got wrong lots+99% of times Flashcards

1
Q

the most appropriate device to input the following:

information from the chip in an electronic passport

A

RFID reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the most appropriate device to input the following:

text from an id card

A

Optical Character Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the most appropriate device to input the following:

account details from the front of a credit card at an EFTPOS terminal

A

Chip reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the most appropriate device to input the following:

account details from the back of a credit card at an EFTPOS terminal

A

Magnetic stripe reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

define phising

A

send emails to fraudulently obtain another person’s bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

define pharming

A

illegally installing malicious code which redirects a person to a fraudulent website with the purpose of obtaining that person’s bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HILARY

A

PHISING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

pharming on a large scale

A

websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define smishing

A

sending text messages to fraudulently obtain another person’s bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the details of computer addresses that are stored by a router

A

Stores IP addresses
IP address is a unique identifier set up by network manager/ISP
Can change but should match the network it’s on
IP address consists of 4 numbers separated by full stops
Stores MAC addresses
6 pairs of hexadecimal digits
MAC address is usually hard coded by manufacturer, never changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(c) Explain how Optical Character Recognition is used before the computer processes the data
car plate

A
  • camera takes image of number plate
  • stores in file
  • Software identifies number plate in image and crops
  • OCR software converts into digital data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is URL

A

Uniform Resource Locator

e.g dogshite.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

reduce the amount of excess information on search

A
Used advanced searches
Use Boolean operands…
…use + and – to limit results to only key words
Use speech marks around key phrases
Use the specific web address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the most appropriate device to input the following:

data written in special ink at the bottom of bank cheques

A

Magnetic Ink Character Reader/Optical Character Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the most appropriate device to input the following:

information on the label of a supermarket product

A

bar code reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the most appropriate device to input the following:

shaded in boxes on a student’s examination answer sheet

A

Optical Mark Reader

17
Q

the most appropriate device to input the following:

debit card details input at an ATM

A

magnetic stripe reader/chip and PIN reader

18
Q

items of hardware which would enable the computer to be connected to a local area network

A

– hub
– switch
– NIC
– bridge

19
Q

Name one item of hardware which would enable the network to be connected to the internet

A

router/modem

20
Q

what is GPS

A

Global Positioning System
– space-based navigation system
– typically four satellites must be visible to the receiver
– calculates the distance from a receiver to the satellite
– calculates the position of the receiver

21
Q

Compare and contrast the use of magnetic tapes with removable magnetic disks to make network
server backups

A
tapes
–  cheaper per bit
–  more compact  for the same memory
–  less prone to data loss/mechanical failure
– slower to access lost work
– slower to restore the system

both
– store large amounts of data
– fast data transfer rates
– can be stored well away from the server

22
Q

There are many microprocessor controlled devices in the modern home. Discuss the effects of
these on people’s lifestyles.

A

😀microprocessor controlled devices do housework
👉dont need to do things manually
👉 be in house when cooking/washing clothes
😀 greater social interaction
😀 more leisure time/ do other things
👉leave home to get fit
👉go shopping
👉work at any time
😀 able to do other things when convenient
😀 encourage a healthy lifestyle

Negative
😡 unhealthy eating bc dependency on ready meals
😡 laziness/lack of fitness
😡 manual household skills are lost
😡 microprocessor controlled burglar alarm provides a sense of security

23
Q

pros/cons of WLAN than LAN

A

😀 cheaper as less cabling is required
😀 new workstations can be sited anywhere
😀different devices can be connected easily

😡 limited area of network
😡  strength of signal is weaker
😡 easier to hack into/less secure
😡  physical obstacles can interfere with signal/can cause disconnection
😡  slower data transmission rates
24
Q

(a) Describe what an RFID chip consists of

A

– an integrated circuit
– which contains aerial
– which receives and transmits data

25
Q

Describe how RFID will be used as he passes through passport control.

A

– he places his passport against the RFID reader
– he stands in front of a scanner/fingerprint scanner is used
– his facial characteristics/fingerprints are compared with…
– …those stored on the RFID chip

26
Q

Describe the differences between RAM and ROM.

A
  1. ROM cannot be changed x – RAM can be read from and written to
  2. ROM is read only memory and RAM is random access memory
  3. ROM holds instructions that need to be unchanged, such as BIOS/program cycles in a washing machine/ program instructions in games
  4. RAM holds the work that is currently being done by the user
27
Q

Describe two ways that students can prevent the work they save from being edited by others IN LAN

A
  • Make their file read only
  • Password encrypt their file/work
    Make their file hidden
28
Q

Describe what a virus is and explain how viruses cause problems for computer users

A
  • A programming code
  • replicates itself
  • Attaches itself to files
  • Corrupts/deletes files/data
  • corrupt or erase the contents of the hard disk
  • fill the hard disk/memory 👉 slows down operation
  • Makes software/operating system unusable
29
Q

what is a spyware

A
  • Software gathers data from computers without the user realising
  • monitors and records all key presses
    👉 sends this info back to hacker
    👉gain personal details of users
30
Q

what is hacking

A
Illegal accessing of data
Unauthorised access to computer system
changing of data
Copying/ distributing data
Using data for fraudulent purposes
31
Q

RAM (Random Access Memory)

A

RAM

  • Temporarily stored, currently in use
  • can be read and change
  • Fast memory, written to/ read from
  • Volatile memory, information is deleted as soon as computer is turned off
  • More RAM = faster computer
  • info
32
Q

1.Describe the processing which takes place during an electronic funds transfer.

A

Details from customer’s card processed
- PIN is compared with that stored on chip
- Card is checked for validity/reported stolen
-If PIN is OK/verified transaction is authorised
(Bank code allows) shop computer to contact bank’s computer
-Account checked for sufficient funds,if
1. credit limit then transaction/card is rejected/
2. sufficient funds then transaction is authorised
- Amount deducted from customer’s bank account
- Amount credited to shop’s bank account
- Itemised receipt printed out