less need to increase ______ ________

A

increase clock speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What’s a factor in increasing the number of cores?

A

CPU needs to communicate with each one which can reduce performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Unicode and ASCII code are _________ _____

A

character sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What represent letters numbers and characters found on a standard keyboard?

A

Unicode or ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Whats a disadvantage of ASCII?

A

Not suitable for most languages around the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What character set code can represent all languages of the world?

A

Unicode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Unicode is…

A

universal, efficient, uniform, unambiguous, supports up to 4 bytes per character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Each sound wave has F______, W________, A___________

A

frequency, wavelength, amplitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Amplitude =

A

loudness of sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Frequency, wavelength and amplitude make up _______

A

sound waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Sound is a____________

A

analogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Sound waves need to be __________ to be stored in a computer

A

sampled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Sampling means measuring the ____________

A

amplitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Sound conversion is done using

A

ADC (analogue to digital converter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Sound waves cannot be measured precisely, so amplitude values are __________

A

approximate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Sampling happens at

A

regular time intervals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

bits per sample =

A

sampling resolution / bit depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Sampling rate =

A

number of samples per second (in hertz, Hz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

How is sampling used to record a sound clip?

A

amplitude is determined with sampling rate, each sample encoded as series of binary digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Using more bits to sample amplitude =

A

more accuracy of sampled sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Higher sampling rate or larger resolution =

A

better quality sound, larger file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Name 3 drawbacks of larger sampling resolution when recording sound

A

larger file size, takes longer to transmit/download data, requires greater processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Name 3 benefits of larger sampling resolution when recording sound

A

larger dynamic range, better sound quality, less sound distortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What has 16-bit sampling resolution and 44.1kHz sample rate?

A

CDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Bitmap images are made of

A

pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

pixel =

A

picture element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Each image is made up of a _________ matrix of pixels

A

two dimensional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Pixels are represented in

A

binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Bitmaps are stored as a series of

A

binary numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Black and white images only require ______ per pixel

A

1 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

In 2 bit pixels, each pixel can be

A

1 of four colours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Number of bits used to represent each colour is called

A

colour depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

8 bit colour depth means each pixel can be _____ colours

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Modern computers have ___ bit colour depth

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Image resolution means

A

number of pixels that make up an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Lower image resolution means

A

Less image detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Pixelated means

A

Fewer pixels to represent the image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Whats the main drawback of using high resolution images?

A

Increase in file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

URLs are made up of p_______, d_____ n_____ and w__ p_____ name

A

protocol, domain name and web page name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What are protocol, domain name and web page name part of?

A

URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What’s the first thing a user has to use to open a webpage

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

To get to a web page from a browser, you need to

A

type or click a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What does DNS mean?

A

Domain Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What does a DNS do?

A

Matches a URL to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What’s an example of an IPv4 address?

A

192.158.29.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Why do we have URLs and IP addresses

A

Lots of IP addresses are too hard for humans to remember

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What’s this? e.g. 192.464.55.2

A

IPv4 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What’s an IP address?

A

Address of a computer on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What’s the address of a computer on a network?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What happens after the DNS has matched the URL to the IP address?

A

DNS sends IP address to browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

When the browser has the IP address, what happens next?

A

Requests data from the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What does a web server do?

A

Holds all the files and data for a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What holds all the files and data for a web page?

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What does the web server do when it receives a request?

A

Sends the website data to the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What does a browser do?

A

Converts HTML code into text and images we can understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What converts HTML code into text and images we can understand

A

Browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What requests data from a web server?

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What’s an example of a browser?

A

Chrome, Safari, Edge, Firefox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What sends the website data to a browser?

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

How to calculate size of image file?

A

multiply image resolution and colour depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

How to calculate size of sound file?

A

multiply sample rate , resolution and length of track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

How to calculate image resolution?

A

Multiply height by width in pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

The output X is 1 if, input A is 1 AND input B is 0, or, input A is 0 AND input B is 1

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

The output X is 1 if, neither input A or B or both, are 1

A

NOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

The output X is 1 if, input A AND input B are NOT both 1

A

NAND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

The output X is 1 if, both inputs A and B are 1

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

The output X is 1 if, either input A or B, or both, are 1

A

OR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

The output X is 1 if, the input A is 0

A

NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

______ ______ check the output of a logic circuit

A

truth tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What are cookies?

A

A text file (stored by web browser) that contains data about a user’s browsing habits/details/preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Everytime a user visits a website, the site checks if it has set _______ on their ________ before

A

Everytime a user visits a website, the site checks if it has set cookies on their browser before

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What are small files or code sent from a webserver and stored on a users computer

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What are the two types of cookies?

