Test Corrections Unit 1 Flashcards

Learn questions I got wrong in tests

1
Q

Identify one item of data and one piece of information

A

Anything from the code or mark column

Average mark= 67
Maths 2 gcse equivalence = b
Mark for computing is 51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A student scores 51, state the most appropriate data type for storing the students score.

A

Integer or Numeric. NOT NUMBER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false - a vector image can be stretched without a loss of clarity

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What effect does resolution have on an image file size?

A

High resolution, larger file size, image size, more pixels the larger the file/image size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State the term that describes a pre-formatted layout into which data can be added.

A

Template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 2 resources managed by the operating system in a computer system

A

Memory/ram allocation
Storage
Processing time/task scheduling
Peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What software group does defragmentation belong to?

A

Utilities (programs/software/application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is The Internet of things?

A

Connection via internet of digital devices enabling them to send and receive data or
Physical devices connected to the internet
DO NOT ACCEPT THINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give 2examples of Internet of Things?

A

CCTV
Smart bulbs
Smart heating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A template is…?

A

A standard layout for a document which can be reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A macro is…

A

A set of commands recorded to perform repetitive tasks or is clicked on to perform a repetitive task eg printing a report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does the Immediate Access Store play in the CPU?

A

Stores programs temporarily while they are being used.
Stores data while it’s being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 main components of the CPU?

A

Control unit
Arithmetic Logic Unit
Immediate Access Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a protocol in data transfer via a network?

A

Set of rules to allow transfer of data between 2 communication systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does FTP stand for?

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program used by hackers to try to gain access to users systems?

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Software used by hackers to capture passwords and bank details

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A program that replicates itself using up memory space

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name the validation check for:
Fee_payable should be between 20 and 100

A

Range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the validation check:
Description should be no longer than 35 characters

A

Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is encryption?

A

A special type of software that scrambles or encodes data so it’s meaningless if intercepted. Needs an encryption key to unscramble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What can a firewall do?

A

Monitor in coming/outgoing data so prevents spam and viruses entering the network, prevent unauthorised access to the network, provide information on unauthorised access

23
Q

How do firewalls protect a network?

A

Monitor incoming/outgoing data, filters data to prevent it being hacked, operates based on rules

24
Q

Explain the processing activity ‘batch’

A

Processing data all together during processor downtime

25
Q

Explain the term backup

A

Duplicate files/data made to ensure no data is lost by accidentally being deleted or overwritten. Stored on a separate storage device, cloud or server

26
Q

State 3 benefits of connecting computers together in a company network.

A

Able to share files
Share software and hardware
Access files from any computer
Share peripherals

27
Q

What is an NIC

A

Network interface card

28
Q

What is the purpose of a network interface card?

A

To connect a device to a network or server
To connect a device to the internet

29
Q

What is a communication protocol?

A

Rules set to define methods of data communication between different devices for sending and receiving data on a network

30
Q

What is meant by a phishing attack?

A

When a hacker/scammer sends an email impersonating a person or legitimate company to get information from the user

31
Q

2 advantages of cloud computing

A

Access data anywhere with internet connection
Cloud services handle back up
Cloud services handle security

32
Q

Describe the functions of a router

A

Wireless access to internet on multiple devices at the same time
Connects WAN to LAN network
Firewall and security on the network
Ip allocation

33
Q

What is the application the World Wide Web uses to function?

A

Internet

34
Q

The World Wide Web is the ________ that runs on the Internet?

A

Network

35
Q

State 2 disadvantages of a ring network

A

If one node closes, they all shut off

Information is passed through other nodes

36
Q

What is the function of the utility software- defragmentation?

A

Rearranges data and files to free storage space
Reduces time to access data

37
Q

What is the function of the task scheduling utility?

A

Auto run tasks eg back up and virus checks
Time slicing to get maximum use of the processor which creates the appearance of no interruptions

38
Q

Main functions of an operating system

A

Provides an interface between user and the computer
Allocate RAM to programs and data currently being used
Control peripherals
Manage processing time
Error handling eg printer isn’t switched on

39
Q

Give 3 examples of utility programs

A

Disk defragmenter
Task scheduling
Back up/Restore

40
Q

Name 2 modes of processing

A

Batch
Real time

41
Q

What does CSV stand for?

A

Comma separated value

42
Q

Name the type of data file

A

CSV

43
Q

List 3 ACCESS steps an organisation can use to stop hackers gaining entry to a computer system

A

User codes
Login IDs
Passwords
Different levels of access
2 factor authorisations

44
Q

2 examples of software an organisation can use to prevent hackers gaining access to a computer system

A

Firewall
Encryption

45
Q

2 forms of social media misuse

A

Cyber stalking
Cyber bullying

46
Q

Why does a computer need a hard drive

A

To store data, files and software not currently in use

47
Q

What is mean by cloud computing

A

Where files and programs can be accessed remotely through the Internet.

48
Q

3 advantages of cloud computing?

A

Remote global access to files
Collaborative working
Backup and software updates dealt with automatically
Share files
Unlimited storage

49
Q

2 risks of cloud computing

A

Hacking
Viruses in the system infect all files
If there’s a problem there’s downtime
Need good stead internet connection

50
Q

In relation to databases, data is stored in a ________ and a ________ is made up of several files

A

Table
Record

51
Q

What does IAS stand for?

A

Immediate Access Store
NOT STORAGE!

52
Q

Explain the process an organisation can use to ensure students can download a video quickly

A

Compression
Remove detail
Reduce the file size

53
Q

What is meant by bit depth when referring to a sound recording?

A

The number of bits in a sound sample

54
Q

Describe what is meant by Denial of Service?

A

Involves computer sending large volume of requests to a server to overload the system with traffic and prevent the system from functioning. The requests slow down the system. May take website offline. Server has difficulty answering legitimate requests.