GSCE Computer Science Flashcards
why do we need primary storage
RAM- store instructions while computer is running. CPU fetches instructions from RAM, stores operating system, currently in use programs, open applications and data in use
ROM- stores boot-up sequence for BIOS, loads operating system
difference between RAM and ROM
ROM= non-volatile, usually fixed, contents of it hardly ever changes, smaller than RAM, stores boot up sequence, stores BIOS, loads operating system RAM= volatile, easily expandable, contents change frequently, larger than ROM, stores programs currently in use, open applications, data in use and operating system
virtual memory
Part of secondary storage
Used to store data temporary’s when ram full, data moved from RAM to VM
Make space in RAM
So ram can be filled up with new data
Let’s you run applications larger than what ram can support
Let’s more memory be used than there is in the system
Allows us to open programs when RAM is full
When data in vm is needed, moved back to ram
Virtual memory disadvantage
slows down CPU performance - disk thrashing ( overuse of virtual memory)
Data has to go from virtual memory to ram to CPU and virtual memory is apart of solid state drive/hard disk/secondary storage
this transferring takes processor time
What is secondary storage
long term non-volatile storage of data/files
not constantly connected to computer and devices
isn’t directly accessible by CPU
Why is secondary storage needed
To permanently save files, data and programs when the computer is switched off
back up the data stored in ram
Need for larger storage capacity
RAM is volatile, ROM cannot be written to
what are the types of secondary storage
optical
magnetic
solid state
optical storage
- slow
- easily scratched - low reliability, low durability
- small capacity 700mb -50gb
- small
- portability , easy to move about
- cheap
- no moving parts
- can be backed up easily
- can’t be over written, read-only
- Can be read by other devices
magnetic storage
has moving parts so:
- only reliable in a machine that doesn’t move
- not portable though portable HDD can be get
- has moving parts so not durable
- slow-medium speed
- very large capacity 1-12tb
- cheap
- Data could be corrupted if close enough to a magnetic field
Solid state storage
No moving parts Fast speed Large capacity 250gb-2tb Portable Durable Reliable As no moving parts Expensive cost Can get lost Wear out over a long time period
Properties you should consider when deciding on type of storage to use
capacity
cost
speed
size
portability- physical and if data can be moved from one device to another
durability- ability to resist damage, length of time expected for data to last
reliability- whether data will be saved as expected, data is not affected when saved, no changes to file formatting
robustness
How does optical storage work?
Laser light creates marks in a pattern on a disc
laser light detects where marks are and translates it into readable format
Optical storage capacity
CVD rom- up to 720mb
DVD- up to 8.4 gb
Blu ray- up to 50gb
How does magnetic storage work?
Info is written to/read from the storage medium as it spins by read-and-write heads that changes how magnetised that part of the medium is. heads that detect/ modify the magnetism to read data. magnetism is 1, demagnetised is 0
How do solid state storage work?
made of microchips (switches)
state of switches determine if 1 or 0 is stored
Optical storage examples
Magnetic storage examples
Solid state examples
Solid state storages- USBS drives, Solid state (SD) drives, memory cards, flash memory
Magnetic storage- magnetic tape, mechanical hard disk drives, portable HDD
Optical- Blu-ray, CVD-ROM, DVD
Units
Bit (0 or 1) Nibble (4 bits) Byte (8 bits) Kilobyte (1,000 bytes or 1KB) Megabyte (1,000 KB) Gigabyte (1,000 KB) Terabyte (1,000 GB) Petabyte (1,000 TB)
What is meant by a bit
the smallest representation of data, 1 or 0. Single binary digit
How data needs to be converted into a binary format to be processed by a computer
Computers consists of transistors/switches/logic circuits/ gates which only have two values/ on or off/1 or 0/ open or closed
Circuit only needs to check for two states/ uses switches electricity flowing or not flowing/on or off/1 and 0
Computers consist of
Binary numbers, 1 or 0
The circuit only needs to check for the states 1 or 0
Only understands binary
What is a overflow error
When we add or shift a number and it becomes too big for the register , number can’t fit into 8 bits and is greater than 11111111 and there is a extra carry/bit
Hexadecimal
One hexadecimal is equal to one nibble
made up of 4 bits per hex digit
used in: defining colours in graphics software, represent MAC addresses , displays address, for checksums
Advantages of hexadecimal
Why do people use hexadecimals to represent numbers stored in computers
Straightforward to convert, easier to convert to binary as each hexadecimal digit is a nibble in binary Shorter number to remember than binary Quicker to enter Less susceptible to errors Easier to work with than binary
Binary shifts
Shift to right of binary, if u convert to denary you’ll see it has been divided by 2
Shift to left, multiply by 2
Character set
The range of characters (symbols, numbers, letters) that can be represented by a computer
each character has a binary value that computer understands/uses.
