important questions Flashcards

1
Q

describe how resistive touch screen tech operates

A

-screen made up of two layers
-user pushes top layer into bottom
-layers create a corcuit
-causes flow of electtricity
-allowing coordinates/location of user touch to be calculated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

benefits of resistive touch screen

A

works with gloves on
isnt damaged by water
supports multitouch
cheap to manufacture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disadvantages of resistive touch screen

A

-lower resolution
-not very senesitive to touch
prone to scratches
-poor visibility of screen on sunlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe the stored concept program

A

data and instructons are sotred in same memory
can only be fethced one at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain methods to be used to avoid accendantly losing/deleting a file

A
  • backup file- data can be recovered
    -double verification- computers sends verification to confirm user wants to delete file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are two ways that a user coul check website uses ssl protocal

A

closed padlock on browser
uses https protocal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

state name of updated ssl protocal

A

tls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain why proxy server is used and how

A

-acts as an intermediary between web browser and server
-examines traffic to web server
-stops malicous traffic
-cache frequently viewed web pages
-prevents dos attacks
-stops overload of requests to web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain some methods to avoid spyware

A

using virtual keyboard or biometrics- both means keypresses cant be recorded
use antispyware-actively scans comp for any malicous malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does ssl work

A

ssl is a security protocal, provides secure. communication over the internet
uses cmvination of symmetric and aysemmetric encryption to secure data
ssl operates at transport layer, ensure data is encrypted before sent over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

explain how file is transmitted using packet switching

A

piece of data is split into packets
packets include-header payload and trailer
packets transmitted from sender to receiver, through multiple wires
packets may arrive out of order
router controls route- shortest most efficient rout for packet
if packet isnt received another request is sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

describe tls

A

also uses combination of symmetric and aysemmetric encryption to secure data, it is a newer version of ssl, provides secure comunication over internet
made up of 2 layers
-handshake layer- establishes a secure connection between two endpoints
record layer- responsible for transmitting data securely between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain steps in tls

A

uses handshake layer and record layer
-client/browser requests secure connection to server
-client/ browser requests server to identify itsled
-server provides a digital certificate
-client/ browser validates certificate
-client/ browser sends a signal back to server to begin data transmission
-encryption method will agree and session key is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what component in the computer is needed to access a network

A

nic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what type of address is allocated to component by manufacturer, used to uniquely identify device

A

mac address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what device on network can connect multiple device and automatically assignt them an ip addresss

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

describe what is meant by a dnamic ip address

A

changes everytime user logs out of page or computer turned on again, can uniquely identify device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

describe infrared touch screen

A

leds shine infrared light accross a screen forming a matrix, when screen is thouched beams are interrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

advantages and disadvantages of infrared touch screen

A

excellent resolution, high precision, durable, allows multitouch
cant work with gloves on, expensive, heat senstive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

describe capactive touch screen

A

made up of a protective layer, a transparent conductive layer and a glass substrate, touching screen changes electrctrostatic field of conductive layer, coordinates/location of finger can be calculated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

advantages / disadvantages of capactivetouch screen

A

excellent quality, unlimited touch life, scale well
sensitive to interfernece to light, not waterproof, not gloves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

describe inkjet printers, + advantages and disadvantages

A

cheap, high quality image, good colour blending
slow printing
uses ink cartilidges which spray tiny bubbles of ink, with moving head, piezoelectric electricity, thermal bubble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

describe laser printers, + advantages and disadvantages

A

higher quality text, fast printing
expensive
laser applies static charge to paper
toner- powdered ink attracted to static charge, sticks and melts producing image
uses drum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the two different forms of projectors

