Unit 1 - J276 Flashcards
CPU (______ ________ _____) - The ______ of the computer. It carries out instructions. It ______, ______ and ________ instructions from the ____.
Central Processing Unit, brain, fetches, decodes, executes , RAM
The Von Neumann Architecture consists of ;
- ____
- MDR
- _______ _____
- _________
MAR
Program Counter
Accumulator
MAR (________ _______ ________) - Stores the _______ ________ of ____ that needs to be _______.
Memory Address Register, memory address, data, accessed
MDR (_______ _____ ________) - Stores _____ that is being _____ from or ____ to memory.
Memory Data Register, data, fetched, sent
Program Counter - Stores the ________ ________ of the ______ _________ to be executed.
memory address, next instruction
Accumulator (____) - Stores the results of any ________ or _______ operations carried out by the ___.
ACC, arithmetic, logical, ALU
ALU (________ ______ _____) - Performs all ________ (add, subtract etc) and _____ (AND, OR, NOT etc) _________.
Arithmetic Logic Unit, arithmetic, logical, operations
CU - (_______ _____) - Sends ______ _______ to all ________ and controls the ______ of _____ in the CPU.
Control Unit, direct operations, components, flow, data
Cache - ______ speed, volatile _______ in the ____ that contains _______ used ________.
High, memory, CPU, frequently, instructions
Fetch, decode & execute cycle - Instructions are _____ from the memory. _______ in to ________ ____, and then ________ (carried out).
This cycle is ________.
fetched, decoded, machine code, executed
repeated
Factors that affect CPU performance
- ______ speed
- Number of _____
- ______ size
Clock
Cores
Cache
Clock speed - Measured in ____, it is the amount of _____, ______ and ______ cycles carried out per ______.
GHz, fetch decode and execute, second
Cores - A part of the _________ that performs the ______, ______ and _______ cycle.
The more cores you have, the more ________ can be executed __________.
processor, fetch decode and execute,
instructions, simultaneously
Embedded System - A device with a _________ _______ inside of it that is designed to carry out a ______ function _________ and ________.
Examples include microwaves, sat navs, fridges etc
computer system, specific, effectively and efficiently
ROM (______ ____ _______) - Non - _______ memory that stores _____ __ instructions (BIOS) and is ______ only.
Data in ROM cannot be _______.
Read Only Memory, volatile, boot up, read
changed
RAM (________ _______ _______) - _______ memory that stores ____ for _______ currently in ___.
Random Access Memory, Volatile, data, programs, use
Differences between RAM & ROM
- ROM is ___ _______, RAM isn’t
- Data in RAM can be _______, in ROM it can’t
- ROM stores data _______, RAM stores them _________.
non volatile
changed
forever, temporarily
________ memory is need to store more _____ for ________ currently in ____ when the RAM is ______.
Virtual, data, programs, use, full
_______ memory is when some memory in ________ storage (e.g. hard drive) is ________ to store _______ temporarily.
Virtual, secondary, allocated, data
Flash memory - non ______ memory that can be _________ erased and _______.
volatile, electronically, reprogrammed
________ storage is needed to allow devices to store ______ in the _____ _____.
Examples include HDDs, SSDs, Magnetic Storage etc
Secondary, data, long term
Optical Storage uses ______ to _______ data on a _____. (e.g CD, DVD, Blu Ray
- ___ capacity
- ______ speed
- Portable
- Can get scratched - not _______ or _______
- Quite ______
lasers, engrave, disk
Small
Slow
Durable, reliable
Cheap
Magnetic Storage uses _______ to ______ and _____ data. Examples include HDDs
- _____ capacity
- _______ speed
- Not very ______
- Not very ______ due to moving parts
- Quite ______
- Quite _____
magnets, read, write
High Average portable durable reliable cheap
Solid State storage uses _______ _____ to store data. They have no ________ ______. Examples include USB, SD cards and SSDs.
