IB Computer science Flashcards

1
Q

Hardware

A

<ul><li>Physical parts of a computer</li><li>Includes both internal(RAM+motherboard) and external(keyboards+monitors etc.)</li><li>Internal-<span>components</span></li><li><span>External-</span><span>peripherals</span><br></br></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peripherals

A

<ul><li>External device providing input/output</li><li>Communicate with system via device drivers</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network

A

<ul><li>Multiple devices that can communicate and share resources with one another via a transmission medium</li><li>2 main networks-<span>LANs </span>and <span>WANs</span></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

<span>Software</span>

A

<ul><li>Computer programs or sets of instructions</li><li>Consists of lines of codes that have been compiled into a program</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

<span>Human resources</span>

A

<ul><li>Describes both people who work for a company/organisation+dept that manages resources for employees</li><li>Known as&nbsp;<span>end-users</span><span> and </span><span>stakeholders</span></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client(in networks)

A

<ul><li><span>Accesses services+resources provided by a server</span></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server

A

<ul><li>Provides data to other computers and fulfils a client's request</li><li>Software is specific to type of server,but hardware is not important</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client server model

A

<ul><li>Each client is connected to a single server</li><li>Clients request connections to the servers</li><li>Can be accepted/rejected</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client server model <span>+ves</span>

A

<ul><li>Centralised management of resources</li><li>Backups and network security controlled centrally</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Client server model <span>-ves</span>

A

<ul><li>High set up and maintenance costs</li><li>Single point of failure</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS server

A

<ul><li>Translates domain names into IP addresses, so they can be accessed by the user</li><li>Sends corresponding IP address of the needed web server back to the user's browser</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Router

A

<ul><li>Routes data from a LAN to another network</li><li>Receives+forwards data packets</li><li>Determines most efficient path for packet</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall

A

<ul><li>Acts as a filter protecting a network from incoming and outgoing traffic</li><li>Monitors incoming+outgoing traffic,following set rules</li><li>Hardware/software</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social issue

A

<ul><li>Problem that influences a considerable number of individuals </li><li>Includes crime, health,education,media+propaganda etc.<br></br></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ethical issue

A

<ul><li>Problem or situation that needs person/organization to choose between options which are considered right/wrong</li><li>Examples include:</li></ul>

          -Computer crime<br></br>          -Privacy<br></br>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social issues in networks

A

<ul><li>Cyberbullying</li><li>Less face-face interaction</li><li>Addiction</li><li>Hacking</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ethical issues in networks

A

<ul><li>Cybercrime</li><li>Identity theft</li><li>Data privacy</li><li>Malware attacks</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Stakeholder

A

<ul><li>Person,group or organisation that has an interest/concern in an organisation</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ask yourself… when identifying stakeholders

A

<ul><li>Who will be affected by new system?</li><li>Who will new system affect?</li><li>Who will the end-users be?</li><li>What are their needs?</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Methods of obtaining a client’s requirements

A

<ul><li>Surveys</li><li>Interviews</li><li>Direct observation</li><li>Collecting documents</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Observation

A

<ul><li>Walk around organisation-watching how things are done</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Observation <span>+ves</span>

A

<ul><li>Information gathered is first-hand + unbiased</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Observation <span>-ves</span>

A

<ul><li><span>People may act differently than normal when being observed</span><br></br></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Interviews

A

<ul><li>Interview key members within a system-find out how it works</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Interviews <span>+ves</span>

A

<ul><li><span>Lots of detailed info can be gathered</span><br></br></li><li>Suggestions for improvements to the system can be heard</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Interviews <span>-ves</span>

A

<ul><li>Takes a long time</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Questionnaires/surveys

A

<ul><li>People are given questionnaires to fill out</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Surveys <span>+ves</span>

A

<ul><li>Large amount of data from large group can be gathered</li><li>Simple</li><li>Little time needed to analyse(if done electronically)</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Surveys <span>-ves</span>

A

<ul><li>Bias possible-info is limited by survey qs</li><li>Quality of responses may be poor/not useful</li><li>Hard to ask the 'right question'</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Collecting documents

A

<ul><li>Look at documents currently being used in the system-find how system works</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Collecting documents <span>+ves</span>

A

<ul><li>Detailed info about current system can be gathered</li><li>Can be seen where old system has problems</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Collecting documents <span>-ves</span>

A

<ul><li>Time consuming</li><li>Documents may be hard to understand(forms/outputs etc.)</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

4 methods before making a new system

A

<ul><li>Examine current systems</li><li>Look at competing products</li><li>Literature search</li><li>Organisational capabilities</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Examine current system steps

A

<ul><li>Who does what?</li><li>How do they do that?</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Organisational abilities steps

A

<ul><li>Determine what organisation can manage+do</li><li>Can they afford new equipment?</li><li>Can the staff use new system(do they need training?)?</li><li>Can they have any 'downtime' to upgrade?</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Competing products

A

<ul><li>Observe competitors</li><li>See what is being done/is possible</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Intellectual property

A

<ul><li>Something unique that you physically create</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Literature search

A

<ul><li>Consult literature to see other products</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Types of diagrams to represent system requirements

A

<ul><li>System flow chart</li><li>Data flow diagram</li><li>Structure chart</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Flowcharts

A

<ul><li>Represent algorithms,workflow or processes</li><li>Used to show how processes should work+help figure out how to create a system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How do flowcharts help developers?

A

<ul><li>Inform decisions that need to be made+ the necessary steps that must be taken</li><li>Estimate development time frames</li><li>Identify who should be involved at each step</li><li>Identify bottlenecks+other problems</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

<div>Input/Output</div>

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Processing

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Disk storage (symbol)

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Online storage (symbol)

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Document 

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Communication link

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Data flow

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Tape

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Data flow diagram

A

<ul><li>Shows flow of data in an information system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Entity symbol(data flow)

A

<div><img></img><br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Process symbol(data flow)

A

<div><img></img></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Data store symbol(data flow)

A

<div><img></img></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Data flow symbol

A

<div><img></img></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Entity definition

A

<b><span> source and destination of information data.</span></b>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Process(data flow)

A

<b><span> Activities and action taken on the data.</span></b>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Data storage(data flow)

A

<b><span>When, but not how, data is stored.</span></b>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Structure chart

A

<ul><li>Represent organisation of a system,showing different parts in a hierachy</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Prototype

A

<ul><li>Abstract representations of a system,only focusing on one/two aspects</li><li>Important in testing-each component can be tested+idea of system can be illustrated to client</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Purposes of a prototype

A

<ul><li>Fail early and inexpensively</li><li>Gather more accurate requirements-demonstrate functionality of product+help end-users decide what they want in the product</li><li>Technically understand the problem-can see any possible challenges of the design</li><li>File patent</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Iteration(in design process)

A

<ul><li><span>&nbsp;procedure in which repetition of a sequence of operations yields results successively closer to a desired result&nbsp;</span><br></br></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Importance of iteration in design process

A

<ul><li>Helps you be sure on what needs to be improved</li><li>Improvements in one iteration only possible due to improvements in last iteration</li><li>New technology/techniques can be used</li><li>User's needs can change</li><li>Stability and reliability improves</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Consequences of not involving end user for the user

A

<ul><li>Software is not suitable for intended use-decrease user productivity</li><li>User may be unsatisfied</li><li>Unhappy customers-reduced user productivity</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Consequences for developer of not consulting end user

A

<ul><li>Legal action could be taken against developers</li><li>Decreased reputation</li><li>Loss of market share/breakdown of company</li><li>Harder to get feedback+help from users</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Why should we listen to the end-user in the design process?

