coExtra Flashcards

(129 cards)

1
Q

High level

A

Less efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

White box

A

Knows source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do viruses do

A

Damage or delete data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Regulations online to

A

Keep kids safw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the link layer?

A

This is where the network hardware is located. This layer attaches the MAC addresses of the sender and recipient so the packet can be directed to a specific device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some of the positives of networks?

A

User profiles and security can all be managed centrally.
All files can be backed up centrally.

Software can be distributed without it having to be installed every time.
Printers can be shares.
internet connection can be shares and files can be stored on a file server so they can be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the negatives of a network?

A

ardware can be expensive
If file server goes down, nobody can access their files

Could lead to loss of data
Viruses can spread easier
Hard to manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some advantages of bus network?

A

Cheap to set up
Easy to set up

Good for smaller or short term
No reliance on central node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the negatives of star network?

A

Expensive to install
Extra hardware is required
Harder to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some positives or star topology?

A

Faster transmission of data
Less likely to experience errors/data traffic problems
A faulty connections disables one computer unless it is the hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cyber security?

A

Protecting networks, computers, data and programs from attack damage or unauthorized access and is done through processes practices and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phising

A

Impersonating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the positives of databases?

A

Makes processing more efficient, reduces storage requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Characteristics of flat file databases.

A

Very inefficient, difficult to query and used for small/trivial data sets. Data is often duplicated, also suffers inconsistencies between records. This can compromise the integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between using a GUI and CLI?

A

Command line interface is much quicker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between system and application software?

A

System is run by system in background for example OS or encryption whereas application is run by user to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIOS

A

Controlling hardware at start up sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two main types of system software?

A

Operating systems and utility software.(just software is like basic applications like games or browsers which is in the other ring).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the operating system do things

A

User authentication, makes sure users must prove who they are, protect against malware, blocks access to specific vulnerable areas of the pc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does WAN have to use

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Draw the two round dots symbolising the terminators at the end of each side of the BUS.

A

okay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why does everything stop working if the bus goes down?

A

The cable splits so there are two open ends with no terminators so the data is not absorbed at the end which causes it to reflect and cause problems. Star only impact one node/device UNLESS it is central hub or switch or server as they are connected individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PAN

A

not always wireless but does not need extra hardware unless it is wired as WAP is always required anyway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the advantages of hydrogen fuel cells?

