paper 1 advanced information Flashcards
What is the purpose of a computer?
to take in data, process it, and then output it
What is hardware?
the physical components of the computer system, like the CPU, motherboard, monitor and printer
what is software?
the programs or applications that a computer system runs e.g. an operating system, a word processor or video game
What is a cpu?
A CPU (Central Processing Unit) is the “brain” of the computer system - it processes all of the data and instructions that make the system work
what are the three main parts of the CPU?
The control unit (CU), the arithmetic logic unit (ALU), and the cache.
What does the control unit do? what’s its main job?
It controls the flow of data inside and outside the CPU. It’s main job is to execute program instructions by following the fetch-decode-execute cycle.
What does the arithmetic logic unit (ALU) do?
All the calculations - it completes simple addition and subtraction, compares the size of numbers and can do multiplications and divisions using repeated addition and subtraction. It also performs logic operations such as AND, OR and NOT, and completes binary shifts.
It also contains the accumulator register.
What is the cache?
Very fast memory in the CPU - it stores regularly used data so that the CPU can access it quickly the next time it’s needed. When the CPU requests data. it checks the cache first to see if the data is there. if not, it will fetch it from RAM
What does the program counter (PC) do?
It holds the memory address of the next instruction for each cycle.
What does the memory address register (MAR) do?
it holds any memory address about to be used by the CPU. the address might point to data or a CPU instruction.
what does the memory data register (MDR) do?
it holds the actual data or instruction. this may have been fetched from memory, or be waiting to be written to memory
what does the accumulator do?
stores the results of the calculations in the ALU
What happens in the “fetch” part of the fetch-decode-execute cycle?
1) The memory address is copied from the program counter to the MAR
2) The instruction stored in the MAR address is copied to the MDR
3) the program counter is incremented (increased) to point to the address of the next instruction, ready for the next cycle
What happens in the “decode” part of the fetch-decode-execute cycle?
The instruction in the MDR is decoded by the CU. The CU may then prepare for the next step, e.g. by loading values into the MAR or MDR
what happens in the “execute” part of the fetch-decode-execute cycle?
The instruction is performed. This could be: load data from memory, write data to memory, do a calculation or logic operation (using the ALU), change the address in the PC, or halt the program.
name five hardware components of a typical desktop computer.
any five from:
- power supply
- case cooling fan
- CPU
- Heat sink
- Optical drive
- RAM
- hard disk drive/HDD
- graphics card/GPU
- Motherboard
What is RAM?
High speed, volatile memory - it’s where all data, files and programs are stored while they’re being used
what is virtual memory?
a part of secondary storage that is used as extra RAM
CPU performance depends on what three factors?
Clock speed, number of cores, and cache size
what is clock speed?
The number of instructions a single processor core can carry out per second (Hz). The higher the clock speed, the greater the number of instructions that can be carried out.
How does the number of cores affect the performance of a CPU?
Each core can process data independently of the rest, so the more cores a CPU has, the more instructions it can carry out at once, so the faster it can process a batch of data
what is primary storage?
the main memory areas that the CPU can access very quickly, such as CPU registers, cache, ROM and RAM. Primary storage has the fastest read/write speeds and is mostly volatile
what is secondary storage?
non-volatile memory that stores all data that’s not in use. Read/write speeds are much slower than primary storage.
How does a hard disk drive (HDD)/magnetic hard disk work?
A hard disk drive is made up of a stack of magnetised metal disks spinning at a rate of between 5400 and 15000 revolutions per minute. Data is stored magnetically in small areas called sectors within circular tracks. Read/write heads on a moving arm are used to access sectors on the disks.
What are the advantages of Magnetic Hard Disks/HDDs?
- They are cheaper
- They are very high-capacity
- They have a longer read/write life than SSDs
What are the negatives of magnetic hard disks/HDDs?
They aren’t very durable and are easily broken because of their moving parts. They also aren’t very portable, and can not be carried around easily
What are solid state drives (SSDs)?
storage devices with no moving parts. Most of them use a type of flash memory. They are used for the same purpose as HDDs - for internal storage
What is flash memory?
a very common type of non-volatile memory that stores data in electrical circuits by trapping electrons
which have a faster read/write time - HDDs or SSDs?
SSDs
What are the advantages of SSDs?