A

<ul><li>Understand own needs+situation far better</li><li>Software developer has limited domain knowledge-can't appreciate end users' needs</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Topics concerning the introduction of new IT systems

A

<ul><li>Robots replacing humans</li><li>AI algorithms replacing humans</li><li>New systems are addictive/less efficient</li><li>New systems lead to new markets</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Usability

A

<ul><li>How simple and self-explanatory the use of a system is for inexperienced end-users</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Ergonomics

A

<ul><li><span>How well the form fits the function</span><br></br></li><li><span>Discipline&nbsp;concerned&nbsp;with&nbsp;optimising&nbsp;human&nbsp;well&nbsp;being&nbsp;and&nbsp;system&nbsp;performance&nbsp;through&nbsp;the application&nbsp;of&nbsp;theory,principles,data&nbsp;and&nbsp;methods</span><br></br></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Accessibility

A

<ul><li><span>Ability&nbsp;of&nbsp;the&nbsp;device&nbsp;to&nbsp;meet&nbsp;the&nbsp;needs&nbsp;of&nbsp;as&nbsp;many&nbsp;people&nbsp;as&nbsp;possible</span><br></br></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Problems with devices

A

<ul><li>Difficult to handle hardware</li><li>Complex user interface</li><li>Specialist support needed to use device</li><li>Short battery life</li><li>Small screen size</li><li>Limited storage/portability</li><li>Small text</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Types of disabilities

A

<ul><li>Visual</li><li>Auditory</li><li>Mobility and dexterity</li><li>Cognitive</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Methods of improving accessibility

A

<ul><li>Touch screens</li><li>Voice recognition</li><li>Text-speech</li><li>Braille keyboard</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Usability issues within a system

A

<ul><li>What happens if they can't access system/only certain parts?</li><li>Can't access output?</li><li>Glitches+crashes</li><li>Incompatibility-time formats,currencies</li><li>Interface language problems</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Moral issue

A

<ul><li>Issue with potential to help or harm anyone</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Economic issue

A

<ul><li>Issue concerned with organisation of money,industry and trade etc.</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Environmental issue

A

<ul><li>Problem concerned with protection of the natural world</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Context definition

A

<ul><li>the background, environment, framework, setting or situation surrounding a system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What are 2 considerations when considering a new system’s context

A

<ul><li>The <span>extent</span> of the new system</li><li>The <span>limitations </span>of the new system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What are some organisational issues when installing a new system? (<span>1.1.1</span><span>)</span>

A

<ul><li>Software/hardware incompatibility</li><li>User roles / the organisation restructure their workflow</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Problems with changing a system <span>(1.1.2)</span>

A

<ul><li>Users may not like change</li><li>New systems may omit old features&nbsp;</li><li>Expensive</li><li>Old systems may be faster in certain situations</li><li>Data loss during migration</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Change management steps <span>(1.1.2)</span>

A

<ul><li>Plan</li><li>Communicate</li><li>Integrate</li><li>Evaluate</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Plan <span>(1.1.2)</span>

A

<ul><li>Business must first need a clear and valid reason for the change process</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Communicate <span>(1.1.2)</span>

A

<ul><li>Communicating the change to the key stakeholders</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Integrate <span>(1.1.2)</span>

A

<ul><li>Consult the stakeholders before enacting the change process</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Evaluate <span>(1.1.2)</span>

A

<ul><li>Examining the stakeholders' and end-users' response to the change</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Legacy system definition <span>(1.1.3)</span>

A

<ul><li>An old method, technology, computer system or app that is no longer supported or available for purchase anymore</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Risks with legacy systems <span>(1.1.3)</span>

A

<ul><li>More susceptible to security vulnerabilities and malware</li><li>Increased maintenance costs-less hardware and software for the system, lack of IT staff with the skills for that specific system</li><li>Integrating with other systems can be difficult</li><li>Compliance risks-data protection and privacy laws etc.</li><li>Inefficient operations-decreased productivity</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Merger definition <span>(1.1.3)</span>

A

A combination of 2 entities or more, into one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Issues with mergers <span>(1.1.3)</span>

A

<ul><li>Software incompatibility</li><li>Language differences</li><li>Time zone differences</li><li>Workforce cultural differences</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Local software definition <span>(1.1.4)</span>

A

<ul><li>Where the software is installed on a particular computer or set of computers</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Remote software <span>(1.1.4)</span>

A

Software that is installed on a server or computer somewhere on the internet to be used via a browser or specific local application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

SaaS <span>(1.1.4)</span>

A

<ul><li>Software distribution model where a third-party provider hosts applications and makes them available to clients over the internet</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Benefits of SaaS (1.1.4)

A

<ul><li>Minimises IT responsibilities and costs</li><li>Useful for small businesses- subscription can be adjusted easily for their specific needs</li><li>Reduction in staff workload-IT workers don't need to perform tasks associated with onsite hardware+software</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Drawbacks of SaaS

A

<ul><li>Companies using multiple SaaS applications or trying to connect them with on site software may experience some integration issues</li><li>Relying on a third party to store your data and business processes</li><li>Businesses must be mindful of compliance regulations regarding storing data in a remote data centre</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

4 methods of implementing/installing a new system <span>(1.1.5)</span>

A

<ul><li>Direct changeover</li><li>Parallel running</li><li>Pilot running</li><li>Phased conversion</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Direct changeover <span>(1.1.5)</span>

A

<ul><li>Old system is stopped and new one is started</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

+ves of direct changeover<span> (1.1.5)</span>

A

<ul><li>Minimal time and effort</li><li>New system is available immediately</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

-ves of direct changeover <span>(1.1.5)</span>

A

<ul><li>No backup if new system fails</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Parallel running <span>(1.1.5)</span>

A

<ul><li>New system is initialised but old system is kept running alongside it</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

+ves of parallel running <span>(1.1.5)</span>

A

<ul><li>Backup if new system fails</li><li>Outputs from both can be compared-ensure new one is functioning properly</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

-ves of parallel running <span>(1.1.5)</span>

A

<ul><li>Expensive to run 2 systems</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Pilot running <span>(1.1.5)</span>

A

<ul><li>New system is tested using a small part of the organisation</li><li>Once it is running properly and all bugs have been fixed, it is implemented everywhere</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

+ves of pilot running <span>(1.1.5)</span>

A

<ul><li>All features are fully tested-any bugs can be found</li><li>If the new system fails only a small part of the organisation suffers</li><li>Staff part of the pilot can train others</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

-ves of pilot running <span>(1.1.5)</span>

A

<ul><li>No backup for subset of the organisation in the pilot group if new system fails</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Phased conversion <span>(1.1.5)</span>

A

<ul><li>New system is introduced in phases</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

+ves of phased conversion <span>(1.1.5)</span>

A

<ul><li>People can get used to new system</li><li>Staff training can be split into stages</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

-ves of phased conversion <span>(1.1.5)</span>

A

<ul><li>No backup for new system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Problems arising from data migration <span>(1.1.6)</span>

A

<ul><li><div><span>Incompatible file formats</span></div></li><li><div><span>Data structure differences</span></div></li><li><div><span>Validation rules</span></div></li><li><div><span>Incomplete data transfers</span></div></li><li><div><span>International conventions on dates, currencies &amp; character sets</span></div></li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Incompatible file formats <span>(1.1.6)</span>

