last minute Flashcards

1
Q

What is a number base?

A

The amount of symbols, notations it used to represent value

How many digits are in it’s number system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a character set?

A

A group of characters that a computer recognises from their binary representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is data compression?

A

The method is reducing file size , while trying to make the compressed file s true to the original as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some uses of data compression?

A

0️⃣smaller files take up less storage on a device
0️⃣streaming and downloading files from the internet is quicker as they take up less bandwidth
0️⃣allows web pages to load more quickly into web browsers
0️⃣Emails have restrictions on size, but with compression you can send attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Lossy compression?

A

Permanently removing data from the file , to limit the number of bits the file needs , therefore reducing space.
✅less bandwidth
✅reduce a lot of file size
❌cannot be used on text or software files
❌cannot regain original file , but the worse quality is normally unnoticeable

MP3 , AAC ,JPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is lossless compression

A
Data is removed temporarily, so reduction in quality.
then restores to it’s original state
✅can be Used for software and text files
❌only slight reduction in file size
FLAC, TIFF, PNG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Huffman

A

Lossless data compression

  1. Make a frequency tally for the amount of times a letter was used
  2. Order it from lowest to highest
  3. put the two lowest together and addd the Total, keep on branching off until all the values are done.
  4. Zeros on the left hand side
  5. On the chart add the new binary values
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Run Length Encoding

A

Another form of lossless compression
1. Count the number of times the same data is repeated and store this instead
2. Store the information as data pairs
(Number of pixels, colour)
Times number by 8 and colour by colour depth and add it all together
3. Compare this to the previous by timing width and height of pixels by colour depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of system software?

A

system software manages the computer system resources and acts as a platform to run application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of the operating system?

A

A collection of programs that manage and control the computer. Connects the hardware with the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Embedded system

A

Dedicated systems within a larger system
Only have ROM,
Cheaper
Less power required- batteries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pros and cons of high and low level languages

A

*low language is efficient use of hardware available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compiler pros and cons

A

✅programs run quickly , as have already been translated
✅only needed once to create an executable file , which is then portable

❌source code must be re-compiled every time the programmer changes the
program
❌code must be completely error free to compile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Interpreter pros and cons

A

✅once an error is found , the program is stopped, debugging is easier
✅✅
❌no executable file is made , so an interpreter is needed each time the program want to be run
❌program run more slowly , as code is being translated ❌

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Low Level languages pros and cons

A

LL ✅= more control over program , program can be made with less memory use (more efficient)
Greater control over CPU, program may bee needed to run quicker
Maintain old code / hardware

❌=
Harder to read and learn ,
Only works for one type of machine and architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are some advantages of embedded systems ?

A

✅Use ROM instead of RAM for main memory , which is cheaper
✅more reliable, require less maintamce and lasts longer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why might assembler language be used ?

A

More readable than machine code, Easter to write and edit programs

assembly language has a 1:1 correspondence with machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are advantages and disadvantages of cloud storage?

A

:)can be accessed from anywhere,
data can be shared ,
cheap,
provides back up/security

:( need Wi-Fi,
data vulnerable to hackers,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why choose a high level language?

A

🟡High level have built in subroutines
🟡Provides programming structures such as iteration and selection
🟡Easier to debug
🟡Easier to understand (more easier to read)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a computer system?

A

Two or more computers , that are CONNECTED together that are able to exchange data with each other. Allowing software and hardware to be shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the advantages of networks?

A

🟢communication eg: emails & text messages
🟢file sharing , eg: stored centrally and worked upon centrally
🟢hardware sharing , eg printers , making it more cost effective
🟢user account allow you to log in from any device
🟢installing software centrally , takes less time

22
Q

What are some disadvantages of networks?

A

🟣expensive to set up as a lot of hardware is required. eg: NIC cards, switched , cables
🟣vulnerable to hacking and malware which can spread to networked computers
🟣hard to maintain and install , may require employing a specialist

23
Q

Advantages wireless 🟢networks:

A

🟢Wireless are cheaper to set up.
🟢Wireless also requires less information and installation is automatic.
🟢wireless can add people more easily

24
Q

Advantages of wired networks🔴

A

🔴wired have a larger transmission speed, higher bandwidth, more reliable
🔴wired are more secured. As physical connection is needed to intercept data
🔴wired have no interference from other Wireless networks or physical obstructions like walls

25
Q

What is a WAP?

A

Wireless access point
Needed in wireless networks
Basically a switch needed to connect devices wirelessly

26
Q

What are routers?