A

Session and persistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What are session and persistent types of ?

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Which cookie is temporary and don’t collect or store user information?

A

Session cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Name two facts about session cookies

A

Temporary, don’t store/collect user info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Which cookies cease to exist when a browser is closed?

A

Session cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Session cookies _____ to ______ when a browser is closed

A

cease to exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What are session cookies used for?

A

Temporary shopping baskets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Which cookies are used for temporary shopping baskets?

A

Session cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

____ cookies are stored on the hard drive of a users computer

A

persistent cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Which cookies have an expiry date or stay until deleted?

A

persistent cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Which cookies remain even after the browser is closed?

A

persistent cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What are persistant cookies used for?

A

Allow website to remember usernames, passwords, emails, baskets, preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What kind of user preferences do cookies hold?

A

language, currency, login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Describe data transmission

A

Signals transmitted from one device to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Data transmission can either be over

A

long distance or short distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Example of short distance data transmission

A

computer to printer over USB cable connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Example of long distance data transmission

A

One computer to another in a global network (i.e. internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What are the 3 factors for data transmission to happen?

A

Direction of transmission, method of transmission and method of synchronisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is simplex

A

data sent in one direction only, example is computer to printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What is half-duplex?

A

both directions but NOT at the same time, example is walkie-talkie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What is full-duplex?

A

Both directions at the same time, example is telephone call or online gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Both directions at the same time describes what?

A

Full-duplex data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Both directions NOT at the same time describes what?

A

Half-duplex data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

One direction only describes what?

A

Simplex data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Serial data transmission is…

A

when data sent one bit at a time over a single wire or channel. bits are sent one after another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Bit sent one after another, over a single wire or channel, one bit at a time describes what?

A

serial data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

serial data transmission can be ….

A

simplex, half-duplex or full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Serial advantages and disadvantages

A

Works well over long distance, data arrives synchronised. BUT slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Example of serial data transmission

A

computer to printer via USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Parallel data transmission is…

A

several bits of data (usually a byte) sent down several wires or channels at the same time. Each wire transmits one bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Parallel data transmission can be…

A

simplex, half-duplex or full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Parallel data transmission advantages and disadvantages

A

works well over short distances. Fast. BUT over long distances data can become skewed and arrive out of order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Example of parallel data transmission

A

Internal circuits in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What does PDLC mean?

A

Programming development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What is the PDLC?

A

Steps that are followed when developing a program (e.g. smartphone app or website)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

What are the steps in the PDLC?

A

Analysis / Design / Coding / Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

In the PDLC - what is analysis?

A

First step, the process of understanding what exactly you need as inputs to ‘build’ your product and if you have enough resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

In the PDLC - what is design?

A

Second step refers to thinking about the technical and visual aspects of your product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

In the PDLC - what is coding?

A

Third step, programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

In the PDLC - what is testing?

A

Testing a product to make sure it works as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

In programming, what is the name for the process of hiding complex details and showing only what is necessary?

A

abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

In programming, What is the name of the process of splitting a problem into smaller, manageable chunks?

A

decomposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

What does abstraction mean?

A

the process of hiding complex details and showing only what is necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

What does decomposition mean?

A

the process of splitting a problem into smaller, manageable chunks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

What are the 3 parts that make up analysis?

A

decomposition, analysis, requirements identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

What is the name used for the specific needs of a problem that must be identified as part of the problem analysis?

A

requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Requirements dictate the ______ ______ to a program.

A

essential inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

The design process involves which representations?

A

structure diagrams, flowcharts, pseudocode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Whare are structure diagrams?

A

Structure diagrams are used to represent sub-systems that make up a system. Each sub-system is also split into smaller sub-systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

What are flowcharts?

A

Flowcharts indicates the inputs needed (requirements) and the processes to be followed (logic) that lead to the output (final outcome)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

In a flowchart, what is the flow line?

A

Arrow representing control passing between the connected shapes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

In a flowchart, what is the process shape?

A

Represents something being performed or done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

In a flowchart, what is a subroutine?

A

Subroutine call that will relate to a separate flowchart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

In a flowchart, what is an input/output?

A

Input or output of something into our out of the flowchart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

In a flowchart, what is a decision?

A

A decision (yes/no, true/false) that results in two lines representing different outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

In a flowchart, what is a terminator?

A

Start and stop of process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Facts about pseudocode

A

Resembles code but can’t be understood by a computer // written for humans // easier for programmers to write and share since close to real code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Coding phase of PDLC is also referred to as

A

implementation phase, because implements design from previous stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Program code is usually written in ____

A

IDE (integrated development environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Advantages of IDEs

A

Adds colour coding and indents to help organise code // helps identify errors using debugger // supports many programming languages

202
Q

Examples of IDEs

A

Apache Netbeans, BlueJ and Microsoft Visual Studio Code

203
Q

What does iterative mean?