A

<ul><li>Same piece of software may have different versions-data from one version may not be compatible with another</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Data structure differences <span>(1.1.6)</span>

A

<ul><li>Data being moved from an array to a linked list etc. can cause problems</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Validation rules <span>(1.1.6)</span>

A

<ul><li>Rules applied to inputs</li><li>If different at destination than at source-data can be rejected and lost</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Incomplete data transfers<span> (1.1.6)</span>

A

<ul><li>Only part of data will be at destination-data loss</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

<span>Differences in data/currency/character set </span><span>(1.1.6)</span>

A

<div><ul><li><div><span>In the UK, 3/5/18 means 3 May 2018, but it means 5 March in the USA</span></div></li><li><div><span>The $ might mean US dollars, but could be taken to mean Zimbabwe dollars which use the same symbol but is worth significantly less.</span></div></li><li><div><span>A set of character used in one country, e.g. ﷼‎ in Saudi-Arabia, might be copied as ?? on Russian computer.&nbsp;&nbsp;</span></div></li></ul></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Consequences of not running tests <span>(1.1.7)</span>

A

<ul><li>System that doesn't work as expected-reduces productivity and end-user satisfaction</li><li>Software may not be appropiate for intended purpose</li><li>Undiscovered bugs in system</li><li>Decrease in organisation's reliability and reputation</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Static testing <span>(1.1.7)</span>

A

<ul><li>Involves verification&nbsp;</li><li>Can include reviews, walkthroughs or inspections</li><li>No execution of code</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Dynamic testing <span>(1.1.7)</span>

A

<ul><li>Involves validation</li><li>Program is executed&nbsp;</li><li>Can be done to test specific parts of the code</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Alpha testing <span>(1.1.7)</span>

A

<ul><li>Performed by internal employees of the organisation</li><li>Done on the developer's site</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Beta testing <span>(1.1.7)</span>

A

<ul><li>Performed by clients/end-users not part of the organisation</li><li>Done at client location&nbsp;</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Black-box testing <span>(1.1.7)</span>

A

<ul><li>Testing software without knowing its internals</li><li>Uses software interfaces</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

White-box testing <span>(1.1.7)</span>

A

<ul><li>Looks inside the software</li><li>Uses that knowledge to help with the testing process</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

User acceptance testing <span>(1.1.7)</span>

A

<ul><li>Testing any new/updated system with its end users</li><li>Checks if it meets their expectations</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Automated testing <span>(1.1.7)</span>

A

<ul><li>Method in software testing using machines to automatically execute tests and compare the results with the expected ones&nbsp;</li><li>Usually done on large amounts of code</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

User documentation definition <span>(1.1.8)</span>

A

<ul><li>Any document that explains how to use the features and functions of a system to its end-users</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Importance of user documentation <span>(1.1.8)</span>

A

<ul><li>Makes users aware of particular features that may not be obvious</li><li>If the documentation is simple-less training needed for users so system implementation is faster</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Types of user documentation <span>(1.1.9)</span>

A

<ul><li>Help files</li><li>Online support</li><li>Printed manuals</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Help files <span>(1.1.9)</span>

A

<ul><li>Files supplied together with the system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

+ves of help files <span>(1.1.9)</span>

A

<ul><li>Accessible any time when using program</li><li>Provide general instructions on how to use system</li><li>General instructions on solving common errors</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

-ves of help files <span>(1.1.9)</span>

A

<ul><li>Only can be used after system installation</li><li>Only deal with general errors</li><li>Lack a search capability-have to look through the file for your specific solution</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Online support <span>(1.1.9)</span>

A

<ul><li>Web service hosted by the system's developer to provide user documentation</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

+ves of online support <span>(1.1.9)</span>

A

<ul><li>More extensive than help files</li><li>Constantly updated by developers with FAQs</li><li>Often have live support-can talk to a real human operator</li><li>Search capabilities&nbsp;</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

-ves of online support <span>(1.1.9)</span>

A

<ul><li>Reliant on internet connection</li><li>Live support can be ineffective with users unfamiliar with computers</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Printed manuals <span>(1.1.9)</span>

A

<ul><li>Manuals printed on paper and supplied with the system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

+ves of printed manuals <span>(1.1.9)</span>

A

<ul><li>Always available</li><li>Help with system installation</li><li>Can be read by users before they work with the system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

-ves of printed manuals <span>(1.1.9)</span>

A

<ul><li>Can be lost/destroyed</li><li>Usually only provides help on system installation</li><li>Rarely updated</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Importance of user training <span>(1.1.10)</span>

A

<ul><li>Productivity is dependent on familiarity with the system</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Methods of delivering user training <span>(1.1.10)</span>

A

<ul><li>Self-instruction</li><li>Formal classes</li><li>Remote training</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Self instruction <span>(1.1.10)</span>

A

<ul><li>Users learn how to use the system on their own</li><li>Usually use a manual or watch a tutorial etc.&nbsp;</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

+ves of self instruction <span>(1.1.10)</span>

A

<ul><li>Lowest cost</li><li>Flexible timeline</li><li>Training is specific to exactly what the user wants to learn</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

-ves of self instruction <span>(1.1.10)</span>

A

<ul><li>Certain key features may be missed-learning is unstructured</li><li>User may feel overwhelmed without guidance</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Formal classes <span>(1.1.10)</span>

A

<ul><li>Users sit in a classroom listening to an instructor</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

+ves of formal classes <span>(1.1.10)</span>

A

<ul><li>Structured learning environment</li><li>Expert on hand to answer questions</li><li>Curriculum covers all aspects</li></ul>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

-ves of formal classes <span>(1.1.10)</span>

A

<ul><li>Expensive</li><li>Rigid schedule+curriculum</li><li>Hardly any personalisation&nbsp;</li></ul>

143
Q

Remote training <span>(1.1.10)</span>

A

<ul><li>Instructor training a user or a group of users via a form of remote connection</li></ul>

144
Q

+ves of remote training <span>(1.1.10)</span>

A

<ul><li>Structured learning environment</li><li>Expert on hand for questions</li><li>Curriculum covers all aspects</li><li>Flexible locations</li></ul>

145
Q

-ves of remote training <span>(1.1.10)</span>

A

<ul><li>Expensive</li><li>Computer based-need basic knowledge to be able to join the meetings etc.</li></ul>

146
Q

Causes of data loss <span>(1.1.11)</span>

A

<ul><li>Hardware/system malfunctions</li><li>Human error</li><li>Software corruption</li><li>Malware</li><li>Natural disasters</li><li>Malicious activity of employees or intruders</li></ul>

147
Q

Things to think about when discussing consequences of data loss <span>(1.1.12)</span>

A

<b><ul><li><div><span>Can the data be replaced?</span></div></li><li><div><span>How easy is the data to replace?</span></div></li><li><div><span>Who will be affected by the data loss?</span></div></li><li><div><span>Are there financial implications to the data loss?</span></div></li><li><div><span>Are there ‘life-and-death’ consequences to the loss?</span></div></li><li><div><span>Who is responsible for data recovery?</span></div></li></ul></b>

148
Q

Methods for data loss prevention <span>(1.1.13)</span>

A

<ul><li>Failover system</li><li>Redundancy</li><li>Removable media</li><li>Offsite/online storage</li></ul>

149
Q

Failover system <span>(1.1.13)</span>

A

<ul><li>Failover-constant capability to automatically and effortlessly switch to a backup system</li></ul>