What is used to represent characters
Each character is assigned a unique character code (binary value)
Character set examples
ASCII: 7 bits, 128 characters
Extended ASCII: 8 bits, 256, more characters it can represent and European symbols and other languages
Unicode: 16 bits or up to 32 bits. Encodes set characters. All languages
What does ASCII stand for?
American Standard Code for Information Interchange
7 bit character system used to code the character set the computer uses
System uses code to represent characters, symbols, numbers
Why would Unicode be used
To use other special characters found in different languages
A image is made up of
pixels which have a binary value to them which represents a colour
Smallest element of a image
The binary numbers are stored in order in the file
Bitmap image
Based on pixels
Each have binary value
That represents a colour
Vector image
Based on mathematical algorithms
Colour depth
Amounts of bits stored per colour of pixel
How many colours that can be represented
The bigger the colour depth=The higher the accuracy, more colours can be represented.
But higher file size
Resolution
Number of pixels per inch of screen
For image: size of image. number of total pixels (image width x image height)
Increasing resolution
Only increases quality if screen is bigger
Smaller images on big screens, image is stretched and lowers quality
Otherwise, increasing resolution= decreases battery life
/larger file size as more pixels-more data needed to be stored
How does reducing the number of colours in a image can reduce its file size
Colour depth decrease
Fewer bits needed per colours
As less colours are represented
Which means fewer bits per pixel
Opposite: more colours, more bits required for each pixel
E.g
two bits per pixel (00 to 11) - four possible colours
Meta data
Background information (data) of a file
computer needs to know the size of the image (height, width, colour depth in bpp)
Allows the computer to recreate the image from binary
How sound is sampled and stored in digital form
Amplitude of waveform measured
Converted into binary
At regular intervals
Sample frequency
Number of samples taken per second
Bit rate
How much data is being processed per sec
Sample frequency x bit depth x channels
Bit depth (audio)
Number of bits taken per sample
Larger sample frequency and bit depth
Better quality
Higher file size
More bit depth- more sound/ data captured
More sample frequency- less time gap between each sample
Sound reproduced is closer to original- accuracy
The need for compression
- Quicker upload/download/load/transfer time
- Less storage space taken up
- less mobile data/bandwidth usage
Lossless compression
Uses algorithm to compress file No data is lost (data lost is only temporary, comes back when file is uncompressed) Reduces file size less than lossy Better quality Suit for text and code as no data lost
Lossy compression
Permanent loss of data
Cannot return to its original condition/not identical to original as data removed
Reduces file size more/significantly
Loss of quality more
Unlikely to be noticed by humans
For unnoticeable data / end users unlikely to notice the removal of data
E.g images, videos, sound
Where loss of quality is an acceptable trade off for smaller files
Cannot be used for text/code, makes unreadable /unable to execute code
Optical storage different types
ROM- data pre-written on them by manufacturer. Cannot be overwritten. Use:Music, films, software, games.
R- blank. Writes data but can only be written once.
Can be ready many times. Use:Copying data.
RW- can be written more than once
How to calculate number of bits
pixel width x pixel height x colour depth (bit per pixel)
Examples of sound files and video files
sound= FLAC, MP3, WAV video= MOV, MP4, AVI
ALU (Arithmetic Logic Unit)
Performs logical and arithmetic operations (calculations and logical comparisons)
Fetch decode execute cycle detailed steps.
Program counter copies address of the next instruction to be run from RAM and stores it in the MAR. Program counter increments by 1. MAR stores the address of data. CU fetches data using address and stores data in MDR. Data is decoded by CU, and executed (e.g ALU does calculation)
What does the fetch decode execute cycle do?
TO PROCESS DATA
Instruction fetched from RAM memory.
Instruction decoded. Instruction executed.
Process is repeated.
CPU performs continuously.
CU (Control unit))
Controls and monitors communications between hardware attached to the computer. Controls input + output of data..
decodes instructions
Checks if signals have been delivered successfully.
