got wrong lots+99% of times Flashcards
the most appropriate device to input the following:
information from the chip in an electronic passport
RFID reader
the most appropriate device to input the following:
text from an id card
Optical Character Reader
the most appropriate device to input the following:
account details from the front of a credit card at an EFTPOS terminal
Chip reader
the most appropriate device to input the following:
account details from the back of a credit card at an EFTPOS terminal
Magnetic stripe reader
define phising
send emails to fraudulently obtain another person’s bank details
define pharming
illegally installing malicious code which redirects a person to a fraudulent website with the purpose of obtaining that person’s bank details
HILARY
PHISING
pharming on a large scale
websites
define smishing
sending text messages to fraudulently obtain another person’s bank details
Describe the details of computer addresses that are stored by a router
Stores IP addresses
IP address is a unique identifier set up by network manager/ISP
Can change but should match the network it’s on
IP address consists of 4 numbers separated by full stops
Stores MAC addresses
6 pairs of hexadecimal digits
MAC address is usually hard coded by manufacturer, never changes
(c) Explain how Optical Character Recognition is used before the computer processes the data
car plate
- camera takes image of number plate
- stores in file
- Software identifies number plate in image and crops
- OCR software converts into digital data
what is URL
Uniform Resource Locator
e.g dogshite.com
reduce the amount of excess information on search
Used advanced searches Use Boolean operands… …use + and – to limit results to only key words Use speech marks around key phrases Use the specific web address
the most appropriate device to input the following:
data written in special ink at the bottom of bank cheques
Magnetic Ink Character Reader/Optical Character Reader
the most appropriate device to input the following:
information on the label of a supermarket product
bar code reader
the most appropriate device to input the following:
shaded in boxes on a student’s examination answer sheet
Optical Mark Reader
the most appropriate device to input the following:
debit card details input at an ATM
magnetic stripe reader/chip and PIN reader
items of hardware which would enable the computer to be connected to a local area network
– hub
– switch
– NIC
– bridge
Name one item of hardware which would enable the network to be connected to the internet
router/modem
what is GPS
Global Positioning System
– space-based navigation system
– typically four satellites must be visible to the receiver
– calculates the distance from a receiver to the satellite
– calculates the position of the receiver
Compare and contrast the use of magnetic tapes with removable magnetic disks to make network
server backups
tapes – cheaper per bit – more compact for the same memory – less prone to data loss/mechanical failure – slower to access lost work – slower to restore the system
both
– store large amounts of data
– fast data transfer rates
– can be stored well away from the server
There are many microprocessor controlled devices in the modern home. Discuss the effects of
these on people’s lifestyles.
😀microprocessor controlled devices do housework
👉dont need to do things manually
👉 be in house when cooking/washing clothes
😀 greater social interaction
😀 more leisure time/ do other things
👉leave home to get fit
👉go shopping
👉work at any time
😀 able to do other things when convenient
😀 encourage a healthy lifestyle
Negative
😡 unhealthy eating bc dependency on ready meals
😡 laziness/lack of fitness
😡 manual household skills are lost
😡 microprocessor controlled burglar alarm provides a sense of security
pros/cons of WLAN than LAN
😀 cheaper as less cabling is required
😀 new workstations can be sited anywhere
😀different devices can be connected easily
😡 limited area of network 😡 strength of signal is weaker 😡 easier to hack into/less secure 😡 physical obstacles can interfere with signal/can cause disconnection 😡 slower data transmission rates
(a) Describe what an RFID chip consists of
– an integrated circuit
– which contains aerial
– which receives and transmits data
Describe how RFID will be used as he passes through passport control.
– he places his passport against the RFID reader
– he stands in front of a scanner/fingerprint scanner is used
– his facial characteristics/fingerprints are compared with…
– …those stored on the RFID chip
Describe the differences between RAM and ROM.
- ROM cannot be changed x – RAM can be read from and written to
- ROM is read only memory and RAM is random access memory
- ROM holds instructions that need to be unchanged, such as BIOS/program cycles in a washing machine/ program instructions in games
- RAM holds the work that is currently being done by the user
Describe two ways that students can prevent the work they save from being edited by others IN LAN
- Make their file read only
- Password encrypt their file/work
Make their file hidden
Describe what a virus is and explain how viruses cause problems for computer users
- A programming code
- replicates itself
- Attaches itself to files
- Corrupts/deletes files/data
- corrupt or erase the contents of the hard disk
- fill the hard disk/memory 👉 slows down operation
- Makes software/operating system unusable
what is a spyware
- Software gathers data from computers without the user realising
- monitors and records all key presses
👉 sends this info back to hacker
👉gain personal details of users
what is hacking
Illegal accessing of data Unauthorised access to computer system changing of data Copying/ distributing data Using data for fraudulent purposes
RAM (Random Access Memory)
RAM
- Temporarily stored, currently in use
- can be read and change
- Fast memory, written to/ read from
- Volatile memory, information is deleted as soon as computer is turned off
- More RAM = faster computer
- info
1.Describe the processing which takes place during an electronic funds transfer.
Details from customer’s card processed
- PIN is compared with that stored on chip
- Card is checked for validity/reported stolen
-If PIN is OK/verified transaction is authorised
(Bank code allows) shop computer to contact bank’s computer
-Account checked for sufficient funds,if
1. credit limit then transaction/card is rejected/
2. sufficient funds then transaction is authorised
- Amount deducted from customer’s bank account
- Amount credited to shop’s bank account
- Itemised receipt printed out