IT 1.4 revision Flashcards

revision

1
Q

Malware​

What does the term mean?

A

A malicious software designed to harm or damage a computer. can also spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering

A

the act of tricking someone into gaining personalised information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does phishing mean

A

phishing is the act of sending a message to a person in an attempt to get them to reveal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

virus?

A

Malicious software designed to cause harm to a network or computer system. spread via humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

worm?

A

A worm is a computer program that can make a copy of itself. spread by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan horse?

A

Any program which tries to hack into the computer by misleading its true use. spread via fake links and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe what a brute force attack is and how they work?

A

This is a very basic attack where you essentially try to crack a password by trying
every combination of letters and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data interception and how does it happen?

A

Data travels across networks in packets which can be intercepted. If packets are encrypted, they cannot be understood without a key. Unencrypted packets can be re-assembled using signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is wireless more insecure?​

A

Security risk as data
travels through the air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS

A

A DDoS attack is malicious, and can prevent a website from being accessible. this is because they are getting bombarded by multiple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is not using common words and short password not a good idea? (Be specific)​

A

short words meaning less combination the hackers need to try thus able to hack you quickly.
common word are much easier to identify than not common words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the purpose of a cpu

A

input–>process–>output

fde cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

common CPU components

A

ALU
CU
CACHE
REGISTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VON NEUMAN ARCHITEUER

A

MAR
MDR
ACCUMULATOR
PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT DID VON NEUMAN DO

A

PROGRAM DATA AND PROGRAM INSTRUCTION RAN ON THE MAIN MEMEORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT IS CLOCK SPEED

A

CLOCKE SPEED IS THE AMOUNT OF FDE CYCLE THE CPU RUNS PER SECOND. MEAUSRED IN HZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WHAT IS CORE AND DOES DOUBLING INCREASE IT/’

A

CORE ARE PROCESSOR INSIDE THE CPU AND DOUBLING DOESNT NECCESARILY INCREASE THE PERFORMANCE BECAUSE THE TWO CORE HAS TO BE UTLISED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WHAT IS CACHE

A

CACHE IS A VERY FAST MEMORY LOCATED NEAR THE CPU OR INSIDE. CACHE STORES RECENTLY USED DATA AND THIS HELPS SPEED UP THE PROCESS AS THE CPU DOESNT HAVE TO GO BACK TO THE RAM TO RE GET THE DATA BUT RATHER GO TO THE CACHE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WHY DO COMPUTERS USE BINARY

A

THEY ARE MADEW OF BILLIONS OF TRANSISTORS WHICH ONLY HAVE TWO STATES ON AND OFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FDE

A

THE CPU CHECKS THE PC TO GET THE NEXT INFORMATION TO EXECUTE NEXT
THE MEMORY ADDRESS OF THE PC IS COPIED TO THE MAR AND IT FETCHES THE DATA FROM THE RAM AND STORES IT IN THE MDR.
THE PC IS INCREMENTED BY ONE TO GO THE NEXT INSTRUCTION
IT DECODES
EXECUTES AND CYCLE RECYCLES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EMBEDDED SYSTEM
EG

A

A COMPUTER INSIDE THE ANOTHER DEVICE THAT HAS A SPECIFDIC FUNCTION TO DO
EG MICROWAVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PRIMARY STORAGE

A

PRIMARY STORAGE IS NEEDED BY THE CPU TO ACCESS THE SECONDARY STORAG. ALSO IT IS FASTER THAN THE SECONDARY STORAGE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TWO TYPES OF PRIMARY STORAGE

A

RAM IS VOLATILE AND CAN BE READ AND WRITTEN FROM
ROM IS NON VOLATILE AND CAN ONLY BE READ FROM. THIUS IS WHY IT USED TO STORE BOOT UP VODE OR THE COMPUTER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VIRTUAL MEMORY?

A

VIRTUAL memory is used when the primary memory is full and operating system starts moving less important applications and data from RAM into the secondary storage. this will help clear some space in the ram allowing more useful programs to run on the ram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

how does each secondary storage stores data

A

optical= it stores via laser beams shining on the pits which will reflect or don’t reflect representing on or off
magnetic= stores via the different polo rites of magnetism representing either on or off
solid state= stored via flash chips electrically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

advantage of each secondary storage.

