Unit 1 - J276 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

CPU (______ ________ _____) - The ______ of the computer. It carries out instructions. It ______, ______ and ________ instructions from the ____.

A

Central Processing Unit, brain, fetches, decodes, executes , RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Von Neumann Architecture consists of ;

  • ____
  • MDR
  • _______ _____
  • _________
A

MAR
Program Counter
Accumulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAR (________ _______ ________) - Stores the _______ ________ of ____ that needs to be _______.

A

Memory Address Register, memory address, data, accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MDR (_______ _____ ________) - Stores _____ that is being _____ from or ____ to memory.

A

Memory Data Register, data, fetched, sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Program Counter - Stores the ________ ________ of the ______ _________ to be executed.

A

memory address, next instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accumulator (____) - Stores the results of any ________ or _______ operations carried out by the ___.

A

ACC, arithmetic, logical, ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALU (________ ______ _____) - Performs all ________ (add, subtract etc) and _____ (AND, OR, NOT etc) _________.

A

Arithmetic Logic Unit, arithmetic, logical, operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CU - (_______ _____) - Sends ______ _______ to all ________ and controls the ______ of _____ in the CPU.

A

Control Unit, direct operations, components, flow, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cache - ______ speed, volatile _______ in the ____ that contains _______ used ________.

A

High, memory, CPU, frequently, instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fetch, decode & execute cycle - Instructions are _____ from the memory. _______ in to ________ ____, and then ________ (carried out).

This cycle is ________.

A

fetched, decoded, machine code, executed

repeated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Factors that affect CPU performance

  • ______ speed
  • Number of _____
  • ______ size
A

Clock
Cores
Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Clock speed - Measured in ____, it is the amount of _____, ______ and ______ cycles carried out per ______.

A

GHz, fetch decode and execute, second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cores - A part of the _________ that performs the ______, ______ and _______ cycle.

The more cores you have, the more ________ can be executed __________.

A

processor, fetch decode and execute,

instructions, simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Embedded System - A device with a _________ _______ inside of it that is designed to carry out a ______ function _________ and ________.

Examples include microwaves, sat navs, fridges etc

A

computer system, specific, effectively and efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ROM (______ ____ _______) - Non - _______ memory that stores _____ __ instructions (BIOS) and is ______ only.

Data in ROM cannot be _______.

A

Read Only Memory, volatile, boot up, read

changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAM (________ _______ _______) - _______ memory that stores ____ for _______ currently in ___.

A

Random Access Memory, Volatile, data, programs, use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Differences between RAM & ROM

  • ROM is ___ _______, RAM isn’t
  • Data in RAM can be _______, in ROM it can’t
  • ROM stores data _______, RAM stores them _________.
A

non volatile
changed
forever, temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

________ memory is need to store more _____ for ________ currently in ____ when the RAM is ______.

A

Virtual, data, programs, use, full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_______ memory is when some memory in ________ storage (e.g. hard drive) is ________ to store _______ temporarily.

A

Virtual, secondary, allocated, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Flash memory - non ______ memory that can be _________ erased and _______.

A

volatile, electronically, reprogrammed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ storage is needed to allow devices to store ______ in the _____ _____.

Examples include HDDs, SSDs, Magnetic Storage etc

A

Secondary, data, long term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Optical Storage uses ______ to _______ data on a _____. (e.g CD, DVD, Blu Ray

  • ___ capacity
  • ______ speed
  • Portable
  • Can get scratched - not _______ or _______
  • Quite ______
A

lasers, engrave, disk

Small
Slow
Durable, reliable
Cheap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Magnetic Storage uses _______ to ______ and _____ data. Examples include HDDs

  • _____ capacity
  • _______ speed
  • Not very ______
  • Not very ______ due to moving parts
  • Quite ______
  • Quite _____
A

magnets, read, write

High
Average
portable
durable
reliable
cheap
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Solid State storage uses _______ _____ to store data. They have no ________ ______. Examples include USB, SD cards and SSDs.

