more paper 2 stuff Flashcards

1
Q

a database is stored at an office. staff use a client server database system. describe an example of a problem that could occur if no systems were in place to manage concurrent access to the database

A
  • two users edit the same data simultaneously
  • one user writes the data then the other user writes the data
  • only one users update is lost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

explain why the amount of storage space taken up by vector graphics is significantly smaller by the space taken up by bitmap

A
  • individual parts of the image can be manipulated
  • the parts of the image can be scaled without loss of quality
  • if an object is deleted, the software knows what is behind it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

explain why compression is considered necessary for images on the web

A

transmission of data is faster, and used less data allowance with smaller image files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • the performance of a system is unsatisfactory. the time delay between a client sending a query to the server and the client receiving the results is long
  • explain how the performance of the system might be improved, include the following factors:
  • the hardware of the server
  • the design of the computer network
  • the database and software running on the server
A
  1. Server hardware
    - replace the processor with one that had more cores
    - replace processor with one that has more cache memory
    - use a processor with a bigger word size
    - faster clock speed
    - replace HDD’s with SSDs
    - use the harvard architecture
  2. Network
    - replace the network cable with a cable that has higher bandwidth
    - use a star topology instead of bus
    - consider using a more efficient protocol for the data across the network
    - add additional wireless access points
  3. Database and Software
    - use a more efficient technique for controlling concurrent access to the database
    - ensure the software is compiled rather than executed by an interpreter
    - use a non relational database
    - distribute the data across multiple servers
    - archive data tat is no longer necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain some of the challenges that face legislators in the digital age

A
  • information can be combined/transferred in ways that were not previously possible
  • technology evolves quickly so it’s difficult for the law to keep up with changes
  • different laws in different countries
  • some crimes may be committed by states rather than individuals
  • methods such as encryption makes it harder to monitor criminal activity
  • individuals may have access to large amounts of sensitive information that may be of public interest
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

anti virus software and user training are methods that can be used to reduce the threat posed by viruses. describe 4 other measures that can be used to reduce the threat posed by viruses

A

Regular Software Updates and Patch Management
- Keeping all software up to date ensures that known vulnerabilities cannot be exploited by viruses or other malicious software.
- Enable automatic updates for operating systems and applications to stay protected against the latest threats.

  1. Firewalls
    Explanation: Firewalls act as a barrier between your network and external threats by monitoring and controlling incoming and outgoing traffic based on predefined security rules. A firewall can block suspicious activities that might introduce viruses.
  2. Email Filtering and Spam Protection
    Email filtering systems can identify and block malicious emails before they reach the user’s inbox.
  3. Data Backup
    Explanation: Regularly backing up important data ensures that in the event of a virus infection (such as ransomware), the data can be restored without needing to pay a ransom or lose it permanently.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

explain why an instruction on couldn’t be processed directly from the MBR

A
  • during the execute stage, MBR is used to store other data
  • MBR is not wired to the components that’ll execute the instruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how is it possible for unauthorised data to be collected via wifi

A
  • wifi signals can travel outside of property
  • any wifi receiver in range can read the data packets
  • no need to physically “tap” into a wifi connection, unlike a cabled connection
  • a protocol that does not encrypt the transmissions may have been used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly