Paper 1 Flashcards

1
Q

Central Processing Unit (CPU)

A

processes data and instructions by following the:
FETCH- DECODE- EXECUTE cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Unit (CU)

A

¬ executes program instructions by following FDE cycle
- controls data flow inside CPU to registers and outside CPU
- Overall control of CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Program Counter (PC)

A

holds memory address of the instruction for each cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cache

A

¬ very fast memory but slower than registers.
- Stores regularly used data to access quickly.
- low capacity but expensive
- which means more cache improves the performance of the CPU
- the bigger the cache size,the more data can be stored closer to the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Memory Address Register (MAR)

A

holds the memory address about to be used by the CPU, which can point to specific data or CPU instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Memory Data Register (MDR)

A

holds the data or instructions fetched from memory or waiting to be written to memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Arithmetic Logic Unit (ALU)

A

¬ carries out calculations and logical operations.
- contains accumulator which is used to store intermediate results and calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

clock speed

A

¬ the speed which instructions are executed in cycles per second.
- measured in hertz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

higher rate of clock speed

A

the higher the rate clock speed, the greater the number of instructions that can be carried out per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

embedded systems

A

Computers built into other devices such as dishwashers microwaves and and TV’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

core

A

-it can independently perform or process all computational tasks.
- more cores = the more instructions it can carry out at once so the faster it can process a batch of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Random Access Memory (RAM)

A

¬ main memory
- volatile (loses data when off)
- more RAM = better performance
- more programs can run at the same time -multitaksing
- stores: applications, GUI, OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Read Only Memory (ROM)

A

¬ CPU reads instructions from ROM
- non-volatile (keeps data when off)
- smaller capacity
- stores: BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

virtual memory

A

Area of secondary storage used by the OS as extra RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fetch-Decode-Execute cycle (fetch)

A

1# copy memory address from PC to MAR
2# copy instructions stored in MAR to MDR
3# increment PC to point to address for next instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

decode

A

the instruction in the MDR is decoded by the CU . The CU may then prepare for the next step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

execute

A

the instructions is performed this could be load data from memory, write data to memory ,do a calculations or logic operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

secondary storage

A

¬ where data is stored when not in use
- non- volatile
- (HDD, SSD)
- read / write speeds much slower than primary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why secondary storage used

A

Secondary storage is non-volatile , long-term storage. It is used to keep programs and data indefinitely.

20
Q

magnetic storage
advantages and disadvantages

A

Advantages
- LARGE capacity (3TB)
- low cost
- fast read / write time
Disadvantages
- not very portable
- can be damaged

21
Q

Hard Disk Drive (HDD)

A
  • portable HDDs back up and transport large data amounts
  • long lasting (reliable)
  • can be damaged by dropping
    ¬ traditional internal storage for laptops / PCs
22
Q

SSD advantages

A
  • don’t need defragmentation
    -faster
    -more shock- proof
    -don’t make any noise
23
Q

optical discs advantages and disadvantages

A
  • cheap per GB
  • portable
  • robust (can easily be scratched though)
  • slow transfer speed compare to SSD
24
Q

network

A

two or more computers connected together to share information and resources

25
Q

Local Area Network (LAN)

A

¬ covers small geographic area located on a single site
LAN has own infrastructure

26
Q

Wide Area Network (WAN)

A

¬ covers large geographical areas , WAN uses external/shared infrastructure

27
Q

cloud storage

A

¬ stores files and programs online
Advantages
efficient method of backing up data and so saves the firm time and money
* It would allow their employees to work from anywhere
* Can access files from any device
* Easier/quicker to share files with others
* provides secuitry

Disadvantages
-Reliant on third party for back up connection
- Data stored in the Cloud will be vulnerable to hacking and other threats
- Cannot access files if no Internet access
- expensive

28
Q

bandwidth

A

amount of data transferred in a given time

29
Q

what affects wireless network performance

A

-distance from Wireless Access Point (WAP
-physical objects (walls)
- interference from other devices
- weather

30
Q

Wireless Access Point (WAP)

A

allows devices to connect to WAN using WiFi

31
Q

router

A

connects two networks together (LAN and WAN) transmits data between them
* Receive packets
* transmitting packets
Assign IP addresses to nodes/

32
Q

Network Interface Card (NIC)

A

internal piece of hardware that allows a device to connect to a network

33
Q

fibre optic

A

data transmitted as light , fast but expensive. Longer distance = less interference

34
Q

switch

A

connect devices on a LAN. Switches receive data from one device and transmit this data to the device on the network with the correct MAC address

35
Q

client server

A

¬ network managed by a server
- files stored centrally
- stores user profiles, passwords, and access information
—————————————————-
1# clients send request to server
2# processes request and responds

36
Q

peer to peer

A

¬ all devices equal
- devices connect directly to each other
- used at home to share files between devices or connect to printer

37
Q

client server (advantages and disadvantages)

A

✔ easy to manage network security
✔ easier to track files (central)
✔ servers reliable and always on
✔ easy to update software
—————————————————
✘ need it specialist to maintain
✘ expensive to set up
✘ may become overloaded if too many clients accessing at once
✘ dependant on server (if server down, clients lose access to work)

38
Q

peer to peer (advantages and disadvantages)

A

✔ easy to maintain
✔ not dependant on server
————————————————-
✘ no central management
✘ file copies between devices = duplicates
✘ easy to lost track of what stored and which files up to date
✘ if one machine fail = data lost
✘ machines slow if other devices access

39
Q

virtual network

A

Non-physical network
 A private network that runs on a public/existing network.
make use of software to divide devices on a LAN into smaller groups

40
Q

user access level

A

User access levels
o Prevents accidental changes
o Limits data users can access

41
Q

Anti malware

A

Anti-malware
o Scans for / identifies virus/spyware
o Quarantines/deletes virus/spyware
o Stops the download of virus/spyware

42
Q

software security methods

A

encryption
firewall
Anti malware
user access level

43
Q

examples of utility programs

A

.Compression
* Firewall
* Anti-virus

44
Q

Threats and prevention

A

Virus / Trojan / worm / malware
 Piece of software that replicates itself //
causes damage
 Running anti-virus

spyware
 Running anti-spyware
 Data interception / passive
 Data is sent to another device and is intercepted by a
third party
 Encryption

 Phishing
 An e-mail has a link that when clicked directs the user to a fake website that collects personal data
-firewall

Ransomware - Use of antimalware
SQL injection - Network forensics

45
Q

prevent unauthorised access

A

Password
 No access without the password // description of strong password //
limit attempts to guess // changing it regularly
 before laptop is locked

 Biometrics
 Need fingerprint/retina scan
 Do not leave laptop logged on/unattended
 So that other people cannot physical access it

46
Q

URL TO IP ADDRESS

A

URL sent to DNS
* DNS finds to IP in its database
* DNS returns IP
* IF not found, DNS sends to higher level DNS