- \_\_\_\_\_\_\_\_ \_\_\_\_\_ capacity
 \_\_\_\_\_\_ speed
- Portable
- No moving parts so \_\_\_\_\_\_\_
- Reliable
- Very \_\_\_\_\_\_.
A

memory chips, moving parts

Limitedly high
High
durable
expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Capacity - How much ______ the storage device has

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Speed - How _____ the storage device is

A

fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Portability - How easy it is to ______/_______ the storage device

A

carry/transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Durability - The storage device’s ability to withstand _____ and _______.

A

wear, damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Characteristics to consider for Secondary Storage

  • C_______
  • S_____
  • P_______
  • D_______
  • R______
  • C____
A
Capacity
Speed
Portability
Durability
Reliability
Cost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

LAN (_____ ____ _______) - a network that covers a ______ _________ ______.

It uses _______ equipment

A

Local Area Network, small geographical area

internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

WAN (____ ____ _______) - a network that covers a ______ ________ _____ and requires ________ equipment.

A

Wide Area Network, large geographical area, external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Factors that affect network performance

  • B________
  • Number of ______
  • ______ (Amount of data being sent)
  • ___________ Media
A

Bandwidth
Devices
Traffic
Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Bandwidth is just the _______ of the network

A

speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Number of _______.

The more devices connected to a network, the _____ the network as more _____ will be _________ between devices due to high amounts of _______ and _______.

A

devices

slower, data, transferred, devices, demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Traffic (Amount of data)

The more data the network has to handle, the ______ the network as it needs more ______ to _______ the data which ______ the process down.

A

slower, time, transfer, slows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Transmission Media is how the data is _______ (e.g. WiFi or Ethernet).

Data transferred wirelessly tend to be _______ and less ________ in speed compared to wired variants.

A

travelling

slower, consistent/reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Client Server Network - Network where all _______ are connected to a _______ _______.

A

devices, central server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Peer to Peer Network - Network where all _______ are connected to ______ _____.

A

devices, each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Hardware required to _______ devices in a LAN.

  • WAP (________ ______ _____)
  • S_____
  • R_____
  • NIC (________ ________ ______)
A

connect

Wireless Access Point
Switch
Router
Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

WAP (_________ _______ _______) - Type of hardware that allows a device to ________ connect to a _______.

A

Wireless Access Point, wirelessly, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A switch is a piece of hardware which has many ________ ports and are used to ________ devices on a ____.

Switches receive _____ (in units called _______) from one device and ________ this data to the device on the network with the correct ____ ________.

A

ethernet, connect, LAN

data, frame, transmit, MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A router is a piece of hardware that ________ ____ between ____ or more different _________.

A

transmits data, two, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

NIC (_________ _______ _____) - An expansion _____ that enables computers to ________ to other _________/ a _________

A

Network Interface Card, card, connect, computers, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

WiFi/Wireless uses ______ waves to _______ data. Up to _____ mbps.

A

radio, transfer, 600

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Copper cables transmit ______ using ________.

E.g. Ethenet. Speed up to _ gbps.

A

signals, electricity

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

______-optic cables ________ data using _______.

_____ in speed, don’t suffer from _______ interference and can _______ data over _____ distances. Speed up to __ gbps

A

Fibre, transmit, light

Fast, signal, transmit, large/long, 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The internet is a set of global __________ networks

A

interconnected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

DNS (_______ _____ _______) - _________ the URL of a website into an __ _______.

A

Domain Name Server, Translates, IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Hosting is when you ______ files on a ________

A

store, server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The cloud is ________ or _____ services provided over a ________.

A

software, data, network

51
Q

A Hub is similar to a ______ but it sends ____ to ____ devices instead of _______ to the desired device.

A

switch, data, all, directly

52
Q

Virtual Network is the _________ of an existing physical ________ into ________ networks.

A

portioning/splitting up, network, seperate

53
Q

A Star Topology is when all ________ are connected to a _______ ______.

All data first goes to the _______ _______ which then sends the data to its __________.

A

devices, central server

central server, destination

54
Q

A Mesh Topology is when all _______ are connected to ____ _____.

A

devices, each other

55
Q

WiFi has 2 ________ bands - ____ GHz and _ GHz

_____ GHz has greater ______ and is better at going through ________ (like walls) but is ______ than _GHz

_ GHz has a larger _______ but less ______ and is more worse than _____GHz and going through _______.