150
Q

Redundancy <span>(1.1.13)</span>

A

<ul><li>Condition in a database or another data storage technology where data is stored in 2 separate places at once&nbsp;</li></ul>

151
Q

Removable media <span>(1.1.13)</span>

A

<ul><li>Use of any storage device that can be removed from a computer while the system is still running</li></ul>

152
Q

Offsite storage <span>(1.1.13)</span>

A

<ul><li>Where data or applications are stored in a facility offsite to the organisation or core IT environment</li></ul>

153
Q

Online storage <span>(1.1.13)</span>

A

<ul><li>Where cloud storage is used to store data from backups</li><li>Cloud resources and infrastructure can be used to create, edit, manage and restore data along with perform backups</li></ul>

154
Q

Release <span>(1.1.14)</span>

A

<ul><li>Process of launching a new product for a specific market or user base</li></ul>

155
Q

Update <span>(1.1.14)</span>

A

<ul><li>Software file that contains fixes for problems found by users or developers</li><li>Almost always free</li></ul>

156
Q

Patches <span>(1.1.14)</span>

A

<ul><li>Software update where code is inserted into the code of the program</li><li>May:</li></ul>

<div>-Fix a software bug</div>

<div>-Install new drivers</div>

<div>-Address security vulnerabilities</div>

<div><br></br></div>

<br></br>

157
Q

How to get updates: <span>(1.1.14)</span>

A

<ul><li>Manually&nbsp;</li><li>Automatically</li></ul>

158
Q

+ves and -ves of manual updates <span>(1.1.14)</span>

A

<ul><li><span>Full control</span></li><li><span>Time consuming</span><br></br></li></ul>

159
Q

+ves and -ves of auto updates <span>(1.1.14)</span>

A

<ul><li><span>No need to worry about updates</span></li><li><span>No control</span></li></ul>

160
Q

Types of release management <span>(1.1.14)</span>

A

<ul><li>Continuous delivery</li><li>Agile software development</li><li>DevOps</li></ul>

161
Q

Continuous delivery <span>(1.1.14)</span>

A

<ul><li>Teams produce software in short cycles</li><li>Allows more incremental updates to the application</li></ul>

162
Q

Agile development <span>(1.1.14)</span>

A

<ul><li>Requirements of the software evolve through collaboration between end users and cross functional teams within the organisation</li><li>Done in iterations (sprints)</li></ul>

163
Q

DevOps <span>(1.1.14)</span>

A

<ul><li>Aims to unify software development and operation</li><li>Utilises lots of automation&nbsp;</li><li>Monitors each step of the software construction</li></ul>

164
Q

Network definition 

A

<ul><li>Group of computer systems and nodes linked together via transmission media to allow for communication and resource sharing</li></ul>

165
Q

LAN characteristics

A

<ul><li>Local Area Network</li><li>Uses MAC addresses and switches</li><li>Private infrastructure</li><li>Usually almost always use Ethernet protocol</li></ul>

166
Q

WAN characteristics

A

<ul><li>Wide Area Network</li><li>IP addresses and routers</li><li>Public infrastructure</li><li>Collection of other networks</li></ul>

167
Q

VLAN characteristics

A

<ul><li>Virtual Local Area Network</li><li>Group of nodes that appear to be on the same LAN despite not being geographically in the same area</li><li>Software implemented</li><li>Able to quickly adapt to changes in the network requirements</li></ul>

168
Q

SAN

A

<ul><li>Storage Area Network</li><li>Secure high speed data transfer network</li><li>Allows access to a centralised storage system</li><li>Allows multiple servers to access a network of storage devices</li></ul>

169
Q

WLAN

A

<ul><li>Wireless Local Area Network</li><li>Network that uses radio-waves and usually an access point to the internet</li><li>Allows the users to have mobility</li></ul>

170
Q

Internet

A

<ul><li>Uses TCP/IP protocols for data transmission</li><li>network of networks</li><li>Global communication system</li><li>Both hardware and infrastructure</li></ul>

171
Q

Intranet 

A

<ul><li>Private LAN that cannot be accessed remotely(only can be accessed via VPN or on the organisation's premises)</li></ul>

172
Q

Extranet

A

<ul><li>Intranet that can only be accessed remotely via authentication</li><li>Utilised to allow 3rd parties to gain information without granting access to the entire network</li></ul>

173
Q

VPN

A

<ul><li>Virtual Private Network</li><li>Uses the internet</li><li>Allows people to access a network remotely but encrypts the connection</li><li>Data is transmitted through a secure pathway known as a tunnel-tunnelling</li></ul>

174
Q

PAN

A

<ul><li>Personal Area Network</li><li>A network covering a very small area</li><li>Bluetooth etc.</li></ul>

175
Q

P2P

A

<ul><li>Peer to Peer network</li><li>Network model where nodes are connected directly to one another</li><li>Directly exchange files and resources etc.&nbsp;</li></ul>

176
Q

Network standards definition

A

<ul><li>Rules followed by manufacturers of network hardware to ensure interoperability between devices</li></ul>

177
Q

Importance of standards

A

<ul><li>Allows devices to be compatible and communicate with each other</li><li>Helps ensure data transmission is secure-minimum latency and good integrity of data</li><li>Allows manufacturers to have a framework on which to build their system</li></ul>

178
Q

2 types of network layer models

A

<ul><li>OSI Network layer-7 layers</li><li>TCP/IP Network layer-4 layers</li></ul>

179
Q

+ves of layers

A

<ul><li>New protocols can be added to each layer easily</li><li>Change to one layer doesn't affect functionality of another layer</li><li>Similar protocols can be grouped into layers with a specific function in data transmission</li></ul>

180
Q

OSI Model layers

A

<ul><li>7 -Application</li><li>6-Presentation</li><li>5-Session</li><li>4-Transport</li><li>3-Network</li><li>2-Data link</li><li>1-Physical</li></ul>

181
Q

TCP/IP model layers

A

<ul><li>Application</li><li>Transport</li><li>Network</li><li>Link</li></ul>

182
Q

Function of application layer in TCP/IP model

A

<ul><li>Collects data to be transmitted</li></ul>

183
Q

Function of transport layer in TCP/IP model

A

<ul><li>Breaks up data into packets</li><li>Adds packet sequence number</li><li>Adds checksum</li></ul>

184
Q

Function of network layer in TCP/IP model

A

<ul><li>Adds IP addresses of the sender and receiver node</li></ul>

185
Q

Function of the link layer in TCP/IP model

A

<ul><li>Adds MAC addresses of sender+receiver node</li><li>Physically transmits data as bits&nbsp;</li></ul>

186
Q

Comparison of TCP/IP and OSI model layers

A

<img></img>

187
Q

What 2 main technologies does a VPN use?

