IT 1.4 revision Flashcards
revision
Malware
What does the term mean?
A malicious software designed to harm or damage a computer. can also spread
What is social engineering
the act of tricking someone into gaining personalised information
what does phishing mean
phishing is the act of sending a message to a person in an attempt to get them to reveal information.
virus?
Malicious software designed to cause harm to a network or computer system. spread via humans.
worm?
A worm is a computer program that can make a copy of itself. spread by itself
Trojan horse?
Any program which tries to hack into the computer by misleading its true use. spread via fake links and apps
Describe what a brute force attack is and how they work?
This is a very basic attack where you essentially try to crack a password by trying
every combination of letters and symbols.
What is data interception and how does it happen?
Data travels across networks in packets which can be intercepted. If packets are encrypted, they cannot be understood without a key. Unencrypted packets can be re-assembled using signatures.
Why is wireless more insecure?
Security risk as data
travels through the air
DDoS
A DDoS attack is malicious, and can prevent a website from being accessible. this is because they are getting bombarded by multiple computers.
Why is not using common words and short password not a good idea? (Be specific)
short words meaning less combination the hackers need to try thus able to hack you quickly.
common word are much easier to identify than not common words.
the purpose of a cpu
input–>process–>output
fde cycle
common CPU components
ALU
CU
CACHE
REGISTERS
VON NEUMAN ARCHITEUER
MAR
MDR
ACCUMULATOR
PC
WHAT DID VON NEUMAN DO
PROGRAM DATA AND PROGRAM INSTRUCTION RAN ON THE MAIN MEMEORY
WHAT IS CLOCK SPEED
CLOCKE SPEED IS THE AMOUNT OF FDE CYCLE THE CPU RUNS PER SECOND. MEAUSRED IN HZ
WHAT IS CORE AND DOES DOUBLING INCREASE IT/’
CORE ARE PROCESSOR INSIDE THE CPU AND DOUBLING DOESNT NECCESARILY INCREASE THE PERFORMANCE BECAUSE THE TWO CORE HAS TO BE UTLISED.
WHAT IS CACHE
CACHE IS A VERY FAST MEMORY LOCATED NEAR THE CPU OR INSIDE. CACHE STORES RECENTLY USED DATA AND THIS HELPS SPEED UP THE PROCESS AS THE CPU DOESNT HAVE TO GO BACK TO THE RAM TO RE GET THE DATA BUT RATHER GO TO THE CACHE.
WHY DO COMPUTERS USE BINARY
THEY ARE MADEW OF BILLIONS OF TRANSISTORS WHICH ONLY HAVE TWO STATES ON AND OFF
FDE
THE CPU CHECKS THE PC TO GET THE NEXT INFORMATION TO EXECUTE NEXT
THE MEMORY ADDRESS OF THE PC IS COPIED TO THE MAR AND IT FETCHES THE DATA FROM THE RAM AND STORES IT IN THE MDR.
THE PC IS INCREMENTED BY ONE TO GO THE NEXT INSTRUCTION
IT DECODES
EXECUTES AND CYCLE RECYCLES
EMBEDDED SYSTEM
EG
A COMPUTER INSIDE THE ANOTHER DEVICE THAT HAS A SPECIFDIC FUNCTION TO DO
EG MICROWAVE
PRIMARY STORAGE
PRIMARY STORAGE IS NEEDED BY THE CPU TO ACCESS THE SECONDARY STORAG. ALSO IT IS FASTER THAN THE SECONDARY STORAGE.
TWO TYPES OF PRIMARY STORAGE
RAM IS VOLATILE AND CAN BE READ AND WRITTEN FROM
ROM IS NON VOLATILE AND CAN ONLY BE READ FROM. THIUS IS WHY IT USED TO STORE BOOT UP VODE OR THE COMPUTER.
VIRTUAL MEMORY?
VIRTUAL memory is used when the primary memory is full and operating system starts moving less important applications and data from RAM into the secondary storage. this will help clear some space in the ram allowing more useful programs to run on the ram.
how does each secondary storage stores data
optical= it stores via laser beams shining on the pits which will reflect or don’t reflect representing on or off
magnetic= stores via the different polo rites of magnetism representing either on or off
solid state= stored via flash chips electrically
advantage of each secondary storage.
solid state is fast and portable.
magnetic is cheap and has large storage
optical is average. cannot be easily changed
what is the point of secondary storage
non volatile and can store more than primary
binary
stores information via numbers of 0 and 1