A

frequency, 2.4GHz, 5GHz

2.4GHz, range, obstacles, slower, 5GHz

5GHz, bandwidth/speed, range, 2.4GHz, obstacles

56
Q

The frequency bands of WiFi are split into _______ _______ that each cover a small ________ _____.

A

numbered channels, frequency range

57
Q

WiFi performance is affected by ________ between networks using ________ channels. To avoid this only certain channels that are _______ apart are usually used.

_ GHz has more ___- ________ channels than ____GHz, so it has less __________ overall.

A

interference, adjacent/near-by, spaced

5GHz, non-overlapping, 2.4GHz, interference

58
Q

Encryption is when data is _______ into a ____ which can only be cracked with the correct ____.

Encryption is used to prevent _________ access.

A

translated, code, key

unauthorised

59
Q

Ethernet cables are used to _______ devices on a ___

Cat _, __ and _ ethernet cables are the most common, they have pairs of _______ wires ______ together to reduce _______ __________.

Slowest to fastest in speed
Cat _, Cat __, Cat _

A

connect, LAN

5, 5e, 6, copper, twisted, internal interference

5, 5e, 6

60
Q

Coaxial ethernet cables has a ______ _______ wire surrounded by a ______ or _______ mesh to shield _______ _________.

A

single copper, plastic, metal, external interference

61
Q

TCP (_________ _______ ________) - Sets the ____ for how devices _______ to a network.

It is responsible for ________ the data into _______ and __________ them whilst ________ if the data has been _____ correctly.

A

Transmission Control Protocol, rules, connect

splitting, packets, reassembling, checking, sent

62
Q

IP (_________ _________) - Used for sending ____ across a _________. Gives it the senders __ _______ and the _______ __ _______. Sends _______ via different _______.

A

Internet Protocol, data, network, IP address, receivers IP address, packets, routes

63
Q

HTTP (_______ _____ _______ _______) - Protocol used by ____ _______ to _________ with ___ servers

A

Hyper Text Transfer Protocol, web browsers, communicate, web

64
Q

HTTPS (_______ _____ ______ _______ _______) - More ______ version of _____, it _______ all data

A

Hyper Text Transfer Protocol Secured, secure, HTTP, encrypts

65
Q

FTP (_____ _______ _______) - Protocol used to ______, _____ and move _____ between devices on a ________.

A

File Transfer Protocol, access, edit, files, network

66
Q

POP (_____ ______ _______) - Protocol used to store mail _________ on a ______ until the user has ________ them

A

Post Office Protocol, temporarily, server, downloaded

67
Q

IMAP (________ _______ _______ ________) - Protocol used to store ____ on a server without the needs of the user __________ them.

A

Internet Message Access Protocol, mail, downloading

68
Q

SMTP (_______ ____ ________ ________) - Protocol used to _____ ______.

A

Simple Mail Transfer Protocol, send emails

69
Q

A MAC address is a _______, ________ address that is _________ (can’t change) and is assigned by the __________.

They are __ or __ bit _____ numbers

They are mainly used by the protocols for ________ on ____ for ________ on the same _________.

A

unique, numerical, permanent, manufacturer

48, 64, binary

ethernet, LANs, communication, network

70
Q

IP addresses are used for ________ data between ____/__ networks (e.g. over the internet).

The two types of IP addresses are ______ and _______.

IP addresses can either be __ bit or ____ bit binary number, depending on the ________ of the IP.

A

sending, TCP/IP

static, dynamic

32 bit, 128 bit, version

71
Q

Static IP addresses are _________ addresses.
They’re used to connect _______ on a ____, and for ________ websites on the ________.
Static IP addresses on the ________ are usually very ________.

A

permanent
printers, LAN, hosting, internet
internet, expensive

72
Q

Dynamic IP addresses are _______ when a device ____ __ to a _______, so the device may have a _______ address every time it ________.

ISPs (_______ _______ ________) commonly use dynamic IPs as they are _______ and can be ______.