A

<ul><li>Encryption</li><li>Tunnelling</li></ul>

188
Q

VPN encryption

A

<ul><li>Converting plaintext to ciphertext via a private key</li><li>Need a decryption key to understand the data</li><li>Computers at each end of the tunnel encrypt incoming data and decrypt it at the other end</li></ul>

189
Q

VPN tunnelling

A

<ul><li>Tunnel-secure pathway through the public network</li><li>On this connection packets are constructed via the specific VPN protocol format and sent privately over public networks via encapsulation</li></ul>

190
Q

VPN components

A

<ul><li>Client VPN software</li><li>VPN infrastructure</li><li>VPN server</li></ul>

191
Q

VPN infrastructure characteristics

A

<ul><li>Need to use specific VPN-routers and firewalls which allow legitimate VPN traffic to pass through</li></ul>

192
Q

VPN server characteristics

A

<ul><li>Handles and manages incoming VPN traffic</li><li>Establishes and manages VPN sessions and their access to network resources</li></ul>

193
Q

+ves of telecommuting

A

<ul><li>Improved productivity</li><li>Reduced costs for businesses and employees</li><li>Flexibility for the employees</li><li>No need to commute to work</li><li>Less environmental impact</li></ul>

194
Q

-ves of telecommuting

A

<ul><li>Social isolation</li><li>Lack of expertise or support on certain issues</li><li>Need specific hardware and a network connection etc.</li><li>May be more distractions in a home environment</li></ul>

195
Q

+ves of VPN

A

<ul><li>Allow for telecommuting</li><li>Improves data security-encryption and tunnelling</li><li>Bypass geo restricted content via masking IP addresses</li></ul>

196
Q

-ves of VPN

A

<ul><li>Reliability of VPN is controlled by ISP</li><li>Not all VPNs are compatible with products&nbsp;</li><li>May lead to increased latency on the user's connection if the nearest VPN server is very far</li></ul>

197
Q

Protocol definition

A

<ul><li>Set of rules for data communication over a network</li></ul>

198
Q

Data packet definition

A

<ul><li>Small unit of data that is used in network communication&nbsp;</li></ul>

199
Q

3 components of a data packet?

A

<ul><li>Header</li><li>Payload</li><li>Trailer</li></ul>

200
Q

What is contained in the packet header?

A

<ul><li>IP address of sender and receiver</li><li>MAC address of sender and receiver</li><li>Sequence number</li></ul>

201
Q

What is contained in the packet payload?

A

<ul><li>Actual data block</li></ul>

202
Q

What is contained in the packet trailer?

A

<ul><li>Check Sum</li><li>Parity Bit</li></ul>

203
Q

Key functions of protocols

A

<ul><li>Maintain data integrity</li><li>Manage flow control</li><li>Prevent deadlock</li><li>Manage congestion</li><li>Error checking</li></ul>

204
Q

Data integrity definition

A

<ul><li>The overall completeness,accuracy and consistency of the data</li></ul>

205
Q

Flow control 

A

<ul><li>Mechanism which ensures the rate at which data is being transmitted is in proportion with the receiver's receiving capabilities</li><li>Ensures receiving node is not overwhelmed with data</li></ul>

206
Q

Congestion control

A

<ul><li>Congestion-where a node or link carries so much data network service quality deteriorates</li><li>This leads to queuing delay,frame or data packet loss and new connections unable to be made</li></ul>

207
Q

Error checking

A

<ul><li>Techniques used to detect noise or other impairments introduced to data during transmission</li><li>Utilises parity bits and checksums</li></ul>

208
Q

Deadlock

A

<ul><li>Where 2 nodes/processes are trying to access the same node at once-neither is able to proceed</li><li>Relevant protocol needs to stop and re-queue them&nbsp;</li></ul>

209
Q

Primary factors affecting speed of data transmission

A

<ul><li>Traffic</li><li>Number of users</li></ul>

210
Q

Secondary causes affecting speed of data transmission

A

<ul><li>Time of day</li><li>Distance</li><li>Infrastructure</li><li>Type of cabling</li></ul>

211
Q

Tertiary factors affecting speed of data transmission

A

<ul><li>Environmental issues(temperature etc.)</li><li>Infrastructure limitations due to financial reasons</li><li>Type of data being transmitted</li></ul>

212
Q

Compression definition

A

<ul><li>Encoding data to use fewer bits than the original version</li></ul>

213
Q

Lossless v lossy compression

A

<img></img>

214
Q

Uses of compression

A

<ul><li>Backups/archiving</li><li>File transfer</li><li>Media file transfer over the web</li><li>Encryption/protection</li></ul>

215
Q

Backups/archiving (compression)

A

<ul><li>Compressed data is smaller in size than original file-saves storage space</li></ul>

216
Q

File transfering (compression)

A

<ul><li>Fewer bits transferred per second-faster transmission rates</li><li>Lower bandwidth needed for uploads and downloads</li></ul>

217
Q

Encryption/protection (compression)

A

<ul><li>Compressing files scrambles their data adding an extra layer of protection against any hackers etc</li><li>Reduces amount of data needing to be encrypted</li></ul>

218
Q

4 characteristics of transmission media

A

<ul><li>Security&nbsp;</li><li>Reliability</li><li>Cost</li><li>Speed</li></ul>

219
Q

UTP-Unshielded Twisted Pair cables characteristics

A

<ul><li>Security-moderate if encrypted</li><li>Susceptible to EMI</li><li>Relatively cheap</li><li>Relatively fast(faster than radiowaves)</li></ul>

220
Q

Fibre optic cables

A

<ul><li>Security-very secure</li><li>Generally quite fragile(glass)</li><li>Very expensive</li><li>Fastest transmission media</li></ul>

221
Q

Radio waves

A

<ul><li>Security-insecure unless encryption is used</li><li>Susceptible to interference</li><li>Technically free</li><li>Quite slow speeds</li></ul>

222
Q

Packet switching definition

A

<ul><li>Routing data packets through a network depending on the destination address contained in each packet</li></ul>

223
Q

Packet switching steps

A

<ul><li>Data is broken up into packets</li><li>Routed from source to destination using switches and routers</li><li>The most efficient routes for the packets are found via the MAC and IP addresses in the header</li><li>Reassembled at destination using sequence number</li><li>Checked for errors using checksum</li><li>If any packets are missing data is retransmitted</li></ul>

224
Q

+ves of wireless networks

A

<ul><li>Radiowaves are technically free</li><li>No need for cabling</li><li>Global standards</li><li>Minimal set up costs</li><li>Allows for user mobility</li></ul>

225
Q

-ves of wireless networks

A

<ul><li>Interference</li><li>Limited range</li><li>WAPs can be used to steal data</li><li>Transfer speeds are slower than wired networks</li><li>Each WAP only has a finite amount of bandwidth</li></ul>

226
Q

Hardware components in a wireless network

A

<ul><li>Nodes</li><li>Wireless NIC</li><li>Radio waves</li><li>Connection point(WAP etc)</li></ul>

227
Q

Software components of a wireless network

A

<ul><li>Network Operating System (with drivers)</li><li>Protocol stack</li><li>Applications</li></ul>

228
Q

Types of wireless networks

A

<ul><li>WiFi</li><li>Wimax</li><li>3G</li><li>LTE</li></ul>

229
Q

Wi-Fi (Wireless Fidelity)

A

<ul><li>Also known as WLAN</li><li>Most commonly used for home networks</li><li>Backwards compatible with most older Wi-Fi standards</li><li>Relatively slow to quick data transmission</li></ul>

230
Q

WiMAX

A

<ul><li>Worldwide Interoperability for Microwave Access</li><li>Large distance internet connections</li><li>Relatively cheap</li></ul>

231
Q

3G (Third Generation)

A

<ul><li>Primary way mobile phones access the internet today</li><li>Allows tunnelling of phone lines</li><li>Relatively fast</li></ul>

232
Q

Key factors concerning security

A

<ul><li>Confidentiality</li><li>Integrity</li><li>Availability</li></ul>

233
Q

Why is system security difficult ?

