keywords Flashcards

1
Q

computer system

A

a system of hardware and software that processes data in binary form and converts it into information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

operating system

A

system that runs in the background of a computer while it is turned on to ensure that the computer works properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

main memory

A

memory that stores instructions and data for work being done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

registers

A

small memory areas on the CPU holding signals ready for processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

secondary storage

A

permanent storage outside main memory that holds data and instructions not currently being used by the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cloud storage

A

date stored in a remote location over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cyber security

A

practice of defending computers and networks from malicious attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

password

A

way for authorised user to prove they have permission to enter the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

misconfigured access rights

A

wrong type of access to wrong users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

blagging/pretexting

A

pretending to be someone who has the right to have information or knows information about a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

phishing

A

sending a fake email pretending to be a trusted source with an offer/confirmation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pharming

A

redirecting users to a fake website that looks real and collects login and personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

shouldering

A

looking over someone’s shoulder to steal their password/PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

computer virus

A

a machine code that gets added to an executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

trojan

A

malware hidden in a file appearing desirable and enters the computer when downloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

spyware

A

malware that records actions taken on computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

adware

A

software that displays advertisements on computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

embedded systems

A

small computers built into other devices and machines for a very specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

firmware

A

instructions for embedded systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

micro-controller

A

small computer with all components on a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

assembler

A

software that converts an assembly language file to an executable file through the process of translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

compiler

A

translator that converts a high-level language program into an executable file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

interpreter

A

translator that translates code and executes it as it translates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

digital data

A

data held in binary form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

pixel

A

a picture element; the smallest editable point on an image that can only show one colour at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

bitmap

A

a list of information about all the pixels in an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

colour depth

A

the number of bits needed to encode each pixel as a binary number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

colour look up table

A

table used to list out which binary value is which colour

29
Q

image resolution

A

number of pixels in a specific area of an image

30
Q

sample rate

A

number of samples collected in one second

31
Q

sample resolution

A

number of bits used to store a single sample

32
Q

network security

A

practice of protecting data on computers

33
Q

captcha

A

checks whether user is a real person by asking them to identify distorted text or objects in an image

34
Q

2 step verification

A

confirms user identity by having them log in or verify an action from an additional access method/device

35
Q

firewall

A

software/hardware that scans network traffic and blocks suspicious activity

36
Q

MAC adress filtering

A

the process of a router checking whether a computer’s MAC address is allowed in that network or not

37
Q

encryption

A

disguising sensitive data when it is sent over network connections

38
Q

virus protection

A

antivirus software that scans files for malware

39
Q

backup data

A

making a regular copy of data to store outside network

40
Q

penetration testing

A

hiring a professional hacker to try and break into the network to identify vulnerabilities

41
Q

black box penetration testing

A

the hacker has no knowledge of the network configuration

42
Q

white box penetration testing

A

the hacker has some knowledge of the network configuration

43
Q

network protocol

A

standard set of rules for network communication

44
Q

application layer (tcpip)

A

interface for humans

45
Q

transport layer (tcpip)

A

ensures end-to-end communication

46
Q

network layer (tcpip)

A

routes data packets through a network

47
Q

link layer (tcpip)

A

implementation of hardware interface to the network

48
Q

HTTP

A

sends & receives HTML web pages

49
Q

HTTPS

A

secure transmissions of web pages

50
Q

FTP

A

sends and receives files over network connection

51
Q

SMTP

A

sends messages to email addresses

52
Q

IMAP

A

opens emails

53
Q

TCP

A

sends data with acknowledgement to ensure packets sent are received

54
Q

UDP

A

sends data without acknowledgements

55
Q

IP

A

does routing

56
Q

database

A

structured collection of data stored in computers

57
Q

record

A

all the data about one entity

58
Q

field

A

a data unit common to all the entities in a table

59
Q

primary key

A

a unique field

60
Q

redundancy (database)

A

unnecessary or repeated work or entering the same data multiple times

61
Q

inconsistency (database)

A

high risk of data not being the same

62
Q

foreign key

A

field that links the data in one table to the data in another table

63
Q

relationship (database)

A

formed when the foreign key of one table is the primary key to another table

64
Q

linear search

A

algorithm that checks every item in a list from beginning to end until a match is found

65
Q

binary search

A

algorithm that starts in the middle of a sorted list and searches the items before or after

66
Q

bubble sort

A

algorithm that compares each pair of items in a list going from beginning to end, sorting them along the way

67
Q

merge sort

A

algorithm that breaks an unsorted list into its individual elements, then sorts them in pairs of lists which are merged together

68
Q

worst case timing

A

maximum length of time the task could take to execute