A

assigned, logs on, network, different, connects

Internet Service Providers, cheap, reused

73
Q

________ Switching is used to ______ the data across ________.

1) The data is _____ into _______
2) Each _______ contains a _______ number which determines the ______ they are _____ in.
3) The _______ reads the packets and _____ them
4) The ________ device ________ the _______ according to the _________ number.
5) The _________ device requests the ______ to resend the _______ if any are packets are _______.
6) _______ checks if the data is _______, if it is an ______ message is _______
7) A _________ message will be sent from the ______ device to the _______ device

A

Packet, direct/send, networks

split, packets
packet, sequence, order, sent
router, sends
receiving, assembles, packets, sequence
receiving, sender, packets, missing
Checksum, corrupted, error, displayed
confirmation, receiving, sending
74
Q

Properties of packets

They have a ______ which contains the _______ information - this contains the _____ and ______ address and the packet _________.

The ______ is the actual ______ of the packet (e.g. a part of an email, doc, web page, etc)

They also have a _______ number which is a form of ________ used to check that the _______ hasn’t been _______ in transit.

A

header, control, source, destination, number

payload, content

checksum, validation, payload, corrupted

75
Q

A layer is a group of ______ which have similar _______.

Layers are ____-______ – ________ in each layer do their job without needing to _____ what is happening in _____ layers.

Each layer _____ the layer _____ it - it does the hidden ____ needed for an action on the layer ______ it.

A

protocols, functions

self-contained, protocols, know, other

serves, above, work, above

76
Q

The 4 types of layers are

  • A_______ layer - Layer 4
  • T_______ layer - Layer 3
  • I_______ layer - Layer 2
  • _____ ____ layer - Layer 1
A

Application, Transport, Internet, Data Link

77
Q

Layer 4 - ________ layer is responsible for turning data into _______ and other ________ and vice versa

Protocol examples include ____, FTP, ____

A

Application, websites, applications

HTTP, SMTP

78
Q

Layer 3 - ________ layer is responsible for controlling _____ ____ (e.g. splitting data into ______ and _______ if they are correctly ____ and delivered)

Protocol example includes ___

A

Transport, data flow, packets, checking, sent

TCP

79
Q

Layer 2 - _______ layer is responsible for making ________ between _______, _______ data _______ and handling ______.

Protocol example includes __

A

Internet, connections, networks, directing, packets, traffic

IP

80
Q

Layer 1 - _____ _____ layer is responsible for _______ data over the _______ network, and for how ___ are sent as ________ _____ over cables, _______ or other hardware.

Protocol example includes _______

A

Data Link, passing, physical, bits, electrical signals, wireless

Ethernet

81
Q

Advantages of using layers
- It breaks network ________ into _________ _____. This helps _______ concentrate on only ___ area of the _______ without having to worry about others

  • As layers are ___-______, they can be ______ without the other ______ being _______.
  • Having __ ____ for each layer forces companies to make ________, universal hardware and _______, so ________ brands will ____ with each other in the same way.
A

communication, manageable pieces, developers, one, network

self-contained, changed, layers, affected

set rules, compatible, software, different, work

82
Q

Frames are ____ sent around a ____, handled by a ______.

A

data, LAN, switch

83
Q

Malware is _______ that can ____ devices by ______/modifying files, locking files and more.

A

software, harm, deleting

84
Q

_______ engineering is the ______ of people (as a ____ point) to give out ________ data

A

social, manipulation/tricking, weak, important

85
Q

Phishing is a type of ______ ________, often sends an ______ or _____ pretending to be a large ________ (e.g. Amazon) in order to gain crucial ____ (e.g. usernames and passwords).

A

social engineering, email, text, organisation/company, data

86
Q

______ force attacks are the use of _______ that uses _____ and _____ to ______ a password

A

Brute, software, trial and error, crack

87
Q

A ______ of _______ attack is when _______ is used to ______ a ___ server with ____ _______ in order to cause the server to _______.

A

Denial of service, software, flood, web, fake requests, crash/go down

88
Q

Data ________ and ______ is when a hacker ______ ____ travelling on a _______ and ________ any _______ pieces of _____/info.

A

interception and theft, monitors data, network, intercepts, valuable, data

89
Q

___ injection is when _______ code is _____ into a websites _____ box to ____, delete or ______ information

A

SQL injection, malicious, entered, input, gain, modify

90
Q

Poor network policy is when the _____ governing a ______ are not ______ enough.

A

rules, network, good/adequate

91
Q

What are all the _____ posed to networks?

