important questions Flashcards

1
Q

describe how resistive touch screen tech operates

A

-screen made up of two layers
-user pushes top layer into bottom
-layers create a corcuit
-causes flow of electtricity
-allowing coordinates/location of user touch to be calculated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

benefits of resistive touch screen

A

works with gloves on
isnt damaged by water
supports multitouch
cheap to manufacture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disadvantages of resistive touch screen

A

-lower resolution
-not very senesitive to touch
prone to scratches
-poor visibility of screen on sunlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe the stored concept program

A

data and instructons are sotred in same memory
can only be fethced one at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain methods to be used to avoid accendantly losing/deleting a file

A
  • backup file- data can be recovered
    -double verification- computers sends verification to confirm user wants to delete file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are two ways that a user coul check website uses ssl protocal

A

closed padlock on browser
uses https protocal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

state name of updated ssl protocal

A

tls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain why proxy server is used and how

A

-acts as an intermediary between web browser and server
-examines traffic to web server
-stops malicous traffic
-cache frequently viewed web pages
-prevents dos attacks
-stops overload of requests to web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain some methods to avoid spyware

A

using virtual keyboard or biometrics- both means keypresses cant be recorded
use antispyware-actively scans comp for any malicous malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does ssl work

A

ssl is a security protocal, provides secure. communication over the internet
uses cmvination of symmetric and aysemmetric encryption to secure data
ssl operates at transport layer, ensure data is encrypted before sent over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

explain how file is transmitted using packet switching

A

piece of data is split into packets
packets include-header payload and trailer
packets transmitted from sender to receiver, through multiple wires
packets may arrive out of order
router controls route- shortest most efficient rout for packet
if packet isnt received another request is sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

describe tls

A

also uses combination of symmetric and aysemmetric encryption to secure data, it is a newer version of ssl, provides secure comunication over internet
made up of 2 layers
-handshake layer- establishes a secure connection between two endpoints
record layer- responsible for transmitting data securely between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain steps in tls

A

uses handshake layer and record layer
-client/browser requests secure connection to server
-client/ browser requests server to identify itsled
-server provides a digital certificate
-client/ browser validates certificate
-client/ browser sends a signal back to server to begin data transmission
-encryption method will agree and session key is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what component in the computer is needed to access a network

A

nic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what type of address is allocated to component by manufacturer, used to uniquely identify device

A

mac address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what device on network can connect multiple device and automatically assignt them an ip addresss

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

describe what is meant by a dnamic ip address

A

changes everytime user logs out of page or computer turned on again, can uniquely identify device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

describe infrared touch screen

A

leds shine infrared light accross a screen forming a matrix, when screen is thouched beams are interrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

advantages and disadvantages of infrared touch screen

A

excellent resolution, high precision, durable, allows multitouch
cant work with gloves on, expensive, heat senstive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

describe capactive touch screen

A

made up of a protective layer, a transparent conductive layer and a glass substrate, touching screen changes electrctrostatic field of conductive layer, coordinates/location of finger can be calculated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

advantages / disadvantages of capactivetouch screen

A

excellent quality, unlimited touch life, scale well
sensitive to interfernece to light, not waterproof, not gloves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

describe inkjet printers, + advantages and disadvantages

A

cheap, high quality image, good colour blending
slow printing
uses ink cartilidges which spray tiny bubbles of ink, with moving head, piezoelectric electricity, thermal bubble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

describe laser printers, + advantages and disadvantages

A

higher quality text, fast printing
expensive
laser applies static charge to paper
toner- powdered ink attracted to static charge, sticks and melts producing image
uses drum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the two different forms of projectors

A

LCD and DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

describe LCD projectors

A

use light of 3 colours, red, green and blue, colours are combined to form final image, high quality images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

describe DLP projectors

A

thousands of tiny mirrors used reflect digital image from computer to screen
smaller more portable, worst quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what are the type of screens/ monitors

A

LCD and LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

describe LCD screens

A

sandwich crystals between s sheets of glass
white back light iluminate screen from behind
crystals solid, light cant pass
electrical current applied to crystals to individual pixels, light can then pass, forming an image
cheaper, worst image quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

describe LED screens

A

back light used is display of LED
display made of pixels arranged in a matrix
light shone at pixels
bette quality image, better contrast and colour production, less electricity used, cost efficient, expensive at first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

how does magnetic storage work

A

disk called platters spin constantly when comp on
read write arm moves in and out across disk surface and electromagnet is on it which is used to read or write data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

give an example and properties of magnetic storage

A

hdd, cheap, fast, large storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

example and properties of optical storage

A

cd, dvd, blu-ray, low storage, slow access, portable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

examples of solid state, properties

A

ssd, memory cards, usb- flash drive
no moving parts, compact, portable, large storage, produce less heat and power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

nic

A

hardware device needed to connect computer to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

mac address

A

nic have unique address assigned to them which is the mac, assigned by manufacturer
unique address
cant be altered
48 bit long
written in hexa
24 first bits are address of manufacturer
other 24 automatically generated serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ip address

A

assigned by the isp
static and dynamic ip
ipv4 and ipv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

static ip

A

same address every time joins network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

dynamic ip

A

assigned any available address when joins network, changes address

39
Q

ipv4

A

32 bit long, denary

40
Q

ipv6

A

128 bit long, 32 hexa characters, groups of 4 seperated by a dot

41
Q

what is function of router

A

hardware device used to connect devices together to form a LAN
or connect LANS to form a WAN
allows devices to connect to LAN
assign IP address to devices joining a LAN
connect a LAN to internet
sends to data to correct destination on a netwrok
sends data packets to efficient route

