Paper 2 Flashcards

1
Q

Operating system functions/purpose

A

(Processor, Memory, Application, Security) management
User/hardware interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do interpreters work

A

No machine code
Call MC subroutines to carry out commands
Translation line by line
Stops when error found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is there more RAM than cache

A

Ram is cheaper
Cache can’t store data and programs simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Issues with SSDs

A

Expensive
Low storage capacities
Limited rewrite capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sample resolution

A

No. Of bits/ sample

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAN v LAN

A

WAN operates over larger area
WAN has morre devices connected
WANs are slower than LANs
WANs have collective ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless over wired networks

A

Easier to add new devices
No tripping hazards
Less cable management/issues
Easy guest access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reasons for automatic software updates

A

People forget to update manually
Computers get protected faster
Updates from trusted sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is RLE not useful

A

Few repeated characters
RLE takes up more space than the original file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Relational database”

A

A database with multiple tables that are linked together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of relational databases

A

Reduces redundancy/inconsistencies over databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unicode > ASCII

A

More available characters
Different languages
Technical characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSD benefits

A

More portable
Use less power
Generate less heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data read from magnetic disc

A

Read head is moved
Disk spins around
Whole sector read in one go
Polarisation reflects 1/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of cloud storage

A

Access data from several devices
Easily share data
Increase available storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reasons for growth in cloud storage

A

Higher bandwidth mobile networks
Increase in mobile devices
Better network security
Trust in 3rd parties

17
Q

Advantages of computer networks

A

Easy To transfer data
Increased available storage
Computer usage monitoring
Central management/backups

18
Q

Blagging

A

Victim persuaded to give details for a false purpose
(Nigerian prince)

19
Q

Phishing

A

Victim thinks they’re communicating with a trusted source - is in fact fraudulent

20
Q

Shouldering

A

Credentials being watched/recorded when being typed

21
Q

High level language > low level language

A

Built in functions/libraries
Easier to write/debug/understand
Require fewer lines
easier to structure

22
Q

When is MAC filtering not useful

A

Wireless network open to the public
MAC address of connected devices won’t be known

23
Q

Function vs procedure

A

Procedure accepts arguments but doesn’t return values
Function returns one or more values

24
Q

OS managing Input/Output devices

A

Downloads drivers
Allows data to be sent/received

25
Q

OS managing security

A

User authentication
Malware protection
Blocking access to vulnerable parts of a system

26
Q

OS managing processors

A

Scheduling programs to be executed

27
Q

OS managing storage

A

Secondary data management
Efficient space allocation

28
Q

Identity method confirmation

A

Passwords - only the user would know/checked against database
Biometrics - physical features
Email confirmation - only valid email proves identity

29
Q

Black box pen. testing

A

No understanding of how system works
Mimics external hacker
Discovery & exploitation of weak spots

30
Q

White box pen. testing

A

Understanding of system
Mimics malicious insider
Testing specific vulnerabilities
Go through all scenarios

31
Q

Spyware

A

Records data on host system
Sends to 3rd party

32
Q

Trojan malware

A

Misleads user - think its a different piece of software
Executes other program

33
Q

Worm

A

Autonomous self replication on a host system

34
Q

Ransomware

A

Encrypts data until decryption key is paid for

35
Q

Keyloggers

A

Monitors keystrokes to find and steal passwords for confidential purposes

36
Q

Password weaknesses

A

Short, potentially blank
No mixture of letters, numbers, and symbols
Ordered numbers/easily guessable

37
Q

Disadvantages of cloud storage

A

Increased security risks
Reliance on providers
Increasing costs
Data leaks