- \_\_\_\_\_\_\_\_ \_\_\_\_\_ capacity \_\_\_\_\_\_ speed - Portable - No moving parts so \_\_\_\_\_\_\_ - Reliable - Very \_\_\_\_\_\_.
memory chips, moving parts
Limitedly high
High
durable
expensive
Capacity - How much ______ the storage device has
memory
Speed - How _____ the storage device is
fast
Portability - How easy it is to ______/_______ the storage device
carry/transport
Durability - The storage device’s ability to withstand _____ and _______.
wear, damage
Characteristics to consider for Secondary Storage
- C_______
- S_____
- P_______
- D_______
- R______
- C____
Capacity Speed Portability Durability Reliability Cost
LAN (_____ ____ _______) - a network that covers a ______ _________ ______.
It uses _______ equipment
Local Area Network, small geographical area
internal
WAN (____ ____ _______) - a network that covers a ______ ________ _____ and requires ________ equipment.
Wide Area Network, large geographical area, external
Factors that affect network performance
- B________
- Number of ______
- ______ (Amount of data being sent)
- ___________ Media
Bandwidth
Devices
Traffic
Transmission
Bandwidth is just the _______ of the network
speed
Number of _______.
The more devices connected to a network, the _____ the network as more _____ will be _________ between devices due to high amounts of _______ and _______.
devices
slower, data, transferred, devices, demand
Traffic (Amount of data)
The more data the network has to handle, the ______ the network as it needs more ______ to _______ the data which ______ the process down.
slower, time, transfer, slows
Transmission Media is how the data is _______ (e.g. WiFi or Ethernet).
Data transferred wirelessly tend to be _______ and less ________ in speed compared to wired variants.
travelling
slower, consistent/reliable
Client Server Network - Network where all _______ are connected to a _______ _______.
devices, central server
Peer to Peer Network - Network where all _______ are connected to ______ _____.
devices, each other
Hardware required to _______ devices in a LAN.
- WAP (________ ______ _____)
- S_____
- R_____
- NIC (________ ________ ______)
connect
Wireless Access Point
Switch
Router
Network Interface Card
WAP (_________ _______ _______) - Type of hardware that allows a device to ________ connect to a _______.
Wireless Access Point, wirelessly, network
A switch is a piece of hardware which has many ________ ports and are used to ________ devices on a ____.
Switches receive _____ (in units called _______) from one device and ________ this data to the device on the network with the correct ____ ________.
ethernet, connect, LAN
data, frame, transmit, MAC address
A router is a piece of hardware that ________ ____ between ____ or more different _________.
transmits data, two, networks
NIC (_________ _______ _____) - An expansion _____ that enables computers to ________ to other _________/ a _________
Network Interface Card, card, connect, computers, network
WiFi/Wireless uses ______ waves to _______ data. Up to _____ mbps.
radio, transfer, 600
Copper cables transmit ______ using ________.
E.g. Ethenet. Speed up to _ gbps.
signals, electricity
1
______-optic cables ________ data using _______.
_____ in speed, don’t suffer from _______ interference and can _______ data over _____ distances. Speed up to __ gbps
Fibre, transmit, light
Fast, signal, transmit, large/long, 10
The internet is a set of global __________ networks
interconnected
DNS (_______ _____ _______) - _________ the URL of a website into an __ _______.
Domain Name Server, Translates, IP address
Hosting is when you ______ files on a ________
store, server
The cloud is ________ or _____ services provided over a ________.
software, data, network
A Hub is similar to a ______ but it sends ____ to ____ devices instead of _______ to the desired device.
switch, data, all, directly
Virtual Network is the _________ of an existing physical ________ into ________ networks.
portioning/splitting up, network, seperate
A Star Topology is when all ________ are connected to a _______ ______.