Makes sure data goes to the correct place at the correct time.
data transfer between the registers in a CPU synchronized to the clock- co-ordinates all of the other components of the CPU.
Registers are
small fast memory storage with a set purpose
Accumulator, MAR, MDR, Program counter
Memory address register (MAR)
Stores address of
data that will be read/written/accessed/fetched/being processed/next to be processed
Memory data register (MDR)
Stores data that is fetched/written to memory/next to be processed data/data fetched from data address in the MAR
Program counter
Increments by 1
holds the address of the next instruction to be executed and copies it to MAR
Accumulator
Stores result of ALU
Things that can affect the performance of a computer
RAM (only if the computer runs out of memory space in ram, less reliance on VM)
Cores
Clock speed
Cache
Graphics Card
Sound card
Motherboard
Clock speed
number of FDE cycles run per sec/or given time. Measured in hertz
1 Ghz=1 billion cycles per sec
Higher Clock speed=more processing it can do per sec+instructions executed faster
Cores
. Allows multitasking/parallel processing. Each core can simultaneously execute instructions or run different parts of the program at the same time. Can process instructions independently of eachother
Double core processor eg:
Processes can be split up between processors and processed faster. More processes completed per second
E.G doubling the cores, doubles maximum processing the CPU can do
However, only improves performance if software is designed for multiple cores/depends on task
Why does having multiple cores sometimes not increase performance
-If software isnt designed for it :isn’t programmed to be split between more cores
-Depends on the task, some tasks cannot be split across cores
-Other factors besides from cores affect performance
e.g a quad core may have a lower clock speed, RAM size, cache size, than dual core
Cache
Stores frequently, recently and next to be used data
that can be accessed faster than accessing it through RAM
as transferring data to and from CPU and cache is faster than data to and from CPU and RAM.
Too much cache is detrimental as it will take longer for CPU to find the specific instructions in cache.
Increasing the cache, more data is transferred faster, makes CPU more efficient
Embedded system
computer system built into another device.
embedded system examples
Microwave, washing machine, dishwasher, oven, MP3 player, digital clock, calculator, coffee maker.
What is a embedded computer
single microprocessor that includes RAM, ROM and the CPU.
Its frequently used to control a device using simple controls.
Has a dedicated/limited purpose
Mostly designed to do one specific task
Simple/no user interface
General purpose computer
Designed to be able to carry out many different tasks
Consists of hardware and software
Flow of data is input>CPU>primary memory/secondary memory> output
Can have many applications
E.g access the internet, play games/videos/music, email, store and retrieve data
What does the CPU do
Processes data and instructions
FDE cycle
Controls computer system
Software and hardware
Hardware - physical components of computer
e.g CPU, hard disk, monitor, keyboard, mouse
Software- programs that run on computer
Buses
High-speed internal connection
Sends control signals and data between processor and other components(RAM memory, input/output devices)
Address bus- memory address
Data bus-data
Control bus- clock’s pulses, control signals
Von Neumann architecture
Data and instructions stored as binary and both stored in one memory (RAM), instructions fetched from memory serially (in order) one at a time
processor decodes+executes instruction, then cycling around to fetch next
Cycle continues until no more instructions
Input device>
CPU (control unit, arithmetic logic unit, registers)
Memory unit
Output device
network
set of connected computers and other devices in order to share resources
network benefits
- can share files/ can work collaboratively on the same files
- can share hardware resources
- can access their files from any computer
- can work together from different computers using instant messaging
- centralised deployment of software to all computers
LAN
covers small geographical area
usually located on a single site
uses its/connected by own internal infrastructure/hardware
uses cables and radio waves to connect
Examples include home, small business, school networks
Generally the router connects the devices in a LAN together
WAN
covers large geographical area
uses external infrastructure/hardware
two or more LANS connected together
Uses cables. Telephone lines, satellites, radio waves to connect
Examples include ATM machines, the internet, international banking systems
similarities of WAN and LAN
allow devices to communciate with eachother
allow for shared periperhals
allow for remote maintenance
Speed of a network
Bit per sec (bps) E.g Kbps Mbps Gbps
Bandwidth
How much data can be transferred over a connection in a given time
Bandwidth is shared/split between connected devices
E.g 54mbps per device if there’s 1 device, 27mbps per device if there’s two devices
Factors that affect the performance of networks
Wired/wireless connection
Bandwidth available
Number of users using the network at the same time
Number of data collisions and transmission errors
Interference (wireless)
Signal strength
Amount of data being transferred/applications being used
Server/CPU performance
Hub/switch
Client server model
Network relies on a central server
clients (devices) request services from server (e.g print services/ file services)
client is dependent on server to provide/manage the resources and info
Pros and cons of client server model
All files can be stored centrally
-user monitoring
-workers can access files from any computer
-all computers can update the central database/file
Backups are central
-all data is backed up each time
-individual computers do not need to backup their own data
Upgrade software centrally
-so you do not have to install on each computer individually
Central security (antivirus/firewall)
Centrally administered in one location
———————————————-
Central point of failure
Can be expensive to maintain and set up (e.g cabling costs, specialist staff.)
