Data Representation and Cyber Security Flashcards

1
Q

State the decimal representation of the binary number 10010100

A

148

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State the hexadecimal representation of the binary number 10010100

A

94

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State the hexadecimal representation of the decimal number 143

A

8F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State the binary representation of the hexadecimal number BE

A

B - 1011
E - 1110
10111110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give two reasons why hexadecimal is often used instead of binary in computer science.

A

Hexadecimal is easier for humans to read than binary

It is quicker to type in hexadecimal than binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the answer to 01010101 + 01101100 + 00011001

A

11011010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State the result in binary of performing binary shift 2 places to the left on the value 00111001

A

11100100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the largest decimal number that can be represented using 6 bits

A

63

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many bits are there in 5kb

A

5000
* 8
* 1000
40,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain how a sound wave is converted so that it can be stored in a computer.

A

A microphone or sound sensor picks up the sound wave
The wave is converted from an analogue to digital signals
The height of the wave is measured
the sample are stored as binary values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A student has recorded a 30 second digital sound track using a sample rate of 44 000Hz. 8 bit have been used to store each sample taken.
Calculate the file size in kb.

A

44,000 * 8 * 30 = 10,560,000
10,560,000 / 8 = 1320000
1320000/1000 = 1320 kB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data compression

A

C- the process of encoding information to try and use fewer bits than the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give 2 reasons why data compression is often used.

A

To speed up file transfer

To use less storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RLE is one method of compressing data

State the feature of data that allows it to be compressed effectively using RLE

A

The data contains lots of runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe how RLE works. Give an example

A

It looks for consecutive repeating data in a file - called a run. Instead of storing each pice of repeated data separately, it stores the number of times it repeats.
An example is a image of how the specific rows of pixels would be compressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define the term cyber security

A

Cyber security aims to protect networks, data, programs and computers against damage, cyber attacks and unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define the term malware.

A

Malware is malicious code that is designed to cause harm or gain unauthorised access to a computer system

18
Q

What is the definition of social engineering

A

C - the art of manipulating people so they give up confidential information

19
Q

Phishing is a form of social engineering.

Describe 2 methods a school could use to protect its staff and students from phishing

A

Tell staff and students to not click on files or attachments from unknown senders
Train staff and students to never enter personal information in a pop up screen

20
Q

Explain how each of the following cyber security threats could be used by a student to gain unauthorised access to a school network

  • weak passwords
  • misconfigured access rights
  • removable media
  • unpatched/outdated software
A

Weak passwords, students code use brute force methods. Default passwords can be published online so everyone knows them
Misconfigured access rights
Allows students to access areas they are not supposed to , students can reconfigure network.
Removable media
Could contain malware that allows students to gain access, can be used to steal data
Outdated sofatware
Could allow students to exploit known weakness
A student can install malware.

21
Q

What are the sizes/units used to store data

A
Bit - 1 or 0
Nibble - 4 bits 
Byte - 8 bits
Kb - 1000 bytes
MB - 1000 kilobytes
GB - 1000 megabytes 
TB - 1000 gigabytes
22
Q

What are the base numbers for binary

A

1,2,4,8,16,32,64,128

23
Q

What happens in binary shift , multiplying

A

It shifts to the left, the number is doubled

24
Q

What happens in binary shift, divding

A

It shifts to the right, the number is halved

25
Q

What are the bases of hexadecimal

A

1,16,256,4096

26
Q

What are character sets

A

Collections of characters that a computer recognises from their binary representation.

27
Q

What is ASCII?

A

Each character has 7 bit binary code

represents 128 different characters

28
Q

What is the difference between ASCII and Unicode

A

Unicode comes in several different forms and tries to cover every possible letter or symbol. It has multiple bytes for each character.
All major languages is covered.

29
Q

What are the type of images usually found?

A

Bitmap . Bitmap images are made up of pixels.
The colour of each pixel is represented by binary code
Black and white images use 2 colours so need 1 bit.

30
Q

What is image resolution ?

A

the number of pixels in an image. The more pixels , the better quart of image but also more file size.

31
Q

What affects the size and quality of sound files.

A
  • Sample rate , how many samples you take in a second
    Same resolution - number of bits available
    However increasing this increases file size too.
32
Q

What are the two types of compression?

A

Lossy and Lossless

33
Q

What is lossy compression and what are the pros and cons of it.

A
Lossy compressions works by permanently removing data from the file. 
Pro - reduces file size, 
Less bandwidth 
Cons - loses data 
Can't be used on text or software files 
Worse quart than original 

e.g. MP3

34
Q

What is lossless compression and what are the pros and cons of it.

A

Lossless compression makes the file smaller by temporarily removing data to store the file and then restores it to its original state.
Pro - data removed temporality
can be used on texts and files
Turned back to original
con - only slight reduction in file size

E.g. PNG

35
Q

What is penetration testing ?

A

Penetration testing is when organisations employ specialists to stimulate potential attacks to their system. It is to identify possible weaknesses in their cyber security.

36
Q

Compare white box and black box penetration?

A

White box penetration tells a malicious insider who has knowledge on the system to identify weaknesses. They are given user credentials.

Black box penetration stimulates an external cyber attack. The person is not given any credentials and try to hack in any way they can.

37
Q

Describe 3 different categories of malware.

A

Worms - like viruses but self replicate without any user help, meaning they can spread very quickly. They exploit weaknesses in network security.
Trojans - malware disguised as legitimate software. Trojans do not self replicate - users install them not realising they have a hidden purpose.
Spyware - Secretly tracks actions like key presses and sends info to the hacker, who might be able to work out things like passwords and bank details.

38
Q

What is pharming

A

User is directed to fake version of a website
Asks for personal information
Can be prevented by up to date anti malware software and web filters.

39
Q

Images can be represented in a computer’s memory as a bitmap. Explain how an image can be represented as a bitmap.

A

Image is divided into pixels
Each possible colour is represented by a (unique) bit pattern
The colour of each pixel is stored
The order of the bit patterns for the individual pixels indicates where the pixel will appear in the image

40
Q

Define sampling rate.

A

number of samples taken per second;

41
Q

Explain each of these security measures:
Authentication
Encryption

A

Authentication is ensuring that a user is who they are
claiming to be, e.g.. password, fingerprint
Encryption is changing data so that it cannot be read (except by authorised users)