Data Representation and Cyber Security Flashcards
(41 cards)
State the decimal representation of the binary number 10010100
148
State the hexadecimal representation of the binary number 10010100
94
State the hexadecimal representation of the decimal number 143
8F
State the binary representation of the hexadecimal number BE
B - 1011
E - 1110
10111110
Give two reasons why hexadecimal is often used instead of binary in computer science.
Hexadecimal is easier for humans to read than binary
It is quicker to type in hexadecimal than binary
what is the answer to 01010101 + 01101100 + 00011001
11011010
State the result in binary of performing binary shift 2 places to the left on the value 00111001
11100100
What is the largest decimal number that can be represented using 6 bits
63
How many bits are there in 5kb
5000
* 8
* 1000
40,000
Explain how a sound wave is converted so that it can be stored in a computer.
A microphone or sound sensor picks up the sound wave
The wave is converted from an analogue to digital signals
The height of the wave is measured
the sample are stored as binary values.
A student has recorded a 30 second digital sound track using a sample rate of 44 000Hz. 8 bit have been used to store each sample taken.
Calculate the file size in kb.
44,000 * 8 * 30 = 10,560,000
10,560,000 / 8 = 1320000
1320000/1000 = 1320 kB
What is data compression
C- the process of encoding information to try and use fewer bits than the original
Give 2 reasons why data compression is often used.
To speed up file transfer
To use less storage
RLE is one method of compressing data
State the feature of data that allows it to be compressed effectively using RLE
The data contains lots of runs
Describe how RLE works. Give an example
It looks for consecutive repeating data in a file - called a run. Instead of storing each pice of repeated data separately, it stores the number of times it repeats.
An example is a image of how the specific rows of pixels would be compressed
Define the term cyber security
Cyber security aims to protect networks, data, programs and computers against damage, cyber attacks and unauthorised access
Define the term malware.
Malware is malicious code that is designed to cause harm or gain unauthorised access to a computer system
What is the definition of social engineering
C - the art of manipulating people so they give up confidential information
Phishing is a form of social engineering.
Describe 2 methods a school could use to protect its staff and students from phishing
Tell staff and students to not click on files or attachments from unknown senders
Train staff and students to never enter personal information in a pop up screen
Explain how each of the following cyber security threats could be used by a student to gain unauthorised access to a school network
- weak passwords
- misconfigured access rights
- removable media
- unpatched/outdated software
Weak passwords, students code use brute force methods. Default passwords can be published online so everyone knows them
Misconfigured access rights
Allows students to access areas they are not supposed to , students can reconfigure network.
Removable media
Could contain malware that allows students to gain access, can be used to steal data
Outdated sofatware
Could allow students to exploit known weakness
A student can install malware.
What are the sizes/units used to store data
Bit - 1 or 0 Nibble - 4 bits Byte - 8 bits Kb - 1000 bytes MB - 1000 kilobytes GB - 1000 megabytes TB - 1000 gigabytes
What are the base numbers for binary
1,2,4,8,16,32,64,128
What happens in binary shift , multiplying
It shifts to the left, the number is doubled
What happens in binary shift, divding
It shifts to the right, the number is halved