Test Corrections Unit 1 Flashcards

Learn questions I got wrong in tests

1
Q

Identify one item of data and one piece of information

A

Anything from the code or mark column

Average mark= 67
Maths 2 gcse equivalence = b
Mark for computing is 51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A student scores 51, state the most appropriate data type for storing the students score.

A

Integer or Numeric. NOT NUMBER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false - a vector image can be stretched without a loss of clarity

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What effect does resolution have on an image file size?

A

High resolution, larger file size, image size, more pixels the larger the file/image size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State the term that describes a pre-formatted layout into which data can be added.

A

Template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 2 resources managed by the operating system in a computer system

A

Memory/ram allocation
Storage
Processing time/task scheduling
Peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What software group does defragmentation belong to?

A

Utilities (programs/software/application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is The Internet of things?

A

Connection via internet of digital devices enabling them to send and receive data or
Physical devices connected to the internet
DO NOT ACCEPT THINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give 2examples of Internet of Things?

A

CCTV
Smart bulbs
Smart heating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A template is…?

A

A standard layout for a document which can be reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A macro is…

A

A set of commands recorded to perform repetitive tasks or is clicked on to perform a repetitive task eg printing a report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does the Immediate Access Store play in the CPU?

A

Stores programs temporarily while they are being used.
Stores data while it’s being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 main components of the CPU?

A

Control unit
Arithmetic Logic Unit
Immediate Access Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a protocol in data transfer via a network?

A

Set of rules to allow transfer of data between 2 communication systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does FTP stand for?

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program used by hackers to try to gain access to users systems?

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Software used by hackers to capture passwords and bank details

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A program that replicates itself using up memory space

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name the validation check for:
Fee_payable should be between 20 and 100

A

Range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the validation check:
Description should be no longer than 35 characters

A

Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is encryption?

A

A special type of software that scrambles or encodes data so it’s meaningless if intercepted. Needs an encryption key to unscramble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What can a firewall do?

A

Monitor in coming/outgoing data so prevents spam and viruses entering the network, prevent unauthorised access to the network, provide information on unauthorised access

23
Q

How do firewalls protect a network?

A

Monitor incoming/outgoing data, filters data to prevent it being hacked, operates based on rules

24
Q

Explain the processing activity ‘batch’

A

Processing data all together during processor downtime

25
Explain the term backup
Duplicate files/data made to ensure no data is lost by accidentally being deleted or overwritten. Stored on a separate storage device, cloud or server
26
State 3 benefits of connecting computers together in a company network.
Able to share files Share software and hardware Access files from any computer Share peripherals
27
What is an NIC
Network interface card
28
What is the purpose of a network interface card?
To connect a device to a network or server To connect a device to the internet
29
What is a communication protocol?
Rules set to define methods of data communication between different devices for sending and receiving data on a network
30
What is meant by a phishing attack?
When a hacker/scammer sends an email impersonating a person or legitimate company to get information from the user
31
2 advantages of cloud computing
Access data anywhere with internet connection Cloud services handle back up Cloud services handle security
32
Describe the functions of a router
Wireless access to internet on multiple devices at the same time Connects WAN to LAN network Firewall and security on the network Ip allocation
33
What is the application the World Wide Web uses to function?
Internet
34
The World Wide Web is the ________ that runs on the Internet?
Network
35
State 2 disadvantages of a ring network
If one node closes, they all shut off Information is passed through other nodes
36
What is the function of the utility software- defragmentation?
Rearranges data and files to free storage space Reduces time to access data
37
What is the function of the task scheduling utility?
Auto run tasks eg back up and virus checks Time slicing to get maximum use of the processor which creates the appearance of no interruptions
38
Main functions of an operating system
Provides an interface between user and the computer Allocate RAM to programs and data currently being used Control peripherals Manage processing time Error handling eg printer isn’t switched on
39
Give 3 examples of utility programs
Disk defragmenter Task scheduling Back up/Restore
40
Name 2 modes of processing
Batch Real time
41
What does CSV stand for?
Comma separated value
42
Name the type of data file
CSV
43
List 3 ACCESS steps an organisation can use to stop hackers gaining entry to a computer system
User codes Login IDs Passwords Different levels of access 2 factor authorisations
44
2 examples of software an organisation can use to prevent hackers gaining access to a computer system
Firewall Encryption
45
2 forms of social media misuse
Cyber stalking Cyber bullying
46
Why does a computer need a hard drive
To store data, files and software not currently in use
47
What is mean by cloud computing
Where files and programs can be accessed remotely through the Internet.
48
3 advantages of cloud computing?
Remote global access to files Collaborative working Backup and software updates dealt with automatically Share files Unlimited storage
49
2 risks of cloud computing
Hacking Viruses in the system infect all files If there’s a problem there’s downtime Need good stead internet connection
50
In relation to databases, data is stored in a ________ and a ________ is made up of several files
Table Record
51
What does IAS stand for?
Immediate Access Store NOT STORAGE!
52
Explain the process an organisation can use to ensure students can download a video quickly
Compression Remove detail Reduce the file size
53
What is meant by bit depth when referring to a sound recording?
The number of bits in a sound sample
54
Describe what is meant by Denial of Service?
Involves computer sending large volume of requests to a server to overload the system with traffic and prevent the system from functioning. The requests slow down the system. May take website offline. Server has difficulty answering legitimate requests.