All data first goes to the _______ _______ which then sends the data to its __________.
devices, central server
central server, destination
A Mesh Topology is when all _______ are connected to ____ _____.
devices, each other
WiFi has 2 ________ bands - ____ GHz and _ GHz
_____ GHz has greater ______ and is better at going through ________ (like walls) but is ______ than _GHz
_ GHz has a larger _______ but less ______ and is more worse than _____GHz and going through _______.
frequency, 2.4GHz, 5GHz
2.4GHz, range, obstacles, slower, 5GHz
5GHz, bandwidth/speed, range, 2.4GHz, obstacles
The frequency bands of WiFi are split into _______ _______ that each cover a small ________ _____.
numbered channels, frequency range
WiFi performance is affected by ________ between networks using ________ channels. To avoid this only certain channels that are _______ apart are usually used.
_ GHz has more ___- ________ channels than ____GHz, so it has less __________ overall.
interference, adjacent/near-by, spaced
5GHz, non-overlapping, 2.4GHz, interference
Encryption is when data is _______ into a ____ which can only be cracked with the correct ____.
Encryption is used to prevent _________ access.
translated, code, key
unauthorised
Ethernet cables are used to _______ devices on a ___
Cat _, __ and _ ethernet cables are the most common, they have pairs of _______ wires ______ together to reduce _______ __________.
Slowest to fastest in speed
Cat _, Cat __, Cat _
connect, LAN
5, 5e, 6, copper, twisted, internal interference
5, 5e, 6
Coaxial ethernet cables has a ______ _______ wire surrounded by a ______ or _______ mesh to shield _______ _________.
single copper, plastic, metal, external interference
TCP (_________ _______ ________) - Sets the ____ for how devices _______ to a network.
It is responsible for ________ the data into _______ and __________ them whilst ________ if the data has been _____ correctly.
Transmission Control Protocol, rules, connect
splitting, packets, reassembling, checking, sent
IP (_________ _________) - Used for sending ____ across a _________. Gives it the senders __ _______ and the _______ __ _______. Sends _______ via different _______.
Internet Protocol, data, network, IP address, receivers IP address, packets, routes
HTTP (_______ _____ _______ _______) - Protocol used by ____ _______ to _________ with ___ servers
Hyper Text Transfer Protocol, web browsers, communicate, web
HTTPS (_______ _____ ______ _______ _______) - More ______ version of _____, it _______ all data
Hyper Text Transfer Protocol Secured, secure, HTTP, encrypts
FTP (_____ _______ _______) - Protocol used to ______, _____ and move _____ between devices on a ________.
File Transfer Protocol, access, edit, files, network
POP (_____ ______ _______) - Protocol used to store mail _________ on a ______ until the user has ________ them
Post Office Protocol, temporarily, server, downloaded
IMAP (________ _______ _______ ________) - Protocol used to store ____ on a server without the needs of the user __________ them.
Internet Message Access Protocol, mail, downloading
SMTP (_______ ____ ________ ________) - Protocol used to _____ ______.
Simple Mail Transfer Protocol, send emails
A MAC address is a _______, ________ address that is _________ (can’t change) and is assigned by the __________.
They are __ or __ bit _____ numbers
They are mainly used by the protocols for ________ on ____ for ________ on the same _________.
unique, numerical, permanent, manufacturer
48, 64, binary
ethernet, LANs, communication, network
IP addresses are used for ________ data between ____/__ networks (e.g. over the internet).
The two types of IP addresses are ______ and _______.
IP addresses can either be __ bit or ____ bit binary number, depending on the ________ of the IP.
sending, TCP/IP
static, dynamic
32 bit, 128 bit, version
Static IP addresses are _________ addresses.
They’re used to connect _______ on a ____, and for ________ websites on the ________.
Static IP addresses on the ________ are usually very ________.
permanent
printers, LAN, hosting, internet
internet, expensive
Dynamic IP addresses are _______ when a device ____ __ to a _______, so the device may have a _______ address every time it ________.
ISPs (_______ _______ ________) commonly use dynamic IPs as they are _______ and can be ______.
assigned, logs on, network, different, connects
Internet Service Providers, cheap, reused
________ Switching is used to ______ the data across ________.
1) The data is _____ into _______
2) Each _______ contains a _______ number which determines the ______ they are _____ in.