specilised required to set up server
central server needed
Peer to peer network model
No central server
Devices on the network have equal status
Files and data are shared between devices on the network
Pros and cons of peer to peer network
Easier to set up - simply be cabled together
easier to add new devices
No special software/specialist required to run
less initial cost and maintenance
If client goes down/fails, can connect to another peer (computers directly connected to eachother)
no reliance on the company’s server and it’s connection to the internet, computers are independant and equal - decentralised
no need to invest in lots of hardware and bandwidth and system likely more fault tolerant
no central software installation/devices can have different software
———————————————————————–
decentralised - no central file storage- files stored on individual machines - hard to find and located a certain version of file and files may become out of date.
Performance- as the number of connected devices increases, each computer is being accessed by the other so performance decreases
security problems - no central security so computer will need own security, and more vulnerable to social engineering as equal status and the malware can spread throughout the network
backup recovery- data is not centrally back up/updated so data have to be backed up individually and separately by user.
The hardware needed to connect stand-alone computers into a local area network
Routers Switches Wireless access points Network interface card Transmission media
Routers
- Directs packets/data to destination in a network
- Receives packets/data from network/Internet
- forwards packets/data to other computers on a network/internet
- connects (different) networks together e.g joins home network to Internet
- Has public IP address for LAN
- Designates private IP addresses to network nodes
Switches
- connect devices together
- receives data n directs traffic only to its destination
- generates list of connected devices, receives signals
- uses MAC address of devices connected to it
Wireless access points
-allows wireless devices to connect to wired network using Wi-Fi
usually connects to a router (via a wired network) as a standalone device/ integral component of router itself
-the further the device is away from WAP, signal strength weakens and possible wireless interference too (obstructions e.g walls)
Network interface card
- Built into most devices, allows to connect to wired/wireless network
- Allows data packets to travel to and from a computer
- contains MAC address (physical hardware address)
- allows Ethernet cable to be plugged into it
Transmission media
Ethernet (Cat 5e/ Cat 6) (twisted pair)
-A networking standard (uses twisted pair cabling or fibre optic)
-cheap, max transmission speed is up to 1gbps, max distance for reliable communication up to 100m
——————————————————————————————
Fibre optic
-often used with WAN or larger LANS
-expensive but fast, max transmission speed is over 40tbps, max distance for reliable communication is over 2km
-higher bandwidth, faster transfer speeds
-data can be transmitted over long distances without any loss of signal quality and as they transmit through light, they do not suffer from electrical interference
————————————————————————————————
Coaxial cable
-an older networking standard
internet
Inter-networking
giant mesh WAN
Worldwide collection of computer networks connected together
How a DNS (domain name server) is used in the process of accessing the website
-Allows you to type a web address into your web browser and translates it into an IP address
-Domain Name Service contains many DNS(domain name servers)
-DNS servers contain a database of domain names/URLs/website addresses, and their corresponding IP addresses
-The domain name/website address entered by a user is looked up in the DNS database tables to find the matching IP address
All packets are transmitted via IP addresses- therefore to access the server that hosts a website the IP address would be needed
Hosting
Website is placed on web server - known as hosting and a suitable domain name selected
Web servers & clients
main purpose of web server: host websites and deal with client requests
When website visited on client (device), a request to the web server is sent and then the website (stored as text HTML) is sent to the client and recreated in the browser
The web server is located via IP address
Client to web server process
- website is hosted on a web server
- website/web server has an IP address
- browser sends URL to DNS
- URL has a linked IP
- DNS finds IP
- ///if DNS cannot find the IP it passes request to higher DNS
- ///if not found, return error
- if found, IP address sent back to the browser/computer
- (Browser) sends request to IP/web server using IP
- web server processes request for website/page
- web server sends webpage/file/data to the user
The cloud/ cloud computing
Computing done outside of your local network. Network of servers
Some servers run applications, some store data
Data is stored on the internet and remotely in large centre data servers across the world and managed by cloud providers
Advantages of cloud
- efficient method of backing up data, saves time and money
- Allows employees to work from anywhere
- Environmentally friendly
- Easy to increase availability of storage
- Specialist network skills not needed, don’t need to employ more staff
- Cloud third party provides security+backups, saves money on staff and software/hardware
- Cheaper as don’t need own infrastructure
- Increase storage
- Access files anywhere in the world
- Collaborate with others around the world
Disadvantages of cloud
- Need constant internet connection
- Reliant on third party to carry out security procedures,company itself still legally responsible if things go wrong, back up connection
- Data vulnerable to hacking+other threats which the company have no control over
- Issues regarding data ownership