A

<ul><li>Users</li><li>'Arms race'-constantly evolving malware etc.</li><li>Systems may have a weak point which can cause it to collapse</li></ul>

234
Q

One factor authentication

A

<ul><li>Something you know-password etc.</li></ul>

235
Q

2 factor authentication

A

<ul><li>Something you have</li><li>OTP etc.</li></ul>

236
Q

3 factor authentication

A

<ul><li>Something you are</li><li>Biometrics etc.</li></ul>

237
Q

Firewalls

A

<ul><li>Hardware or software or combo of both</li><li>Analyses data packets based on predetermined rules</li><li>Acts as a filter monitoring incoming and outgoing network traffic</li></ul>

238
Q

MAC Address filtering

A

<ul><li>Hard-coded into devices by manufacturers</li><li>Can be used to identify specific pieces of hardware</li><li>Routers can keep track of allowed and banned MAC addresses&nbsp;</li></ul>

239
Q

Physical security examples

A

<ul><li>Locks on doors</li><li>Security personnel</li><li>Reinforced rooms</li><li>Barbed wire fences</li></ul>

240
Q

Encryption in wireless networks

A

<ul><li>Using algorithms to convert plaintext into ciphertext, so that it cannot be understood by any hackers</li><li>3 main standards-WEP,WPA,WPA2</li></ul>

241
Q

WEP

A

<ul><li>Wireless Equivalent Privacy</li><li>Very quickly broken and replaced by WPA</li></ul>

242
Q

WPA and WPA2

A

<ul><li>WPA-intrusions could still occur from outside the network</li><li>WPA2-intrusion can only occur by those who have accessed the network previously</li></ul>

243
Q

+ves of userID

A

<ul><li>Access rights can be set for each user</li><li>User groups can be created-manage access rights in batches</li></ul>

244
Q

-ves of userID

A

<ul><li>userIDs can be stolen</li><li>System can be bypassed</li><li>No protection against interception</li></ul>

245
Q

+ves of encryption

A

<ul><li>Strong encryption is very difficult to break</li><li>Maintains confidentiality of data</li><li>Data is encrypted so even if transmission media is insecure, data is still secure</li></ul>

246
Q

-ves of encryption

A

<ul><li>Hard to encode-need specialists</li><li>Computationally expensive</li><li>Some encryption methods may have built in backdoors</li></ul>

247
Q

+ves of MAC filtering

A

<ul><li>&nbsp;Another layer of security</li></ul>

248
Q

-ves of MAC filtering

A

<ul><li>Danger of whitelist being discovered, so MAC addresses can then be spoofed</li><li>Difficult to manage whitelist</li><li>Doesn't help against data interception</li></ul>

249
Q

+ves of firewalls

A

<ul><li>Effectively prevents unauthorised access to a network</li></ul>

250
Q

-ves of firewalls

A

<ul><li>May slow the network</li><li>Issues with censorship on a software firewall</li></ul>

251
Q

What does RAM do? (6.1.1)

A

<ul><li>Memory which stores currently running programs and data being used.</li></ul>

252
Q

Effect on system if RAM is too limited (6.1.1)

A

<ul><li>Part of secondary storage needs to be used as virtual memory (much slower than RAM)</li><li>Less processes can be executed simultaneously</li><li>If virtual memory is not available, programs or data won't load</li></ul>

253
Q

What does secondary storage do (6.1.1.)

A

<ul><li>Permanent storage of data and programs including vital programs such as OS</li><li>Non-volatile</li></ul>

254
Q

Effect on system if secondary storage is too limited (6.1.1)

A

<ul><li>May not be enough space to permanently store programs and data-data loss occurs</li><li>Not enough space available to use virtual memory</li><li>Less data can be stored on the system in general</li></ul>

255
Q

What does the processor speed do (6.1.1)

A

<ul><li>Processor performs all calculations and instructions in a system</li><li>Speed - measurement of how many instructions executed per second</li></ul>

256
Q

Effect on system if processor speed is too limited (6.1.1)

A

<ul><li>Processor takes longer to perform tasks</li></ul>

257
Q

What cores do (6.1.1)

A

<ul><li>Each processor has at least one core (ALU) which performs arithmetic and logic operations</li></ul>

258
Q

Effect on system if cores are limited (6.1.1)

A

<ul><li>Without multiple cores, tasks cannot be executed simultaneously&nbsp;</li><li>More cores=more tasks executed simultaneously</li></ul>

259
Q

What is screen resolution (6.1.1)

A

<ul><li>Measurement of the number of pixels in the height x width of a display</li></ul>

260
Q

Effect on system if resolution is too limited (6.1.1)

A

<ul><li>Number of pixels displayed is lower-pixelated display</li><li>Poorer quality images but also smaller file size</li></ul>

261
Q

What does a sound processor do? (6.1.1)

A

<ul><li>Helps the system with sound reproduction and processing-frees up CPU</li><li>Also may contain bank of sampled sounds-helps to produce better quality audio</li></ul>

262
Q

Effect on system if sound processor is too limited (6.1.1)

A

<ul><li>CPU has to help with processing sounds-reduces system performance</li><li>Overall quality of audio is not as high without use of sound processor</li></ul>

263
Q

What does a graphics processor do (6.1.1)

A

<ul><li>Complex graphics processing-3D rendering etc.</li><li><br></br></li></ul>

264
Q

Effect on system if graphics processor is too limited (6.1.1)

A

<ul><li>CPU is less efficient at graphics processing-lower quality or slower</li></ul>

265
Q

What does cache do ? (6.1.1)

A

<ul><li>Stores instructions and data most likely to be requested next by the CPU from the RAM</li><li>CPU doesn't need to wait for instruction or data to arrive all the way from RAM</li></ul>

266
Q

Effect on system is cache is too limited (6.1.1)

A

<ul><li>CPU will have to wait longer for instructions/data to be fetched from RAM, decreasing performance</li><li>Less cache hits</li><li>Slower processing of common tasks on the system</li></ul>

267
Q

What is bandwidth (6.1.1)

A

<ul><li>Measurement of the amount of data able to be sent at the same time in a certain time frame&nbsp;</li></ul>

268
Q

Effect on system if bandwidth is too limited (6.1.1)

A

<ul><li>Lower data transmission speeds from one point to another-slower network performance</li><li>Takes longer to process data in its entirety&nbsp;</li></ul>

269
Q

What is network connectivity (6.1.1)

A

<ul><li>The type of network connection being used within a network</li></ul>

270
Q

Effect on system if network connectivity is limited (6.1.1)

A

<ul><li>Reduced data transmission speeds, and higher latency</li><li>Possibly more interference and transmission errors depending on the type of connection<br></br></li><li>Lower download and upload speeds</li></ul>

271
Q

Mainframes:Processor, primary and second memory

A

<ul><li>Contains thousands of cores</li><li>Vast amounts of primary and secondary memory</li></ul>

272
Q

Common uses of mainframes

A

<ul><li>Virtualise smaller computers</li><li>Weather/financial models and predictions</li></ul>

273
Q

Servers and server farms:Processor,primary and secondary memory

A

<ul><li>Many high spec PCs running in parallel</li><li>Vast amounts of primary memory (less than mainframes, more than PCs) along with secondary memory</li></ul>

274
Q

Common uses of servers and server farms

A

<ul><li>Serve networks</li><li>Data centres for cloud storage</li><li>Online data backups</li></ul>