3) The _______ reads the packets and _____ them
4) The ________ device ________ the _______ according to the _________ number.
5) The _________ device requests the ______ to resend the _______ if any are packets are _______.
6) _______ checks if the data is _______, if it is an ______ message is _______
7) A _________ message will be sent from the ______ device to the _______ device
Packet, direct/send, networks
split, packets packet, sequence, order, sent router, sends receiving, assembles, packets, sequence receiving, sender, packets, missing Checksum, corrupted, error, displayed confirmation, receiving, sending
Properties of packets
They have a ______ which contains the _______ information - this contains the _____ and ______ address and the packet _________.
The ______ is the actual ______ of the packet (e.g. a part of an email, doc, web page, etc)
They also have a _______ number which is a form of ________ used to check that the _______ hasn’t been _______ in transit.
header, control, source, destination, number
payload, content
checksum, validation, payload, corrupted
A layer is a group of ______ which have similar _______.
Layers are ____-______ – ________ in each layer do their job without needing to _____ what is happening in _____ layers.
Each layer _____ the layer _____ it - it does the hidden ____ needed for an action on the layer ______ it.
protocols, functions
self-contained, protocols, know, other
serves, above, work, above
The 4 types of layers are
- A_______ layer - Layer 4
- T_______ layer - Layer 3
- I_______ layer - Layer 2
- _____ ____ layer - Layer 1
Application, Transport, Internet, Data Link
Layer 4 - ________ layer is responsible for turning data into _______ and other ________ and vice versa
Protocol examples include ____, FTP, ____
Application, websites, applications
HTTP, SMTP
Layer 3 - ________ layer is responsible for controlling _____ ____ (e.g. splitting data into ______ and _______ if they are correctly ____ and delivered)
Protocol example includes ___
Transport, data flow, packets, checking, sent
TCP
Layer 2 - _______ layer is responsible for making ________ between _______, _______ data _______ and handling ______.
Protocol example includes __
Internet, connections, networks, directing, packets, traffic
IP
Layer 1 - _____ _____ layer is responsible for _______ data over the _______ network, and for how ___ are sent as ________ _____ over cables, _______ or other hardware.
Protocol example includes _______
Data Link, passing, physical, bits, electrical signals, wireless
Ethernet
Advantages of using layers
- It breaks network ________ into _________ _____. This helps _______ concentrate on only ___ area of the _______ without having to worry about others
- As layers are ___-______, they can be ______ without the other ______ being _______.
- Having __ ____ for each layer forces companies to make ________, universal hardware and _______, so ________ brands will ____ with each other in the same way.
communication, manageable pieces, developers, one, network
self-contained, changed, layers, affected
set rules, compatible, software, different, work
Frames are ____ sent around a ____, handled by a ______.
data, LAN, switch
Malware is _______ that can ____ devices by ______/modifying files, locking files and more.
software, harm, deleting
_______ engineering is the ______ of people (as a ____ point) to give out ________ data
social, manipulation/tricking, weak, important
Phishing is a type of ______ ________, often sends an ______ or _____ pretending to be a large ________ (e.g. Amazon) in order to gain crucial ____ (e.g. usernames and passwords).
social engineering, email, text, organisation/company, data
______ force attacks are the use of _______ that uses _____ and _____ to ______ a password
Brute, software, trial and error, crack
A ______ of _______ attack is when _______ is used to ______ a ___ server with ____ _______ in order to cause the server to _______.
Denial of service, software, flood, web, fake requests, crash/go down
Data ________ and ______ is when a hacker ______ ____ travelling on a _______ and ________ any _______ pieces of _____/info.
interception and theft, monitors data, network, intercepts, valuable, data
___ injection is when _______ code is _____ into a websites _____ box to ____, delete or ______ information
SQL injection, malicious, entered, input, gain, modify
Poor network policy is when the _____ governing a ______ are not ______ enough.
rules, network, good/adequate
What are all the _____ posed to networks?