- Implications of data protection act
Star network topologies
Each device on network has own cable that connects to a switch/hub
hub sends every packet of data to every device/switch only sends packet of data to destination device
Advantages and disadvantages of star network topology
If a device fails the rest of the network is unaffected Simple to add new devices Good performance Fewer data collisions Easier to manage from a central point ------------------------------------------------------------------------------------ If switch dies, network dies Can be expensive for cables
Mesh network topology
No central connection point
Each node connected to at least one other node and squally to more than one
Each node is capable of sending messages to and receiving messages from other nodes
The nodes act as relays, passing on a message towards its final destination
Mesh advantages and disadvantages
-no single point where the network can fail, if a node in the route fails the packet is sent a different way
-Can handle high volumes of traffic
-adding more nodes will not hinder the process as all nodes help to transmit data
—————————————————————————–
Expensive to set up, needs lots of cables
Difficult to manage and maintain
Wired
Ethernet/fibre optic/coaxial cables to form connections between nodes(networked devices)
Wireless (Wi-Fi)
medium range wireless technology used to connect devices together
uses radio waves transmitted by a WAP that has a wired connection to the internet
examples:
2.4Ghz - ultra high frequency
5Ghz - super-high frequency
Wired advantages and disadvantages
generally faster data transfer compared to wireless networks
much less likely to suffer from interference than wireless networks
more difficult for unauthorised users to intercept data
——————————————————————————–
expensive to install or reconfigure
users cant instantly move a device from one location to the another as there might not be a network connection available
Wireless advantages and disadvantages
Allows more flexibility with location as users can move around freely and still stay connected
cheaper to setup
new nodes can be added easily without interruption to the network
————————————————————————————
wireless transmission is slower than cabled
more devices/users could be connected e.g mobile phones//increase in traffic reducing bandwidth available for each user//insufficient bandwidth for users/demand
wireless can be limited by interference such as wall or other wireless users that disrupt the signal
radio signals pose a security risk as they can be intercepted by unauthorised users. to overcome this problem, messages need to be encrypted.
Bluetooth
Uses radio frequencies
No physical cable connections required
Designed to enable range of portable devices to connect to each other and to less portable hardware
Operates over short range (10~100m) which can be affected by obstacles
Devices do not need to have a direct line of sight to connect
Common uses:
Sharing data files between mobile phones
Sending audio to Bluetooth speakers
Bluetooth advantages and disadvantages
-Low cost to set up
-Uses relatively little power compared to other types of wireless connection
-you can easily set up Bluetooth networks with other Bluetooth enabled devices
————————————————————————
Short range
Low level of security
Low data transmission rate
IP addressing and IP Address
IP addressing is
data travelling on a network are sent as packets
each device on the Internet has a unique IP address which is used as an “address” to send the packets
——————————————————————————————
IP Address is a
unique ID
can be changed/allocated as needed
configured by software
used for routing across the internet or Network
IP address IPv4 system
P address IPv6 system
4 bytes long
4 sets of 8 bits
Values separated by dots
normally written in denary 0-255
allow for just over 4 billion unique addresses
———————————————————————————————
8 groups of 4 hexadecimal digits
8 sets of 16 bits
values separated by colons
allows almost 80 octillion unique IP address
MAC address
consists of 12 hexadecimals/normally written in hex
48 bits / 6 bytes long
configured in hardware
only used within a LAN
fixed/cant be changed
unique serial number assigned to each network interface controller
unique to device, allows network to uniquely identify any device; even when a dynamic IP address is assigned using DHCP(dynamic host configuration protocol)
The router assigns IP addresses based on the mac address
network protocol and protocol
Protocol: set of rules for data transmission and communication between hardware
Network: set of rules for data transmission across a network
for how computers should communicate//how data is sent/received/transmitted on a network
defines standards + rules for data transmission
TCP/IP
internet protocol suite
set of protocols used over the internet
organizes how data packets communicated,makes sure packets have:
source- which computer the message came from
destination- where the message should go
packet sequence- the order the message data should be re-assembled
data- the data of the message
error check-the check to see that the message has been sent correctly
——————————————————–
TCP splits data into packets, numbers them, reassembles packet and orders them at other end, resends lost messages, detects errors
IP locates destination and routes the packets over the network via routers
Packet switching process
request split into packets
each packet is given the address and a number
and consists of two parts (header - IP addresses, number, total number of packets, protocols used) and payload (message itself)
packets are sent across the network
packets are received by the host server
server checks if all packets have arrived
if they have not: timeout is sent to request the packets are resent
if they have: packets put in order
Network protocols
HTTPS (Hyper Text Transfer Protocol)-Viewing a website using a web browser. Uses secure socket layer. Encrypts data and connection itself.