A

solid state is fast and portable.
magnetic is cheap and has large storage
optical is average. cannot be easily changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is the point of secondary storage

A

non volatile and can store more than primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

binary

A

stores information via numbers of 0 and 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

hexadecimal

A

This was invented to allow 2 digits to represent a byte of information. So
each hexadecimal digit represent 4 bits or a nibble.

30
Q

overflow

A

when u have more numbers left after u did the binary addition

31
Q

character sets

A

computers allocating a set of binary to represent letters numbers and symbol

32
Q

ascii

A

it used byte to store so only 256 charecters
only English letters

33
Q

unicode

A

popularity of internet grew more languages needed and thus Unicode is invented. more charecter from different languages and also the ascii

34
Q

how is sound stored

A

sample of analogue sound is taken from set intervals and converted into binary

35
Q

sample rate

A

how many sample it can take per second. more sample meaning more quality but takes up space.

36
Q

bit depth

A

how accurate the samples are.
more bits meaning more options
more bits means more accurate but takes up space

37
Q

metadata

A

extra information about the data

38
Q

images stored

A

images are stored via pixels. these pixels are allocated with a colour via binary. usualy represented via hexadecimal as red green or blue

39
Q

resolution

A

number of pixels in the image. more pixels the better. but increase storage

40
Q

colour depth

A

how many bits allocated to the pixel but more pixel more realistic colours but more storage.

41
Q

compressioin

A

reducing the size of the file using algorithm by decompress.
lossy. loose some data when compress.
lossless dont loose no data even after compress

42
Q

bandwidth

A

amount data that can be transmitted from one place to another

43
Q

type of factors that can disrupt network

A

bandwith
types of connection
interference
number devices= more device less bandwith

44
Q

NIC

A

A DEVICE In the computer that allows u to connect to a network

45
Q

wap

A

a device that lets wireless nic to connect to a network

46
Q

switch and router

A

switch= connects computer together to form network
router same as switch but also connect to each other

47
Q

an internet
hosting
web server
web client

A

1)internet is collection of network
2) service where people are allowed to put their own website onto the internet
3)computer that allows u to host the website
4)the device attempting to access the webpage

48
Q

dns

A

turns the name of the website into the ip address required to access it

49
Q

DNS STEPS

A

1) web browser gets request for a url from the user
2)browser contacts the dns and sends the domain name
3) the dns maps out the domain name and send the ip address back to the browser.
4) browser send a GET request to the website
5)requested website is delivered back to the users profile

50
Q

wireless adv and dis

A

WIRELESS TRANSEFER DATA VIA RADIO SIGNALS
ADV: NO CABLES, EASSIER TO SETUP AND ADD NEW DEVICES.
DIS: INTEERFERNECE FROM THE WALLS, LACK OF SECURITY AS DATA IS EXPOSED TO THE SURRONDINGS, SHORT RANGE

51
Q

ETHERNET ADV AND DIS

A

USE TWISTED COPPPER CABLES TO SWEND DATA
NO INTERFERENCE,GOOD SPEED, RESONABLY CHEAP
DIS# NEEDS BUILDING, MID RANGE, DEGRADES OVER TIME

52
Q

FIBRE OPTIC CABLE

A

SENDS DATA THROUH LIGHT THORUGH CABLES.
VERY FAST, WORKS OVER LONG DISTANCE
VERY EXPENSIVE, NEEDS BUILDING WORK

53
Q

STAR

A

COMPUTER ARE CONNETED TO A CENTRAL NETWORK
ADV: IF ONE COMPUTER NOT CONNECDT, REST WONT BE AFFECTED ONLY THE COMPUTER NOT CONNECT.
DISADV: SERVER BREAK, EVERY BREAK

54
Q

MESH

A

RANGE OF COMPUTER CONNECTED TO EACH OTHER
ADV: BREAKS WOULD NOT BE PROBLEM CAUSDE U CAN ROUTE IN AN ANOTHER WAY
DISADV: EXPENSIVE AS LOTS OF CABLE

55
Q

NETWORK LATENCY

A

HOW LONG IT TAKES FOR A SIGNAL TO REACH ITS DESTINATION.