- M_______
- P_______
- _______ ________
- _______ force _______
- ________ of ________ ________
- _____ _________ and ______
- ____ injection
- ____ network _______
threats
Malware Phishing Social Engineering Brute force attacks Denial of service attacks Data interception and theft SQL injection Poor network policy
__________ testing is when _________ employ _______ to simulate potential _______ on their _______ in order to find _________.
Penetration, organisations/companies, hackers, attacks, networks, vulnerabilities
________ f______ are _________ undertaken to find the ____ of _______ on a network
Network forensics, investigations, cause, attacks
A _______ p_____ is the ____ governing a _______.
Having a _____ ______ p_____ will help prevent ______.
Network policy, rules, network
Good network policy,
____ - _______ software is designed to ____ and stop _______ from ________ a network and the ______ connected
Anti-malware, find, malware, affecting, devices
A f_______ is used to block ________ ______.
It _______ all data ________ and _______ the _______ to block any potential _______.
firewall, unauthorised access
monitors, entering, leaving, network, threats
____ ______ levels ______ which parts of a _______ different _____ of _____ can _______.
User access, control, network, groups, users, access
P_______ help prevent ________ ____ from _______ the network.
P______ should be _____ - they should be many ________ long, use a _______ of letters, _______ and symbols, and be ______ regularly.
Passwords, unauthorised users, accessing
Passwords, strong, characters, combination, numbers, changed/updated
E_______ is when data is _______ into a ____ which can only be cracked with the correct ____.
E_______ is used to prevent _________ access.
Encryption, translated, code, key
Encryption, unauthorised
All the methods of preventing ______ on a network
- _________ testing
- _________ f______
- Good _______ ______
- ____ - _______ software
- F_______
- _____ ______ levels
- P________
- E________
threats
Penetration Network Forensics Good Network Policies Anti-Malware software Firewalls User Access Levels Passwords Encryption
System software is designed to ___ and _______ a _______ system.
run, maintain, computer
__________ systems manage ________ and run ________, examples include Windows, MacOS etc
The functions of an OS are
- _________ with _______ and external _______ via device _______
- Provide a user _________ which allows the ____ to __________ with the computer
- Provide a _________ for different ________ to run
- Allow the computer to _____-____ by ________ memory and the ___.
- Deal with ___ and ___ management
- Manage system _______ and user _______.
Check CGP page 8-9 for more details
You can ignore this flashcard
Operating, hardware, software
Communicate, internal, hardware, drivers
interface, user, communicate
platform, applications
multi-task, managing, CPU
file, disk
security, accounts
The functions of an operating system
- ______ interface
- _______ management/_____-tasking
- ________ management and d_____
- U____ management
- F____ management
user, memory, multi peripheral, drivers User File
A ______ interface allows the user to ______ with the ________ system.
The two types of UIs are GUIs (_________ _____ ________) and _______-____ interface
user, interact/communicate, computer
Graphical User Interface, Command Line
GUIs are the most ________ type - they’re designed to be ____ for ________ users by making them _____, ________ and intuitive.
GUIs are ________ for specific _____ methods. In the past, they used to be WIMP - based (_______, ____, _____ and ______). iOS and stuff were created for ________ devices, using finger ______ (e.g. swiping) in place of using a ________.
common/popular, easy, everyday, visual, interactive
optimised, input, windows icons menus and pointers, touchscreen, gestures, mouse
A ________- _____ interface is ____ based. The users enter specific ________ go complete ____. They are less ________ heavy than ____.
They can be far more _______ and ________ than ___ for advanced users.
They can ________ processes using _______.
command-line, text, commands, tasks, resource, GUIs
efficient, power, GUIs
automate, scripts
The OS helps the ___ carry out _____-______ by efficiently _______ memory and ____ processing time
- When an _______ is opened, the OS moves ________ parts of the ________ to ________, followed by additional parts if they are _________.