  • M_______
  • P_______
  • _______ ________
  • _______ force _______
  • ________ of ________ ________
  • _____ _________ and ______
  • ____ injection
  • ____ network _______
A

threats

Malware
Phishing
Social Engineering
Brute force attacks
Denial of service attacks
Data interception and theft
SQL injection
Poor network policy
92
Q

__________ testing is when _________ employ _______ to simulate potential _______ on their _______ in order to find _________.

A

Penetration, organisations/companies, hackers, attacks, networks, vulnerabilities

93
Q

________ f______ are _________ undertaken to find the ____ of _______ on a network

A

Network forensics, investigations, cause, attacks

94
Q

A _______ p_____ is the ____ governing a _______.

Having a _____ ______ p_____ will help prevent ______.

A

Network policy, rules, network

Good network policy,

95
Q

____ - _______ software is designed to ____ and stop _______ from ________ a network and the ______ connected

A

Anti-malware, find, malware, affecting, devices

96
Q

A f_______ is used to block ________ ______.

It _______ all data ________ and _______ the _______ to block any potential _______.

A

firewall, unauthorised access

monitors, entering, leaving, network, threats

97
Q

____ ______ levels ______ which parts of a _______ different _____ of _____ can _______.

A

User access, control, network, groups, users, access

98
Q

P_______ help prevent ________ ____ from _______ the network.

P______ should be _____ - they should be many ________ long, use a _______ of letters, _______ and symbols, and be ______ regularly.

A

Passwords, unauthorised users, accessing

Passwords, strong, characters, combination, numbers, changed/updated

99
Q

E_______ is when data is _______ into a ____ which can only be cracked with the correct ____.

E_______ is used to prevent _________ access.

A

Encryption, translated, code, key

Encryption, unauthorised

100
Q

All the methods of preventing ______ on a network

  • _________ testing
  • _________ f______
  • Good _______ ______
  • ____ - _______ software
  • F_______
  • _____ ______ levels
  • P________
  • E________
A

threats

Penetration
Network Forensics
Good Network Policies
Anti-Malware software
Firewalls
User Access Levels
Passwords
Encryption
101
Q

System software is designed to ___ and _______ a _______ system.

A

run, maintain, computer

102
Q

__________ systems manage ________ and run ________, examples include Windows, MacOS etc

The functions of an OS are
- _________ with _______ and external _______ via device _______

  • Provide a user _________ which allows the ____ to __________ with the computer
  • Provide a _________ for different ________ to run
  • Allow the computer to _____-____ by ________ memory and the ___.
  • Deal with ___ and ___ management
  • Manage system _______ and user _______.

Check CGP page 8-9 for more details

You can ignore this flashcard

A

Operating, hardware, software

Communicate, internal, hardware, drivers

interface, user, communicate

platform, applications

multi-task, managing, CPU

file, disk

security, accounts

103
Q

The functions of an operating system

  • ______ interface
  • _______ management/_____-tasking
  • ________ management and d_____
  • U____ management
  • F____ management
A
user,
memory, multi
peripheral, drivers
User
File
104
Q

A ______ interface allows the user to ______ with the ________ system.

The two types of UIs are GUIs (_________ _____ ________) and _______-____ interface

A

user, interact/communicate, computer

Graphical User Interface, Command Line

105
Q

GUIs are the most ________ type - they’re designed to be ____ for ________ users by making them _____, ________ and intuitive.

GUIs are ________ for specific _____ methods. In the past, they used to be WIMP - based (_______, ____, _____ and ______). iOS and stuff were created for ________ devices, using finger ______ (e.g. swiping) in place of using a ________.

A

common/popular, easy, everyday, visual, interactive

optimised, input, windows icons menus and pointers, touchscreen, gestures, mouse

106
Q

A ________- _____ interface is ____ based. The users enter specific ________ go complete ____. They are less ________ heavy than ____.

They can be far more _______ and ________ than ___ for advanced users.

They can ________ processes using _______.