A

Any action that’s carried out in a loop until it produces correct outcome

204
Q

Iterative testing is useful because…

A

makes sure each section of code works as intended

205
Q

What’s the difference between alpha and beta testing?

A

Alpha is testing it by yourself, Beta is testing on a target audience

206
Q

____ testing is testing it by yourself, ______ is testing on a target audience

A

Alpha is testing it by yourself, Beta is testing on a target audience

207
Q

Why is test data important?

A

Make sure the product works as intended

208
Q

Normal data

A

Data within an accepted range

209
Q

Boundary data

A

Values in upper and lower bounds - pair that’s accepted, pair that’s rejected

210
Q

Extreme data

A

Data at upper and lower bounds (accepted)

211
Q

Abnormal data

A

Any data that is not accepted

212
Q

What are the 4 basic sub-systems that make up a computer system?

A

input / process / output / storage

213
Q

Input / process / output / storage are…

A

the basic sub-systems that make up a computer system

214
Q

Binary logical shifts mean

A

moving a binary number to the left or right in the table

215
Q

A left logical shift means ________ the number by 2

A

multiplying

216
Q

A right logical shift means ________ the number by 2

A

dividing

217
Q

During logical shifts, empty positions are filled with

A

zeros

218
Q

Left shift this binary number 1 place: 0010 &laquo_space;1

A

100

219
Q

Left shift this binary number 2 places: 0010 &laquo_space;2

A

1000

220
Q

Right shift this binary number 1 place: 1011&raquo_space;> 1

A

101

221
Q

Right shift this binary number 3 places: 1011&raquo_space;> 3

A

1

222
Q

Two’s complement allows

A

representing negative integers

223
Q

In two’s complement the left-most bit is changed to a _____ value

A

negative

224
Q

The left most value is changed to a negative number in _____ _________

A

two’s complement

225
Q

Apply two’s complement to 1010

A

-6

226
Q

Why does compression exist?

A

To reduce the size of the file

227
Q

What’s the impact of compressing files?

A

less bandwidth required, less storage space required, shorter transmission time

228
Q

What are the two types of compression?

A

Lossless and lossy

229
Q

_______ and _______ are the two types of compression

A

Lossless and lossy

230
Q

Lossless and lossy are types of _________

A

compression

231
Q

What’s lossy file compression?

A

compression algorithm eliminates unnecessary data by permanently removing it. original file cannot be reconstructed

232
Q

Which compression type? Compression algorithm eliminates unnecessary data by permanently removing it. original file cannot be reconstructed

A

Lossy

233
Q

Examples of lossy file compression?

A

images - jpeg, audio - mp3, video - mp4

234
Q

What are these file types examples of? images - jpeg, audio - mp3, video - mp4

A

lossy file compression

235
Q

What’s lossless file compression?

A

Uses compression algorithm, ALL data from original can be retrieved

236
Q

What compression type? Uses compression algorithm, ALL data from original can be retrieved

A

Lossless

237
Q

What is an example of lossless compression algorithm?

A

Run length encoding (RLE)

238
Q

What’s RLE?

A

Lossless compression algorithm

239
Q

How do lossless compression algorithms work?

A

Reduce size of string of identical adjacent data, only effective if repeated patterns/words used

240
Q

What compression algorithm, reduces size of string of identical adjacent data and is only effective if repeated patterns/words used?

A

Lossless compression / RLE

241
Q

USB

A

Universal Serial Bus

242
Q

How is data transmitted by USB

A

Uses serial data transmission / sending data to and from peripherals or devices.

243
Q

What are advantages of USBs?

A

simple interface - cable only works one way so less chance of errors // relatively high speed data transfer // universal - lots of devices use USB // can be used for power // automatically detected by computer to transfer

244
Q

What happens when you plug a USB into a computer?

A

Automatically detected - if it’s the first time, a driver is downloaded, otherwise it works without needing to download each time

245
Q

What are disadvantages of USBs?

A

Cables are limited to 5m usually // not as fast as other cables e.g. network cables

246
Q

Why are USB cables limited to 5m usually?

A

More chance of errors in data transmission over long distances

247
Q

What software is needed when a device is plugged in via USB?

A

Device driver

248
Q

USB allows both _____ and ______ data transmission

A

full duplex and half duplex

249
Q

Why can a computer only process binary data?

