IT 1.4 revision Flashcards

revision

1
Q

Malware​

What does the term mean?

A

A malicious software designed to harm or damage a computer. can also spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering

A

the act of tricking someone into gaining personalised information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does phishing mean

A

phishing is the act of sending a message to a person in an attempt to get them to reveal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

virus?

A

Malicious software designed to cause harm to a network or computer system. spread via humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

worm?

A

A worm is a computer program that can make a copy of itself. spread by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan horse?

A

Any program which tries to hack into the computer by misleading its true use. spread via fake links and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe what a brute force attack is and how they work?

A

This is a very basic attack where you essentially try to crack a password by trying
every combination of letters and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data interception and how does it happen?

A

Data travels across networks in packets which can be intercepted. If packets are encrypted, they cannot be understood without a key. Unencrypted packets can be re-assembled using signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is wireless more insecure?​

A

Security risk as data
travels through the air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS

A

A DDoS attack is malicious, and can prevent a website from being accessible. this is because they are getting bombarded by multiple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is not using common words and short password not a good idea? (Be specific)​

A

short words meaning less combination the hackers need to try thus able to hack you quickly.
common word are much easier to identify than not common words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the purpose of a cpu

A

input–>process–>output
CARRY OUT THEW FETCH/EXECUTE CYCLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

common CPU components

A

ALU
CU
CACHE
REGISTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VON NEUMAN ARCHITEUER

A

MAR Stores the memory address from which data will be
fetched to the CPU,
MDR Holds data that is being transferred to or
from memory.
ACCUMULATORThe accumulator is a register in which holds the
intermediate arithmetic logic unit results are stored.
Basically in a multiple calculation it would the result
in between.
PC The memory address of the next instruction to be
executed next.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT DID VON NEUMAN DO

A

PROGRAM DATA AND PROGRAM INSTRUCTION RAN ON THE MAIN MEMEORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT IS CLOCK SPEED

A

CLOCKE SPEED IS THE AMOUNT OF FDE CYCLE THE CPU RUNS PER SECOND. MEAUSRED IN HZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WHAT IS CORE AND DOES DOUBLING INCREASE IT/’

A

CORE ARE PROCESSOR INSIDE THE CPU AND DOUBLING DOESNT NECCESARILY INCREASE THE PERFORMANCE BECAUSE THE TWO CORE HAS TO BE UTLISED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WHAT IS CACHE

A

CACHE IS A VERY FAST MEMORY LOCATED NEAR THE CPU OR INSIDE. CACHE STORES RECENTLY USED DATA AND THIS HELPS SPEED UP THE PROCESS AS THE CPU DOESNT HAVE TO GO BACK TO THE RAM TO RE GET THE DATA BUT RATHER GO TO THE CACHE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WHY DO COMPUTERS USE BINARY

A

THEY ARE MADEW OF BILLIONS OF TRANSISTORS WHICH ONLY HAVE TWO STATES ON AND OFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FDE

A

THE CPU CHECKS THE PC TO GET THE NEXT INFORMATION TO EXECUTE NEXT
THE MEMORY ADDRESS OF THE PC IS COPIED TO THE MAR AND IT FETCHES THE DATA FROM THE RAM AND STORES IT IN THE MDR.
THE PC IS INCREMENTED BY ONE TO GO THE NEXT INSTRUCTION
IT DECODES
EXECUTES AND CYCLE RECYCLES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EMBEDDED SYSTEM
EG

A

A COMPUTER INSIDE THE ANOTHER DEVICE THAT HAS A SPECIFDIC FUNCTION TO DO
EG MICROWAVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PRIMARY STORAGE

A

PRIMARY STORAGE IS NEEDED BY THE CPU TO ACCESS THE SECONDARY STORAG. ALSO IT IS FASTER THAN THE SECONDARY STORAGE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TWO TYPES OF PRIMARY STORAGE

A

RAM IS VOLATILE AND CAN BE READ AND WRITTEN FROM
ROM IS NON VOLATILE AND CAN ONLY BE READ FROM. THIUS IS WHY IT USED TO STORE BOOT UP VODE OR THE COMPUTER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VIRTUAL MEMORY?