_________ and features that aren’t recent may be _______ from memory - To run multiple _______, the OS needs to make sure the _________ don’t ________ or ________ with each other. A memory________ allocates certain _______ certain ______ ________, to make sure their _______ are placed in separate _________.
- Only _ application can be ________ at a time by the ___, so other _______ must wait. The OS ______ ___ time between _________ and may _______ some over others in order to be _______ in the most _______ order.
- The OS may also ________ the movement of ___ to and from _______ _______.
CPU, multi-tasking, managing, CPU
application, necessary, application, memory, required, applications, removed
applications, applications, interfere, overwrite, manager, applications, memory addresses, processes, locations
1, processed, CPU, proccesses, divides CPU, applications, prioritise, processed, efficient
organise/manage, data, virtual memory
The OS helps the ___ carry out _____-______ by efficiently _______ memory and ____ processing time
- When an _______ is opened, the OS moves ________ parts of the ________ to ________, followed by additional parts if they are _________.
_________ and features that aren’t recent may be _______ from memory - To run multiple _______, the OS needs to make sure the _________ don’t ________ or ________ with each other. A memory________ allocates certain _______ certain ______ ________, to make sure their _______ are placed in separate _________.
- Only _ application can be ________ at a time by the ___, so other _______ must wait. The OS ______ ___ time between _________ and may _______ some over others in order to be _______ in the most _______ order.
- The OS may also ________ the movement of ___ to and from _______ _______.
CPU, multi-tasking, managing, CPU
application, necessary, application, memory, required, applications, removed
applications, applications, interfere, overwrite, manager, applications, memory addresses, processes, locations
1, processed, CPU, processes, divides CPU, applications, prioritise, processed, efficient
organise/manage, data, virtual memory
OSs use device ______ software to communicate with ______ hardware or ________ connected.
- Every piece of _______ connected to the _______ system requires a ______ driver. ______ act as a ________ for the ______ between OS and _______.
- When a computer is booted up, the OS will select the correct ______ drivers for the _______ it _____. New _______ will be installed for any new ________ connected.
- Updates to device ______ can fix ___, add _____ or improve _________, they can be installed _______ by the user or _________ by the OS.
driver, internal, peripherals
hardware, computer, device, drivers, translator, signals, hardware
device, hardware, detects, drivers, hardware
drivers, bugs, features, performance, manually, automatically
OSs can be S_____- user (where only ___ user can use the _______ at ____) or _____-user (where _____ users can use the _______ at ______).
OS also deals with ____ _______ control. These ____ _______ allow different users to have _______ to ______ data or ________ on a system,
On most OSs, each ____ has access to their own _______ ____ and _______, but can’t access other user’s ________ ____.
____ ______ usually require _______, ___ or some sort of ________ to grant ______ to the account.
Single, one, computer, once/one time, Multi, multiple, system, once/one time
user account, user accounts, access, specific, resources
user, personal data, desktop, personal data
User accounts, passwords, PINs, authentication, access
U_____ ______ _______ helps to ________ and _______ a computer. The 4 we need to know are
- D_______ ______
- B_______ ______
- C________ ________
- E________ ________
Utility System Software, maintain, configure
- Defragmentation Utility
- Backup Utility
- Compression Software
- Encryption Software
D_______ ______ put _____ up ____ back _______.
1) Files are ____ on ____ ____ in available _____. Ideally, entire ___ would be _____ together
2) As files are _____, deleted and change ___, lots of small ___ begin to appear on the ____. The OS ____ files into smaller ____ to fill these ___ when ______ data.
3) Over ___ the ___ becomes more and more _________ (data more _____ apart). - This slows _____ and _____ speeds as the ____/____ ____ has to move back and _____ across the ____.
4) ________ software __-_______ data on the ____ ____ to put ________ files back _________. It also ____ files to collect all the ____ space _______. This helps to ______ further d________.
F_______ doesn’t cause any problems for ____.
