S3 Computer Systems, Binary, Cyber security Flashcards

Jan test revison

1
Q

Examples of input devices?

A

Mouse, Keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of output devices

A

Headphones, monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer System diagram?

A

Input devices into Cpu
output dervices out of cpu
working memory both ways of cpu
backing storeage both ways.
Layout: Cpu in middle, Ram above, Backing storage below
input & output devices either side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens when you open a file?

A

The file moves from backing storage to working memory and while working on file moves between cpu and working memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens when you save a file.

A

moves back into backing storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean that the working memory is volitile?

A

It does not save when you turn off the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Cpu stand for?

A

Central Proccessing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does RAM stand for?

A

Random acess memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does GPU for?

A

Graphics proccessing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does PSU stand for?

A

Power supply unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SSD stand for?

A

Solid state drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does HDD stand for?

A

Hard disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OS stand for?

A

operaiting system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the CPU do?

A

Brain of the computer, all the calculations are prefromed here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the 3 things CPU is broken into?

A

Speed frequency(GHz)
Number of cores(1,2,4,8,ect)
Cache (1mb,4mb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the RAM do?

A

Stores working data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where does RAM solt into?

A

Mother board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What sizes does RAM come in?

A

4GB,8GB,16GB,64GB,128GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the range of speed for RAM?

A

2133-4200MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the GPU do?

A

Produces a display so can use computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why is GPU useful?

A

Can create refection, transparency, shadows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Does the computer need GPU?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is GPU measured in?

A

GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

does it have a ram on board

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does the motherboard do?

A

a device that connects all the components together so the computer can work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What must the motherboard match

A

CPU type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what connects to the motherboard

A

CPU,RAM,GPU,hard drive + extra compoents

28
Q

What is the two things the PSU does?

A

Supplies the computer and components with the right power, changes the mains into a usable power supply

29
Q

What is SSD & HDD

A

backing storage

30
Q

3 things about HDD

A

Slower,More Fragile, moving parts

31
Q

3 things about SSD

A

Faster, move expensive, longer life

32
Q

What does the OS do?

A

It is a software responsible for making all the components speak to each other correctly

33
Q

What does 1 and 0’s repersent and what are they?

A

a state of switch, 1 = on, 0 = off.
It is the smallest pieces of storage a computer can understand, know as a bit

34
Q

what do 8 bits create

A

a byte

35
Q

what does 1024 bytes equal?

A

1 Kilobyte

36
Q

what does 1024 kilobytes equal?

A

1 megabyte

37
Q

what does 1024 megabytes equal?

A

1 gigabyte

38
Q

what does 1024 gigbyte equal?

A

1 tera byte

39
Q

How do you find out the number of combos?

A

2 squared by the number of bits

40
Q

what is ASCII?

A

a system to reperesent text

41
Q

how many bits is the ASCII system

A

8 bit system

42
Q

how many different characters is ASCII

A

256 different charactes

43
Q

Why is ASCII not useful

A

it only has 256 character and there is more characters

44
Q

what is UNICODE and why is it used

A

it is the alternaitve to ASCII and has more characters, 16 bit system

45
Q

how many characters does UNICODE have?

A

65536

46
Q

In a byte how do you find the number?

A

each 0/1 has a value if there is a 1. the value range goes from 128 and halving it each time.

47
Q

what does it mean if the number at the end is a 1

A

its odd

48
Q

what does it mean if the number at the end is a 0

A

its even

49
Q

What are the two types of images?

A

Bitmap and vectors

50
Q

Vectors?(3)

A

Used for line art and simple graphics. Each object is repersented by a formula. can be scaled up without loss of resolution.

51
Q

Bitmap?(5)

A

used for photos and high quality graphics. repersented by a grid of pixals. each pixal a colour in binary. for 256 colours need 8 bits per pixal for two colours need 1 bit per pixal. become pixalated when scaled up.

52
Q

What is a security breach?

A

incident where private data may have been stolen or veiwed

53
Q

impact of a security breach? (4)

A

Reputaional damage, theft of personal info(idenity theft), moneyloss, damage

54
Q

why somone would do a secruity brearch

A

for fun, challange, show how poor system is, steal credit card info to sell or use, steal personal info to use or sell

55
Q

what makes a strong password

A

mix of upper and lower case letters, numbers, symbols

56
Q

what is a diconary attack

A

computer tries password and then another until gets the right password

57
Q

what is a brute force attack

A

changes parts of the password

58
Q

malware?

A

programs that cause damage to the computer system

59
Q

examples of malware

A

steals info, cause pop ups, slow down computer

60
Q

what are the 5 types of malware

A

viruses, keyloggers, trogan horses, worms, spyware

61
Q

viruses

A

causes damage or annoyance, need user interaction

62
Q

worms

A

self replicating software that causes damage

63
Q

trojan horses

A

appears harmless, used to install malware and create backdoors,

64
Q

spyware

A

spy on users to get personal info and web browsing info

65
Q

keyloggers

A

logs each keystroke made, used to steal password and sensitive info

66
Q

what is antiviruses

A

program that is installed to block malware and suspisous programs. scans whole computer to check if anything matchs a virus, if find virus will quaritnine file soo can’t do anything.