A

VIRTUAL memory is used when the primary memory is full and operating system starts moving less important applications and data from RAM into the secondary storage. this will help clear some space in the ram allowing more useful programs to run on the ram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
how does each secondary storage stores data
optical= it stores via laser beams shining on the pits which will reflect or don't reflect representing on or off magnetic= stores via the different polo rites of magnetism representing either on or off solid state= stored via flash chips electrically
26
advantage of each secondary storage.
solid state is fast and portable. magnetic is cheap and has large storage optical is average. cannot be easily changed
27
what is the point of secondary storage
non volatile and can store more than primary
28
binary
stores information via numbers of 0 and 1
29
hexadecimal
This was invented to allow 2 digits to represent a byte of information. So each hexadecimal digit represent 4 bits or a nibble.
30
overflow
when u have more numbers left after u did the binary addition
31
character sets
computers allocating a set of binary to represent letters numbers and symbol
32
ascii
it used byte to store so only 256 charecters only English letters
33
unicode
popularity of internet grew more languages needed and thus Unicode is invented. more charecter from different languages and also the ascii
34
how is sound stored
sample of analogue sound is taken from set intervals and converted into binary
35
sample rate
how many sample it can take per second. more sample meaning more quality but takes up space.
36
bit depth
how accurate the samples are. more bits meaning more options more bits means more accurate but takes up space
37
metadata
extra information about the data
38
images stored
images are stored via pixels. these pixels are allocated with a colour via binary. usualy represented via hexadecimal as red green or blue
39
resolution
number of pixels in the image. more pixels the better. but increase storage
40
colour depth
how many bits allocated to the pixel but more pixel more realistic colours but more storage.
41
compressioin
reducing the size of the file using algorithm by decompress. lossy. loose some data when compress. lossless dont loose no data even after compress
42
bandwidth
amount data that can be transmitted from one place to another
43
type of factors that can disrupt network
bandwith types of connection interference number devices= more device less bandwith
44
NIC
A DEVICE In the computer that allows u to connect to a network
45
wap
a device that lets wireless nic to connect to a network
46
switch and router
switch= connects computer together to form network router same as switch but also connect to each other
47
an internet hosting web server web client
1)internet is collection of network 2) service where people are allowed to put their own website onto the internet 3)computer that allows u to host the website 4)the device attempting to access the webpage
48
dns
turns the name of the website into the ip address required to access it
49
DNS STEPS
1) web browser gets request for a url from the user 2)browser contacts the dns and sends the domain name 3) the dns maps out the domain name and send the ip address back to the browser. 4) browser send a GET request to the website 5)requested website is delivered back to the users profile
50
wireless adv and dis
WIRELESS TRANSEFER DATA VIA RADIO SIGNALS ADV: NO CABLES, EASSIER TO SETUP AND ADD NEW DEVICES. DIS: INTEERFERNECE FROM THE WALLS, LACK OF SECURITY AS DATA IS EXPOSED TO THE SURRONDINGS, SHORT RANGE
51
ETHERNET ADV AND DIS
USE TWISTED COPPPER CABLES TO SWEND DATA NO INTERFERENCE,GOOD SPEED, RESONABLY CHEAP DIS# NEEDS BUILDING, MID RANGE, DEGRADES OVER TIME
52
FIBRE OPTIC CABLE
SENDS DATA THROUH LIGHT THORUGH CABLES. VERY FAST, WORKS OVER LONG DISTANCE VERY EXPENSIVE, NEEDS BUILDING WORK
53
STAR
COMPUTER ARE CONNETED TO A CENTRAL NETWORK ADV: IF ONE COMPUTER NOT CONNECDT, REST WONT BE AFFECTED ONLY THE COMPUTER NOT CONNECT. DISADV: SERVER BREAK, EVERY BREAK
54
MESH
RANGE OF COMPUTER CONNECTED TO EACH OTHER ADV: BREAKS WOULD NOT BE PROBLEM CAUSDE U CAN ROUTE IN AN ANOTHER WAY DISADV: EXPENSIVE AS LOTS OF CABLE
55
NETWORK LATENCY
HOW LONG IT TAKES FOR A SIGNAL TO REACH ITS DESTINATION.
56
LAN AND WAN
LOCAL AREA NETWORK: LOCATED IN ONE GEOGRAPHICAL AREA AND HARDWARE IS YOURS WIDE AREA NETWORK; LOCATED IN MULTIPLE PLACE AND HARDWARE OWNED BY SOMEONE ELSE
57
CONCEPT OF LAYERS
BREAK NETWORKING DOWN INTO SMALL TASK THAT WORK WITH EACH OTHER ADV IS THAT REDUCE DIFFCULT OF CREATING PROGRAM AS ITS DIVIDE INTO SMALL PARTS.
58
PRTOCOL
IS A SET OF RULES THAT GOVERN HOW DEVICES COMMUNICATE OVER THE INTERNET
59