A

command-line, text, commands, tasks, resource, GUIs

efficient, power, GUIs

automate, scripts

107
Q

The OS helps the ___ carry out _____-______ by efficiently _______ memory and ____ processing time

  • When an _______ is opened, the OS moves ________ parts of the ________ to ________, followed by additional parts if they are _________.
    _________ and features that aren’t recent may be _______ from memory
  • To run multiple _______, the OS needs to make sure the _________ don’t ________ or ________ with each other. A memory________ allocates certain _______ certain ______ ________, to make sure their _______ are placed in separate _________.
  • Only _ application can be ________ at a time by the ___, so other _______ must wait. The OS ______ ___ time between _________ and may _______ some over others in order to be _______ in the most _______ order.
  • The OS may also ________ the movement of ___ to and from _______ _______.
A

CPU, multi-tasking, managing, CPU

application, necessary, application, memory, required, applications, removed

applications, applications, interfere, overwrite, manager, applications, memory addresses, processes, locations

1, processed, CPU, proccesses, divides CPU, applications, prioritise, processed, efficient

organise/manage, data, virtual memory

108
Q

The OS helps the ___ carry out _____-______ by efficiently _______ memory and ____ processing time

  • When an _______ is opened, the OS moves ________ parts of the ________ to ________, followed by additional parts if they are _________.
    _________ and features that aren’t recent may be _______ from memory
  • To run multiple _______, the OS needs to make sure the _________ don’t ________ or ________ with each other. A memory________ allocates certain _______ certain ______ ________, to make sure their _______ are placed in separate _________.
  • Only _ application can be ________ at a time by the ___, so other _______ must wait. The OS ______ ___ time between _________ and may _______ some over others in order to be _______ in the most _______ order.
  • The OS may also ________ the movement of ___ to and from _______ _______.
A

CPU, multi-tasking, managing, CPU

application, necessary, application, memory, required, applications, removed

applications, applications, interfere, overwrite, manager, applications, memory addresses, processes, locations

1, processed, CPU, processes, divides CPU, applications, prioritise, processed, efficient

organise/manage, data, virtual memory

109
Q

OSs use device ______ software to communicate with ______ hardware or ________ connected.

  • Every piece of _______ connected to the _______ system requires a ______ driver. ______ act as a ________ for the ______ between OS and _______.
  • When a computer is booted up, the OS will select the correct ______ drivers for the _______ it _____. New _______ will be installed for any new ________ connected.
  • Updates to device ______ can fix ___, add _____ or improve _________, they can be installed _______ by the user or _________ by the OS.
A

driver, internal, peripherals

hardware, computer, device, drivers, translator, signals, hardware

device, hardware, detects, drivers, hardware

drivers, bugs, features, performance, manually, automatically

110
Q

OSs can be S_____- user (where only ___ user can use the _______ at ____) or _____-user (where _____ users can use the _______ at ______).

OS also deals with ____ _______ control. These ____ _______ allow different users to have _______ to ______ data or ________ on a system,

On most OSs, each ____ has access to their own _______ ____ and _______, but can’t access other user’s ________ ____.

____ ______ usually require _______, ___ or some sort of ________ to grant ______ to the account.

A

Single, one, computer, once/one time, Multi, multiple, system, once/one time

user account, user accounts, access, specific, resources

user, personal data, desktop, personal data

User accounts, passwords, PINs, authentication, access

111
Q

U_____ ______ _______ helps to ________ and _______ a computer. The 4 we need to know are

  • D_______ ______
  • B_______ ______
  • C________ ________
  • E________ ________
A

Utility System Software, maintain, configure

  • Defragmentation Utility
  • Backup Utility
  • Compression Software
  • Encryption Software
112
Q

D_______ ______ put _____ up ____ back _______.

1) Files are ____ on ____ ____ in available _____. Ideally, entire ___ would be _____ together
2) As files are _____, deleted and change ___, lots of small ___ begin to appear on the ____. The OS ____ files into smaller ____ to fill these ___ when ______ data.
3) Over ___ the ___ becomes more and more _________ (data more _____ apart). - This slows _____ and _____ speeds as the ____/____ ____ has to move back and _____ across the ____.
4) ________ software __-_______ data on the ____ ____ to put ________ files back _________. It also ____ files to collect all the ____ space _______. This helps to ______ further d________.

F_______ doesn’t cause any problems for ____.
D_______ ____ can actually ______ the l_____ of the ____ since they have ______ number of _____ and _____.