- They are faster than HDDs
- They don’t need defragmenting
- They are more shock-proof than HDDs
- They are silent
- They have quite a high capacity
How much data can CDs hold?
around 700 MB
How much data can DVDs hold?
around 4.7GB
How much data can Blu-Ray disks hold?
around 25 GB
what are the three forms that optical disks come in?
read only, write-once, rewritable
What are some advantages of optical disks?
- They’re very cheap (per GB)
- They’re portable
- They won’t be damaged by water or shocks (although they are easily scratched)
Put these types of storage in order of their average read/write speed:
Magnetic tape, HDD, Memory card, Optical disk, SSD
Optical disk, Memory card, magnetic tape, HDD, SSD
Put these types of storage in order of their average cost per GB:
SSD, Optical disc, HDD, Memory Card, Magnetic tape
Magnetic tape, Optical disk, HDD, memory card, SSD
Put these types of storage in order of their average capacity:
HDD, SSD, Magnetic Tape, Optical disk, Memory card
Optical disk, memory card, SSD, HDD, Magnetic Tape
what does compression software do? where is it often used and why?
compression software reduces the size of files so they take up less disk space. it’s used lots on the internet to make files quicker to download.
what are standard file formats for compressed files?
.zip and .rar
what do you need to do to compressed files before you can use them?
extract them
what is a LAN?
A LAN (Local Area Network) is a network that covers a small geographical area, often located on a single sight.
who owns the hardware for a LAN?
the organization using it
Why use a LAN? (what are the positives?)
- sharing files is easier - network users can access the same files, work collaboratively on them and copy files between machines
- you can share the same hardware (like printers)
- the internet connection can be shared between every device connected to the LAN
- you can install and update software on all computers at once, rather than one-by-one
- you can communicate with all LAN users cheaply and easily, e.g. with instant messaging
- user accounts can be stored centrally, so users can log in from any device on the network
What is a WAN?
A WAN (Wide Area Network) is a network that connects LANs that are in different geographical locations. for example, a business with offices in three different countries would need a WAN for all their devices to connect together
Who owns the hardware for a WAN?
organisations hire infrastructure (e.g. communication lines) from telecommunications companies who own and manage the WAN. this is because a WAN is much more expensive to set up than a LAN.
Is the Internet a LAN or a WAN?
A WAN
Do most people have LANs or WANs in their homes?
Most people have LANs in their homes.
name 4 factors that can affect the performance of networks.
1 - Bandwidth (the amount of data that can be transferred in a given time)
2 - the amount of users (available bandwidth is shared between users of a network - too many users or heavy use may cause congestion and slow the network )
3 - mode of connection (wired connections are generally faster and more reliable than wireless)
4 - choice of hardware and network topology
What is a network interface controller (NIC)?
an internal piece of hardware that allows a device to connect to a network. they used to be on separate cards, but nowadays they’re built into the motherboard.
Do switches connect devices on a LAN or a WAN?
A LAN
Do switches transmit data in frames or packets?
frames
What address do switches use to transmit data?
a MAC address
Do routers transmit data within networks or between networks?
Between networks
Do routers direct data in frames or packets?
packets
Why are routers used in homes and offices?
to connect the LAN to the Internet
What are ethernet cables used for?
They are used to connect devices in a LAN
What are ‘twisted pair cables’?
pairs of wires that are twisted together to reduce interference.
Are ethernet cables twisted pair?
Yes
Are coaxial cables twisted pair?
No
Describe the structure of coaxial cables.
A single copper wire surrounded by a plastic layer for insulation and a metallic mesh which provides shielding from outside interference.
How do fibre optic cables transmit data?
as light
list three advantages and one disadvantage of fibre optic cables.
Advantages:
They are high performance
They don’t suffer interference
They can transmit over very large distances without loss of signal quality
Disadvantage:
They very expensive
What does a wireless connection use to transmit data?
Radio Waves
What is a WAP?
A Wireless Access Point - you need one to connect to a wireless network, and it is basically a switch that allows devices to connect wirelessly.
Advantages of a Client-server network:
- easier to keep track of files as they are stored centrally
- easier to perform back-ups
- easier to install and update software
- easier to manage network security (e.g. anti-malware software and user access levels)
- servers are very reliable and are always on
Disadvantages of a client-server network:
- expensive to set up and needs IT specialists to maintain the network and server
- server dependence - if the server goes down all clients lose access to their work
- the server may become overloaded if too many clients are accessing it all at once
Advantages of a peer-to-peer network:
- easy to maintain - you don’t need any expertise or expensive hardware
- no dependence on server - if one device fails the whole network isn’t lost
disadvantages of peer-to-peer networks:
- no centralized management - devices need their updates and security installed individually. Backups are also more complicated
- copying files between devices creates duplicate files, so it’s easy to lose track of what’s stored where and which files are up-to-date
- peer machines are less reliable and data may be lost if one fails
- machines are prone to slow down when other devices access them
describe a star network topology
all the devices are connected to a central switch or server that controls the network.
