IT Comp 3 Exam Flashcards

1
Q

Ad-hoc

A

Something that is setup when and where needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ad-hoc Network

A

A network that is setup when and where needed. They are often created using a mobile device like a smartphone, and can be used wirelessly or using a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

USB Tethering

A

Where a cable is used to create an ad-hoc network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile Hotspot

A

Where Wi-Fi or Bluetooth is used to create an ad-hoc network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of USB Tethering

A

Connection speed is quicker, Is a wired connection, Does not require a wireless connection, Uses less battery than a Mobile Hotspot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of Mobile Hotspots

A

Is a wireless connection, Host and device both need wireless capabilites, More than one device can connect at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open Network

A

A Wi-Fi Network that does not encrypt data. Anyone can intercept information sent via the network (i.e. passwords and personal data). Hackers can also connect to your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can a user protect themselves on an Open Network?

A

Use an up-to-date firewall and a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN

A

A VPN (or Virtual Private Network) encrypts your network traffic by ‘tunneling’ you to another network (often in different countries). These can reduce the risk of personal data being stolen on an Open Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Issues with Ad-hoc Networks

A

Battery life of the host will reduce very quickly, If your hotspot is open, anyone can connect, Monthly/top-up data from your mobile plan is used. In most cases, there is not an unlimited amount., Signal strength, and network speed can fluctuate due to it being on a mobile network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What could prevent your host from recieving a mobile network’s signal?

A

The microwave link could not have enough range, or be blocked by a building or hill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Storage

A

Where a company hosts a service (like Microsoft OneDrive or Dropbox) to store your files on a remote server via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud Computing

A

Where a company hosts a service (like Microsoft 365 or Google Drive) to store your files on a remote server via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantages of Cloud Storage

A

File versioning, Automatic synchronisation, Data backups, Security, Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File Versioning

A

Where older versions of a file are stored on Cloud Storage in case of accidental deletion or a user wanting to retrieve an older version for reference/to compare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Backups

A

Where full or incremental/partial backups of a computer system are made and uploaded to Cloud Storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Automatic Synchronisation

A

Where files are automatically synced to Cloud Storage so that the user can share files and collaborate in real-time with other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security

A

Cloud Storage is significantly more secure than Local Storage. In most cases, Local Storage is almost always unencrypted and can be physically stolen, whereas Cloud Storage is one of the most protected forms of storage (i.e. physically protected and protected with two-factor authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Scalability

A

While traditional mediums of storage, like Local Storage, require drives to be physically added to a system, upgrading the tier of your Cloud Storage service will instantaniously give you more storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Advantages of Cloud Computing

A

Devices can have small storage drives, so are cheaper (used as Thin Clients), More than one person can collaborate on a document at a time, Changes are saved automatically to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SaaS

A

SaaS (Software as a Service) describes Cloud Computing that is a paid for service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Choosing a Cloud service

A

Users/Network Administrators look for lots of things when selecting an online platform, including; * Security of data * Compatibility with existing infrastructure * System Maintainance needed * Speed of setup * Internet Speed Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Disaster Recovery

A

The plan to recover data after a loss of data (i.e. cyber attack or physical damage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

World Teams

A

People can communicate from all over the world, and that means that they can also work from all over the world using technologies like; * E-Mail * Video Confrencing * Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Advantages of World Teams

A

Workers from all over the world can keep in touch, Companies can employ the best from anywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Disadvantages of World Teams

A

People may not be avaliable due to living in different time zones, World teams could have an impact on work-life balances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Stakeholder

A

Somebody who has an interest in a business or organisation (i.e. employees, shareholders, local community)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Communication Channels

A

A way that an organisation can communicate with stakeholders, using; * Webpages * Social Media * E-Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The Equality Act 2010

A

The law in the UK which recognises disabilies are protected by a discriminatory law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Interface Design

A

For interfaces to be accessible to anyone, they need to have a good; * Layout * Font * Colour Selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Types of Hardware Accessibility Devices

A

Puff Switch, Foot Mouse, Eye Typer, Braille Keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Types of Software Accessibility Devices

A

magnifier, high contrast, keyboard shortcuts, screen readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Infrastructure

A

The physical systems and structures that are in place for an organisation

34
Q

How could not having a ¯¯¯¯¯¯¯ impact a modern business?

A

Website - reduces the amount of advertising a company can recieve, Mobile Optimised Website - reduces the amount of advertising a company can recieve, Superfast Broadband Connection - reduces the amount of advertising a company can recieve.

35
Q

Hacking

A

Unauthorised access to a computer system. Covered by the Computer Misuse Act 1990

36
Q

Why are systems attacked?

A

Fun, financial gain, industrial espionage, personal attacks, hacktivism (hacking for activism)

37
Q

Types of Hackers

A

Black Hat - a hacker with malicious intent, Grey Hat - a hacker with neither malicious or heroic intent, White Hat - a hacker with heroic intent to stop other hackers

38
Q

Types of threat to a computer system

A

Unauthorised access, virus, worm, botnet/DDoS attack, rootkit, trojan, ransomware, spyware

39
Q

Virus

A

A computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally

40
Q

Worm

A

a harmful computer program that can copy itself and spread across a number of connected computers

41
Q

Botnet

A

A group of computers that are controlled by software containing harmful programs, without their users’ knowledge

42
Q

DDoS

A

Distributed Denial of Service: an occasion when a computer network or website is intentionally prevented from working correctly, by a botnet sending lots of data at once.

43
Q

Rootkit

A

A type of malware designed to give hackers access to and control over a target device. Most rootkits affect the software and the operating system.

44
Q

Trojan

A

A computer program that has been deliberately designed to destroy information, or allow someone to steal it.

45
Q

Ransomware

A

Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money.

46
Q

Spyware

A

Software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it

47
Q

Social Engineering

A

Manipulating people so that confidential information can be found out.

48
Q

Why does social engineering work?

A

Most people want to do the right thing, and this is why it works. In a recent study, 60% of unauthorised USB drives were mounted to a computer and used in a controlled environment.

49
Q

Types of Social Engineering

A

Phishing, pharming, shoulder surfing, tailgating, baiting, pretexting

50
Q

Internal Threats

A

dodgy websites, portable storage, stealing/leaking data, disclosure of data, overriding security, downloads

51
Q

Why do Internal Threats happen?

A

accidents or employee choosing to attack a business

52
Q

impacts of an Internal Threat

A

short term (data loss/downtime, lost sales), long term (reputation damage, financial loss)

53
Q

Firewall

A

set of rules that filter suspicous network packet from remote networks

54
Q

Hardware Firewall

A

Sits between an external network and an internal connection - like a LAN and the internet - as a first line of defence.

55
Q

Software Firewall

A

On a system - like a computer - to filter network data in and out. Secondary protection, which uses an ACL to block certain data.

56
Q

Types of Device Hardening

A

security patches, anti-virus, firewalls, user permissions, closing ports, encryption

57
Q

Digital Footprint

A

All the data you have shared makes up your digital footprint. Future employers and the government can look at this to make decisions about you (can be either active or passive)

58
Q

Location Services

A

Location services track where you are using GPS, Wi-Fi, Bluetooth and phone towers.

59
Q

Where aare location services used?

A

App-based taxi services, airports and railways, fitness trackers, location-based games, Law and order

60
Q

Cookies

A

Session-based or persistant files stored on your computer that; * keep you logged in * or store your shopping bag * etc

61
Q

Transactional Data

A

Data that is collected when a user exchanges information with a business, such as shopping with their loyalty card.

62
Q

Environmental Issues

A

To create a computer, over 7,300 gallons of water is used, and that is an issue. Highly toxic chemicals like Arsenic, Cadium and Chromium are also used to create a computer.

63
Q

Packaging & Distribution

A

Packaging for IT equiptment is often unrecyclable and end up in landfill. Devices usually also travel large distances from their factories in China and Taiwan across the planet to customers in other countries.

64
Q

Device Usage

A

Keep devices cool uses a lot of energy too, and if this is not from renewable forms of energy, then it is speeding up the rate of Global Warming.

65
Q

How to prevent environmental risks

A

Only upgrade devices when necessary, check power setting, don’t print if not needed, don’t leave devices on standby

66
Q

Disposal

A

You must dispose of IT equiptment properly. The current legislation is the WEEE laws (Waste, Electrical and Electrical Equiptment Regulations 2013). You should; donate, recycle, refurbish or trade-in devices so that they can end up not going in landfill.

67
Q

Digital Literacy

A

With IT equiptment becoming increasingly more important in society, digital literacy is important. Simple tasks like using a web browser and using a word processor should be essential nowadays.

68
Q

Digital Divide

A

The gap between those with great technology skills and those with not.

69
Q

Digital Exclusion

A

Where people cannot access important digital services.

70
Q

Net Neutrality

A

The concept that all traffic online should be treated the same. Without Net Neutrality, Governments and Internet Service Providers (ISPs) can block access to certain sites.

71
Q

Data Protection

A

More personal information is being stored on computers, and with that data becomes beig responsibilities. If the data were to be stolen, it could be a big risk. Protected by Data Protection Act 2018.

72
Q

GDPR

A

General Data Protection Regulation 2016 of the European Union

73
Q

Intellectual Property

A

Original designs, ideas and artwaork that is protected if you create it. If ownership is hard to prove, then a copyright, trademark or patent is put in place. Protected by the Copyright, Designs & Patents Act 1988

74
Q

The Malicious Communications Act

A

A law that prevents people from posting malicious things on the internet. Sanctions can include 2 years of prison or a fine.

75
Q

Flowchart

A

A visual representation of a workflow

76
Q

Algortithm

A

A series of steps necessary to complete a task

77
Q

Information Flow Diagram

A

Shows the flow of information between individuals or departments

78
Q

Data Flow Diagram

A

Shows an Information Flow Diagram in much more detail (i.e how it will be processed, and how it is outputted)

79
Q

Process

A

Something that is happening

80
Q

Data Store

A

Where data is held

81
Q

Entity

A

A person, department, or device which supplies or is provided with data and info.