Component 1 Flashcards

1
Q

Why is secondary storage needed?

A

Rom is read only and Ram is volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the benefit of optical media?

A

Thin, lightweight and portable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the downsides of optical media?

A

Low capacity, slow access times, dust/scratches can damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of magnetic storage?

A

High capacity and access speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the downsides of magnetic storage devices

A

Has moving parts which will eventually fail
Performs better if defragmented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits of SSDs

A

Very quick to access
very reliable
no noise
low power consumption
no need to defragment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the downsides of SSDs

A

Expensive
limited number of read-write cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the benefits of using binary?

A

easier to manufacture - cheaper
more reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are text file sizes calculated?

A

bits per character X number of characters (including spaces)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are image file sizes calculated?

A

colour depth X image height (px) X image width (px)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are sound file sizes calculated

A

sample rate X duration (s) x bit depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is 0 + 0 in binary addition?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is 0 + 1 in binary addition?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is 1 + 1 in binary addition?

A

0 carry 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is 1 + 1 + 1 in binary addition?

A

1 carry 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the effect of a binary shift left?

A

X 2 per bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the effect of a binary shift right?

A

/ 2 per bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a character set?

A

A defined list of characters recognised by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Each character is represented by a __________________

A

unique binary number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are bitmap images stored?

A

constructed from pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How are vector images stored?

A

mathematics to draw coloured shapes stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Each pixel of a bitmap is stored in ___________

A

Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do you calculate the number of colours available in a image?

A

2^n where n = number is bits per pixel

24
Q

What is the number of bits per pixel known as?

A

colour depth

25
Q

What is metadata

A

data stored within the image to define the width, height, colour depth and colour palette

26
Q

What is bit depth?

A

number of bits stored per sample

27
Q

What is sample rate?

A

number of samples stored per second

28
Q

What does compression do?

A

Reduce number of bits in a file

29
Q

What are the effects of lossy compression

A

Some data is lost
Greatly reduces file size
Reduces quality of image/sound
Cannot be used on text or executable files

30
Q

What are the effects of lossless compression?

A

No data is lost, it is encoded differently
Can be revered to original format
can be used on all types of data
usually less effective than lossy
most suitable for documents and executable files

31
Q

What are the advantages of networking?

A

Users can share files and peripherals
Users can access files from any computer on the network
Servers can control security, software updates and the backing up of data
communication with other people

32
Q

give facts about LANs

A

local area network
network over a small geographical area
all hardware owned by organisation
wired using UTP or fibre optic OR wireless

33
Q

Give facts about WANs

A

wide area network
covers wide geographical area, connecting LANs
Infrastructure is leased from telecommunications companies who own and manage it
connected with telephone lines, fibre optic cables or satellite links

34
Q

give facts about bandwidth

A

how much data can be sent on the transmission media
measured in bits per second
higher bandwidth = better performance

35
Q

How does the number of users affect network performance?

A

Too many users can slow down the network if there is insufficient bandwidth

36
Q

How does transmission media affect network performance?

A

Wired connections have higher bandwidth than wireless
fibre optic has higher bandwidth than copper cables

37
Q

Give facts about latency and its affect on the performance on a network

A

caused by bottlenecks
higher latency means lower performance

38
Q

explain the client-server model

A

Server manages internet access
Server manages printing jobs
server provides email services
server runs data backup
clients make requests for data and connections

39
Q

what are the advantages of the client-server model?

A

easier to manage security files
easier to make backups of all shared data
easier to install software updates on all computers

40
Q

what are the disadvantages of the client - server model?

A

can be expensive
requires IT specialists to maintain
server is a single point of failure
users will loose access if the server fails

41
Q

Explain the peer to peer model

A

A peer is a computer on the network and it is equal to all other peers
peers serve their own files to each other
each peer is responsible for it’s own security
each peer is responsible for it’s own backup
peers usually have their own printers

42
Q

What are the advantages of the peer to peer network?

A

very easy to maintain
no specialist staff required
no dependency on a single computer
cheaper to set up - no expensive hardware required

43
Q

what are the disadvantages of a peer to peer network

A

generally less secure
users will need to manage their own backups
can be difficult to maintain a well ordered file store

44
Q

List the hardware necessary for a LAN

A

network interface controller
switch
router

45
Q

What is the internet?

A

A global collection of connected networks

46
Q

Where are web addresses converted to IP addresses?

A

domain Name service resolver server

47
Q

clients ________/________ resources from a server

A

request/use

48
Q

Give facts about a star network

A

most popular wired type
central switch
all devices connected to central switch
switch is intelligent and ensures traffic only goes where wanted

49
Q

What are the advantages and disadvantages of a star topology?

A

Advantages
If a single cable breaks, only that computer is effected
Disadvantages
switch is a serious point of failure

50
Q

What is a full mesh topology

A

Every device connected to every other

51
Q

What are the advantages / disadvantages of a full mesh topology?

A

Advantage: if any connection breaks, there is a alternative route
disadvantage : very expensive and impractical for large networks

52
Q

What is a partial mesh topology?

A

Multiple routes
however not every device is connected to every other device
compromise solution which reduces hardware needed compared to full mesh

53
Q

What is ethernet?

A

a standard for networking technologies
used for communicating on a WAN
includes a number of associated protocols

54
Q

Explain how encryption works

A

1) data is scrambled into ciphertext using a master key created from the SSID other network and the password
2) Data is decrypted using the same master key, so important it is not transmitted
A handshake protocol is used to ensure that the receiver has a valid master key before transmission to the device begins.

55
Q
A