Pros of star topology:
- if a device fails or a cable is disconnected, the rest of the network is unaffected.
- it’s simple to add more devices to the network
- better performance than other setups - data goes straight to the central service so all devices can transmit data at once and there a few data collisions
Cons of star topology:
- in wired networks, every device needs a cable to connect to the central switch or server. This can be expensive, e.g. for an office building with 50 terminals
- if there is a problem with the switch/server, the whole network is affected
Is a mesh network centralised or decentralised?
decentralised
describe a mesh network.
all networking devices are either directly or indirectly connected to each other without the need for one central switch or server. Mesh networks work by sending data along the fastest route from one device to another.
What is the main advantage of a mesh network?
there is no single point where the network can fail - if one device fails then the data is sent along a different route to get to its target
what is the traditional disadvantage of mesh networks, and why is it becoming less of a problem?
they can be very expensive - you need a lot of wires to connect so many devices together. However, now that more people are using wireless technology, mesh networks are a more practical option.
what is the difference between a full mesh topology and a partial mesh topology?
in a full mesh topology, every device is connected to every other device, whereas in a partial mesh topology, not all devices are directly connected.
what address does communication on the same network use?
a MAC address
why do we have MAC addresses?
every device needs a unique identifier so it can be found on a network
How are MAC addresses assigned to a device?
MAC addresses are assigned to all network enabled devices by the manufacturer. They are unique to the device
can MAC addresses by changed?
no
how many bits do MAC addresses have? (how long is their binary number)
MAC addresses are 48 or 64 bit binary numbers (i.e. a long string of 48 or 64 0s and 1s)
what decimal system are MAC addresses converted into to make them easier to use?
hexidecimal
what are MAC addresses mainly used by?
the Ethernet protocol on LANs. LAN switches read the MAC addresses and use them to direct data to the right device
what address is used for communication between different networks?
IP address
when are IP addresses used?
when sending data between TCP/IP networks e.g. over the internet
are IP addresses linked to hardware?
no
are MAC addresses linked to hardware?
yes
when are IP addresses assigned?
they are assigned either manually (static) or automatically (dynamic) before the device can access the network
what are static IP addresses?
permanent addresses
what are static IP addresses used for?
they’re used to connect printers on a LAN and for hosting websites on the internet - companies don’t want the IP address of their website changing
what are dynamic IP addresses and when are they assigned?
dynamic IP addresses are assigned when a device logs on to a network, meaning that it may have a different address every time it connects.
which is more expensive - static IP addresses or dynamic IP addresses?
static IP addresses are more expensive - businesses pay big money for them. dynamic IP addresses are more cost-effective
do Internet Service Providers (ISPs) commonly use dynamic or static IP addresses?
dynamic - they are more cost effective and can be reused
how many bits is an IP address? (how many digits long is the binary number?)
either a 32-bit or a 128-bit binary number, depending on the version of IP you’re using
what are 128-bit IP addresses translated into?
eight hexadecimal numbers
what are 32-bit binary numbers converted into?
four denary (normal) numbers
what is packet switching used for?
packet switching is used by routers to direct data packets on the internet and other IP networks
what are the 6 steps of packet switching?
- the sending device splits the data into packets to be sent across the network. Each packet is given a packet number to show the order of the data
- each router reads the packet header and decides which way to send the packet next, according to the IP rules
- the way the data is sent next changes depending on network traffic so the packets can take different routes. If a router receives too many packets at once, it may prioritise some over others
- as the packets take different routes, they can arrive in the wrong order. The receiving device uses the packet numbers to reassemble them in the right order
- sometimes packets go missing in transit, so the receiving device checks periodically that all packets have been received. If it hasn’t received them within a certain time, it sends a timeout message back to the sending device
- if all the data is received and the checksums match, a receipt confirmation is sent to the sending devices
why is packet switching an efficient use of the network?
there are so many possible routes that data can take - packets can reach their receiving device even if there’s heavy traffic
what protocol is the internet based around?
