Chapter 3-Hardware Flashcards

1
Q

What in relation to RAM can cause a system crash

A

When the amount of RAM is exceeded due to multiple programs running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the basis behind virtual memory

A

That if a system crash is caused due to the amount of available RAM being exceeded through multiple programs running, it can be solved by using the HDD or SSD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is virtual memory

A

Memory management system that makes use of secondary storage and software to enable a computer to compensate for the shortage of actual physical RAM memory. It is RAM storage+swap space on hard disk or SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Very basic: how is a program executed

A

Data is loaded into memory from HDD/SSD when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Utility programs(utilities)

A

Part of the Operating system which carries out certain functions such as virus checking, defragmentation and screensaver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the size of RAM affect the CPU/how is increasing it a benefit

A

The larger the RAM the faster the CPU can operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is disk thrashing

A

Problem in a hard disk drive caused by excessive swapping in and out of data causing a high rate of read/write head movements during vital memory operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the main benefits of virtual memory (3)

A

It reduces the need to buy and install more (expensive) RAM, but accessing data from virtual memory is slower than physical.
No need to waste space on data that is not being used (Eg. During error handling)
Programs larger than physical memory can still be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is thrash point

A

Point at which the execution of a program comes to a halt because the system is so busy moving data in and out of memory rather than executing the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does thrashing lead to

A

Premature failure of HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can thrashing be reduced (4)

A

By installing more RAM
Using an SSD instead of an HDD
Reducing the size of a swap file
Reducing the number of programs running at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data redundancy

A

Unnecessary storing of the same data on several storage devices at the same time. Done in case of maintenance and repair, so that customer can access data at any time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cloud storage

A

Method of data storage where data is stored on remote/offline servers. The physical storage may be on hundreds of servers in many locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

By whom is the physical environment owned and what may it include

A

A hosting company, may include hundreds of servers in many locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where can a user save their data other than a local HDD or other storage device

A

In the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 common systems in cloud storage

A

Private cloud
Public cloud
Hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain public cloud

A

Storage environment where customer/client and cloud storage environment provider are different companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain private cloud

A

Storage provided by dedicated environment behind company firewall. Customer/client and cloud storage provider are integrated and operate as a single entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain hybrid cloud

A

A combination of the 2 other enviroments. Some data resides in the private cloud, and less sensitive/commercial data can be accessed from a public cloud storage provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the benefits of cloud storage (5)

A

No need for customer/client to carry external storage device on them or even use the same computer to restore/retrieve information

Almost unlimited storage capacity

Cloud storage will allow recovery of their data if a customer/client has a failure on their hard disk or back-up device

Customer/client files stored can be accessed at anytime anywhere in the world provided there is internet access

Helps alleviate data loss and recovery as it provides the user with remote back-up of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the drawbacks of cloud storage (3)

A

Costs can be high if large storage capacity is needed and the high down/upload data transfer with the ISP can be expensive

Risk of loss of all backup data if the cloud storage company fails

Would be problems accessing/downloading data/files if there is poor internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Concerns regarding data security when using cloud storage (3)

A

What physical security exists regarding the building where the data is housed?
How good is the service provider’s resistance to natural disasters and power cuts?
What safeguards exist regarding persons; who work for the company-can they use their authorisation codes to access confidential data for monetary purposes?

23
Q

NIC

A

Network Interface Cars

Hardware component (circuit board/chip required to allow a device to connect to a network (internet)

24
Q

What is a MAC address and what is it make up of

A

Media Access Control
Unique identifier which acts as a network address for a device. Takes form NN-NN-NN-DD-DD-DD
Manufacturer code=NN - device code =DD
48 bits shown as six groups of hexadecimal digits