A

Because it consists of logic circuits/gates that can only process data in two states

250
Q

Because computers consist of logic circuits/gates that can only process data in two states, computers can only process b______ d______

A

Because computers consist of logic circuits/gates that can only process data in two states, computers can only process binary data

251
Q

In computer systems, what is an instruction?

A

A set of operations decoded in sequence

252
Q

What is a set of operations decoded in sequence?

A

Instructions

253
Q

In computer systems, what does each operation instruct?

A

ALU and CU

254
Q

Operations are made up of ________ and ________

A

opcode and operand

255
Q

Opcode

A

informs the CPU what operation needs to be done

256
Q

Operand

A

Data which needs to be acted on OR refer to register in memory

257
Q

What is an instruction set?

A

A list of all the commands that can be processed by a CPU and the commands are machine code

258
Q

All software running on a computer contains….

A

a set of instructions

259
Q

The ____ _____ ____ cycle is the sequence of steps to process each instruction

A

Fetch decode execute

260
Q

Example instruction set is

A

X86

261
Q

Instruction sets are written in _______ ____

A

machine code

262
Q

machine code is a ____ level language

A

low

263
Q

What are embedded systems?

A

An embedded system is used to perform a dedicated function

264
Q

What are examples of embedded systems?

A

e.g. domestic appliances, cars, security systems, lighting systems or vending machines

265
Q

What is a general purpose computer?

A

is used to perform many different functions

266
Q

What is an example of a general purpose computer

A

e.g. a personal computer (PC) or a laptop

267
Q

What’s a microcontroller?

A

has a cpu, ram and rom all embedded onto one single chip to carry out a single task

268
Q

What has a cpu, ram and rom all embedded onto a single chip to carry out a single task

A

microcontroller

269
Q

What’s a microprocessor?

A

Integrated circuit, ONLY has CPU

270
Q

What’s system on chips (SoC)?

A

microcontroller, ports and secondary storage

271
Q

Advantages of embedded systems?

A

small, cheap, dedicated to a task, low-power, remote control, fast, reliable

272
Q

Disadvantages of embedded systems?

A

difficult to upgrade or troubleshoot, interface confusing, open to hacking, encourages disposing of them

273
Q

Embedded systems include ____, ____ _______ and ________

A

inputs, user interface and output (e.g. AC panel, input is buttons, user interface is display, output is air)

274
Q

Explain embedded system of vending machine

A

input is buttons, user interface is display, output is actuator which pushes food

275
Q

What is the purpose of encryption?

A

There’s always a risk of interception when transmitting data over a public network, encryption reduces the risk

276
Q

What does encryption mean?

A

Encryption alters the data into a form that is unreadable by anybody for whom the data is not intended

277
Q

asymmetric encryption includes the use of _____ and _____ keys

A

public and private keys

278
Q

Which encryption method uses public and private keys?

A

assymetric

279
Q

What’s plaintext?

A

the original data being sent

280
Q

What’s ciphertext?

A

Plaintext after it goes through encryption algorithm

281
Q

In encryption, what’s the original data being sent?

A

plaintext

282
Q

In encryption, what’s the encrypted data called?

A

ciphertext

283
Q

To increase encryption security you…

A

increase the number of bits used in the key (e.g. 128 bits instead of 64)

284
Q

Symmetric uses….

A

The same key for encrypting and decrypting

285
Q

Which encryption method uses the same key for encrypting and decrypting?

A

symmetric

286
Q

Disadvantage of symmetric encryption?

A

Uses same key for encrypting and decrypting

287
Q

Scrambles data for secure transmission

A

encryption

288
Q

Why is encryption effective?

A

If the data is stolen it’s meaningless

289
Q

How does symmetric encryption work?

A

Same key used for encrypting and decrypting- sender and receiver both need it

290
Q

How does asymmetric encryption work?

A

Matching public and private keys are generated that are mathematically linked. Only public key sent. Both needed to decrypt.

291
Q

What is robotics?

A

branch of computer science - brings together design, construction and operation of robots

292
Q

Where can you find robots?

A

Factory equipment/domestic robots/drones

293
Q

Examples of factory equipment robots are…

A

welding parts together, spray painting, fitting windscreens to cards, cutting metal parts, bottling and labelling objects, warehouse operations

294
Q

Examples of domestic robots are…

A

autonomous floor sweepers, autonomous lawn mowers, ironing robots, pool clearning, automatic window cleaners, entertainment (robot friends)

295
Q

Examples of drones are…

A

UAVs, reconnaisance (photos), parcel delivery

296
Q

What are the 3 characteristics of a robot?

A

Sense surroundings, degree of movement, programmable

297
Q

Explain how robots sense surroundings

A

sensors allow robot to recognise immediate environment and give it ability to determine things like shape, size, weight of objects

298
Q

What are examples of sensors robots use?

