test nov 18th Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what is a subroutine

A

breaking up a large complicated problem into smaller sub programs (self contained)
(functions or procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the difference between a function and a procedure

A

function - returns a value
procedure - just performs a task/ executes code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a parameter

A

variables in a function - assign a value to it when you call it
data passed into a subroutine when it’s called

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is an argument

A

values passed into a subroutine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

+ of subroutines?

A
  • each subroutine tested separate to make sure it works - easy to debug
  • split a program between many programmers - cut down development time
  • subroutines can be reused - cut down development time
  • code that’s broken down into meaningful subroutines is easier to maintain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

local variable

A

only exists whilst the subroutine is executing - can only be used and modified in a subroutine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

global variable

A

accessible anywhere in the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

presence check validation

A

value <- USERINPUT
WHILE LEN(value) == 0
OUTPUT “nothing entered enter again”
value <- USERINPUT
ENDWHILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

range check - using while loop

A

postcode <- USERINPUT
WHILE LEN(postcode) <6 OR LEN (postcode) > 8
OUTPUT ‘Invalid enter again’
postcode <- USERINPUT
END WHILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define cyber secutity

A

the processes / practices and technologies that protect from attack damage or unauthorised access
(protects networks, comps and digital data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how does anti virus software protect a device

A
  • detects malware - sees if it had a match to the signature on its database - then informs the user not to open the file
  • can quarantine or delete malware if it’s on the device - to prevent causing damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what anti virus software does if it finds a virus?

A
  • a new virus is detected - and sent to the anti virus software
  • verify it’s malware and creates a signature of the virus
  • add it to their database and tell computers to run an update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

why keep anti virus software up to date?

A

new threats are detected daily
- if not updated it won’t have the signature in the database so won’t be able to detect any new malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

social engineering definition

A

the ability to obtain confidential info by manipulating people for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

phishing

A

using email / sms pretending to be from a trusted source - to obtain personal/ sensitive info
- tend to involve links/ not personalised/ poor spelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

blagging

A

using an invented scenario to target someone - usually an urgent personal scenario

17
Q

shouldering

A

observe information as it’s entered - in person / camera / reflection

18
Q

penetration testing

A

deliberately trying to find security holes in your system to identify targets - possible entry holes + report these back

19
Q

white box

A

simulates a malicious insider with knowledge of the system - have basic credentials to target a system

20
Q

black box

A

simulates an external hacker with no knowledge of the system

21
Q

why use a function over a procedure?

A
  • returns one value which you can use multiple times everywhere in the code