A

They will produce electricity for as long as you provide hydrogen. They do not get less efficient the more they run and they can be a source of drinkable water for example on a space craft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the disadvantages or rechargeable batteries?
They run out and need to be recharged, they can also store less energy the more charging cycles they go through and eventually need to be replaced.
26
What are the disadvantages of hydrogen fuel cells?
Run on hydrogen which is explosive and difficult to store safely they produce a relatively low potential difference or voltage so several are needed together.
27
What are the advantages of rechargeable batteries?
They can produce a large potential difference.
28
What is another positive of closed source for the user?
Often will have more online help and support as they realised their code is unavailable.
29
pipette.
Small volume of solution in bottom to make it accurate.
30
What are anti bumping granules for?
To make the liquid boil more smoothly-small bubbles of vapour form on the corners of the granules and reduce the risk of the liquid boiling over.
31
What is bandwith?
The maximum rate of data transfer across a given path. The more people online, the more bandwidth is used up.
32
Make sure electrodes dont touch.
This would create a dangerous short circuit.
33
What do you always need to say?
Without consent.
34
What is an example of lossless compression?
.gif
35
What is an example of lossy compression?
.jpg and .mp3
36
What is not compression.
.bmp
37
What is RLE stored as?
Frequency/data pairs
38
What is system software?
Programs that are needed to enable the computer to function, including the OS, utilities and programming language translators and library routines.
39
What does the OS manage?
Processors, memory, input/output, applications, security.
40
How does the OS manage processors?
anages the use of the processors resources, task manager, the OS provides a tiny slice of processor time.
41
How does the OS manage memory?
OS manages where in memory each program and the data it needs will go.
42
How does the OS manage input/output devices?
The input is processed and the computer will generate outputs. The OS takes over and controls the sending of data. Each I AND O has a device driver.
43
How does the OS manage applications?
The OS interacts with applications through an Applications program interface(API) which allows the application to communicate with the operating system. Once an application is installed, it will need t communicate with the operating system to execute modules.
44
How does the OS manage security?
Controls access to ta computer by setting up passwords for different users, this blocks access to files and software without password. Sets up access rights and privileges for different users. Encrypts files stored on the hard disk and automatically downloads updates to ensure security loopholes are patched.
45
What do embedded systems use?
No OS and a microprocessor.
46
What are some strange things about embedded systems?
System held in non-volatile memory and some firmware devices are permanently installed and cannot be changed after manufacture. It is not possible to update hardware or attach peripherals.
47
What is good about embedded systems?
More reliable, optimised and efficient. And use less resource
48
Star topology positive?
Consistent performance even when the network is heavily used.
49
IMAP.
Stores email messages on a server and allows users to view and manipulate the messages.
50
SMTP?
Sending email messages between servers, used for relaying or forwarding messages form one mail server to another if there are different email service providers.
51
What is firmware?
Permanent software in read only memory.
52
What has a lower boiling point nitrogen or oxygen?
Nitrogen.
53
Why would a company not want to make their source code of the software available?
So third parties cannot insert/modify code and pass it off as original as it affects profitability. Algorithms cannot be copyrighted and therefore need to be protected to preserve commercial advantages. Hacking/cyber security as hackers could identify vulnerabilities in the source code and use them to create targeted attacks. Copyright of code-they may not want others to have access to what they have developed.
54
What are some advantages of star topology compared to bus?
Less likely to experience transmission errors/data traffic problems(contention issues). Faster transmission data. Fewer/no collisions if a switch is used rather than a hub. Also better security potentially as data is not broadcasted to all machines if a switch is used.
55
What are some negatives of star topology as oppose to bus?
It is harder to install and requires more cable. It is more expensive to install as more cable and hardware is needed. Switch/hub/central device may fail breaking the entire network.
56
What are the positives of a network?
Sharing of resources such as printers and storage space. Managed/central backing up of data. Central installation and management of software by network admin. Monitoring of users and network activity centrally by network admin. Hot Desking/users can log onto any machine. Ability to use communication tools between computers and centrally managed access rights. Rapid data sharing and it allows decentralised/home working.
57
What are the negatives of networks?
Spreading of malware and cost of infrastructure. Cost of network admin required to run network and dependency on network hardware.
58
Difference between PAN and lan.
you have to cover both to actually state a difference. For example PANs are centred round one person whereas LANs cover a limited geographical area/ larger area. Or one person v more than one usually.
59
What can networks do?
Increase available storage.
60
What are the reasons for growth of cloud storage?
Higher bandwidth mobile networks like 4g and there is an increased availability of mobile devices. Reduction in cost of large capacity storage devices and improvements in network security so people have a higher trust in cloud storage. Improvements in web browser software and increased availability of super computers for cloud processing. Companies have managed to develop business models based on cloud computing that allow them to make a profit.
61
What are the advantages of cloud storage?
Enables the user to access their data from more places/devices and enables the user to more easily share data with others as you can make parts of your cloud storage publicly available. Increases amount of storage available and reduced cost of computing devices for users as no need for as much built in-secondary storage.
62
What was it like before von neuman?
Instructions had to be hard wired and data went through physical switches.
63
Advantages of star compared to bus?
ess likely to experience transmission errors/data traffic problems(contention issues). Faster transmission data. Fewer/no collisions if a switch is used rather than a hub. Also better security potentially as data is not broadcasted to all machines if a switch is used.
64
What is data stored on for optical?
Singal spiral tracks.
65
Iterative testing?
Tweaked each time it is tested to improve it.
66
What are the electrodes made of?
Porous carbon.
67
Shouldering
PHYSICAL
68
What is a paging algorithm?
Memory management scheme.
69
What is it called when multiple instructions are being executed at once?
Concurrent.
70
What else does the OS do?
Scheduling algo.
71
What is a scheduling algo?
makes sure each instruction get s a slice of cpu time.
72
What is pipelining?
Method used by CPU to split up tasks and overlap tasks if possible.
73
What is a positive of client server?