TCP/IP
what is the world wide web?
a collection of websites that are hosted on web servers and accessed through the http protocol
what are URLs?
addresses used to access web servers and resources on them
what does a domain name server (DNS) do?
it translates a website’s domain name into it’s IP address - the internet has a network of domain name servers, meaning you don’t need to remember IP addresses to access websites - you can use domain names instead
what is hosting?
when a business uses its servers to store files of another organisation
what is the traditional use for hosting on the internet?
the hosting of website
what is a relatively recent use of internet hosting?
general storage of user files and also providing online software
what is the cloud?
general storage of user files and also providing online software - this is cloud computing, or simply ‘the cloud’. It acts like an extension of a traditional client-server network where user files are stored centrally on a network server
what virtual networks?
networks that are entirely software-based
how are virtual networks created?
by partitioning off some of a physical network’s bandwidth to form a separate network
can more than one virtual network exist on the same physical network?
yes
are virtual networks more or less efficient than standard physical networks?
more - they all share the same hardware
does each virtual network have its own security?
yes, including its own firewall. this means virtual networks can only be accessed by using certain software or login information - other people could be using the same physical network and not have access to the virtual network, or even know that it exists
what is a virtual private network (VPN)?
a type of virtual network that can be used to send data securely over a large network, like a WAN or the internet. e.g. a vpn can be used to send data securely between offices on different sites, or to set up a school intranet that all the students can access from home
what does a virtual LAN allow you to do?
split a LAN into several separate networks using the same hardware
what is a passive attack?
someone monitors data travelling on a network and intercepts any sensitive information they find. they use network-monitoring hardware and software such as packet sniffers.
are passive or active attacks harder to detect
passive attacks are harder to detect as the hacker is quietly listening
what is the best defence against passive attacks?
data encryption
what is an active attack?
when someone attacks a network with malware or other planned attacks
what is the main defence against active attacks?
a firewall
what is an insider attack?
Someone within an organisation exploits their network access to steal information
what is a brute force attack?
a type of active attack used to gain information by cracking passwords through trial and error. Brute force attacks use automated software to produce hundreds of likely password combination, e.g. combining real words with predictable number sequences. Hackers may try lots of passwords against one username or vice versa.
what helps to reduce the risk of a brute force attack?
simple measures like locking accounts after certain number of failed attempts and using strong passwords will reduce the risk of a brute force attack
what is a denial-of-service (DoS) attack?
where a hacker tries to stop users from accessing a part of a network or website. Most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible
what is malware?
malicious software that can harm devices
what are 6 typical actions of malware?
- deleting or modifying files
- scareware - e.g. it tells the user their computer is infected with loads of viruses to scare them into following malicious links or paying for problems to be fixed
- locking files - ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money be paid in exchange for a decryption key
- spyware - secretly monitors user actions, e.g. key presses, and sends info to the hacker
- rootkits alter permissions, giving malware and hackers administrator-level access to devices
- opening backdoors - holes in someone’s security which can be used for future attacks
what are three ways malware can access your device?
- viruses attach (by copying themselves) to certain files, e.g. .exe files and autorun scripts. Users spread them by copying infected files and activate them by opening infected files
- worms are like viruses but they self-replicate without any user help, meaning they can spread very quickly. they exploit weaknesses in network security.
- trojans are malware disguised as legitimate software. Unlike viruses and worms, trojans don’t replicate themselves - users install them not realising they have a hidden purpose
what is social engineering?
a way of gaining sensitive information or illegal access to networks by influencing people, usually the employees of large companies
describe a common form of social engineering that takes place over the telephone
someone rings up an employee of a company and pretends to be a network administrator or somebody else within the organisation. The social engineer gains the employee’s trust and persuades them to disclose confidential information - this might be personal (e.g. their login details) or sensitive company data
is phishing social engineering or malware?
social engineering
what is phishing?
phishing is when criminals send emails or texts to people claiming to be from a well-known business, e.g. a bank or an online retailer. The emails often contain links to spoof versions of the company’s website. They then request that the user update their personal information (e.g. password or bank account details). when the user inputs this data into the website they hand it all over to the criminals, who can then access their genuine account
which networks are vulnerable to SQL injection attacks?
networks which make use of databases
what is SQL?
Structured Query Language - it’s one of the main coding languages used to access information in databases
what are SQL injections?
pieces of SQL typed into a website’s input box which then reveal sensitive informatio
how do SQL injections work?
a website may allow you to view your account information, as long as you enter your password into an input box. If the website’s SQL code does not have strong enough input validation, then someone may be able to enter a piece of SQL code which allows them to access other people’s account information as well as their own.
what is a network policy?
a set of rules and procedures the organisation will follow to ensure their network is protected against attacks and unauthorised access
what are 5 things a good network policy will do?