A

Transmit data between different networks
Used to connect to the internet

27
Q

Star network pros and cons

A

✅if a device fails the network is unaffected
✅fewer data collisions as all devices can transmit data at the same time
✅easier to add devices
✅packets only sent to intended devices
❌expensive as it requires a switch and other hardware
❌problem with switch then the whole network is affected

28
Q

Pros and cons of Bus networks

A

✅if one device fails the network remains unaffected
✅cheap to set up and maintain
✅not dependant on a switch
❌frequent data collisions slowing the network down
❌unsuitable for large networks as too many data collisions
❌network fails if the backbone cable is broken

29
Q

Describe IP and it’s purpose

A

Internet protocol,
🟣give them an IP address ,
🟣used to route the journey for packets by according to traffic

Responsible for packet switching
An IP adresss is a number code gIven to every device in the network

30
Q

What does the application layer do , and what are some examples?

A

Network applications like web browsers or email programs operate

Eg: HTTP, HTTPS,FTP,SMTP.IMTP

31
Q

What does the transport layer do, and what are some examples?

A

🔵sets up communication between 2 hosts
🔵make the size of packets
Eg:TCP,UDP

32
Q

What does the internet layer do, and what are some examples?

A

🔵addresses and packages the data for transmission
🔵routes the packets across the network

Eg: IP

33
Q

What is the link layer, and what are some examples?

A

Passing data over a physical network, data sent as electrical signals over cables , wireless and other hardware
🔵network hardware is located

34
Q

What is authentication, when would it be used?

A

🟣takes one or more specific data from a user
🟣only allows access to the system if credentials are valid
Preventing unauthorised access

eg: username and password

35
Q

What is MAC address filtering and when is it used?

A

🔵takes a MAC address for each device
🔵checks to see if it is in the list of allowed , and on that basis gives it permission to connect to the system

36
Q

Compare bus and star

A

🚎 isn’t reliant on central switch/server, ⭐️ will completely fail if central device stops working
🚎 less cabling (no switch) and so are cheaper than a ⭐️

⭐️ all devices can access the switch simultaneously, so there are no data collisions, 🚎 data collisions are common

37
Q

Why is network security important?

A

🟠prevent cyber attacks(targeting specifics)
🟠prevent unauthorised access
🟠protects data and programs against damage

38
Q

What is Pharming?

A

redirects the user from a websites’s traffic to a fake website , in hope to gain personal information , to access their genuine account

39
Q

How could you prevent pharming?

A
  • anti-malware software , up to date
  • internet browsers using web filters
    *not clicking or links or attachments from unknown users
40
Q

What Phishing?

A

A technique if fraudulently obtaining private information, often using email or SMS

emails are sent to the user claiming to be from well known business, asking for bank details

41
Q

what is penetration testing?

A

organisations employing specialists to stimulate potential attacks to their system, allowing them to identify their weaknesses in cyber security

The process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.

42
Q

What is the difference between white and black penentration testing ?

A

white: when the person or team testing the system has knowledge of possibly basic credentials for the target system, stimulating an attack from inside the system (a malicious insider)

black: when the person of team testing the system has no knowledge of any credentials for the target system, stimulating an attack from outside the system (an external attack)

43
Q

How do orgainsations keep their networks safe from threats?

A
  • encryption, to prevent wire tapping or packet sniffing
  • anti-malware software
  • firewalls
  • user access levels, stops attacks from within the organisation
  • automatic software updates
  • MAC Address filtering
    *penetration testing (white & black) to find weaknesses and correct
    *strong, regularly changed passwords, against automated software.
44
Q

Describe encryption

A

data translated into cipher text, with the correct key to decipher, data can now be sent over a network securly

45
Q

What are some types of security measures ?

A
  • email confirmation
  • biometrics
  • CAPTCHA
  • passwords
    *automatic software updates
46
Q

CAPTCHA

completly automated public turning ( to tell) computers and humans apart

A

✓prevents programs from automatically doing things (creating user accounts)

47
Q

What is ‘cyber security’?

A

The processes , practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

48
Q

Change the age of Molly from 5 to 6

A
49
Q

Delete all the black spaniels from the table

A
50
Q

What are some advantages of relational databases ?

A

🔵data is only stored in one place and then referenced. This means that to input , update or delete pieces of data, it only has to be done in one place which can prevent inconsistencies
🔵only storing the same price of dat once will also save storage space
🔵relational databases can be more secure , some tables can be made more confidential so only some users can see certain data (helps companies meet data protection laws)

51
Q

How do you insert a full record into a table ?

A
52
Q

How would insert bits of a record into a table ?

A