A

light, pressure, temperature, acoustic

299
Q

Explain movement in robots

A

make use of wheels, cogs, pistons to carry out functions such as twisting, turning, moving, gripping or lifting // they are mechanical structures made up of many parts // contain electrical components // can make use of effectors

300
Q

What are examples of end effectors in robots?

A

welding, spraying, cutting, lifting

301
Q

What determines action to be taken in a robot?

A

controller

302
Q

Controllers in robots allow…

A

action to be taken to perform a task. Controllers rely on sensors/cameras for data and are programmable

303
Q

In robots, what rely on sensors/cameras for data and are programmable?

A

controllers

304
Q

What are examples of software robots (bots?)

A

webcrawlers, search engines, chatbots

305
Q

What are the two types of physical robots?

A

independent and dependent

306
Q

Explain independent (physical) robots

A

have no direct human control, autonomous, can replace the human activity totally, no human interaction required for full function

307
Q

What’s an example of a independent robot?

A

robot vacuum cleaner

308
Q

Explain dependent (physical) robots

A

has a human interfacing with the robot directly, can supplement, rather than replace human activity

309
Q

What’s an example of a dependent robot?

A

car assembly plant where humans and robots work together

310
Q

What are types of AI?

A

image recognition, speech recognition, natural language, computer games, diagnostic systems

311
Q

What is image recognition?

A

identify objects or people in an image

312
Q

What is speech recognition?

A

Identify words spoken by humans and store them

313
Q

What is natural language?

A

To receive a command or instruction that is not in a set format and perform the required task (e.g. Siri question)

314
Q

What use is AI in computer games?

A

to move elements or characters independently based on the environment

315
Q

What is a diagnosis system in AI?

A

e.g. to diagnose medical problems

316
Q

What are the features of AI programs?

A

collect data, programmed rules, ability to reason, ability to learn and adapt

317
Q

What is collecting data in AI?

A

programs need data input - data might come from users or from sensors

318
Q

What are programmed rules in AI?

A

Programs use rules to make decisions

319
Q

What is the ability to reason in AI?

A

An area of logic. In logic you have rules and can develop facts

320
Q

What is the ability to adapt and learn in AI?

A

Not all AI does this, its known as machine learning and requires training a program

321
Q

What is an expert system?

A

An attempt to emulate the expertise of a human, e.g. doctor or engineer

322
Q

How do expert systems work?

A

System asks questions to determine the solution, depending on answers given it will ask different questions

323
Q

What’s an example of an online expert system?

A

Online chat bot to help you with a problem

324
Q

What are the features of expert systems?

A

Knowledge base, rule base, inference engine, user interface

325
Q

In expert systems, what’s a knowledge base?

A

list of facts

326
Q

In expert systems, what’s a rule base?

A

Links the facts

327
Q

In expert systems, what’s an inference engine?

A

Decides which question to ask next or which answer it gives

328
Q

In expert systems, what’s a user interface?

A

Outputs questions and other statements to the user and allows them to enter data

329
Q

What is machine learning?

A

A system that has the ability to learn and adapt, and change their own rules and logic. It involves training.

330
Q

What is supervised machine learning?

A

Supervised means that user is telling the program what its data means.

331
Q

What is unsupervised machine learning?

A

Unsupervised means that data is input, and then the program learns from the data.

332
Q

What’s system software

A

Services a computer requires

333
Q

What are services a computer requires called?

A

system software

334
Q

What are services that a user requires called?

A

Application software

335
Q

Examples of system software

A

operating system, utility programs, device drivers

336
Q

Examples of application software

A

spreadsheets, word processors, instagram app, browsers

337
Q

What are spreadsheets, word processors, youtube app examples of?

A

application software

338
Q

What are operating systems, utility programs, device drivers examples of?

A

system software

339
Q

general features of system software

A

control and manage operation of hardware, HCI, allows hardware and software to run without problems, platform on which other sofware can run

340
Q

general features of application software

A

perform variety of tasks, applications, apps / users can perform specific tasks / can be single programs / users can execute as required

341
Q

Features of operating systems

A

run in background, allows input/output operations, users can interact with hardware, handles errors, loads and runs programs, manages security

342
Q

features of utility programs

A

manage and maintain computer resources, designed to carry out specific task, e.g. anti-virus, backups, disk repair

343
Q

features of device drivers

A

enables hardware to communicate with operating system

344
Q

What is firmware?

A

program that provides low-level control for devices

345
Q

BIOS

A

Basic Input Output System (Firmware)

346
Q

Firmware is run on h_______

A

hardware

347
Q

Applications are run on the o________ s______

A

operating system

348
Q

Operating system is run on f________

A

firmware

349
Q

Bootloader is another name for f

A

firmware

350
Q

Bootloading also known as b_________

A

booting

351
Q

What is an IDE?

A

Integrated Development Environment is use to help write computer programs

352
Q

What do programmers use to help write programs?

A

IDEs

353
Q

What are examples of IDEs

A

Pycharm (for Python), Visual Studio (for Visual Basic)

354
Q

What are Pycharm (for Python), Visual Studio (for Visual Basic) examples of?

A

IDEs

355
Q

What are the features of IDEs?

A

code editor, translator, runtime environment with debugger, error diagnostics, autocomplete, autocorrect, pretty printing

356
Q

What are these features of…code editor, translator, runtime environment with debugger, error diagnostics, autocomplete, autocorrect, pretty printing?

A

IDEs

357
Q

Describe an IDE code editor

A

Allows program to be written without using a separate text editor, which makes programming faster

358
Q

Describe a runtime environment with a debugger in an IDE

A

Allows programmer to run a program a line at a time and check for errors.

359
Q

Describe error diagnostics in an IDE

A

Finds possible errors as the code is being typed

360
Q

Describe pretty printing in an IDE

A

Colour codes the words in the program and lays it out in a meaningful way

361
Q

What colour codes words in a program and lays it out in a meaningful way?

A

Pretty printing

362
Q

What is an interrupt?

A

A signal to the processor to tell it something needs it attention. Can be software or hardware based

363
Q

What is a signal to the processor to tell it something needs it attention. Can be software or hardware based.

A

Interrupt

364
Q

Examples of software interrupts

A

divide by zero, two processes attempting to access the same memory location, program request for input

365
Q

What are divide by zero, two processes attempting to access the same memory location, program request for input, examples of?

A

Software interrupts

366
Q

Examples of hardware interrupts

A

Error from hardware e.g. printer out of paper, new hardware device conected

367
Q

What are error from hardware e.g. printer out of paper, new hardware device conected , examples of?

A

Hardware interrupts

368
Q

How does a computer decide the priority of an interrupt to service the interruption?

A

Managed by an interrupt handler

369
Q

What does an interrupt handler do?

A

Decides the priority of interrupts and what to service first

370
Q

What happens when an interrupt is sent to the processor?

A

Processor store the current process and fetches the interrupt // Next, checks the source of the interrupt // Calls the relevant Interrupt service routine to handle it // When finished the stored process is returned to memory

371
Q

The internet can be described as….

A

an infrastructure

372
Q

An infrastructure is a way of describing

A

the internet

373
Q

An infrastructure means all…

A

parts are connected in a huge network

374
Q

All parts connected in a huge network is called an

A

infrastructure

375
Q

What can you do on the internet?

A

send/receive emails, chatting (video, text, audio), share files

376
Q

What makes use of transmission protocols (TP) and internet protocols (IP)

A

The internet

377
Q

What is a world wide collection of internet connected networks and devices?

A

The internet

378
Q

The internet uses transmission _________ and internet ___________

A

protocols

379
Q

URL

A

uniform resource locator

380
Q

URLs are made up of 3 things….

A

protocol, domain, webpage

381
Q

Protocol, domain and webpage are part of….

A

URLs

382
Q

Every website and webpage has a

A

URL

383
Q

What’s a text address used to access websites?

A

URL

384
Q

HTTP means

A

Hyper text transfer protocol

385
Q

www.google.com is made up of…

A

domain host (www), domain name (Google ), domain type (.com)

386
Q

URLs consist of

A

protocol://website address /path/filename

387
Q

In a URL the protocol is…

A

http or https

388
Q

In a URL the domain name is broken into 3 pieces…

A

domain host (www), domain name (name e.g. Google, Youtube), domain type (e.g. .com .gov. kr)

389
Q

HTTP is secure if

A

is HTTPS

390
Q

URLs are t_____ addresses to access websites

A

URLs are text addresses to access websites

391
Q

HTTP means H_____T_____ T_____ P_______

A

HyperText Transfer Protocol

392
Q

Another sign that a website is secure, other than HTTPS protocol is…

A

Padlock in the address bar

393
Q

A padlock in the address bar next to HTTPS means

A

Site is secure

394
Q

Web browsers are…

A

software that allows users to access and display web pages on their devices

395
Q

Browsers translate ______ to images, video, text and audio

A

HTML

396
Q

What do browsers translate HTML into?

A

images, video, text and audio

397
Q

What is software that allows users to access and display web pages on their devices?

A

Web browsers

398
Q

Most browsers have what features?