- regularly test the network to find and fix security weaknesses and investigate any problems
- use passwords to prevent unauthorised people from accessing the network
- enforce user access levels to limit the number of people with access to sensitive information
- install anti-malware and firewall software to prevent and destroy malicious software attacks
- encrypt sensitive data
what is penetration testing?
penetration testing is when organisations employ specialists to simulate potential attacks on their network
what is penetration testing used for?
it’s used to identify possible weaknesses in a network’s security by trying to exploit them. the results of the pentest are then reported back
what are network forensics?
investigations undertaken to find the cause of attacks on a network.
what does an organisation need to have to conduct network forensics?
a system of capturing data packets as they enter their network
how do network forensics work?
an organisation captures all the data packets as they enter their network. after the network is attacked, these packets can be analysed to discover how the network was attacked and decide how to prevent further attacks
what makes a strong password?
a strong password should be many characters long, use a combination of letters, numbers and symbols, and be changed regularly
what do user access levels control?
which parts of the network different groups of users can access, e.g. business managers are likely to have a higher access level allowing them to access more sensitive data, like pay information
how do user access levels help to make a network more secure?
user access levels help limit the number of people with access to important data, so help prevent insider attacks on the network
what is anti-malware software designed to do?
to find and stop malware from damaging a network and the devices on it
what do antivirus programs do?
isolate and destroy computer viruses
what do companies use firewalls for?
to block unauthorised access. Firewalls examine all data entering and leaving the network and block any potential threats
what is encryption?
Encryption is when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it
what is encrypted text called?
cipher text
what is non-encrypted data called?
plain text
what is encryption essential for?
sending data over a network securely
what does the computer measure when it samples a sound wave?
amplitude and frequency
what is metadata?
metadata means “data about data” and provides information about the data, e.g. file format, resolution, dimensions, colour depth, etc.
what are ethical issues about?
what would be considered right and wrong by society
what are legal issues about?
what’s actually right and wrong in the eyes of the law
what are cultural issues about?
how groups of people with particular beliefs, practices or languages may be affected, e.g. ethnic groups, religions, countries
what are environmental issues about?
how we impact the natural world
what are stakeholders?
individuals or groups of people who have an interest in or are affected by a particular scenario (e.g. the actions of a company or the development of a new technology)
what are some examples of stakeholders?
a company’s owners, its employees, the shop that sells the company’s product, customers, the company’s hardware suppliers and the local community
what could companies do with your personal information?
companies may make your personal information, photos, etc. available to other website users or organisations (who might use it to send you targeted adverts or spam emails). Companies can do lots with your information as long as they stay within the bounds of the privacy agreement
what is internet censorship?
when someone tries to control what other people can access on the internet. some countries’ governments use censorship to restrict access to certain information
what are two countries that use internet censorship, and in what way do they do it?
one of the strictest countries for censorship is China, where they restrict access to websites which are critical of the government. china also censors many major foreign websites, including facebook, twitter and youtube. in cuba, citizens can only access the internet from government-controlled access points
what are some ways that many countries (including the UK) use censorship?
they restrict access to pornography, gambling and other inappropriate websites in order to protect children
what is computer surveillance?
when someone monitors what other people are accessing on the internet
is it common for governments to use some form of surveillance?
yes
what is a way government intelligence agencies may use computer surveillance?
they may use packet sniffers and other software to monitor internet traffic, looking out for certain key words or phrases that may alert them to illegal activities, terrorism, etc.
how are internet service providers used for computer surveillance in some countries?
Internet service providers keep records of all websites visited by all its customers for a certain amount of time
what are two controversial topics/issues in computer science?
censorship and surveillance
what are two reasons people might support censorship or surveillance in some form?
to protect children or stop terrorism
how do smartphones make it easier for people’s work to intrude into other areas of life?
employees may be expected to carry a smartphone all the time, so that they can always be contact - the smartphone may beep each time that they get a work e-mail. This can be stressful for employees who feel they can never really switch off from work
how has technology increased peer pressure?
children feel pressure to own the latest device for fear of being bullied by their peers. Parents feel pressured into buying them
what are three ways new technology can impact our social well-being?
