Comp Flashcards

1
Q

What is WAP

A

Wireless access point allows wireless devices to connect to wired networks using wi-fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a switch

A

A switch is used to connect all devices to a network and a switch will send a message to its intented location in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is router

A

A router is a networking device that forwards data packets between computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a modem used for

A

A modem is used to modulate the electrical signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some ways to reduce the chance of cyber attack succeeding

A

Audit trail
Use secure operating system
Provide effective network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHat is white box penetration testing

A

White box penetration testing approach, also known as an assumed breach, clear box, or transparent box testing, is where the penetration tester has full access and complete knowledge of the target that is being tested and its features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is black box penetration testing

A

In a black box penetration test, no information is provided to the tester at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ethical hacking

A

Ethical hacking is when a person hacks into a system but doesn’t cause any harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 ways to identify vulnerabilities

A

penetration testing
Ethical hacking
commercial analysis tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a eavesdropping attack

A

Eavesdropping attack is when someone intercepts data being sent from one computer to another computer. Eavesdropping is just reading the data but not copying it or stealing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a unpatched software

A

It is basically a sofware that is very vurnerable to malware attacks because the person who made it has to see the weaknesses of his software by putting it on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shoulder surfing

A

Shouldering involves a attacker watching victim over their shoulder while they provide personal infomation (For example passcode for phone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming

A

The term pharming refers to a user being sent a fake website that the user believes is real and the users are tricked into entering their personal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing

A

Phishing is a attack in which a victim recieves a message disguised to look like it is from a reputable source (for example Bank). THe message will contain a link when clicked will trick victim into giving personal information or initiate the installation of a malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 types of cyberattacks

A

Phising
Pharming
Shoulder surfing
Unpatched software
USB device
Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantage of cloud storage

A

You are relying on third party stroage provider if company shuts down data may be lost.
Internet is required to access data
security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advantage of cloud

A

You can change to amount of storage you need at anytime

Stored data can be accessed from anywhere

Cloud storage can back up data hourly or daily so data can be restored if there is hardware failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a firewall

A

A firewall is something that sits inbetween a trusted network (e.g. Home network) and a un-trusted network (e.g. Internet) and the firewall will attempt to prevent malicious traffic entering the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a runtime error

A

A runtime error is when a program encounters issues with some operations during runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a logic error

A

A logic error is when a program does not do what it was intended to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a syntax error

A

A syntax error is where a program statement does not obey the grammatical rules of the programming language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a compiler

A

Translates a high-level program to machine code.
If a program contains a syntax error, a comprehensive list of all syntax errors is produced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 2 types of low-level language

A

Assembly language and Machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Advantage and disadvantage of Mesh