A

Home page, favourites/bookmarks, history, tabs, use cookies, use links, have an address bar

399
Q

What are these features of - Home page, favourites/bookmarks, history, tabs, use cookies, use links, have an address bar

A

Web browsers

400
Q

Name 5 browsers

A

Chrome, Edge, Safari, Firefox, Opera

401
Q

What are Chrome, edge, safari, firefox, opera examples of?

A

Browsers

402
Q

The world wide web the name for

A

all websites and webpages

403
Q

All websites and webpages are known as

A

the world wide web (www)

404
Q

Websites are a collection of

A

webpages

405
Q

A collection of webpages is called

A

a website

406
Q

WWW uses what protocol?

A

HTTP(S)

407
Q

Web resources are accessed using

A

web browsers

408
Q

HTTP(S) protocol is written using

A

HTML

409
Q

What is the part of the internet that’s only accessible through web browsers?

A

World Wide Web

410
Q

What uses the internet to access information from web servers?

A

World Wide web

411
Q

___ resources are accessed by ____ browsers

A

web / web

412
Q

Payments can be sent digitally over the internet using…

A

Paypal, Apple Pay, Kakaopay and more

413
Q

Digital payments over the internet are secure because they are

A

Encrypted

414
Q

The central authority for currencies are

A

banks

415
Q

Banks are the ________ _________ for currencies

A

central authority

416
Q

An example of a central bank is….

A

Bank of England, Bank of Korea

417
Q

Examples of cryptocurrencies are

A

bitcoin, dogecoin, ethereum, cardano

418
Q

bitcoin, dogecoin, ethereum, cardano are examples of

A

cryptocurrencies

419
Q

Bank of England and Bank of Korea are examples of

A

central banks

420
Q

Cryptocurrency has no ________ _________

A

central authority

421
Q

What has no central authority for payments?

A

cryptocurrencies

422
Q

No central authority is also called

A

Decentralised

423
Q

Decentralised

A

means no central authority

424
Q

Cryptocurrency payments over the internet are secure because

A

they are encrypted

425
Q

Payments are made for cryptocurrencies using…

A

blockchain

426
Q

Blockchain is how _________ payments are made

A

Cryptocurrency

427
Q

A blockchain is like a

A

digital ledger or list of all records of payment

428
Q

Blockchains record…

A

All payments with time and date stamps

429
Q

Once added to a blockchain, records….

A

cannot be changed

430
Q

Blockchains are accessible by…

A

every connected computer

431
Q

USB

A

Universal Serial Bus

432
Q

How is data transmitted by USB

A

Uses serial data transmission / sending data to and from peripherals or devices.

433
Q

What are advantages of USBs?

A

simple interface - cable only works one way so less chance of errors // relatively high speed data transfer // universal - lots of devices use USB // can be used for power // automatically detected by computer to transfer

434
Q

What happens when you plug a USB into a computer?

A

Automatically detected - if it’s the first time, a driver is downloaded, otherwise it works without needing to download each time

435
Q

What are disadvantages of USBs?

A

Cables are limited to 5m usually // not as fast as other cables e.g. network cables

436
Q

Why are USB cables limited to 5m usually?

A

More chance of errors in data transmission over long distances

437
Q

What software is needed when a device is plugged in via USB?

A

Device driver

438
Q

USB allows both _____ and ______ data transmission

A

full duplex and half duplex

439
Q

Why keep data safe?

A

It has either personal or business value

440
Q

Examples of personal information/data?

A

credit card number, bank account, date of birth, passport number, passwords

441
Q

Data can be…

A

corrupted, deleted, or intercepted - maliciously or accidentally

442
Q

What is a brute force attack?

A

A hacker tries to crack a password using all combinations of characters

443
Q

What hacking is when a hacker tries all combinations of characters?

A

brute force attack

444
Q

What is a wordlist?

A

A very large text file containing common words for passwords

445
Q

Name facts about brute force attacks

A

No sophistication, time consuming, often uses wordlists

446
Q

What is data interception?

A

Stealing data by tapping into wired or wireless communcation links

447
Q

What is stealing data by tapping into wired or wireless communication links?

A

Data interception

448
Q

Wired data interception uses a

A

packet sniffer

449
Q

What do packet sniffers do?

A

Look at packets going over a network

450
Q

Wireless data interception is also called

A

wardriving/ access point mapping

451
Q

What makes wireless data interception harder to do?

A

If data is encrypted using Wireless Equivalency Privacy (WEP)

452
Q

DoS

A

Denial of Service

453
Q

DDoS

A

Distributed Denial of Service

454
Q

What is the purpose of a DoS or DDoS?