A

Defragmentation utilities, broken, files, together

stored, hard disks, spaces, file, stored

modified, size, gaps, disk, splits, blocks/parts, gaps, writing

time, data, fragmented, further, read, write, read/write head, forth, disk

Defragmentation, re-organises, hard disk, fragmented, together, moves, free, together, prevent, defragmentation

Fragmentation, SSDs, Defragmenting SSDs, shorten, lifespan, SSD, limited, read and writes

113
Q

A b_______ is a ____ of a system’s files and ______ stored ________. - So data can be _______ if data ____ occurs (coz of fires, loss of power etc).

The 2 types of b______ are.

  • ____ ______
  • _________ _______
A

backup, copy, settings, externally, recovered, loss

backups

  • Full backup
  • Incremental backup
114
Q

____ backup is where a ____ is taken of _____ file on the ______. They use a lot of _______, takes ____ to perform, but is ______ to re____ from.

A

Full, copy, every, system, storage, long, faster, restore

115
Q

_________ backups is where only the files ______ or ______ since the ____ ______ are copied. They take up l___ ______, are ______ to perform, but a ___ system re____ is ____ since the last ___ backup as well as every ________ backup after it has to be _______.

A

Incremental, created, edited, last backup, less storage, faster, full, restore, slow, full, incremental, restored.

116
Q

C_______ _______ reduces the ____ of files so they take up less ______.
Used often on the _______ to make files ______ to _______/______. File ______ include .___ and .rar, C______ files need to be _______ before they can be _____.

A

Compression software, size, storage,

internet, quicker, download/upload, formats, .zip

Compressed, extracted, used

117
Q

E_______ software _____ data to stop ____-_____ from ________ the data.
The E______ data can only be ________ using a special ___.

A

Encryption, scrambles, third-parties, accessing,

Encrypted, decrypted, key

118
Q

The two types of software are

  • ____ ____ software
  • ________ software
A

Open source

Propietary

119
Q

____ _____ software (eg Linux) is where the ______ code is made freely _______.
Users can ______ modify the _____ code to make their own ______ of the software, which can be _____ under the same _______ and _____ as the original ________.

Popular ____ _____ software are ______ by a strong _____ _______, where users can actively ____ to _______ the software by suggesting ___ fixes or ________ to the original ________.

A

Open source, source, available

legally, source, version, shared, licence, terms, software]

open source, supported, online community, help, improve, bug, improvements, developers

120
Q

The advantages of ___ ____ software are

  • Usually ____ of charge
  • Software can be ______ by users to meet their ____
  • Lots of ________ can be more creative and _______ than the _________ of one company
  • ______ software is very ______ and secure - _______ can quickly be solved by the __________.
A

open source

free
adapted/modified, needs
collaborators, innovative, developers
Popular, reliable, problems, community

121
Q

The disadvantages of ___ ____ software are

  • No _______ if something goes wrong
  • No _______ _______
  • Small projects may not get regular _______, so they can be _____ and have _______ flaws.
  • ______ code can’t be ______ away from other people, such as _________.
A

open source

warranties
customer support
updates, buggy, security
source, hidden, competitors

122
Q

_______ _______ is software where only the ______ code (eg .exe file) is released, the ______ code is ______.

_______ software licences ______ the _______, copying and r________ of the software. They are usually ____ for.

________ use this type of _______ as it tends to have ______ and reliable ______ ______ when compared to ____ _____ software.

A

Proprietary Software, compiled, source, hidden

Proprietary, restrict, modification, redistribution, paid

Businesses, software, better, customer service, open source

123
Q

Advantages of _______ software are

  • Comes with _______, documentation and _______ ______
  • Fixes and ______ come _______
  • Usually is well-_____ and _______
  • _______ in cost for companies than _________ their own ______ software
A

proprietary

warranties, customer support

updates, regularly
tested, reliable
Cheaper, developing, custom

124
Q

Disadvantages of ________ software are

  • Can be ________ in cost
  • Software may not _____ the user’s _____, and they can’t do anything about that
  • Older software may not be _______ after some years, which forces businesses to spend _____ to _______ later on.
A

proprietary

expensive

meet, needs

supported, money, upgrade