HTTPS (Hyper Text Transfer Protocol Secure)-Viewing a website using a web browser but Encrypts the connection
FTP (File Transfer Protocol) - Used for sending or retrieving files to or from a remote server or computer. Uses a client-server model /sends from client to server, sends from server to client
POP-retrieves/accesses/downloads email from a mail server
removes the email from the server and transfers it to the device
IMAP-Retrieves and downloads a copy of an e-mail from the server, Allows synchronisation/management of account
SMTP-sends/forwards/transmits e-mail from one server to another
or/and from an email client (device) to a server
layers (4 layer model)
a division of network functionality
application layer- encodes/decodes the message in a form that is understood by the sender and the recipient. HTTP, HTTPS. SMTP, IMAP, FTP, POP
transport- breaks down the message into packets. Each packet is given a packet number and total number of packets. Recipient uses this info to assemble packets together in correct order and to see if there’s any missing packets. TCP, UDP
network- adds the sender’s IP address and that of the recipient/ The network knows where to send the message, and where it came from. DNS. IP
data link - enables the transfer of packets between nodes on a network, and between one network and another. Operating system drivers and NIC, Ethernet/Wireless LAN
advantages of using layers to construct network protocols
splitting networking into layers means each layer is self-contained - does not need to consider what the other layers do - each layer has its own purpose and can be programmed individually
allows different developers to concentrate on one aspect of a network
a layer can be removed or modified without affecting other layers
promotes interoperability between products from different vendors/systems
individual protocols are smaller/simpler to manage
different layers can interact with different hardware
A device not connected to a network is called
A stand-alone
Virtual network
Network that can securely connect
Geographically unrelated computers
Via the internet
Virtual network servers create a network that has no direct physical connection but allows file sharing and communication
Enable users at home to connect to the organisation’s data and facilities and work at home
Latency
How long it takes a message to travel from one device to another across a network
Low latency= few transmission delays
High latency- more delays, longer to transmit data
Transmission errors
When two devices on a network try to communicate simultaneously along the same communication channel. Their signals collide and the transmission fails.
Role of web client and web server
web server:
Control access to a centralised resource (definition of a server)
Stores content and layout data for web pages
Receives+processes requests for web pages
——————————————————————————–
web client
Sends requests for web pages
Sends DNS requests for IP addresses
Displays the result of web requests
Encryption process of HTTPS
Client requests HTTPS session
Certificate sent to client from the server
Client creates sesshion key
Encrypted session key is sent to the server
Session key is decrypted with private key
Session encrypted with session key
standard
all manufactureres/developers agreeing to follow something when working in a specific area
so devices/applications are able to communicate with eachother even if created by different vendors
e.g protocols. devices communicating over network must use the same protocols to allow them to understand eachother.
Malware
Piece of software/code/a program
That replicates itself and causes damage by editing or deleting files
Prevent by running anti malware software and not downloading from unknown sources or clicking on unknown links
Virus
malicious software embedded in a program that replicates itself and causes damage to the computer by deleting/altering files/data
Trojans
Programs which pretend to be legitimate but are malware. Disguised as email attachments often. Cannot spread by themselves and deceived a user into installing the program
Worms
Replicates themselves and become part of other programs and cause damage by deleting or modifying data. Often spread through emails.