A

Advantage: Multiple path between devices
Disadvantage: Expensive, complicated to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Advantage and disadvantage of Star
Advantage: Reliable, no collision Disadvantage:Expensive, central device fails = everything fails
26
Advantage and disadvantage of ring network
Advantage: Fast, no data collision(one direction flow) Disadvantage: One fail = all fail
27
Advantage and disadvantage of bus
Advantage: cheap and easy Disadvantage: One point of failure More devices --> slower All devices can see the data(security risk)
28
Name the 4 network topologies
Bus Ring Star Mesh
29
Name the 4 layers of TCP/IP model from top to bottom
Application Transport Internet Link
30
What is IP
IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication.
31
What is UDP
User Datagram Protocol. Data is split into packets (as with TCP). However, this is an unreliable transmission protocol. If any packets arrive out of sequence or are missing, they are ignored. UDP is suitable where data does not have to be 100% accurate but speed is important, e.g., with some video streaming services or VOIP.
32
What is TCP
Transmission Control Protocol (TCP) is a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.
33
What is DHCP
Dynamic Host Configuration Protocol. Used to assign IP addresses and other configuration options to devices in a network.
34
What is IMAP
Internet Message Access Protocol. Used to synchronise a client email account with an account on a mail server. The server returns new emails (if there are any) and deletes any emails that were deleted locally on the client application. This allows a user to use multiple devices to access their email account.
35
What is POP
Post Office Protocol. Used to request any new emails for a specific email account. The server returns the emails (if there are any).
36
What is SMTP
Simple Mail Transfer Protocol. Used to send an email to an email server. The server returns a code indicating whether or not the email could be delivered.
37
What is FTP
File Transfer Protocol. Used to upload or download a file. The server opens a data connection (over which the file will be transferred) or sends an error code if there was a problem with the request.
38
What is HTTPS
Hypertext Transfer Protocol Secure. Sends an encrypted request for a webpage. The server returns the encrypted page or an error code if there was a problem with the request.
39
What is HTTP
Hypertext Transfer Protocol. Used to make a request for a webpage. The server returns the page or an error code if there was a problem with the request.
40
Name the 3 types of networks and state some examples
PAN: Bluetooth LAN: Office or school WAN: Wide geographic areas
41
Difference between compiler and interpreter
interpreter: translate one at a time execution time slow no object code produced compiler: scans entire thing and translate it execution time fast object code is produced
42
What does the utility software Basic tools do?
Calculator, command prompt, notepad etc
43
Name 4 things Operating system do
Processor management Inputs, outputs, and interrupts Memory management Security
44
Name 4 operating systems
Windows MacOS Linux Android or IOS
45
Name the 3 components in a Magnetic storage
platter, track and read/write head
46
Factors to consider before buying secondary storage
Capacity Speed Cost Portability Compatibility
47
What does a bus do
A bus transfers data and signals between components inside a computer.
48
Function of accumulator
Stores the result of any calculation
49
Function of memory data register
Temporarily holds the data (data values or instructions) that are read from or written to the main memory
50
Function of Memory address register
Temporarily stores the memory addresses used when searching for data in RAM
51
What is the purpose of Current instruction registers
Holds the current instruction that the processor is executing
52
What does a clock do
It sends out clock signal which is used to synchronise the operations of the processor components.
53
Different utility software
Basic tools File management Security tools
54
Advantage and disadvantage of SSD
Advantage: Speed, durable Disadvantage: Number of times it is written is limited
55
How is data stored in a optical disc
Data is stored on the reflective surface of an optical disc. A laser is used to burn small marks into the surface and binary data is represented in the two states of pits/troughs (burns) and lands/peaks (no burn).
56
Advantages and disadvantages of optical storage
Advantage: Portable, cheap, reliable Disadvantage: Slow seek time, low capcity
57
Advantages and disadvantages of magnetic storage
Advantages: Cost and capacity Disadvantage: Not portable, very fragile
58
Name the 4 secondary storages
Magnetic storage Optical SSD Cloud
59
What is the control unit responsible of
Ensures the execution of instructions in the correct sequence Decodes every instruction that the processor will execute Sends and receives control signals to and from other components Checks that signals have been delivered successfully Makes sure that data goes to the correct place at the correct time
60
Function of ALU
Arithmetic calculations: addition, subtraction, division, and multiplication Logical operations: such as AND, OR, NOT Comparisons between values, such as greater than, less than, equal to
61
What is a control bus
the control bus, is used to synchronise and control operations
62
What is a data bus
data bus is used to transfer the contents to/from that location
63
What is a address bus
address bus is used to identify the addressed location
64
What does the von neumann architecture have
input devices secondary storage processor main memory output devices out/in controllers
65
What is a dedicated register
Dedicated registers serve a specific purpose in the Fetch-decode-execute cycle.
66
What is a general purpose register
General purpose registers are used to temporarily store values generated by instructions if they need to be used again in the next instruction.
67
4 characteristics of ROM
It is non-volatile It is written by the computer manufacturer Usually stores the BIOS Smaller capacity than RAM
68
What are the 4 characteristics of RAM
It is volatile You can read and write to it It is quicker to access than secondary storage It has the largest capacity of all main memory
69
What is secondary storage
Secondary storage is used to permanently store data such as the operating system and the user's files.
70
What is main memory
Main memory is where data and instructions are stored so that they can be accessed directly by the CPU.
71
What is a GPU
A graphics processing unit (GPU) is a processor designed specifically to render graphics.
72
Function of proccesser
The processor is the part of the computer that processes data by executing programs. It also manages the rest of the hardware.
73
What is cache memory
Temporarily stores frequently used instructions and data
74
What is non-volatile memory
non-volatile memory, which keeps its contents even without power
75
What is volatile memory
volatile memory, which loses its contents when the power is removed
76
3 examples of output devices
inkjet printer, laser printer and speaker
77
State 3 examples of input device
mouse, keyboard, mircophone
78
Explain what a multi-agent algorithm is
In the parallel model, one task is processed by several processors while in the multi-agent model, separate tasks or algorithms are processed by different systems (agents) to perform a particular function.
79
Explain what a parallal computational model
In the parallel model, computer processes are distributed between two or more processors in a computer with two or more processors installed.
80
Explain what a sequential computational model
Sequential involves following instructions in an algorithm step by step, in order, from start to finish.
81
What is the 3 computational model
Sequential Parallal Multi-agent
82
Name the 4 different types of encryption algorithm
Caeser cipher Pigpen cipher Vigenere cipher Rail fence cipher
83
What is asymmetric encryption
asymmetric encryption uses 2 keys that work as a pair to decrypt a message
84
What s symmetrc encrypton
The same key is used to decrypt the message
85
Example of a lossy compresson
MP3
86
Name an example of an lossless compression algorithm
RLE
87
Name an example of lossless
zip file
88
What are the 2 types of compression methods
lossy and lossless
89
On a sound graph what is the x axis and y axis
y = amplitude x = time/seconds
90
Name 2 file formats of bitmap
Bitmap: .bmp PNG: .png JPEG: .jpeg GIF: .gif
91
What is the formula of image file size
Width x Height x colour depth
92
What is a pixel
A pixel is a square in a bitmap that represents a picture. Each color represents a color.
93
Why is unicode preferred over ASCII
ASCII is limited to 256 characthers While unicode covers all characters
94
How many bits are there in hexadecimal
4
95
What is the difference between logical shift and arithmetic
Logical shift can multiply and divide unsigned binary numbers Arithmetic shift can multiply and divide signed numbers
96
What is a binary overflow
When a binary number has more than 8 bits
97
how many bits are there in one byte
8
98
How many bits are there in one nibble
4
99
Order this is in size increasing byte, gigabyte, nibble, megabyte, bit, terabyte
bit, nibble, byte, megabyte, gigabyte, terabyte
100
How do computers produce data
They use a transistor which produces 1s when on and 0s when off