- increased peer pressure
- makes it easier for work to intrude into other areas of life
- face-to-face social interaction can be neglected
what is cyberbullying?
when somebody uses social media to deliberately harm someone else. this includes trying to intimidate or insult someone, or trying to humiliate or defame them (damage their reputation)
what is trolling?
when somebody tries to cause public arguments with others online. For example, the troll may take part in a political discussion online, but only to make comments which would frustrate the other members of the discussion
what are two reasons that people troll others?
for their own amusement or to gain attention
what are two things that may be a result of the anonymity the internet gives people?
cyberbullying and trolling - they say things online that they wouldn’t say face-to-face
why could sending sexually explicit messages or images to other people be dangerous?
the person receiving the images might not be trustworthy - social media allows them to forward someone else’s images to anyone they want. there are now laws that prevent this.
when you’re answering essay questions on these issues, what should you think about?
what groups are affected (stakeholders) and what issues (legal/ethical/cultural/environmental) it raises
the internet as made it easier for children to access inappropriate material, like pornography, drugs and gambling. What can parents and schools use to try to stop children seeing it?
parental-control software
what is the sharing economy?
the name given to services which use new technology to let people make money from things they already own - e.g. Airbnb uses the internet to let you rent out a room in your house to tourists
what is an advantage of the sharing economy?
it makes things cheaper
what are some disadvantages of the sharing economy?
they draw customers away from original businesses, and they may be more risky for sharers and customers
what is the digital divide created by?
the fact that some people have greater access to technology than others
what are some examples of how people are advantaged by having access to the internet?
people can use the internet to apply for jobs or university courses, access a range of services from banking to retail, and keep in touch with friends. people who have a limited access to the internet are therefore at a heavy disadvantage
what are 3 causes of the digital divide?
- some people don’t have enough money to buy new devices like smartphones and laptops, which can be very expensive
- urban areas are likely to have greater network coverage than rural areas
- some people don’t know how to use the internet and other new technologies, and so are shut out of the opportunities they offer. this is a problem for many older people who haven’t grown up with computers and so have little experience with them
what is the global divide created by?
the fact that the level of access to technology is different in different countries. people in richer countries tend to have greater access to technology than people in poorer countries. the internet and other technologies have created lots of opportunities for the people with access to them, so this has increased the inequality between poorer and richer countries
what is One Laptop Per Child?
a charity which provides laptops to children in Africa, Central Asia and South America. it is one of the several projects that have been set up to combat the digital and global divides
what are plastics used for in devices, and where do they come from?
they are used for casting and other parts, and they come from crude oil
what precious metals do devices contain?
any three from: gold, silver, copper, mercury, palladium, platinum and indium
how is making devices bad for the environment?
extracting the raw materials for electronic devices uses lots of energy, creates pollution and depletes scarce natural resources
how is most electricity made, and how is this relevant to computer science?
most electricity is made using non-renewable resources like coal oil and gas - the billions of devices in the world today are consuming lots of energy in the form of electricity. Extracting the resources to make electricity and producing electricity in power stations causes lots of pollution including greenhouse gasses
all computers generate heat. how does this increase the negative environmental effects from computers?
all computers generate heat and therefore require cooling. the powerful servers used by businesses and the internet are a particular problem. they’re very power hungry and require special air-conditioned rooms to keep them cool. this means using even more energy and more pollution
how do devices waste a lot of energy?
servers normally only use a small proportion of their processing power. people often leave their desktops, laptops and smartphones idle. this means that these devices are using a lot of energy without actually doing anything
what are three ways to reduce the amount of energy wasted by devices?
- virtual servers are software-based servers rather than real machines. multiple virtual servers can run on one physical server, so the physical server can run at full capacity
- most modern devices include sleep and hibernation modes to reduce their power consumption when they are idle
- don’t leave electronic devices (TVs, laptops, etc.) on standby
what do we create when we throw away devices?
lots of E-waste
how much e-waste does the world create each year?
