Gsce Hard Questions Flashcards

1
Q

Explain why computer system can only process data and binary form 

A

Data is processed in a computer by using logic gates
As it only has two states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how the MDR, Andy, ALu are used in the fetch decode execute cycle

A

Data fetched from ram is stored in the MDR
Data from MDR is sent to ALU to be executed
ALU performs calculations and logical operations on data
ALU has a built in register…
… where it stores interim results of calculations
After calculations, ALU sends data to MDR
Data is sent from MDR to be written to RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe what is meant by an embedded system

A

It is a built in device
Which has a single purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a reason for ROM

A

To store boot up instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe anti virus

A

Scans the computer system for viruses
Has a record for known viruses
Removes any viruses found
Checks data before it is downloaded
And stops download is virus is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Anti spyware

A

Scans the computer for spyware
Removes any spyware found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe firewall

A

Monitors traffic coming in and out of the computer system
Checks that the traffic meets the criteria
Blocks any traffic that does not meet the criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can u make passwords protect computers from hacking or other

A

Making password stronger
Changing It regularly
Lock out after set number of attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do u do to biometrics to make it protect the computer

A

Data needed to enter is unique to individual
… therefore it is very difficult to replicate
Lock out after set number of attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does two step verification help protect the computer

A

Extra data is sent to device, pre set by the user
… making it more difficult for the hacker to obtain it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does IDE stand for

A

Integrated development environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three common functions of an ide

A

Translator
Code editor
Error diagnostics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe what is meant by cloud storage

A

Storage consisting of servers
That are often in a remote location
That are maintained by a third party company
Storage is normally accessible using a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is virtual memory created and used

A

The hard drive is partitioned to create virtual memory
When RAM is full
Pages of data that are not required
Are transferred from RAm to virtual memory
When the data is required again the pages are transferred back to RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When would an interrupt be generated

A

Division by 0
Two processes trying to access the same memory location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State what is meant by a digital currency

A

An currency that exists only electronically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the process of block chain in digital currency

A

It acts as a ledge
By tracking each transaction
It keeps a series of time stamped records
That cannot be altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain how lossless compression compresses a file

A

An algorithm is used
No data is removed in the process
Repeated words are identified
And indexed
And their positions are stored into a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exokain why an expert system needs a knowledge base

A

It needs facts
To generate rules
To make the decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some components that are present for an expert system

A

Rule base
Inference engine
Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State what is meant by machine learning

A

When a program has the ability to adapt to its own processes or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe what is meant by a microprocessor

A

Type if intergrated circuit
That is contained on a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe how the sensor and the microprocessor are used in this automated light system (5to6 points)

A

Sensors sends signal to microprocessor
Signal is converted from analogue data to digital data
Value to compared to stored values
If value is outside range
Microprocessor sends a signal to switch of lights
Process is continuous

24
Q

Describe what is meant by MAC address

A

Used to identify a device
It is unique
It is set by the manufacturer
The first set is the manufacturer ID
The second set is the serial number

25
Q

Two uses of HEXADECIMAL

A

Colour CODES
Error messages
IO address
ASCII
URL

26
Q

Describe the structure of a data packet

A

It has a header
That contains the destination address, packet number and originator address
It has the payload
It has the trailer

27
Q

Why is parallel half duplex transmission a good method

A

Parallel would allow the fastes transmission
Of large amount of data
Data can be uploaded and downloaded
But this does not have to be the same time

28
Q

Describe what is meant by a DDoS attack

A

Multiple computers are used as bots
Designed to deny people access to a website
A large amount of requests are sent
At the same time
The server is unable to respond
So fails

29
Q

What is the name of https

A

Protocol

30
Q

What is the name of Cambridge.org.uk

A

Domain name

31
Q

What is the name of /index.html

A

Web page

32
Q

Describe the purpose of the CU

A

It sends control signals
It decides an instruction
Using an instruction set

33
Q

Purpose if the core in the CPU

A

To process an instruction

34
Q

How does a dual core CPU affect the performance of the computer

A

It can process two instructions simultaneously simultaneously
Increasing the performance