275
Q

Desktop PCs: Processor,memory

A

<div><ul><li>Single processor, but multiple cores</li><li>Quite a lot of primary ( less than servers) and secondary memory (much less than servers)</li><li>Upgradeable</li></ul></div>

276
Q

Common uses of desktop PCs

A

<ul><li>Companies and schools with no need for portability</li><li>Gaming</li></ul>

277
Q

Sub-laptop (netbooks): processor and memory

A

<ul><li>Single or low multi-core</li><li>Limited RAM</li><li>Quite little secondary storage,usually a SSD</li></ul>

278
Q

Common uses of sub-laptops

A

<ul><li>Personal computing devices</li></ul>

279
Q

Cell phones/mobiles: processor, memory

A

<ul><li>Single or multi-core</li><li>Moderate RAM</li><li>Quite limited secondary storage</li><li>Constrained by screen size along with input options</li></ul>

280
Q

Common uses of cell phones

A

<ul><li>Personal computing devices</li></ul>

281
Q

Tablets: processor,memory

A

<ul><li>Single or multi-core</li><li>Not much RAM</li><li>Moderate secondary storage(less than PC)</li><li>Very portable</li></ul>

282
Q

Common uses of tablets 

A

<ul><li>Media consumption</li><li>Personal computing device</li></ul>

283
Q

PDAs:processor,memory

A

<ul><li>Single core</li><li>Very limited RAM and secondary storage</li></ul>

284
Q

Common uses of PDAs 

A

<ul><li>Not used that much anymore</li><li>Calendars/emails</li><li>Delivery drivers</li></ul>

285
Q

Digital camera:processor,memory

A

<ul><li>Single core</li><li>Limited secondary and primary memory,however secondary storage is expandable</li></ul>

286
Q

Common uses of digital camera

A

<ul><li>Higher end photography</li></ul>

287
Q

Think about consequences on a system of limiting which 5 things ?

A

<ul><li>Primary memory</li><li>Secondary storage</li><li>CPU speed</li><li>CPU cores</li><li>Connectivity</li></ul>

288
Q

Questions to think about and their consequence to the user (6.1.4)

A

If the processor is too slow?<br></br><br></br>If the processor has only one core?<br></br><br></br>If the amount of primary memory is limited?<br></br><br></br>If the amount of cache is limited?<br></br><br></br>If network connectivity is limited?<br></br><br></br>If user access is limited to a single user per device?

289
Q

Multi-user system definition

A

<ul><li>Many users on the same machine or many users connected to the same network</li></ul>

290
Q

Multi-programming system definition

A

<ul><li>System that can have different programs installed&nbsp;</li></ul>

291
Q

Single programming system

A

<ul><li>Can only run one program/set of programs</li></ul>

292
Q

4 main functions of the OS (6.1.5)

A

<ul><li>Device configuration</li><li>File management</li><li>Memory management</li><li>Interface platform</li></ul>

293
Q

How does device configuration work with the OS? (6.1.5)

A

<ul><li>OS uses device drivers (software program that acts as a translator) to allow the system to communicate with peripherals</li></ul>

294
Q

How does managing primary memory work with the OS (6.1.5)

A

<ul><li>OS ensures each process runs in its own allocated memory space</li><li>Therefore OS allocates and deallocates memory</li><li>Prevents overwriting</li><li>Ensures a program has sufficient memory to run</li></ul>

295
Q

Virtual memory management with the OS (6.1.5)

A

<ul><li>Virtual memory is part of the secondary storage that is used as RAM when RAM is full</li><li>Virtual memory is transferred in the form of pages</li><li>Data from RAM is temporarily transferred to secondary storage</li></ul>

296
Q

Managing secondary storage with the OS (6.1.5)

A

<ul><li>Provides structure and access methods for the storage</li><li>Known as folder-structure</li><li>OS manages security access of these folders and files also</li></ul>

297
Q

Providing an interface with the OS (6.1.5)

A

<ul><li>User gives commands to computer and enters data</li><li>OS translates I/O and sends it to correct memory or folder address to be processed</li><li>Provides link between user and computer hardware</li></ul>

298
Q

Time slicing 

A

<ul><li>Multi-user system-time slice is set amount of processing time each user gets</li><li>Single user system-time slice is set amount of processing time each program gets</li><li>Allocating a fixed period of time to each process for which they are allowed to run</li><li>CPU time is allocated dependent on time and priority</li></ul>

299
Q

Interrupt handling (6.1.5)

A

<ul><li>Function of the OS which is executed when an interrupt is detected</li><li>Interrupt-signal to processor emitted by hardware/software indicated an event needs immediate attention</li></ul>

300
Q

Security management with the OS

A

<ul><li>Utilises authentication and access rights</li><li>In multi user systems OS also isolates each users tasks, data and programs along with controlling access rights to specific parts of memory and secondary storage</li></ul>

301
Q

Parallel processing with the OS (6.1.5)

A

<ul><li>Multi-core systems</li><li>Utilises prioritising where highest priority tasks are executed until a higher priority task appears</li><li>Scheduler sorts tasks into order of priority</li></ul>

302
Q

Main resource management techniques (6.1.7)

A

<ul><li>Scheduling</li><li>Policies and mechanisms</li><li>Multitasking</li><li>Virtual memory</li><li>Interrupt</li><li>Polling</li></ul>

303
Q

Scheduling (6.1.7)

A

<ul><li>Action of deciding which processes can occur when and for how long</li><li>Allocating CPU time amongst running programs and tasks</li></ul>

304
Q

Policies (6.1.7)

A

<ul><li><b>Policies</b>-what is to be done</li><li><b>Mechanism</b>-how it is to be done</li><li>Policies are rules followed by the system in order for it to run as effectively and safely as possible</li></ul>

305
Q

Multi-tasking (6.1.7)

A

<ul><li>The OS allows more than one program or task to be executed simultaneously on a system</li><li>OS keeps track of the progress of each of these tasks and allows you to move from one to another without any loss of information</li></ul>

306
Q

Virtual memory + paging (6.1.7)

A

<ul><li>Feature of the OS where secondary storage is used as an extension to RAM</li><li>Involves transferring pages from RAM to VM when you are running many programs or large ones</li><li>OS is constantly swapping data between the 2 locations</li><li>OS will transfer back pages they need from VM and then send other pages to the VM so there is space for these needed pages</li><li>Memory manager determines this by sending the least-used page usually to VM</li></ul>

307
Q

Interrupt (6.1.7)

A

<ul><li>Signal emitted by hardware or software indicating an event needs immediate attention</li><li>OS responds first suspending its current activities,saving these tasks then execute an interrupt handler</li><li>After interrupt handler is finished the system resumes its previous activities</li></ul>

308
Q

Polling (6.1.7)

A

<ul><li>Process of where OS regularly checks another device or peripheral in order to see its status(ready or not)</li><li>Often done with low-level hardware</li></ul>

309
Q

Dedicated OS definition (6.1.8)

A

<ul><li>OS designed for a specific device or purpose</li></ul>

310
Q

+ves of a dedicated OS (6.1.8)

A

<ul><li>Higher level of security-developers can restrict possible entry methods for malware etc.</li><li>Can be customised for maximum speed and efficiency for whatever specific device or purpose it is being used for</li><li>Since you know the purpose and hardware for the OS, developers can eliminate elements of a typical OS which may not be needed in this scenario(less resource usage)</li></ul>

311
Q

Abstraction (6.1.9)