20-50 million tonnes
how are device manufacturers and retailers part of the problem of E-waste?
they provide short warranties (e.g. 1 year), use marketing to convince people to upgrade and have pricing policies that make it cheaper to replace than to repair
what was the Waste Electricity and Electrical Equipment (WEEE) directive created for?
to tackle the e-waste problem
how does the WEEE plan to tackle the e-waste problem?
it has rules for disposing of e-waste safely, to promote reuse (e.g. refurbishing broken devices to use again) and recycling (e.g. extracting the devices’ precious metals)
why is a lot of e-waste sent to certain african and asian countries?
to cut costs, and regulations are less strict there
where does most of the e-waste end up in britain?
landfill - it can be a hazard as toxic chemicals can leak into the ground water and harm wildlife
what are 2 positive environmental effects of devices?
they let us communicate without having to travel long distances in pollution-spouting vehicles, and reduce our need for paper
what are two reasons why someone might give their personal details to a website?
many websites (e.g. social media, banking and retail) require users to provide personal information in order to set up and account, e.g. date of birth and address
social media websites actively encourage users to upload personal files to their servers
name two problems with many online companies’ privacy agreements
- very few people actually read the privacy agreements, so are unaware of what they’re agreeing to
- users have no choice to agree if they want to use the website or software at all
what can you do to make the information you share online more private?
change you privacy settings on social media sites.
give three examples of how technology and the internet have shaped our culture
- selfies - they’ve become really popular due to being able to take them and share them more easily, but they could be seen as a sign that social media is gradually making people more attention-seeking and self-obsessed
- viral videos - a big aim for companies, politicians, celebrities and charities in their promotional campaigns
- social media and blogging websites - give a voice to groups of people who might have been ignored my mainstream media
what are 2 potential problems with privacy settings on social media?
- websites often have fairly relaxed privacy settings by default
- they can have privacy settings that are hard to find and hard to understand
what is a protocol?
a set of rules for how devices communicate and how data is transmitted across a network
what information do protocols cover?
how communication between two devices should start and end, how the data should be organised, and what the devices should do if data goes missing
what are the three components of a data packet?
- header - contains control information - like the envelope of a letter - includes packet’s destination address (where it’s going), the source address (where it’s come from) and the packet number
- payload - the letter inside the envelope - the thing the person is likely to read, and the reason it was sent in the first place. might be part of an email, document, web page of streamed video.
- likely to include a checksum number - a form of validation used to check that the payload data hasn’t been corrupted during transit. the sending and receiving devices both calculate a checksum value by performing a function on the payload data. if the values match then the data has been received correctlly
what does the TCP/IP protocol do?
dictate how data is sent between networks
what two protocols is the TCP/IP protocol made up of?
Transmission control protocol (TCP) and Internet Protocol (IP)
what does the transmission control protocol (TCP) do?
set the rules for how devices connect on the network. It’s in charge of splitting the data into packets and reassembling the packets back into the original data once they reach the receiving device. It’s also responsible for checking the data is correctly sent and delivered
what is the internet protocol (IP) responsible for?
packet switching
what is the Hyper Text Transfer Protocol (HTTP) used for?
used by web browsers to access websites and communicate with web servers
what is the HTTPS protocol?
a more secure version of HTTP. encrypts all information sent and received
what is the file transfer protocol (FTP) used for?
used to access, edit and move files between devices on a network e.g. to access the files on a server from a client computer
what does POP3 stand for?
Post Office Protocol - version 3
what is POP3 used for?
used to retrieve emails from a server. The server holds the email until you download it at which point it is deleted from the server
what does IMAP stand for?
Internet Message Access Protocol
what is IMAP used for?
used to retrieve emails from a server. The server holds the email until you delete it - you only download a copy. Used by most web-based email clients
what does SMTP stand for?
simple mail transfer protocol
what is SMTP used for?
used to send emails. Also used to transfer emails between servers
what is a layer?
a group of protocols which have similar functions
what is the name of layer 4?
application layer
what does layer 4 do?
turns data into websites and other applications and vice versa
what is the name of layer 3?
transport layer
what does layer 3 do?
controls data flow - e.g. splitting data into packets and checking packets are correctly sent and delivered
what is layer 2 called?
network layer
what does layer 2 do?
makes connections between networks, directs data packets and handles traffic. used by routers
what is layer 1 called?
data link layer
what does layer 1 do?
Passes data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware
what protocols work in layer 4 (the application layer)?
HTTP, FTP, SMTP
what protocols work in layer 3 (the transport layer)
TCP (transmission control protocol)
what protocols work in layer 2 (the network layer)?
IP
what protocols work in layer 1 (the data link layer)?
ethernet
what are the advantages of using layers?
