Revision for Nov Mocks Flashcards
Daro’s current computer has a low resolution. State health risk of using a computer with low resolution
- Eye strain
- Eyesight damage
- Headaches
Daro upgrades the graphics card to improve the screen resolution of his computer. List other features that could be upgraded to make it easier to edit photographs
He can ugrade his
- Processor
- RAM
- Motherboard
- Monitor/Screen size
Give examples of a service by cloud computing
- Online storages space
- Email services
- Backup your files
- Hosted applications e.g. google docs
- Technical support services
List wired methods of connecting peripheral devices
- USB
- Firewire
- Ethernet cable
- Audio / Auxiliary cable
- Thunderbolt
- HDMI
State the purpose of a router
- A router direct data / network traffic
- To allow devices to share an internet connection
- To allow devices to share data
What makes a strong password?
Is at least 8 characters long.
Combines letters, numbers, and symbol characters within the password.
Is not found in a dictionary.
Is not the name of a command.
Is not the name of a person.
Is not the name of a user.
Is not the name of a computer.
Is changed regularly.
Is significantly different from previous passwords.
Daro uses a keyword search to find an image file. Explain how the choice of appropriate keywords affects the results of the search
- Appropriate keywords are used to match the image
- Fewer results in the search
- Images which are more relevant
In the search Daro filter the results by DATE
List other filters that he could use
- Location
- File size
- File type
- Dimensions
- Colour
- Author
- Copyright licence
- Popularity
Name negative and positive impacts in which way cloud computing affects the enviroment
- Uses fewer resources (paper)
- Reduces pollution from computing
- Used more resources (fuel)
What is WPA?
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.
Explain VoIP
Voice over Internet Protocol is the set of rules for transmitting audio messages over the internet. The rules enable you to make free voice calls from your computer.
Explain POP3
If the recipient uses Post Office Protocol (POP or POP3) to read the email, the mail server will download the email to the computer. The email is then deleted from the server and can be read offline
Explain IMAP
If the recipient uses Internet Message Access Protocol (IMAP), the email is read on the mail server. The email is not deleted from the server.
Explain Encryption
For security, data is translated into a secret code according to a set of rules in a special ‘key’. To convert the data back into plain text, the receiver must also have the key.
A WiFi network is shared with other train passengers. Daro tries to access an online video streaming service.
Explain why the WiFi network provider blocks video streaming.
An explanation to include three from:
Streaming video requires lots of data and bandwidth (1)
Reducing the bandwidth available to others users (1)
Negatively affecting the experience of other users (1)