56
Q

LAN AND WAN

A

LOCAL AREA NETWORK: LOCATED IN ONE GEOGRAPHICAL AREA AND HARDWARE IS YOURS
WIDE AREA NETWORK; LOCATED IN MULTIPLE PLACE AND HARDWARE OWNED BY SOMEONE ELSE

57
Q

CONCEPT OF LAYERS

A

BREAK NETWORKING DOWN INTO SMALL TASK THAT WORK WITH EACH OTHER
ADV IS THAT REDUCE DIFFCULT OF CREATING PROGRAM AS ITS DIVIDE INTO SMALL PARTS.

58
Q

PRTOCOL

A

IS A SET OF RULES THAT GOVERN HOW DEVICES COMMUNICATE OVER THE INTERNET

59
Q

STANDARDS

A

STANDARS ARE NORM THAT ARE EXPECTED TO BE FOLLLOWED. LIKE BLUETOOTH BEING ACCPTED BY EVERY MANUFACTURER

60
Q

TRANSFROMATION CONTROL PROTOCOL AND IP

A

ENABLES COMMUNICATION OVER THE INTERNET

61
Q

HTTP HTTPSECURE. HYPER TEXT TRANSFER PROTOCOL

A

GOVERS THE COMMUNCIATION BETWEEN CLIENT AND SERVER. USED TO SEND WEBPAGES

62
Q

FILE TRANSFER PROTOCOL.

A

ALLOWS TRANSFER OF FILE BETWEEN COMPUTER.

63
Q

POP POST OFFICE PROTCOL

A

GOVERN RETREIVING EMAIL FROM EMAIL SERVICE. POP DOWNLOADS THER EMAIL TO THE COMPUTER.

64
Q

IMAP INTERNET MESSAGE ACCESS PROTCOL

A

Email protocol that is used to retrieve emails from
mail servers. Emails are stored on a server online so it is better when using multiple devices to access your
email.

65
Q

Simple Mail Transfer
Protocol

A

Protocol used to send email from a web browser or
client.

66
Q

DATA INTERCEPTION METHODS

A

Wireless networks are susceptible to data interception as no physical access is required.
* Data can be intercepted as it travels over a WAN as it uses telecommunications infrastructure.
* Data can also be intercepted physically, for example portable hard drives and other external
hardware can be stolen.

67
Q

SQL

A

Where an attacker can execute malicious SQL statements using software which controls a database
management system. SQL is used to manage database and many website are essentially linked to
database especially online shops.

68
Q

SQL DANGERS AND PREVENTION

A

DANGERS:
THEY COULD DELETE DATA AND ALTER THE DATA, EXPOSE DATA
PREVENTION
REMOVE THE SQL COMMAND AND PRECOMPILE ANY SQL COMMANDS

69
Q

IDENTIFYING AND PREVENTING VULNERABILITIES

A

PENETRATION TESTING HELPS SCAN FOR VULENRABILITIES
USER ACCESS LEVELS: TO CONTROL WHAT USERS CAN ACCESS.
SECURE PASSWORDS. FORCING CYUSTOMER TO MAKE STRONG PASSS WORD WHICH WILL EHLP DEFEND AGAINST BRUTE FORCE ATTACK
ENCRYPTION: UNREADABLE DATA. MUST BE DECODED BY A KEY
ANTI MALWARE SOFTWARE will help to stop malware from causing damage to your
system and files.
Firewalls: Monitors the traffic flowing in and out of a computer on a network
Physical Security: Keeping unwanted people away from devices by locking doors, using swipe cards,
having CCTV and guards are ways to control access to your system.

70
Q

HOW CAN A PERSON MAKE THEIR PASSWORD STRONGER

A

VIA HAVING LONG PASSWORD WITH MORE CHARECTERS MEANING IT WILL TAKE AFR LONGER TO BREAK.