D_______ ____ can actually ______ the l_____ of the ____ since they have ______ number of _____ and _____.
Defragmentation utilities, broken, files, together
stored, hard disks, spaces, file, stored
modified, size, gaps, disk, splits, blocks/parts, gaps, writing
time, data, fragmented, further, read, write, read/write head, forth, disk
Defragmentation, re-organises, hard disk, fragmented, together, moves, free, together, prevent, defragmentation
Fragmentation, SSDs, Defragmenting SSDs, shorten, lifespan, SSD, limited, read and writes
A b_______ is a ____ of a system’s files and ______ stored ________. - So data can be _______ if data ____ occurs (coz of fires, loss of power etc).
The 2 types of b______ are.
- ____ ______
- _________ _______
backup, copy, settings, externally, recovered, loss
backups
- Full backup
- Incremental backup
____ backup is where a ____ is taken of _____ file on the ______. They use a lot of _______, takes ____ to perform, but is ______ to re____ from.
Full, copy, every, system, storage, long, faster, restore
_________ backups is where only the files ______ or ______ since the ____ ______ are copied. They take up l___ ______, are ______ to perform, but a ___ system re____ is ____ since the last ___ backup as well as every ________ backup after it has to be _______.
Incremental, created, edited, last backup, less storage, faster, full, restore, slow, full, incremental, restored.
C_______ _______ reduces the ____ of files so they take up less ______.
Used often on the _______ to make files ______ to _______/______. File ______ include .___ and .rar, C______ files need to be _______ before they can be _____.
Compression software, size, storage,
internet, quicker, download/upload, formats, .zip
Compressed, extracted, used
E_______ software _____ data to stop ____-_____ from ________ the data.
The E______ data can only be ________ using a special ___.
Encryption, scrambles, third-parties, accessing,
Encrypted, decrypted, key
The two types of software are
- ____ ____ software
- ________ software
Open source
Propietary
____ _____ software (eg Linux) is where the ______ code is made freely _______.
Users can ______ modify the _____ code to make their own ______ of the software, which can be _____ under the same _______ and _____ as the original ________.
Popular ____ _____ software are ______ by a strong _____ _______, where users can actively ____ to _______ the software by suggesting ___ fixes or ________ to the original ________.
Open source, source, available
legally, source, version, shared, licence, terms, software]
open source, supported, online community, help, improve, bug, improvements, developers
The advantages of ___ ____ software are
- Usually ____ of charge
- Software can be ______ by users to meet their ____
- Lots of ________ can be more creative and _______ than the _________ of one company
- ______ software is very ______ and secure - _______ can quickly be solved by the __________.
open source
free
adapted/modified, needs
collaborators, innovative, developers
Popular, reliable, problems, community
The disadvantages of ___ ____ software are
- No _______ if something goes wrong
- No _______ _______
- Small projects may not get regular _______, so they can be _____ and have _______ flaws.
- ______ code can’t be ______ away from other people, such as _________.
open source
warranties
customer support
updates, buggy, security
source, hidden, competitors
_______ _______ is software where only the ______ code (eg .exe file) is released, the ______ code is ______.
_______ software licences ______ the _______, copying and r________ of the software. They are usually ____ for.
________ use this type of _______ as it tends to have ______ and reliable ______ ______ when compared to ____ _____ software.
Proprietary Software, compiled, source, hidden
Proprietary, restrict, modification, redistribution, paid
Businesses, software, better, customer service, open source
Advantages of _______ software are
- Comes with _______, documentation and _______ ______
- Fixes and ______ come _______
- Usually is well-_____ and _______
- _______ in cost for companies than _________ their own ______ software
proprietary
warranties, customer support
updates, regularly
tested, reliable
Cheaper, developing, custom
Disadvantages of ________ software are
- Can be ________ in cost
- Software may not _____ the user’s _____, and they can’t do anything about that
- Older software may not be _______ after some years, which forces businesses to spend _____ to _______ later on.
proprietary
expensive
meet, needs
supported, money, upgrade