S3 Computer Systems, Binary, Cyber security Flashcards

Jan test revison (66 cards)

1
Q

Examples of input devices?

A

Mouse, Keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of output devices

A

Headphones, monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer System diagram?

A

Input devices into Cpu
output dervices out of cpu
working memory both ways of cpu
backing storeage both ways.
Layout: Cpu in middle, Ram above, Backing storage below
input & output devices either side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens when you open a file?

A

The file moves from backing storage to working memory and while working on file moves between cpu and working memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens when you save a file.

A

moves back into backing storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean that the working memory is volitile?

A

It does not save when you turn off the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Cpu stand for?

A

Central Proccessing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does RAM stand for?

A

Random acess memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does GPU for?

A

Graphics proccessing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does PSU stand for?

A

Power supply unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SSD stand for?

A

Solid state drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does HDD stand for?

A

Hard disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OS stand for?

A

operaiting system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the CPU do?

A

Brain of the computer, all the calculations are prefromed here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the 3 things CPU is broken into?

A

Speed frequency(GHz)
Number of cores(1,2,4,8,ect)
Cache (1mb,4mb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the RAM do?

A

Stores working data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where does RAM solt into?

A

Mother board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What sizes does RAM come in?

A

4GB,8GB,16GB,64GB,128GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the range of speed for RAM?

A

2133-4200MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the GPU do?

A

Produces a display so can use computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why is GPU useful?

A

Can create refection, transparency, shadows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Does the computer need GPU?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is GPU measured in?

A

GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

does it have a ram on board

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does the motherboard do?
a device that connects all the components together so the computer can work
26
What must the motherboard match
CPU type
27
what connects to the motherboard
CPU,RAM,GPU,hard drive + extra compoents
28
What is the two things the PSU does?
Supplies the computer and components with the right power, changes the mains into a usable power supply
29
What is SSD & HDD
backing storage
30
3 things about HDD
Slower,More Fragile, moving parts
31
3 things about SSD
Faster, move expensive, longer life
32
What does the OS do?
It is a software responsible for making all the components speak to each other correctly
33
What does 1 and 0's repersent and what are they?
a state of switch, 1 = on, 0 = off. It is the smallest pieces of storage a computer can understand, know as a bit
34
what do 8 bits create
a byte
35
what does 1024 bytes equal?
1 Kilobyte
36
what does 1024 kilobytes equal?
1 megabyte
37
what does 1024 megabytes equal?
1 gigabyte
38
what does 1024 gigbyte equal?
1 tera byte
39
How do you find out the number of combos?
2 squared by the number of bits
40
what is ASCII?
a system to reperesent text
41
how many bits is the ASCII system
8 bit system
42
how many different characters is ASCII
256 different charactes
43
Why is ASCII not useful
it only has 256 character and there is more characters
44
what is UNICODE and why is it used
it is the alternaitve to ASCII and has more characters, 16 bit system
45
how many characters does UNICODE have?
65536
46
In a byte how do you find the number?
each 0/1 has a value if there is a 1. the value range goes from 128 and halving it each time.
47
what does it mean if the number at the end is a 1
its odd
48
what does it mean if the number at the end is a 0
its even
49
What are the two types of images?
Bitmap and vectors
50
Vectors?(3)
Used for line art and simple graphics. Each object is repersented by a formula. can be scaled up without loss of resolution.
51
Bitmap?(5)
used for photos and high quality graphics. repersented by a grid of pixals. each pixal a colour in binary. for 256 colours need 8 bits per pixal for two colours need 1 bit per pixal. become pixalated when scaled up.
52
What is a security breach?
incident where private data may have been stolen or veiwed
53
impact of a security breach? (4)
Reputaional damage, theft of personal info(idenity theft), moneyloss, damage
54
why somone would do a secruity brearch
for fun, challange, show how poor system is, steal credit card info to sell or use, steal personal info to use or sell
55
what makes a strong password
mix of upper and lower case letters, numbers, symbols
56
what is a diconary attack
computer tries password and then another until gets the right password
57
what is a brute force attack
changes parts of the password
58
malware?
programs that cause damage to the computer system
59
examples of malware
steals info, cause pop ups, slow down computer
60
what are the 5 types of malware
viruses, keyloggers, trogan horses, worms, spyware
61
viruses
causes damage or annoyance, need user interaction
62
worms
self replicating software that causes damage
63
trojan horses
appears harmless, used to install malware and create backdoors,
64
spyware
spy on users to get personal info and web browsing info
65
keyloggers
logs each keystroke made, used to steal password and sensitive info
66
what is antiviruses
program that is installed to block malware and suspisous programs. scans whole computer to check if anything matchs a virus, if find virus will quaritnine file soo can't do anything.