N5 Exam Prep Flashcards

1
Q

Data Controller

A

The person who is responsible for looking after the personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a Primary Key

A

Is used to uniquely identify each row in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by a foreign key?

A

A primary key which is in both tables to link them together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of validation is used when the user can only select from a list of options?

A

Restricted Choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by the term ‘Virus’

A

A type of malware written to copy its program into others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan?

A

A type of malware which pretends to be something useful such as anti-virus software and instead makes more viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of malware program would record information about which websites a user visits?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack leaves users unable to access files, use printers or connect to the Internet?

A

DOS (Denial of Service Attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is not always possible to limit physical access to a computer in order to protect data?

A

Computers which are accessed by the public such as computers in a library or a bank ATM machine make it easy for many people to access each other’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would you ensure that data that is being transferred remains unreadable should it be intercepted?

A

Make sure a secure sockets layer is created when data is sent, this would make sure that data is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What method can be used by an individual to ensure that others using the same computer cannot access any information which they have stored?

A

Setup a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name one method used to disrupt the running of a computer network and its services in a denial of service attack

A

Overwork the processor, which means it cannot perform anything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the purpose of a firewall on a network

A

A firewall restricts what information can pass through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe how a computer virus works?

A

A virus infects other programs with its own. They are programmed to spread by copying themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe one method used by anti-virus software to detect viruses on a computer

A

Checks for known virus behaviour in main memory and virus signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State what is meant by file compression

A

Reducing the amount of storage space that a file takes up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State an advantage of compressing files before they are sent via email

A

Files upload/download faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

State one advantage of using a standard file format when sending email attachments

A

The file can be viewed by the receiver on any word processing package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Data Subject

A

The person who data is stored on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State one standard file format for text

A

.txt OR .RTF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name advantages of saving photos in bmp format

A

No compression

High quality images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an advantage of saving graphics in JPEG format despite it giving a lower quality image

A

The file size is smaller as it is compressed which is what causes the reduction in quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Name two standard file types for saving audio files

A

WAV

MP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does ASCII stand for?

A

American Standard Code for Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define ASCII

A

An 8 Bit code for representing English characters as numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Name the method used by WAV to affect file size

A

Different sampling rates and bit depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

State a suitable file type for transmitting video data over the Internet

A

MP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

State the advantage(s) of uploading the report as a PDF file

A

It can be accessed from any device and shared across the Internet once saved. (It is portable).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does JPEG stand for?

A

Joint Photographic Experts Group

30
Q

What does GIF stand for?

A

Graphics Interchange Format

31
Q

What is PNG most commonly used for?

A

Designed for Internet transfer of images

32
Q

Which 3 standard file formats use lossy compression (1 graphic, 1 audio, 1 video)

A

JPEG, MP3 and MP4

33
Q

State the type of language used to create web pages which enable a browser to display the information in the web pages and give an example

A

Mark-Up Language and an example of this would be HTML

34
Q

What type of language is JavaScript

A

Scripting language

35
Q

What does JavaScript mean?

A

To make webpages more interactive and dynamic

36
Q

What does URL stand for?

A

Uniform Resource Locator

37
Q

Explain the purpose of a URL

A

To tell your web browser what the unique address of the web server that has the pages which you want to display is

38
Q

Explain the role of a web browser when viewing web pages

A

Used to locate, gather and display content on screen

39
Q

State the purpose of a search engine

A

To use key words specified by the user to display results of websites the user would most likely want to visit

40
Q

Describe how a web designer could ensure that a website is accessible by visually impaired and hearing impaired users

A

Audio description could be used for those who are visually impaired and make sure all audio can be seen through text such as subtitles for hearing impaired users

41
Q

State the type of loop used in input validation

A

Conditional loop

42
Q

Address Bus

A

Wires connecting the CPU with main memory, used to identify particular locations in main memory

43
Q

Data Bus

A

Transfers instructions from the main memory to the processor

44
Q

Health and Safety Legislation

A

Adjustable workstation chairs for computer users to change the height and seating position to prevent back pain

45
Q

Phishing attack

A

The act of sending an email to a user falsely claiming to be something useful - forcing he user into giving private information

46
Q

Client Server Advantages

A

Data can be stored/accessed centrally
Only accessible by registered users
Different access rights for users

47
Q

Peer-To-Peer disadvantages

A

Not as secure as a client server

Risk from viruses

48
Q

Biometric Sensors Benefits

A

Eliminate problems caused by lost IDs or forgotten passwords

49
Q

Benefits of pseudo code, structure diagram and flowcharts

A

Flowchart/structure chart gives a visual representation of the sequence of processes/events

50
Q

Quality User Interfaces

A

User friendliness
Straightforward navigation
Consistent/High quality visual layout

51
Q

Copyright, Designs and Patents Act

A

It gives the creators of media content the right to control the ways in which their material may be used

52
Q

Computer Misuse Act

A

Unauthorised access to computer material
Unauthorised access with intent to commit further offence
Unauthorised modification of computer material

53
Q

Data protection act

A

Personal data must:

Be processed fairly
Be obtained for specified purposes
Be relevant and not excessive
Be accurate and up to date

54
Q

Advantages of using smart phones and tablets

A

Size/Weight - Smartphone fits into pocket and is carried around easily
Internet connection using 3G - Access almost anywhere

55
Q

1 Advantage and 1 disadvantage of cloud storage

A

Can access data from any computer device remotely but if the Internet is inaccessible then it cannot be accessed

56
Q

Storing REAL numbers

A

They are stored using mantissa and exponent

57
Q

Relative Addresssing

A

An address specified by indicating its distance from another address

58
Q

Absolute addressing

A

A fixed address in memory.

59
Q

Firewalls purpose

A

Protect a network or system from unauthorised access

Block specific IPs from accessing

60
Q

What are vectors stored as?

A

.svg

61
Q

Advantages of vectors graphics

A

Elements of vector images can be independently edited

He have a small file size as not every pixel is stored

62
Q

Good accessibility elements

A

Colour scheme
Layout
Large characters
Audio/zoom features for visually impaired

63
Q

Advantage of Compilers

A

Can create portable code

64
Q

Advantages of an interpreter

A

An interpreter reads and executes source code without the need to translate the entire program first
Feedback on errors

65
Q

Testing Websites

A

Testing navigation - Hyperlinks, back and home buttons
Check screen matches design
Ensure accurate spelling

66
Q

Magnetic Storage Example

A

Hard drives, tapes, common file servers

67
Q

Solid State Storage examples

A

SSD Cards, USB storage devices

68
Q

Optical storage examples

A

CD-RW
CD-R
DVD

69
Q

Standard algorithm?

A

Is a type of design notation

70
Q

Purpose of an ALU

A

Performs arithmetic operations

71
Q

Registers

A

Store the information/data just before executed

72
Q

Control Unit

A

It detracts instructions from memory and decodes and executes them