A

Attempt at preventing users from accessing part of a network

455
Q

DoS or DDoS facts

A

Usually an internet server, usually temporary, very damaging and large breach of security, can be individual or group target

456
Q

What is a cyber attack that is..usually an internet server, usually temporary, very damaging and large breach of security, can be individual or group target

A

DoS or DDoS

457
Q

What’s the difference between a DoS and DDoS?

A

DDoS comes from many different computers all around the world

458
Q

How does a DoS or DDoS work?

A

Floods a network with spam traffic and web servers can only handle so many requests, so they become overloaded and can’t answer legitimate requests

459
Q

How can you prevent DoS or DDoS?

A

Use up to date malware blockers / use firewalls to restrict traffic / use filters to block spam

460
Q

What are the signs of a DoS or DDoS?

A

V slow internet on network / can’t access some websites / large amounts of spam

461
Q

What is meant by phishing?

A

Creator sends out legitimate looking email; as soon as recipient clicks on a link in the email/attachment, the user is sent to a fake website

462
Q

What are the effects of phishing?

A

Loss of personal data such as bank account numbers. Can also lead to identity theft.

463
Q

How to prevent phishing?

A

Be aware and cautious when opening emails or attachments. Use anti-phishing software. Look for HTTPS

464
Q

What’s spear phishing?

A

Attacks a specific individual to gain access to sensitive information

465
Q

What’s the difference between phishing and spear phishing?

A

Spear phishing attacks one person, phishing attacks many

466
Q

What’s the aim of phishing?

A

Steal personal data like credit cards and bank information

467
Q

What is meant by pharming?

A

vicitim clicks a link and malicious code installed on their computer which redirects to fake website to steal personal information

468
Q

How do you prevent pharming?

A

Install anti-malware, don’t click suspicious links

469
Q

What’s a virus?

A

Replicates itself, corrupts data

470
Q

What’s a worm?

A

Replicates itself, finds weaknesses in networks and slows them down

471
Q

What’s spyware?

A

Records actions on a computer

472
Q

What’s an example of spyware?

A

Keylogger

473
Q

What’s a trojan horse?

A

Used to disguise other malware

474
Q

What’s adware?

A

Designed to create advert banners and popups when online

475
Q

What’s ransomware?

A

Encrypts data so you can’t access it, creators demand ransom to give it back

476
Q

What replicates itself, corrupts data?

A

Viruses

477
Q

What replicates itself, finds weaknesses in networks and slows them down?

A

Worms

478
Q

What records actions on a computer?

A

Spyware

479
Q

What’s a keylogger?

A

Example of spyware

480
Q

What’s used to disguise other malware?

A

Trojan horse

481
Q

What’s designed to create advert banners and popups when online?

A

Adware

482
Q

What encrypts data so you can’t access it, creators demand ransom to give it back?

A

Ransomware

483
Q

Name three protections against malware

A

Anti-malware, firewalls, backups

484
Q

What 3 things does anti-malware do?

A

Scans, quarantines and deletes any malware found

485
Q

What’s a firewall?

A

Helps prevent malware - looks at data coming in and out of a computer

486
Q

What scans, quarantines and deletes any malware found?

A

Anti-malware

487
Q

What helps prevent malware - looks at data coming in and out of a computer?

A

Firewalls

488
Q

What looks for spyware?

A

Anti-spyware

489
Q

Social engineering is…

A

When a perpetrator will try and manipulate and deceieve someone into providing them with personal or confidential data

490
Q

What’s it called when a perpetrator will try and manipulate and deceieve someone into providing them with personal or confidential data?

A

Social engineering

491
Q

What’s the aim of social engineering?

A

To get data to commit criminal activity, such as stealing money, hacking into a computer network, and identity theft or fraud

492
Q

How can you prevent social engineering?

A

Access levels to data and staff training of how social engineering works

493
Q

What is a word list

A

a text file containing a collection of words used in a brute force attack

494
Q

What is packet sniffing?

A

a method used by a cybercriminal to examine data packets being sent over a network and to findthe contents of a data packet, which are sent back to the cybercriminal

495
Q

What’s wardriving?

A

using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data;sometimes called Access Point Mapping

496
Q

What’s spam?

A

unsolicited emails sent to a user’s mailbox

497
Q

What are access levels?

A

different levels of access in a computer system allowing access depending on the users security level

498
Q

What’s anti-spyware?

A

software that detects and removes spyware programs installed on a system; the software is based on typical spyware rules or known file structures

499
Q

What’s a patch?

A

An update for software that improves its and/or removes bugs

500
Q

What’s a SSL certificate?

A

A form of digital certificate that authenticates a website, and any data transmission between the browser and website is secure