25
Compare NIC to WNIC
They both are used to connect devices to internet/other networks WNIC uses wireless connectivity, utilising antennas to communicate with networks via microwaves. NIC normally plugs into USB port/is part of an integrated internal circuit
26
What is another word for device code and what happens to the MAC if the NIC card is replaced
Serial number The MAC address will change
27
What are the 2 types of MAC addresses+short description
LAA-Locally Administered MAC address UAA-Universally Administered MAC address -provided by manufacturer at factory -most common and not normally changed
28
Why would a MAC address need to be changed using an LAA
Certain software on mainframe systems need all MAC addresses to fall into a strict format (change to suit format) To bypass a MAC address filter on firewall. Sometimes only certain formats are allowed through, others will be blocked To get past certain types of network restrictions. May need to emulate unrestricted MAC addresses
29
What do protocols do
They define the rules that must be agreed by senders and receivers of data communicating through the internet
30
Describe public and private IP addresses
When a device connects to the internet, it is assigned a unique public address, all the devices on the network will have the same public address, but different private ones on the network When a device connects to a private network, it is assigned a private IP address but the router, this is unique on the network, but may be used on a separate network
31
IPv4 vs IPv6
IPv4 is based on 32 bits and is written as 4 groups of 8 bits in denary format, it only being 32 bits significantly reduces the amount of potential devices+routers on the internet IPv6 is based on 18-bit presented in 8 groups of HEXADECIMAL NUMBERS and use colons Designed after IPv4 to allow internet to grow in terms of the number of hosts+potential increase in amount of data traffic
32
What are the advantages of using IPv6 (3)
It removes the risk of IP address collisions Has built in authentication checks Allows for more efficient package routes
33
What is + General features of system software (3)
Set of programs to control and manage the operation of computer hardware Provides platform on which other software can run provides human computer interface (HCI) Controls allocation and usage of hardware resources
34
What are what are examples of application software (4)
Used to perform various apps on computer Allows a user to perform specific tasks in computers resources May be single(notes) or suite (Microsoft office) of programs user can execute software as and when they require
35
What utilities are usually offered by computer software systems (6)
Back-up software File compression and management Virus checkers Defragmentation software Security Disk contents analysis and repair
36
Where do virus checkers run and why should they be kept up to date
They run in the backyard and need to be kept up to date to maintain the ability to guard against being infected by malware
37
Malware
Programs (viruses, Trojan-horse and worms) that are installed on a computer with the aim of deleting, corrupting or manipulating data illegally
38
What does anti virus check do (6)
It compares a possible virus against a data base of known viruses Check software/files before they are loaded onto the computer Carry out heuristic checking Put infected files into quarantine Needs to be kept up to date (new virus discovery) Full system checks once a week- dormant viruses
39
How can you prevent viruses
Be careful when downloading material from internet Not opening files/websites emailed by unknown senders Not using non-original software Anti virus software
40
What is quarantine/what does it do
To isolate a file(to delete) identified by anti-virus checker as being infected Allows virus to be automatically detected Allows user to make decision about deletion (maybe it was a false positive)
41
Defragmentation
Process that réorganisés sectors on an HDD by rearranging blocks of data until they are contiguous which reduces the read/write head movements.
42
Conséquence of HDD becoming full
Slower data access time as the read-write head will now require several moments to find+retrieve the data to make up the required file from the different sectors and tracks on the disks surface
43
What rearranges blocks of data to store files in contiguous sectors What does it allow
Disk defragmenter Faster data access and retrieval as there are fewer read-write head movements to access the files
44
What does a backup utility do
Allow a schedule for backing up files to be made Only carries out backup procedures once there has been change to a file
45
How many, and what versions of a file should there be for total security
1. Current one stored in internal HDD/SSD 2. Locally backed up (local SSC) 3. remote backup version (iCloud )
46
What is security software and what does it do (4)
Over arching utility that Manages access control over user accounts( ID checks and passwords) Protects network interfaces (firewall) Uses encryption and decryption to secure intercepted data Oversees updating of software (is request from legit source)
47
Screensaver
Software that suppplies a still or moving image on a monitor if a computer has been inactive for a long time. Initially used to protects CRT monitors from phosphor burn Provides extra security and is used when doing virus scans and distributed computing applications
48
Device driver
Software that Communicates with OS to translate data into format understood by hardware peripheral device Would not work without “Device not registered”
49
Descriptor
Collection of info about device plugged into USB port Can be vendor ID (VID) or product ID (PID) or serial number
50
What does it mean if a language is portable
It can be used on more than 1 device without having to be redone
51
Disadvantage to programmer.of using high level instead of low level language
The time it takes for translation
52
Firmware
Computer software that gives you low level control. But it forms part of hardware. Inside ROM. REDO
53
Where is BIOS stored
EEPROM Electrically Erasable Programmable Read Only Memory