A

LCD and DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
describe LCD projectors
use light of 3 colours, red, green and blue, colours are combined to form final image, high quality images
26
describe DLP projectors
thousands of tiny mirrors used reflect digital image from computer to screen smaller more portable, worst quality
27
what are the type of screens/ monitors
LCD and LED
28
describe LCD screens
sandwich crystals between s sheets of glass white back light iluminate screen from behind crystals solid, light cant pass electrical current applied to crystals to individual pixels, light can then pass, forming an image cheaper, worst image quality
29
describe LED screens
back light used is display of LED display made of pixels arranged in a matrix light shone at pixels bette quality image, better contrast and colour production, less electricity used, cost efficient, expensive at first
30
how does magnetic storage work
disk called platters spin constantly when comp on read write arm moves in and out across disk surface and electromagnet is on it which is used to read or write data
31
give an example and properties of magnetic storage
hdd, cheap, fast, large storage
32
example and properties of optical storage
cd, dvd, blu-ray, low storage, slow access, portable
33
examples of solid state, properties
ssd, memory cards, usb- flash drive no moving parts, compact, portable, large storage, produce less heat and power
34
nic
hardware device needed to connect computer to network
35
mac address
nic have unique address assigned to them which is the mac, assigned by manufacturer unique address cant be altered 48 bit long written in hexa 24 first bits are address of manufacturer other 24 automatically generated serial number
36
ip address
assigned by the isp static and dynamic ip ipv4 and ipv6
37
static ip
same address every time joins network
38
dynamic ip
assigned any available address when joins network, changes address
39
ipv4
32 bit long, denary
40
ipv6
128 bit long, 32 hexa characters, groups of 4 seperated by a dot
41
what is function of router
hardware device used to connect devices together to form a LAN or connect LANS to form a WAN allows devices to connect to LAN assign IP address to devices joining a LAN connect a LAN to internet sends to data to correct destination on a netwrok sends data packets to efficient route
42
whats a lan
computer network within single location, eg school
43
whats a wan
multiple lans joined together
44
how is laser used to store and read data from disk
laser is shined into disk, laser light reflects back and is captured by sensors lasers burns pits onto surface of disk uses pits and lands, 1 and 0 or on and off
45
what are two examples of software stored on the ssd
utility software, os or application software
46
state what is meant by biometric password
uses biological data
47
explain how firewall makes mobile device more secure
firewall gathers traffic coming and going out of server, traffic is compared to set critera, if traffic doesnt meet criteria, alert sent to warn adele, prevent hackers, and malicous attacks
48
what are ethical issues that could be a concern when using internet
pharming, spyware, malware, hacking, phishing, plagiarism, fake news, addiction, environmental effects, cyber bullying
49
why does an overflow occur
more bits that availble in register, number of bits is too big/ bigger than number of bits in register, result is bigger than 255, requires more than 8 bits to represent
50
describe brute force attacks
-user guesses a password -combinations are repeatedly entered -can be manually or automatically using a software -password guessed until access is given
51
what are some aims of brute force attacks
gain personal info, delete data, change data
52
where is session cookies and persistent cookies stored
session- ram persistent- hard drive
53
explain https
It is a secure protocol // hypertext transfer protocol secure It is a set of rules for data transmission It combines HTTP and SSL/TLS to transmit data It encrypts data for transmission
54
State three ways that stored data can be maliciously damaged
virus hacking malware
55
purposes of os
perform basic functions of computer manages hardware provides an itnerface handles interrupts
56
name of component in cpu that regulates number of fetch decode execute cycles cpu can perform in a second
clock
57
why may an error occur when data is transmitted
interferance
58
two advantages of owners of company sotring data in cloud storage
data can be accessed from anywhere, employees can thus work from anywhere cloud system will back up data, meaning company doesnt need to do this increase storage needed easily without needing to buy new hardware
59
one disadvantage to employees in copany of storing data incloud
needs internet to access, or else data cant be accessed
60
image resolution
number of pixels wife by number of pixels high
61
image colour depth
number of bits used to represent each colour
62
one benefit of increasing colour depth
greater range of colours can be used
63
role of router in annotated diagram
router examines packet looks for packet header, looks for ip address of destination packet sent towards its correct destination by fastest route router is shown connecting devices router is shown assigning an ip address to device
64
differences between primary and secondary storage
primary- directly accessed by cpu, secondary not primary can be both non volatile and volatile, secondary only non volatile primary storage faster access, secondary slower access speed of data
65
describe an expert system
has a rule base that contains a list of facts, the itnerference engine appies knowledge bse to the rule base to reach a diagnosis for repair of cr. the user provides data to system using an interface
66
describe what is meant by machine learning capabilities
trained, form of ai analyses patterns stored succesfully or not results adapts and reflects can improve or adapt without human influence/ input
67
how is hexadecimal used in website development
html colour codes
68
how does lossy compression reduce file size of videos
A compression algorithm is used The resolution could be reduced Colour depth could be reduced // bits per pixel reduced Sounds not heard by human ear could be removed Repeating frames could be removed
69
what uses position and alignment marks for orientation
QR CODE
70
explain how ssl protocal secures the data for transmission (2)
encrypts data based on authentication of an ssl certificate
71
describe operation of an HDD and how it stores data
has platters platters diveded into tracks platter spins magnetic field determines binary value read/ write arm moves in and out of platter arm has electromagnetic properties
72
describes how lossy compression functions
compression algorithm used permenantly removes data sample resolution reduced reduced frame rate reduced colour depth
73
explain how phishing obtains personal data
fake email sent to user contains link to false website user clicks link and enters personal details
74
what type of language can be used to directly manipulate hardware in the comp
assembly lang and machine code
75
what type of lang is portable
high level language
76
identify ways in which data can be accidentally damage
hardware or software failure fire flood
77
what type of sensor can check if vehicle too high
light
78
what type of sensor can count the vehicles enetering car park
pressure
79
is the ram contained in the cpu
no
80
what error check checks for errors in data entry
check digit
81
what error check checks for errors in data after transmission
checksum
82
describe process of interrupt
interrupt generated given rpiority interrput queued Interrupt stops CPU from processing current task CPU will service interrupt // Interrupt handler services interrupt …
83
MAR
register that holds address of data needs to be fetched
84
PC
next instruciton to be fetched
85
what are multimedia format that stores video and audio
MP4
86
what file stores sound
MP3
87
what files contain instructions on how to create the sound
MIDI
88
explain why user uses a compiler rather than interpreter
produces exectuable file would not realease source code source code cant be edited no need to be translated everytime
89
mdr
stores data that has been fethed
90
firmware
type of software stored in rom, incldues basic input output system bios, and bootlander
91
ascii vs unicode
ascii uses 7/8 bit per charcter unicode uses 16/32 bits per character ascii limited languages that cna represent unicode many languages including emojis ascii represent less characters than unicode
92
features of solid state storage
volatile or not uses flow gates uses control gates transistors uses nand or nor tech
93
examples of software interrupts
division by zero null value two processes trying to access same memory