42
Q

whats a lan

A

computer network within single location, eg school

43
Q

whats a wan

A

multiple lans joined together

44
Q

how is laser used to store and read data from disk

A

laser is shined into disk, laser light reflects back and is captured by sensors
lasers burns pits onto surface of disk
uses pits and lands, 1 and 0 or on and off

45
Q

what are two examples of software stored on the ssd

A

utility software, os or application software

46
Q

state what is meant by biometric password

A

uses biological data

47
Q

explain how firewall makes mobile device more secure

A

firewall gathers traffic coming and going out of server, traffic is compared to set critera, if traffic doesnt meet criteria, alert sent to warn adele, prevent hackers, and malicous attacks

48
Q

what are ethical issues that could be a concern when using internet

A

pharming, spyware, malware, hacking, phishing, plagiarism, fake news, addiction, environmental effects, cyber bullying

49
Q

why does an overflow occur

A

more bits that availble in register, number of bits is too big/ bigger than number of bits in register, result is bigger than 255, requires more than 8 bits to represent

50
Q

describe brute force attacks

A

-user guesses a password
-combinations are repeatedly entered
-can be manually or automatically using a software
-password guessed until access is given

51
Q

what are some aims of brute force attacks

A

gain personal info, delete data, change data

52
Q

where is session cookies and persistent cookies stored

A

session- ram
persistent- hard drive

53
Q

explain https

A

It is a secure protocol // hypertext transfer protocol secure
It is a set of rules for data transmission
It combines HTTP and SSL/TLS to transmit data
It encrypts data for transmission

54
Q

State three ways that stored data can be maliciously damaged

A

virus
hacking
malware

55
Q

purposes of os

A

perform basic functions of computer
manages hardware
provides an itnerface
handles interrupts

56
Q

name of component in cpu that regulates number of fetch decode execute cycles cpu can perform in a second

A

clock

57
Q

why may an error occur when data is transmitted

A

interferance

58
Q

two advantages of owners of company sotring data in cloud storage

A

data can be accessed from anywhere, employees can thus work from anywhere
cloud system will back up data, meaning company doesnt need to do this
increase storage needed easily without needing to buy new hardware

59
Q

one disadvantage to employees in copany of storing data incloud

A

needs internet to access, or else data cant be accessed

60
Q

image resolution

A

number of pixels wife by number of pixels high

61
Q

image colour depth

A

number of bits used to represent each colour

62
Q

one benefit of increasing colour depth

A

greater range of colours can be used

63
Q

role of router in annotated diagram

A

router examines packet looks for packet header, looks for ip address of destination
packet sent towards its correct destination by fastest route
router is shown connecting devices router is shown assigning an ip address to device

64
Q

differences between primary and secondary storage

A

primary- directly accessed by cpu, secondary not
primary can be both non volatile and volatile, secondary only non volatile
primary storage faster access, secondary slower access speed of data

65
Q

describe an expert system

A

has a rule base that contains a list of facts, the itnerference engine appies knowledge bse to the rule base to reach a diagnosis for repair of cr. the user provides data to system using an interface

66
Q

describe what is meant by machine learning capabilities

A

trained, form of ai
analyses patterns stored succesfully or not results
adapts and reflects
can improve or adapt without human influence/ input

67
Q

how is hexadecimal used in website development

A

html colour codes

68
Q

how does lossy compression reduce file size of videos

A

A compression algorithm is used
The resolution could be reduced
Colour depth could be reduced // bits per pixel reduced
Sounds not heard by human ear could be removed
Repeating frames could be removed

69
Q

what uses position and alignment marks for orientation

A

QR CODE

70
Q

explain how ssl protocal secures the data for transmission (2)

A

encrypts data
based on authentication of an ssl certificate

71
Q

describe operation of an HDD and how it stores data

A

has platters
platters diveded into tracks
platter spins
magnetic field determines binary value
read/ write arm moves in and out of platter
arm has electromagnetic properties

72
Q

describes how lossy compression functions

A

compression algorithm used
permenantly removes data
sample resolution reduced
reduced frame rate
reduced colour depth

73
Q

explain how phishing obtains personal data

A

fake email sent to user
contains link to false website
user clicks link and enters personal details

74
Q

what type of language can be used to directly manipulate hardware in the comp

A

assembly lang and machine code

75
Q

what type of lang is portable

A

high level language

76
Q

identify ways in which data can be accidentally damage

A

hardware or software failure
fire
flood

77
Q

what type of sensor can check if vehicle too high

A

light

78
Q

what type of sensor can count the vehicles enetering car park

A

pressure

79
Q

is the ram contained in the cpu

A

no

80
Q

what error check checks for errors in data entry

A

check digit

81
Q

what error check checks for errors in data after transmission

A

checksum

82
Q

describe process of interrupt

A

interrupt generated
given rpiority
interrput queued
Interrupt stops CPU from processing current task
CPU will service interrupt // Interrupt handler services interrupt …

83
Q

MAR

A

register that holds address of data needs to be fetched

84
Q

PC

A

next instruciton to be fetched

85
Q

what are multimedia format that stores video and audio

A

MP4

86
Q

what file stores sound

A

MP3

87
Q

what files contain instructions on how to create the sound

A

MIDI

88
Q

explain why user uses a compiler rather than interpreter

A

produces exectuable file
would not realease source code
source code cant be edited
no need to be translated everytime

89
Q

mdr

A

stores data that has been fethed

90
Q

firmware

A

type of software stored in rom, incldues basic input output system bios, and bootlander

91
Q

ascii vs unicode

A

ascii uses 7/8 bit per charcter
unicode uses 16/32 bits per character
ascii limited languages that cna represent
unicode many languages including emojis
ascii represent less characters than unicode

92
Q

features of solid state storage

A

volatile or not
uses flow gates
uses control gates
transistors
uses nand or nor tech

93
Q

examples of software interrupts

A

division by zero
null value
two processes trying to access same memory