STANDARDS
STANDARS ARE NORM THAT ARE EXPECTED TO BE FOLLLOWED. LIKE BLUETOOTH BEING ACCPTED BY EVERY MANUFACTURER
60
TRANSFROMATION CONTROL PROTOCOL AND IP
ENABLES COMMUNICATION OVER THE INTERNET
61
HTTP HTTPSECURE. HYPER TEXT TRANSFER PROTOCOL
GOVERS THE COMMUNCIATION BETWEEN CLIENT AND SERVER. USED TO SEND WEBPAGES
62
FILE TRANSFER PROTOCOL.
ALLOWS TRANSFER OF FILE BETWEEN COMPUTER.
63
POP POST OFFICE PROTCOL
GOVERN RETREIVING EMAIL FROM EMAIL SERVICE. POP DOWNLOADS THER EMAIL TO THE COMPUTER.
64
IMAP INTERNET MESSAGE ACCESS PROTCOL
Email protocol that is used to retrieve emails from mail servers. Emails are stored on a server online so it is better when using multiple devices to access your email.
65
Simple Mail Transfer Protocol
Protocol used to send email from a web browser or client.
66
DATA INTERCEPTION METHODS
Wireless networks are susceptible to data interception as no physical access is required. * Data can be intercepted as it travels over a WAN as it uses telecommunications infrastructure. * Data can also be intercepted physically, for example portable hard drives and other external hardware can be stolen.
67
SQL
Where an attacker can execute malicious SQL statements using software which controls a database management system. SQL is used to manage database and many website are essentially linked to database especially online shops.
68
SQL DANGERS AND PREVENTION
DANGERS: THEY COULD DELETE DATA AND ALTER THE DATA, EXPOSE DATA PREVENTION REMOVE THE SQL COMMAND AND PRECOMPILE ANY SQL COMMANDS
69
IDENTIFYING AND PREVENTING VULNERABILITIES
PENETRATION TESTING HELPS SCAN FOR VULENRABILITIES USER ACCESS LEVELS: TO CONTROL WHAT USERS CAN ACCESS. SECURE PASSWORDS. FORCING CYUSTOMER TO MAKE STRONG PASSS WORD WHICH WILL EHLP DEFEND AGAINST BRUTE FORCE ATTACK ENCRYPTION: UNREADABLE DATA. MUST BE DECODED BY A KEY ANTI MALWARE SOFTWARE will help to stop malware from causing damage to your system and files. Firewalls: Monitors the traffic flowing in and out of a computer on a network Physical Security: Keeping unwanted people away from devices by locking doors, using swipe cards, having CCTV and guards are ways to control access to your system.
70
HOW CAN A PERSON MAKE THEIR PASSWORD STRONGER
VIA HAVING LONG PASSWORD WITH MORE CHARECTERS MEANING IT WILL TAKE AFR LONGER TO BREAK.
71
brute force attack
is where a hacker tries every combination of letters and symbols to crack your password. password is turned into hashed version and stored in hexadecimal and is a one way process so brute force attack is the only way. they can check if hashed versions are same as the hashed version in the password.
72
denial of service
its an malicious attack computer spamming/pinging a server which makes it inaccessible for users. it is used as smokescreen to hide another malicious attack
73
operating systems
is the suite of programs that helps manage and control the computer. it is a software that provides an interface between the user and the hardware by providing a virtual machine to the user as the hide the complexities of the hardware from the user.
74
multitasking
operating system allows a lot of tasks to be done at the same time by doing a little bit of each of the tasks at a time. without this you are only able to do one task at a time.
75
user interface
providing the user with interface like CL and GUI
76
CLI DESCRIP EASE OF USE CONTROL POWER APPEARNCE
1. COMMAND LINE INTERFACE is basically text based commands that help control the computer 2. it is harder to use due to it being complex meaning its not beginner friendly and harder to understand 3. it has more control as it directly communicates to the hardware. 4. it doesn't require much power. 5. cannot change it
77
gui DESCRIP EASE OF USE CONTROL POWER APPEARNCE
1. graphical user interface that uses visual icons to help control the computer. user can navigate between applications via the use of a pointer. 2. it is much easier to learn commands and beginner friendly as it is easier to understand. 3. it doesn't have as much control as CLI over the OS 4. it uses more power due to use of graphical components 5. visual operating systems. able to change the appearance of the os
78
peripheral management
the operating system controls devices like a printer a mouse, and even a secondary storage device. a device driver is used to explain to the os how to communicate with each device
79
file management
operating system must identify where files are stored for long term in a secondary storage using specifc track, sector eg allocating files to a folder deleting file and creating naming of files
80
user management
the OS enables different users to log onto a computer and the settings for the individual can be retained. network administrator allocates accounts to users and set access rights for different users
