Secondary storage Flashcards

1
Q

What is secondary stoarge

A

WStorage that is not directly accessible by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is secondary storage volatile or non-volatile

A

Non-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some uses of secondary storage

A

-Programs and data are stored on hard -drive
-Blu-rays may be used to distribute films
-Memory sticks may be used to transport data from one place to another
-Magnetic tape or external hard drives may be used for backup
-SD cards can be used for additional storage on cameras and smartphones – this is used for music, video and photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of storage are RAM and ROM

A

Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of storage are hard disk drives and solid state drives

A

Secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three storage methods

A

-Magnetic: Mechanical parts move over the disks surface to read and write data magnetically, or a drive head reads a magnetic tape
-Optical: Lasers read and write data using light
-Solid state: Data is recorded onto solid memory chips without any moving parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the basic features of optical storage

A

-Data is stored as pits and lands burnt into a spiral
-A laser beam passes over the pits and lands and the level of reflection is measured
-From whether its a pit or land 0’s and 1’s are derived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages of optical storage

A

-Cheap
-Very easily portable
-Takes up very little physical space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the disadvantages of optical storage

A

-Less storage capacity compared to other types
-Easily damaged/ scratched
-Requires a CD reader
-Slow write speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between blu-ray and CD

A

Blu-ray has smaller pits and lands meaning it can store more data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the basic features of solid state drives

A

-Uses non-volatile flash memory
-Very fast read/ write times as it doesn’t need to wait for a physical arm to move it for the disk itself to spin
-No mechanical or moving parts meaning it’s very durable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does flash memory work

A

-Large electric current used to force electrons through a barrier and trap them on the other side
-They remain on the other side until ‘flashed’ with a new current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the advantages of SSDs

A

-Highly durable
-No moving parts
-Very fast read/ write speeds
-No noisy fan or drive arm
-Faster start up times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the disadvantages of SSDs

A

-More expensive than magnetic hard disks
-Similar storage capacity as magnetic hard disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’ the advantages of flash memory

A

-Low cost
-Portable
-No moving parts
-Durable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some other characteristics of storage devices to consider

A

-Capacity
-Speed
-Portability
-Durability
-Reliability
-Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is data capacity

A

The amount of data that can be stored in a device (gigabytes, megabytes …._)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is malware

A

A malicious software that is designed to hack a system

19
Q

Name the 5 types of malware

A

-Worms
-Trojans
-Ransomware
-Spyware
-Viruses

20
Q

What is a virus

A

When programs embed themselves in other files. They replicate themselves and become part of other data

21
Q

What is the effect of viruses

A

They can cause damage by deleting or modifying data

22
Q

What are worms

A

Programs similar to viruses except they are not hidden within other files

23
Q

How are worms spread

A

Often through emails

24
Q

What is a trojan

A

Programs that pretend to be legitimate but are actually malware.

25
Q

How do trojans disguise themselves

A

As email attachments

26
Q

What is spyware

A

Programs that monitor user activities and send information back to the hacker

27
Q

What is ransomware

A

Programs that attempt to blackmail a user into making a payment to a hacker. Some encrypt documents and refuse to decrypt them without payment

28
Q

What are some other network threats

A

-Phishing
-Brute force
-Denial of service (DOS)
-Data inception and theft
-SQL injection
-Poor network policy
-People

29
Q

How are people a threat to network security

A

When users do not adhere to the network policy. Like forgetting to sign out. Or falling victim to social engineering

30
Q

What is an SQL injection

A

Where SQL code in entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data which can cause errors or unintended operations

31
Q

What is data iterception

A

When data is intercepted during transmission. This is done by using a packet sniffer

32
Q

What is a denial of service attack (DOS)

A

When a computer is used to prevent a server from performing it’s tasks. This is done by bombarding it with requests making it difficult for the server to respond to legitimate requests

33
Q

What is brute force attack

A

When a program is used to find all possible combinations of a character until the correct one is obtained.

34
Q

What is phishing

A

Emails that try tricking users into giving away personal details. It prevents to be a genuine message and tries to deceive a user into following a link that looks like a real website

35
Q

What do poor network policies tend not to have

A

-Levels of access
-Rules preventing the connection of external devices such as USBs
-Regulation regarding secure passwords
-Controls on what can be accessed remotely
-A formal backup procedure that is adhered to
-A regular maintenance programme

36
Q

What are the different ways to protect networks

A

-Network policies
-User access levels
-Secure passwords
-Encryption
-Anti-malware software
-Firewalls

37
Q

What are the different ways to identify network vulnerabilities

A

-Penetration testing
-Network forensics

38
Q

What is penetration testing

A

To determine how resilient a network against attack. It involves someone purposefully probe the network for potential weaknesses and attempt to exploit them

39
Q

What is network forensics

A

Involves monitoring the traffic on a network. At regular intervals data packets are copied. They information about the packet are then stored for later analysis

40
Q

What do access levels determine

A

The facilities a user has access to

41
Q

What’s the 3 main purposes of anti-malware

A

-To detect malware that has been installed
-To prevent malware from being installed
-To remove malware from the system

42
Q

What’s the problem with anti-malware software

A

They’re not always up to date and have to be updated regularly

43
Q

What do firewalls do

A

A tool that monitors traffic going into and out of a computer or network and either allows the traffic to pass through or blocks it.