Paper 2 Flashcards

(37 cards)

1
Q

Operating system functions/purpose

A

(Processor, Memory, Application, Security) management
User/hardware interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do interpreters work

A

No machine code
Call MC subroutines to carry out commands
Translation line by line
Stops when error found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is there more RAM than cache

A

Ram is cheaper
Cache can’t store data and programs simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Issues with SSDs

A

Expensive
Low storage capacities
Limited rewrite capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sample resolution

A

No. Of bits/ sample

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAN v LAN

A

WAN operates over larger area
WAN has morre devices connected
WANs are slower than LANs
WANs have collective ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless over wired networks

A

Easier to add new devices
No tripping hazards
Less cable management/issues
Easy guest access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reasons for automatic software updates

A

People forget to update manually
Computers get protected faster
Updates from trusted sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is RLE not useful

A

Few repeated characters
RLE takes up more space than the original file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Relational database”

A

A database with multiple tables that are linked together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of relational databases

A

Reduces redundancy/inconsistencies over databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unicode > ASCII

A

More available characters
Different languages
Technical characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSD benefits

A

More portable
Use less power
Generate less heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data read from magnetic disc

A

Read head is moved
Disk spins around
Whole sector read in one go
Polarisation reflects 1/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of cloud storage

A

Access data from several devices
Easily share data
Increase available storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reasons for growth in cloud storage

A

Higher bandwidth mobile networks
Increase in mobile devices
Better network security
Trust in 3rd parties

17
Q

Advantages of computer networks

A

Easy To transfer data
Increased available storage
Computer usage monitoring
Central management/backups

18
Q

Blagging

A

Victim persuaded to give details for a false purpose
(Nigerian prince)

19
Q

Phishing

A

Victim thinks they’re communicating with a trusted source - is in fact fraudulent

20
Q

Shouldering

A

Credentials being watched/recorded when being typed

21
Q

High level language > low level language

A

Built in functions/libraries
Easier to write/debug/understand
Require fewer lines
easier to structure

22
Q

When is MAC filtering not useful

A

Wireless network open to the public
MAC address of connected devices won’t be known

23
Q

Function vs procedure

A

Procedure accepts arguments but doesn’t return values
Function returns one or more values

24
Q

OS managing Input/Output devices

A

Downloads drivers
Allows data to be sent/received

25
OS managing security
User authentication Malware protection Blocking access to vulnerable parts of a system
26
OS managing processors
Scheduling programs to be executed
27
OS managing storage
Secondary data management Efficient space allocation
28
Identity method confirmation
Passwords - only the user would know/checked against database Biometrics - physical features Email confirmation - only valid email proves identity
29
Black box pen. testing
No understanding of how system works Mimics external hacker Discovery & exploitation of weak spots
30
White box pen. testing
Understanding of system Mimics malicious insider Testing specific vulnerabilities Go through all scenarios
31
Spyware
Records data on host system Sends to 3rd party
32
Trojan malware
Misleads user - think its a different piece of software Executes other program
33
Worm
Autonomous self replication on a host system
34
Ransomware
Encrypts data until decryption key is paid for
35
Keyloggers
Monitors keystrokes to find and steal passwords for confidential purposes
36
Password weaknesses
Short, potentially blank No mixture of letters, numbers, and symbols Ordered numbers/easily guessable
37
Disadvantages of cloud storage
Increased security risks Reliance on providers Increasing costs Data leaks