Central backups.
74
IPV4
32
75
IPV6
128
76
Why might a company not give out daTA
It could affect a court case.
77
What is the first way anti malware detects malware?
Compares definition with definition stored in database of known malware.
78
What is the second way ant malware detects malware?
Uses a set of rules to detect suspicious behaviour which could suggest a file is malware.
79
What can heart implants do
May include electrodes for regulating heartbeat, warn of heart attacks and monitor the effects of treatment.
80
What implants can a quadroplegic get?
Electrodes implanted in his brain which enable him to control a robotic arm, getting it to bring a cup to his mouth simply by thinking about doing it
81
What are the environmental impacts of cloud storage?
It uses much more energy to keep its storage equipment running, cooling systems also use lots of energy. Cloud storage does save energy for companies that need to store large amounts of data.
82
What is recognised under the computer missue act?
Unathourised access to computer material, with intent to commit or faciliate a crime and modification of a computer. Making, supplying or obtaining anything which can be used in computer misuse offences.
83
What is end-to-end encryption?
It ensures that during transmission, only you, and the person you send the message to can read it. Used in whatsapp.
84
What is the problem with organisations or governments using this backdoor?
Providing any backdoor would potentially enable it to be opened by anyone, meaning that anyone’s confidential messages could fall into the wrong hands.
85
What do you say in SQL to sort?
ORDER BY
86
What is concurrency in a database?
Many users can query data at the same time.
87
How do you insert another record in SQL?
INSERT INTO cakes Vaules(..).
88
What is a transaction?
Change in database.
89
How does the OS do interface?
User/software and software/hardware
90
How does the OS do cpu?
Pipelining, scheduling to allow for optimal cpu usage.
91
How does the CPU do memory management?
Moves data and instruction sbetween primary+secondary storage and also disk defrag.
92
How does the OS do security?
User profiles/access levels and encyption.
93
Faster what?
Read write speeds
94
How do you update SQL?
UPDATE students SET surname="Kennedy" WHERE firstname="Mark"
95
How do you make a new record SQL
INSERT into students | VALUES ("Mark","Kennedy","15")
96
How do you delete SQL?
DELETE from students | Where firstname="Mark"
97
What is an entity?
Real world data about which data is stored about-whole table-song
98
What is an attribute?
A field-song name
99
Two things about peer to peer
Equal status and share data.
100
Select and from?
When saying select we dont care about where it comes from but with from we do
101
Query?
Access specific data quickly
102
What things can DBMS do?
Create a DB, add data, delete data, edit data and search data
103
Record
Collection of data about a single entity
104
Field
A unique piece of data about an entity
105
First principle of GDPR?
must be used for reason it was acquired with the persons consent
106
Second
Data must only be collected for specified, explicit and legitimate reasons
107
thurd
Data must be relevant, not excessive and not be held longer than needed
108
Fourth
Data must be accurate and up to date
109
fifth?
Data must be kep secure
110
sixth?
god knows
111
What else does the link layer do?
Attaches the mac adress
112
What do databases do
Reduce storage requirements
113
What is an array?
in computer science, an array data structure, or simply an array, is a data structure consisting of a collection of elements, each identified by at least one array index or key. An array is stored such that the position of each element can be computed from its index tuple by a mathematical formula
114
What is a record
A record is any document - in any format (paper or electronic, and yes even video) - created or received by you or your department - that allows you to conduct business. The value of a record is determined by content, not by format.
115
Can a record be in an array?
Yes
116
Where are records stored?
Hard disk
117
Where are arrays stored?
RAM
118
RECORDS SEACRH
requires linear search as can be any data type
119
etter to number ch
ord('f")
120
number to letter ch
chr(102)
121
Showing how Rle works
• the number of consecutive pixels/data points/characters of the same colour/value/character would need to be counted; • (pairs of values would be stored), which would consist of a run length and the colour/value/character of the pixels/data points/text in the run; Example (max 1 mark) • Image example of how the specific row of pixels would be compressed eg 9 Black, 11 Red, 8 White; • Text example of how the specific run of characters would be compressed eg 7 G, 6 Y, 12 $
122
How is main memory used
it stores instructions whilst a program is being executed; • it stores data whilst a program is being executed; • each unique memory location in memory holds one value; • every memory location has a unique address; • once data has been stored in memory it can be found again later (when it's needed); • data and instructions are replaced in memory as needed;
123
What is malware
* (Malware is a blanket/umbrella term for) computer software/program/code; * with malicious/hostile/intrusive intent;
124
Explain box two reasons why software companies usually do not make their source code publicly available. Source code is the code they wrote to create the software.
 Algorithms cannot be copyrighted; and therefore need to be protected to preserve commercial advantage;  Copyright of code; the company has paid for development of the code and therefore own the code. They may not want others to have access to what they have developed;  Hacking/cyber security; hackers could identify vulnerabilities in the source code and use them to create targeted attacks;  So third parties cannot insert/modify code and pass it off as original; as it affects profitability;
125
Is black 0
ye
126
Describe one difference between system software and application software.
System software manages the computer hardware/application software whereas application software is for end-user tasks
127
Many organisations provide free public access to a wireless network. box Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access.
 Websites – any inappropriate websites ie pornography, drugs, guns, terrorism etc. e.g. is it acceptable for the organisation to allow access to this sort of material when you can’t control who is accessing the service?  Time – limit amount of time, they may not want to provide indefinite access or may want to charge for access after the time limit has expired.  Preventing file sharing and illegal sharing\use of copyrighted materials.  Accountability – identification of users and actions on a network by preventing anonymous access.  Prevention of illegal activities such as terrorism and fraud.  The responsibility to keep children safe and protected.  Responsibility to keep users (customers) data safe and secure.  Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in place, eg filtering of known fraudulent sites.  Recording of private messages or details if not encrypted.  Recording of usernames and passwords that the user may also use to access other systems.  Responsibility of organisation to secure their systems from possible attack.  Sales and marketing – providing sales leads to market products
128
hex more or less space
same
129
Explain why it would not be appropriate for the café to use MAC address filtering on their wireless network.
Network is made available to members of the public; | Won’t know the MAC addresses for (most) of the devices connecting to the network