35
Q

What is meant by ide (not what ide stands for fyi)

A

Software that provides useful functions for a programmer writing a computer program

36
Q

State some characteristics of a robot

A

It has a mechanical structure
Electrical components
Programmable

37
Q

Two advantages of using robots

A

More efficient than humans
More accurate than humans
Don’t need breaks

38
Q

Describe what is meant by a character set

A

All the characters and symbols that can be represented by a computer system
Each character and symbol is assigned a unique value

39
Q

Describe the process of SSL and explain how it provides a secure connection

A

SSL is a protocol
That encrypts any data sent
It uses digital certificates that is
Sent to the browser
That contains a public key
That can be used to authenticate the website

40
Q

Explain how sound is stored in a computer

A

Sound is stored using a microphone
The sound wave is sampled at intervals
Samples represent th wave
These readings are converted to binary which can be stored and processed by a comouter

41
Q

Benefits of compressing a file

A

Smaller file to transmit
Transmitter quicker
Uses less bandwidth

42
Q

Describe the process of packet switching

A

Data is broken into packets
Each packet can take a different route
A router controls the route the packet takes
Packets may arrive out of order
Once the last packet has arrived, the packets rearrange into correct order

43
Q

examples of software THAT CAN BE STORED ON SSD

A

Operating system
Applications software
Utility software

44
Q

Explain the difference between a compiler and an interpreter

A

An interpreter translates the code line by line
Whereas a compiler translates the whole code at the same time
An interpreter stops and reports an error as it is encountered
Whereas a compiler creates a report of all the errors at the end of the translation

45
Q

Describe what is meant by a high level language

A

Uses English like statements
Needs to be converted to machine code to be processed by computer
Using a translator
It is portable

46
Q

Explain how lossless compression would compress a SOUND FILE

A

Reduce amplitudes to on,u the range used
This means fewer bits per sample

47
Q

Explain how a laser is used to store and read data from a disk

A

Laser is shone at disk
An arm moves the laser across surface of disk
The laser burns pits onto surface of the disk
The laser js used to read the pits and lands on the surface of the disk
The reflected light from the laser shining on the disk is captured by sensor

48
Q

Describe parity check

A

Checks a byte of data
A parity bit is added
Counts number id 1s
Can be even or odd
If parity is incorrect, error is detected

49
Q

Describe Automatic repeat request

A

An error is detected ( in parity check or sm)
So request to re send data
And repeated till data is correct
Then send an acknowledgment that data is received

50
Q

Describe a solid state memory

A

It has no moving parts
Uses transistors
One transistor is called a floating gate
Second transistor is called the control gate

51
Q

Describe how keylogging software can be used to gain unauthorized access to a customers account

A

Keylogger is downloaded without knowledge
Keylogger records key presses
Data is relayed back to third party
Data analyzed
Details can be used to log into account

52
Q

Distinguish between the internet and World Wide Web

A

Internet has a massive network of networks
Uses IP protocol
WWW is a collection of web pages
Web browser are accessible using browsers

53
Q

Describe how the browser uses the domain name service to display the web page

A

URL is passed to nearest DNS
DNS looks for URK in its database
Finds the matching IP address and returns it to the originator
And if cannot find it p, it forwards on to a higher level DNS

54
Q

Describe what is meant by cookies

A

Cookies are used for functions
Sabpving persinal data
Tracking user preferences
Storing log in details

55
Q

What is Trojan horse

A

Disguise the self’s as other programs
But act like any other virus, by deleting and corrupting files

56
Q

What is pharming

A

It occurs when there is malicious software that sits on a victims computer
It monitors the users web activity
ISP take action to block redirects when they are aware of the attack

57
Q

What is phishing

A

A sent email that looks real, to get you to hand over your personal details