Gsce Hard Questions Flashcards

(57 cards)

1
Q

Explain why computer system can only process data and binary form 

A

Data is processed in a computer by using logic gates
As it only has two states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how the MDR, Andy, ALu are used in the fetch decode execute cycle

A

Data fetched from ram is stored in the MDR
Data from MDR is sent to ALU to be executed
ALU performs calculations and logical operations on data
ALU has a built in register…
… where it stores interim results of calculations
After calculations, ALU sends data to MDR
Data is sent from MDR to be written to RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe what is meant by an embedded system

A

It is a built in device
Which has a single purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a reason for ROM

A

To store boot up instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe anti virus

A

Scans the computer system for viruses
Has a record for known viruses
Removes any viruses found
Checks data before it is downloaded
And stops download is virus is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Anti spyware

A

Scans the computer for spyware
Removes any spyware found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe firewall

A

Monitors traffic coming in and out of the computer system
Checks that the traffic meets the criteria
Blocks any traffic that does not meet the criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can u make passwords protect computers from hacking or other

A

Making password stronger
Changing It regularly
Lock out after set number of attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do u do to biometrics to make it protect the computer

A

Data needed to enter is unique to individual
… therefore it is very difficult to replicate
Lock out after set number of attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does two step verification help protect the computer

A

Extra data is sent to device, pre set by the user
… making it more difficult for the hacker to obtain it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does IDE stand for

A

Integrated development environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three common functions of an ide

A

Translator
Code editor
Error diagnostics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe what is meant by cloud storage

A

Storage consisting of servers
That are often in a remote location
That are maintained by a third party company
Storage is normally accessible using a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is virtual memory created and used

A

The hard drive is partitioned to create virtual memory
When RAM is full
Pages of data that are not required
Are transferred from RAm to virtual memory
When the data is required again the pages are transferred back to RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When would an interrupt be generated

A

Division by 0
Two processes trying to access the same memory location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State what is meant by a digital currency

A

An currency that exists only electronically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the process of block chain in digital currency

A

It acts as a ledge
By tracking each transaction
It keeps a series of time stamped records
That cannot be altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain how lossless compression compresses a file

A

An algorithm is used
No data is removed in the process
Repeated words are identified
And indexed
And their positions are stored into a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exokain why an expert system needs a knowledge base

A

It needs facts
To generate rules
To make the decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some components that are present for an expert system

A

Rule base
Inference engine
Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State what is meant by machine learning

A

When a program has the ability to adapt to its own processes or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe what is meant by a microprocessor

A

Type if intergrated circuit
That is contained on a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe how the sensor and the microprocessor are used in this automated light system (5to6 points)

A

Sensors sends signal to microprocessor
Signal is converted from analogue data to digital data
Value to compared to stored values
If value is outside range
Microprocessor sends a signal to switch of lights
Process is continuous

24
Q

Describe what is meant by MAC address

A

Used to identify a device
It is unique
It is set by the manufacturer
The first set is the manufacturer ID
The second set is the serial number

25
Two uses of HEXADECIMAL
Colour CODES Error messages IO address ASCII URL
26
Describe the structure of a data packet
It has a header That contains the destination address, packet number and originator address It has the payload It has the trailer
27
Why is parallel half duplex transmission a good method
Parallel would allow the fastes transmission Of large amount of data Data can be uploaded and downloaded But this does not have to be the same time
28
Describe what is meant by a DDoS attack
Multiple computers are used as bots Designed to deny people access to a website A large amount of requests are sent At the same time The server is unable to respond So fails
29
What is the name of https
Protocol
30
What is the name of Cambridge.org.uk
Domain name
31
What is the name of /index.html
Web page
32
Describe the purpose of the CU
It sends control signals It decides an instruction Using an instruction set
33
Purpose if the core in the CPU
To process an instruction
34
How does a dual core CPU affect the performance of the computer
It can process two instructions simultaneously simultaneously Increasing the performance
35
What is meant by ide (not what ide stands for fyi)
Software that provides useful functions for a programmer writing a computer program
36
State some characteristics of a robot
It has a mechanical structure Electrical components Programmable
37
Two advantages of using robots
More efficient than humans More accurate than humans Don’t need breaks
38
Describe what is meant by a character set
All the characters and symbols that can be represented by a computer system Each character and symbol is assigned a unique value
39
Describe the process of SSL and explain how it provides a secure connection
SSL is a protocol That encrypts any data sent It uses digital certificates that is Sent to the browser That contains a public key That can be used to authenticate the website
40
Explain how sound is stored in a computer
Sound is stored using a microphone The sound wave is sampled at intervals Samples represent th wave These readings are converted to binary which can be stored and processed by a comouter
41
Benefits of compressing a file
Smaller file to transmit Transmitter quicker Uses less bandwidth
42
Describe the process of packet switching
Data is broken into packets Each packet can take a different route A router controls the route the packet takes Packets may arrive out of order Once the last packet has arrived, the packets rearrange into correct order
43
examples of software THAT CAN BE STORED ON SSD
Operating system Applications software Utility software
44
Explain the difference between a compiler and an interpreter
An interpreter translates the code line by line Whereas a compiler translates the whole code at the same time An interpreter stops and reports an error as it is encountered Whereas a compiler creates a report of all the errors at the end of the translation
45
Describe what is meant by a high level language
Uses English like statements Needs to be converted to machine code to be processed by computer Using a translator It is portable
46
Explain how lossless compression would compress a SOUND FILE
Reduce amplitudes to on,u the range used This means fewer bits per sample
47
Explain how a laser is used to store and read data from a disk
Laser is shone at disk An arm moves the laser across surface of disk The laser burns pits onto surface of the disk The laser js used to read the pits and lands on the surface of the disk The reflected light from the laser shining on the disk is captured by sensor
48
Describe parity check
Checks a byte of data A parity bit is added Counts number id 1s Can be even or odd If parity is incorrect, error is detected
49
Describe Automatic repeat request
An error is detected ( in parity check or sm) So request to re send data And repeated till data is correct Then send an acknowledgment that data is received
50
Describe a solid state memory
It has no moving parts Uses transistors One transistor is called a floating gate Second transistor is called the control gate
51
Describe how keylogging software can be used to gain unauthorized access to a customers account
Keylogger is downloaded without knowledge Keylogger records key presses Data is relayed back to third party Data analyzed Details can be used to log into account
52
Distinguish between the internet and World Wide Web
Internet has a massive network of networks Uses IP protocol WWW is a collection of web pages Web browser are accessible using browsers
53
Describe how the browser uses the domain name service to display the web page
URL is passed to nearest DNS DNS looks for URK in its database Finds the matching IP address and returns it to the originator And if cannot find it p, it forwards on to a higher level DNS
54
Describe what is meant by cookies
Cookies are used for functions Sabpving persinal data Tracking user preferences Storing log in details
55
What is Trojan horse
Disguise the self’s as other programs But act like any other virus, by deleting and corrupting files
56
What is pharming
It occurs when there is malicious software that sits on a victims computer It monitors the users web activity ISP take action to block redirects when they are aware of the attack
57
What is phishing
A sent email that looks real, to get you to hand over your personal details