A

<ul><li>In general, it is omitting the unnecessary and complex info in a system</li><li>In OSs certain hardware details may be hidden and higher-level functions may be provided</li></ul>

312
Q

Drive letters (6.1.9)

A

<ul><li>Single A-Z letter assigned to a physical drive or drive partition in a system</li><li>Example of abstraction</li></ul>

313
Q

Virtual memory (example of abstraction) (6.1.9)

A

<ul><li>OS handles paging in the optimal manner to maximise performance, we can just alter settings of virtual memory</li></ul>

314
Q

Java virtual machine (6.1.9)

A

<ul><li>Interprets compiled Java binary code for a computer's processor&nbsp;</li><li>Each platform has its own JVM</li></ul>

315
Q

Control system definition

A

<ul><li>Device/set of devices that manages,commands or regulates the behaviour of other devices or systems</li></ul>

316
Q

2 main types of control systems

A

<ul><li>Open-loop control systems</li><li>Closed-loop control systems</li></ul>

317
Q

Key features of an open-loop control system

A

<ul><li>Non-feedback system(output has no impact on control action of input)</li><li>No self correction of errors</li></ul>

318
Q

Examples of open loop control systems

A

<ul><li>Toaster</li><li>Electric hand dryer</li><li>Automatic washing machine</li></ul>

319
Q

Key features of a closed loop system

A

<ul><li>Utilises feedback-output can influence control action of input</li><li>Output is measured to be compared with input</li><li>Self correction can then occur based on the output</li></ul>

320
Q

Examples of closed loop systems

A

<ul><li>Air conditioner</li><li>Centralised heating system</li></ul>

321
Q

Main steps in control systems operation cycle

A
  1. Analogue inputs taken from the sensors<br></br>2.Analogue data converted to digital using ADC<br></br>3.Digital data is processed by the microprocessor and digital output generated<br></br>4.Digital data converted to analogue using DAC<br></br>5.Output executed using actuators
322
Q

Automated doors features (example of control system)

A

<img></img>

323
Q

Heating system (example of control system)

A

<img></img>

324
Q

Microprocessor definition

A

<ul><li>Computer system that contains all the functions of a CPU&nbsp;</li></ul>

325
Q

Sensor definition

A

<ul><li>A device that converts a physical stimulus into a readable output</li></ul>

326
Q

Actuators function

A

<ul><li>Part of a device or machine that helps it with physical movement</li><li>Converts energy into mechanical force</li></ul>

327
Q

Accessibility input devices examples

A

<ul><li>Adapted keyboard</li><ul><li>Bigger keys</li><li>Ergonomic(help with Carpal Tunnel Syndrome)</li></ul><li>Adapted mouse,trackball and joystick</li><ul><li>Ergonomic mouse</li><li>Xbox Adaptive Controller(large buttons+is affordable)</li><li>USB mouse with a large trackball</li></ul></ul>

328
Q

Assistive technology examples 

A

<ul><li>Screen readers</li><li>Screen magnification software</li><li>Alternative input devices</li><ul><li>Motion/eye tracking</li><li>Head pointers</li></ul><li>Speech input software</li></ul>

329
Q

Medical sensors examples

A

<ul><li>Airflow sensor</li><li>Body temp sensor</li><li>Accelerometer</li><li>Electrocardiogram sensor</li></ul>

330
Q

Transducers definition

A

<ul><li>A device which converts signals from analogue to digital and vice versa</li></ul>

331
Q

+ves of transducers

A

<ul><li>Compatible with microprocessors and computers</li><li>Ease of convertibility between analogue and digital</li><li>Remote controllability</li></ul>

332
Q

What is feedback?

A

<ul><li>Modification or control of a process or system by its results or effects</li></ul>

333
Q

Examples of processes that use feedback

A

<ul><li>Missile tracking moving target</li><li>A heating system in a house</li><li>Auto-pilot</li></ul>

334
Q

Embedded system definition

A

<ul><li>A computer system within another mechanical or electrical device with a specific purpose</li></ul>

335
Q

Tagging prisoners-arguments for:

A

<ul><li>Allows non-dangerous criminals to move</li><li>Reduces number of people needed to be in prison</li><li>Allows for tracking at all times</li></ul>

336
Q

Tagging prisoners-against 

A

<ul><li>Could be hacked to track innocent people</li><li>Tracking data could be sold to make money</li><li>Loss of freedom of movement</li></ul>

337
Q

Surveillance 

A

<ul><li>Monitoring/observation from a distance using electrical equipment</li></ul>

338
Q

Arguments for surveillance

A

<ul><li>Greater security</li><li>Can be used as evidence in court cases</li><li>Fewer people need to monitor others-physical security replaced by cameras etc.</li></ul>

339
Q

Arguments against surveillance

A

<ul><li>Loss of privacy</li><li>Could be hacked and used for malicious purposes</li><li>Utilised to spy on people</li></ul>

340
Q

CCTV-how it works

A

<ul><li>Video surveillance technique</li><li>Works independently to monitor a certain area</li></ul>

341
Q

Arguments for CCTV

A

<ul><li>Reduces crime-deterrent</li><li>Cost effective solution to criminal damage</li><li>People may feel safer</li></ul>

342
Q

Arguments against CCTV

A

<ul><li>Doesn't stop crime</li><li>Expensive to install and maintain</li><li>May be used for illegal spying</li></ul>

343
Q

What is a centralised control system?

A

<ul><li>Control system where all processing occurs at a single, central location such as a microprocessor</li><li>Microprocessor controls numerous terminals (sensors/actuators)</li></ul>

344
Q

What is a distributed control system?

A

<ul><li>Control system where multiple decentralised microprocessors control multiple sensors and actuators</li><li>These terminals all communicate with one another via a network</li></ul>

345
Q

+ves of centrally controlled systems

A

<ul><li>Easier to maintain-everything is managed centrally</li><li>More control</li><li>Cheaper-just need one microprocessor</li></ul>

346
Q

+ves of distributed systems

A

<ul><li>Quicker access</li><li>Sharing of tasks and resources</li><li>No single point of failure</li><li>Response will be more specific to environment</li></ul>

347
Q

-ves of centrally controlled systems

A

<ul><li>Single point of failure</li><li>Slower processing-single processor has to manage all terminals and respond to all sensors etc</li><li>Actuators will be less responsive to their environments</li></ul>

348
Q

-ves of distributed systems 

A

<ul><li>Much more expensive-multiple microprocessors and sensors</li><li>Much more complex-harder to maintain&nbsp;</li><li>Harder to fix any potential errors</li></ul>

349
Q

What is an autonomous agent?

A

<ul><li>Software entity that carries out a set of operations on behalf of a user or another program with some degree of independence</li></ul>

350
Q

4 key features of an autonomous agent

A

<ul><li>A-autonomy</li><li>B-reactive behaviour</li><li>C-concurrency/sociality</li><li>D-persistence</li></ul>

351
Q

Autonomy key features

A

<ul><li>Self activation-agents don't need to be triggered to perform a task</li><li>No human intervention-agents can select task themselves without human intervention</li></ul>

352
Q

Reactive behaviour key features

A

<ul><li>Agent senses environment it is in (use of sensors) and decides what to do</li></ul>

353
Q

Concurrency/sociality key features

A

<ul><li>Agents able to interact with other agents through communication in various modes</li><li>Include coordination,cooperation and competition</li></ul>

354
Q

Persistence key features

A

<ul><li>Code describing an agent runs continuously like a process</li><li>Not executed on demand</li></ul>