81
device driver
helps explain to the OS on how to communicate with peripheral devices. IT IS A PIECE OF SOFTWARE THAT HELPS CONTROL A HARDWARE. a driver allows a peripheral deivice to be connected to the computer and controlled by the os . Drivers are OS SPECIFIC
82
TWO TYPES OF SYSTEM SOFTWARE
OS AND UTILITIES
83
ENCRYPTION SOFTWARE
scramble information so that it can be sent safely without anyone else being able to read it. The information is encrypted with a password or key that is needed to read the information again.
84
COMPRESSION SOFTWARE
This is used to reduce the size of the file by performing an algorithm on the original data. You get lossy (loses data when compressed) and lossless compression (data is mathematically exactly the same when uncompressed).
85
DEFRAGMENTATION SOFTWARE
When a hard disk drive is new – files get added onto the disk in order .As files are deleted – this leaves gaps * When new files are saved – the files fill the gaps and become fragmented * Defragmentation software groups fragmented files back together
86
WHY DOES A SOLID STATE DRIVE DONT NEED DEFRAGMENTATION SOFTWARE
IT DOESNT HAAVING MOVING PARTS AND ALSO IT FINE WITH DATA BEING ALL OVER THE PLACE
87
Disk Thrashing:
When a hard disk drive is getting data from all over the place it can really slow down and even make a noise as the head moves around (thrashes) so much.
88
Law
The Data Protection Act 2018 Covers how personal data can be used by companies. It Covers: What can be collected, How long you can keep it for, Steps to keep it accurate, How it can be sent and used and who can see the data. Computer Misuse Act 1990 Makes it illegal to: Access a system without authorisation, Access a system with the intent to commit a crime, Alter data without permission (by physically doing it or by a virus). Copyright Designs and Patents Act 1988 Protects people’s intellectual property (books, play, films, music etc..) Make it an offence to copy or distribute other people’s intellectual property without permission.
89
THE FIVE ISSUES
ETHICAL Principles of conduct that are considered correct, especially those of a given profession. You will often find that professional bodies have ‘Codes of Ethics’ which members must follow. A doctor, for example, should always try to help keep people alive even if they are not at work. Legal issues Issues such as: Illegally sharing personal data, Stealing money or information, Illegally copying and sharing films and music, Extorting information or blackmailing, Electronic Spying Cultural issues Many countries have different views to us on things that we may find surprising. Cultural issues may cover things like: Language used, character sets, colours and the use of social media. Environ mental issues Positive things technology does for environment: * Email and file sending reduces paper usage * Video Conferencing reduces the need to travel * People can work from home reducing commuting and less office space. * Computers can help us analyse environmental impacts and look for solutions to help improve the environment Negative things technology does for environment: * Technology consumes a lot of energy. * Technological waste - also known as e-waste - sometimes contains poisonous chemicals and can be an environmental hazard. Privacy issues Social media, CCTV, the ability to track devices and other technology could cause privacy issues. Large companies may purchase data about us to use in marketing.
90
Digital DevIDE
The digital divide is the division which exists between those individuals who can use technology and those who can not. People who know about technology tend to have a better quality of life as they have access to jobs, benefits, health information etc..
91
Open Source Proprietary
Users: Open source is free but more likely to be buggy and less supported. They can however look at the code and alter it. Proprietary more likely to be supported and less buggy but obviously costs money. Creators: Open source doesn’t get them any money but it can get their name out there as a good programmer. People can change your software and you might not like the changes. Proprietary protects their software code and makes them money. If people buy it
92
WHATS A BUS MEMORY ADDRESS DATA AND REGISTER
Register: Small but ultra fast piece of memory normally inside the processor. They hold either some data or a memory address. Memory address: Is a binary address of where something is normally in RAM. Data: This could be some data like a simple number or an instruction. Bus: A bus is a series of lines that connect the processor to another part of the computer's architecture, such as cache memory or main memory. Think of it as wires but a little more.