Random Questions Flashcards
Three disadvantages of robots in manufacturing
- expensive
- no need for manual labour, therefore less employment
- can’t problem solve
- technical knowledge required to maintain them
- unemployment leads to social unrest
Three advantages of robots in manufacturing
- consistency
- eliminate human error
- work 24/7
- no overheads - no wages
- easily reprogrammed
- no staff training needed
- all products get cheaper
What does RAM stand for?
Random access memory
What does ROM stand for?
Read only memory
What does CAD stand for?
Computer aided design
What does CAM stand for?
Computer aided manufacturing
What is the law CMA?
Computer Misuse Act
Why was the CMA introduced?
To stop unauthorised access and prevent and punish hacking.
What two rights do data subjects have?
- the right to change their data
What are the four types of licenses?
- single license (one machine, one copy)
- multi-user license (for several machines)
- site license (for a company)
- internet –> shareware (try before you buy), freeware (free)
What is cryptography?
The science or study of the techniques of secret writing, especially code and cipher systems, methods and the like.
What does a “key” do in cryptography terms?
A ‘key’ or code is encrypted and the key is used to scramble and unscramble the actual message. It is very important to keep the key secret as anyone with the key can quickly unscramble the message.
What is used in quantum cryptography to make it a more secure way of encrypting data?
> Using computers to encrypt and decrypt messages has made communication more secure.
QC is an extremely secure way of encrypting data because the quantum property of light or photons is used. It uses photons to send a secret key used to encrypt data.
Scientists say it’s impossible to measure the quantum state of photons so QC is unbreakable.
If anyone tries to read encrypted data, the sender and receiver will know that this has happened.
What are the five methods for protecting data?
- Physical Security (locks, PCs securely fixed onto desk)
- User ID and Password (not shared, complex)
- Encryption (scrambled data)
- Firewall (check incoming network traffic)
- Antivirus Software (scan for and quarantine malware)
What happens in key logging?
Key logging software records the keys that are used when a person types at a keyboard. The software sends the information to another person or records it for sending later.