N5 Exam Prep Flashcards

(72 cards)

1
Q

Data Controller

A

The person who is responsible for looking after the personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a Primary Key

A

Is used to uniquely identify each row in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by a foreign key?

A

A primary key which is in both tables to link them together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of validation is used when the user can only select from a list of options?

A

Restricted Choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by the term ‘Virus’

A

A type of malware written to copy its program into others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan?

A

A type of malware which pretends to be something useful such as anti-virus software and instead makes more viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of malware program would record information about which websites a user visits?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack leaves users unable to access files, use printers or connect to the Internet?

A

DOS (Denial of Service Attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is not always possible to limit physical access to a computer in order to protect data?

A

Computers which are accessed by the public such as computers in a library or a bank ATM machine make it easy for many people to access each other’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would you ensure that data that is being transferred remains unreadable should it be intercepted?

A

Make sure a secure sockets layer is created when data is sent, this would make sure that data is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What method can be used by an individual to ensure that others using the same computer cannot access any information which they have stored?

A

Setup a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name one method used to disrupt the running of a computer network and its services in a denial of service attack

A

Overwork the processor, which means it cannot perform anything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the purpose of a firewall on a network

A

A firewall restricts what information can pass through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe how a computer virus works?

A

A virus infects other programs with its own. They are programmed to spread by copying themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe one method used by anti-virus software to detect viruses on a computer

A

Checks for known virus behaviour in main memory and virus signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State what is meant by file compression

A

Reducing the amount of storage space that a file takes up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State an advantage of compressing files before they are sent via email

A

Files upload/download faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

State one advantage of using a standard file format when sending email attachments

A

The file can be viewed by the receiver on any word processing package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Data Subject

A

The person who data is stored on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State one standard file format for text

A

.txt OR .RTF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name advantages of saving photos in bmp format

A

No compression

High quality images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an advantage of saving graphics in JPEG format despite it giving a lower quality image

A

The file size is smaller as it is compressed which is what causes the reduction in quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Name two standard file types for saving audio files

A

WAV

MP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does ASCII stand for?

A

American Standard Code for Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Define ASCII
An 8 Bit code for representing English characters as numbers
26
Name the method used by WAV to affect file size
Different sampling rates and bit depth
27
State a suitable file type for transmitting video data over the Internet
MP4
28
State the advantage(s) of uploading the report as a PDF file
It can be accessed from any device and shared across the Internet once saved. (It is portable).
29
What does JPEG stand for?
Joint Photographic Experts Group
30
What does GIF stand for?
Graphics Interchange Format
31
What is PNG most commonly used for?
Designed for Internet transfer of images
32
Which 3 standard file formats use lossy compression (1 graphic, 1 audio, 1 video)
JPEG, MP3 and MP4
33
State the type of language used to create web pages which enable a browser to display the information in the web pages and give an example
Mark-Up Language and an example of this would be HTML
34
What type of language is JavaScript
Scripting language
35
What does JavaScript mean?
To make webpages more interactive and dynamic
36
What does URL stand for?
Uniform Resource Locator
37
Explain the purpose of a URL
To tell your web browser what the unique address of the web server that has the pages which you want to display is
38
Explain the role of a web browser when viewing web pages
Used to locate, gather and display content on screen
39
State the purpose of a search engine
To use key words specified by the user to display results of websites the user would most likely want to visit
40
Describe how a web designer could ensure that a website is accessible by visually impaired and hearing impaired users
Audio description could be used for those who are visually impaired and make sure all audio can be seen through text such as subtitles for hearing impaired users
41
State the type of loop used in input validation
Conditional loop
42
Address Bus
Wires connecting the CPU with main memory, used to identify particular locations in main memory
43
Data Bus
Transfers instructions from the main memory to the processor
44
Health and Safety Legislation
Adjustable workstation chairs for computer users to change the height and seating position to prevent back pain
45
Phishing attack
The act of sending an email to a user falsely claiming to be something useful - forcing he user into giving private information
46
Client Server Advantages
Data can be stored/accessed centrally Only accessible by registered users Different access rights for users
47
Peer-To-Peer disadvantages
Not as secure as a client server | Risk from viruses
48
Biometric Sensors Benefits
Eliminate problems caused by lost IDs or forgotten passwords
49
Benefits of pseudo code, structure diagram and flowcharts
Flowchart/structure chart gives a visual representation of the sequence of processes/events
50
Quality User Interfaces
User friendliness Straightforward navigation Consistent/High quality visual layout
51
Copyright, Designs and Patents Act
It gives the creators of media content the right to control the ways in which their material may be used
52
Computer Misuse Act
Unauthorised access to computer material Unauthorised access with intent to commit further offence Unauthorised modification of computer material
53
Data protection act
Personal data must: Be processed fairly Be obtained for specified purposes Be relevant and not excessive Be accurate and up to date
54
Advantages of using smart phones and tablets
Size/Weight - Smartphone fits into pocket and is carried around easily Internet connection using 3G - Access almost anywhere
55
1 Advantage and 1 disadvantage of cloud storage
Can access data from any computer device remotely but if the Internet is inaccessible then it cannot be accessed
56
Storing REAL numbers
They are stored using mantissa and exponent
57
Relative Addresssing
An address specified by indicating its distance from another address
58
Absolute addressing
A fixed address in memory.
59
Firewalls purpose
Protect a network or system from unauthorised access | Block specific IPs from accessing
60
What are vectors stored as?
.svg
61
Advantages of vectors graphics
Elements of vector images can be independently edited | He have a small file size as not every pixel is stored
62
Good accessibility elements
Colour scheme Layout Large characters Audio/zoom features for visually impaired
63
Advantage of Compilers
Can create portable code
64
Advantages of an interpreter
An interpreter reads and executes source code without the need to translate the entire program first Feedback on errors
65
Testing Websites
Testing navigation - Hyperlinks, back and home buttons Check screen matches design Ensure accurate spelling
66
Magnetic Storage Example
Hard drives, tapes, common file servers
67
Solid State Storage examples
SSD Cards, USB storage devices
68
Optical storage examples
CD-RW CD-R DVD
69
Standard algorithm?
Is a type of design notation
70
Purpose of an ALU
Performs arithmetic operations
71
Registers
Store the information/data just before executed
72
Control Unit
It detracts instructions from memory and decodes and executes them