- it breaks network communication into manageable pieces. This helps developers to concentrate on only one area of the network without having to worry about others
- as layers are self-contained, they can be changed without the other layers being affected
- having set rules for each layer forces companies to make compatible, universal hardware and software, so different brands will work with each other and in basically the same way
what is the first principle of the data protection act?
data must only be used in a fair and lawful way
what is the second principle of the data protection act?
data must only be used for the specified purpose
what is the third principle of the data protection act?
data should be adequate, relevant and not excessive for the specified use
what is the fourth principle of the data protection act?
data must be accurate and kept up-to-date
what is the fifth principle of the data protection act?
data should not be kept longer than necessary
what is the sixth principle of the data protection act?
the rights of the data subject must be observed
what is the seventh principle of the data protection act?
data should be kept safe and secure
what is the eighth principle of the data protection act?
data should not be transferred abroad without adequate protection
what does the data protection act 1998 do?
it gives rights to data subjects
what is a data subject?
a person whose personal data is stored on computer systems
what does the data protection act mean for organisations?
- before collecting personal data an organisation must register with the government, saying what data they’ll collect and how they’ll use it
- the act gives data subjects the right to see the personal data an organisation holds about them
- there are some exceptions to this, e.g. organisations don’t have to disclose the data they hold if it could affect national security, tax assessment, or the outcome of a court case
- if a data subject feels an organisations use of their data has caused them distress, they may be entitled to compensation
what does the Freedom of Information Act 2000 allow?
public access to data - it allows members of the public to access information held by a public organisation about that organisation’s activities. The Act covers information stored in computer data files (including audio and video files), emails, and printed documents
what are some exceptions to the Freedom of Information Act 2000?
an organisation can withhold requested information if it is intended for future publication, or if disclosing it could affect national security or cause people harm
what does the computer misuse act 1990 prevent?
illegal access to files - it was introduced to stop hacking and cyber crime
what three new offences did the Computer Misuse Act 1990 introduce?
- Gaining unauthorised access to a private network or device, e.g. through hacking
- gaining unauthorised access to a network or device in order to commit a crime like stealing data or destroying the network
- unauthorised modification of computer material - e.g. deleting or changing files. The Act also makes it illegal to make, supply or obtain malware
what does the Copyright, Designs and Patents Act 1988 protect?
innovation - it was introduced to protect intellectual property - anything that someone has created
what does the Copyright, Designs and Patents Act 1988 make illegal?
it makes it illegal to share copyrighted files without the copyright holder’s permission, use unlicensed software of plagiarise somebody else’s work. Copyright holders can make money by granting permission to use the material for a fee
why has the internet made it harder to protect copyrighted content?
because of the ease of file sharing. It’s also difficult to enforce copyright if content is held on servers in countries with more relaxed copyright laws
what do Creative Commons licenses allow?
legal file sharing - they allow you to legally share media and software online without having to ask for permission first. Intellectual property owners use creative commons licences when they want other people to share of build upon their work
what are the four main types of creative commons licence?
- Attribution - work can be shared, copied or modified, but the copyright holder has to be credited
- Share-alike - modified works can only be distributed with the same license terms as the original
- Non-commercial - nobody can use the copyrighted work for profit
- No derivative works - the work can be copied and distributed, but can’t be modified or built upon
can you combine CC licences?
yes
what does it mean for works to be in the public domain?
they don’t have any copyright attached to them, meaning you can copy them and share them as you wish.
when does UK copyright expire?
70 years after the creators death, at which point their creation enters the public domain - Shakespeare’s plays, Beethoven’s symphonies and da Vinci’s paintings are all no in the public domain
what are alphanumeric characters used for?
they are used to make words and strings. They include uppercase and lowercase letters, the digits 1-9, and symbols like ? + and £
what are character sets?
collections of characters that a computer recognises from their binary representation
what is ASCII?
- ASCII is the most commonly-used character set in the English-speaking world. Each ASCII character is given a 7-bit binary code - this means it can represent a total of 128 different characters, including all the letters in the English alphabet, numbers, symbols and commands
- An extra bit (0) is added to the start of the binary code for each ASCII character. This means each ASCII character fits nicely into 1 byte
what is extended ASCII?
a character set which gives each character an 8-bit binary code, allowing for 256 characters to be represented. The first 128 characters are in exactly the same order as the ASCII characters.
Extended ASCII is particularly useful for many European languages like French and German which include accents on some of the vowels
what is unicode?
- unicode is a character set that comes in several different forms and tries to cover every possible character that might be written. In its most common forms it uses 16-bit and 32-bit binary codes
- Unicode is that covers all major languages , even those that use a completely different alphabet like Greek, Russian and Chinese
what are the 2 types of images?
bitmap and vector
what are bitmap images mainly used for?
photos