May/June 2016 Exam corrections Flashcards
What is freeware?
- Soft ware that can be feely accessed and modified as required
- It is possible to distribute modified versions of the software to friends and family
What is shareware?
- All the features of the full version of the software are not made available; the full version needs to be purchased first
- The original software is subject to all copyright laws
What does MAC stand for?
Media Access Control
What does the Hexadecimal code in a MAC address represent?
- The physical hardware of the device
- The device’s unique address
- Usually 48/64 bits
Why are SSDs becoming more popular than HDDs?
- More durable (no moving parts)
- Faster
- Smaller
- Less power
- Getting cheaper (not as cheap as HDD for the capacity yet)
What is it called when a printer runs out of ink while printing documents and it sends a signal to the processor to deal with the problem?
AN INTERRUPT
Name a suitable application for an INK JET printer…
- Photographs
- Small quantities of documents
Name a suitable application for a 3D printer…
- To make a physical prototype from CAD
- To make a physical model of something (blueprint)
Name a suitable application for a LASER printer… (and how it works)
- Uses toner/powder ink
- Uses positive and negative rotating charged drums
- Uses static charge
- No moving head
- Faster at printing
- Better orientated to higher volumes/output speed
- Good for producing flyers/leaflets/magazines
What stages does a web browser go through to detect whether or not a website is secure?
- Requests web server to identify itself/view the (SSL) certificate
- Receives a copy of the (SSL) certificate, sent from the webserver
- Checks if the SSL certificate is authentic/trust worthy
- Sends a signal back to webserver that the certificate is authentic/trustworthy
- Starts to transmit data once connection is established as secure
- If a website is not secure browser will display an open padlock/warning message
Why would a bank’s online service ask for four random characters from the user’s password?
- Hacker never finds all characters on the first hack
- Makes it more difficult for hackers to find the order of the characters
- Hacker needs to hack the system several times to gain the whole password
- Shoulder surfing will not give the person the full password