Factors Influencing Performance Flashcards

1
Q

Discuss RAM as a factor

A

Random access memory: stores volatile data and beeds power to do so. Stores instructions CPU needs while operating
-More RAM allows multitasking
-More RAM increases speed of which data can be accessed
-caching: temporary storage of data in cache so it can be accessed quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss CPU as a factor

A

The speed it has (GhZ)
The number of cores
The cache size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hard disk drives and solid state drives as factors

A

The storage of data
More is always better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is malware?
Discuss viruses, trojans, ransomware, spyware and adware

A

Malicious software installed without consent to corrupt, damage or gain access to computer.
Virus: replicate and spread fast
Trojan: hidden as legitimate looking applications
Ransomware: incrypt files for ransom
Spyware: gathers your personal information
Adware: displays adverts automatically without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discuss social engineering. What is disk jacking, key logging and phishing?

A

Deception to manipulate or scam someone for their confidential information or access to their computer
Disk jacking: attack where site appears to do one thing but does another
Keylogging: logs what keys you input
Phishing: emails from legitimate looking addresses to scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss the different categories of computer crime. Harassment, internet attacks, theft

A

Harassment: Continuous bother of someone with messages/data they dont want. Can be cyberstalking, spam, uploading your data or cyberbullying
Internet attacks: attack on IT infrastructure. Attacking buildings, sites, buildings
Computer theft: for example using someone else’s broadband, passwords or identity theft
Data theft: physically copying people’s data, or intercepting it. Results in plans, financial information or intellectual property and thus money loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly