Unit 1 - J276 Flashcards

1
Q

CPU (______ ________ _____) - The ______ of the computer. It carries out instructions. It ______, ______ and ________ instructions from the ____.

A

Central Processing Unit, brain, fetches, decodes, executes , RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Von Neumann Architecture consists of ;

  • ____
  • MDR
  • _______ _____
  • _________
A

MAR
Program Counter
Accumulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAR (________ _______ ________) - Stores the _______ ________ of ____ that needs to be _______.

A

Memory Address Register, memory address, data, accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MDR (_______ _____ ________) - Stores _____ that is being _____ from or ____ to memory.

A

Memory Data Register, data, fetched, sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Program Counter - Stores the ________ ________ of the ______ _________ to be executed.

A

memory address, next instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accumulator (____) - Stores the results of any ________ or _______ operations carried out by the ___.

A

ACC, arithmetic, logical, ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALU (________ ______ _____) - Performs all ________ (add, subtract etc) and _____ (AND, OR, NOT etc) _________.

A

Arithmetic Logic Unit, arithmetic, logical, operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CU - (_______ _____) - Sends ______ _______ to all ________ and controls the ______ of _____ in the CPU.

A

Control Unit, direct operations, components, flow, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cache - ______ speed, volatile _______ in the ____ that contains _______ used ________.

A

High, memory, CPU, frequently, instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fetch, decode & execute cycle - Instructions are _____ from the memory. _______ in to ________ ____, and then ________ (carried out).

This cycle is ________.

A

fetched, decoded, machine code, executed

repeated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Factors that affect CPU performance

  • ______ speed
  • Number of _____
  • ______ size
A

Clock
Cores
Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Clock speed - Measured in ____, it is the amount of _____, ______ and ______ cycles carried out per ______.

A

GHz, fetch decode and execute, second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cores - A part of the _________ that performs the ______, ______ and _______ cycle.

The more cores you have, the more ________ can be executed __________.

A

processor, fetch decode and execute,

instructions, simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Embedded System - A device with a _________ _______ inside of it that is designed to carry out a ______ function _________ and ________.

Examples include microwaves, sat navs, fridges etc

A

computer system, specific, effectively and efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ROM (______ ____ _______) - Non - _______ memory that stores _____ __ instructions (BIOS) and is ______ only.

Data in ROM cannot be _______.

A

Read Only Memory, volatile, boot up, read

changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAM (________ _______ _______) - _______ memory that stores ____ for _______ currently in ___.

A

Random Access Memory, Volatile, data, programs, use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Differences between RAM & ROM

  • ROM is ___ _______, RAM isn’t
  • Data in RAM can be _______, in ROM it can’t
  • ROM stores data _______, RAM stores them _________.
A

non volatile
changed
forever, temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

________ memory is need to store more _____ for ________ currently in ____ when the RAM is ______.

A

Virtual, data, programs, use, full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_______ memory is when some memory in ________ storage (e.g. hard drive) is ________ to store _______ temporarily.

A

Virtual, secondary, allocated, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Flash memory - non ______ memory that can be _________ erased and _______.

A

volatile, electronically, reprogrammed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ storage is needed to allow devices to store ______ in the _____ _____.

Examples include HDDs, SSDs, Magnetic Storage etc

A

Secondary, data, long term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Optical Storage uses ______ to _______ data on a _____. (e.g CD, DVD, Blu Ray

  • ___ capacity
  • ______ speed
  • Portable
  • Can get scratched - not _______ or _______
  • Quite ______
A

lasers, engrave, disk

Small
Slow
Durable, reliable
Cheap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Magnetic Storage uses _______ to ______ and _____ data. Examples include HDDs

  • _____ capacity
  • _______ speed
  • Not very ______
  • Not very ______ due to moving parts
  • Quite ______
  • Quite _____
A

magnets, read, write

High
Average
portable
durable
reliable
cheap
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Solid State storage uses _______ _____ to store data. They have no ________ ______. Examples include USB, SD cards and SSDs.

- \_\_\_\_\_\_\_\_ \_\_\_\_\_ capacity
 \_\_\_\_\_\_ speed
- Portable
- No moving parts so \_\_\_\_\_\_\_
- Reliable
- Very \_\_\_\_\_\_.
A

memory chips, moving parts

Limitedly high
High
durable
expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Capacity - How much ______ the storage device has
memory
26
Speed - How _____ the storage device is
fast
27
Portability - How easy it is to ______/_______ the storage device
carry/transport
28
Durability - The storage device's ability to withstand _____ and _______.
wear, damage
29
Characteristics to consider for Secondary Storage - C_______ - S_____ - P_______ - D_______ - R______ - C____
``` Capacity Speed Portability Durability Reliability Cost ```
30
LAN (_____ ____ _______) - a network that covers a ______ _________ ______. It uses _______ equipment
Local Area Network, small geographical area internal
31
WAN (____ ____ _______) - a network that covers a ______ ________ _____ and requires ________ equipment.
Wide Area Network, large geographical area, external
32
Factors that affect network performance - B________ - Number of ______ - ______ (Amount of data being sent) - ___________ Media
Bandwidth Devices Traffic Transmission
33
Bandwidth is just the _______ of the network
speed
34
Number of _______. The more devices connected to a network, the _____ the network as more _____ will be _________ between devices due to high amounts of _______ and _______.
devices slower, data, transferred, devices, demand
35
Traffic (Amount of data) The more data the network has to handle, the ______ the network as it needs more ______ to _______ the data which ______ the process down.
slower, time, transfer, slows
36
Transmission Media is how the data is _______ (e.g. WiFi or Ethernet). Data transferred wirelessly tend to be _______ and less ________ in speed compared to wired variants.
travelling slower, consistent/reliable
37
Client Server Network - Network where all _______ are connected to a _______ _______.
devices, central server
38
Peer to Peer Network - Network where all _______ are connected to ______ _____.
devices, each other
39
Hardware required to _______ devices in a LAN. - WAP (________ ______ _____) - S_____ - R_____ - NIC (________ ________ ______)
connect Wireless Access Point Switch Router Network Interface Card
40
WAP (_________ _______ _______) - Type of hardware that allows a device to ________ connect to a _______.
Wireless Access Point, wirelessly, network
41
A switch is a piece of hardware which has many ________ ports and are used to ________ devices on a ____. Switches receive _____ (in units called _______) from one device and ________ this data to the device on the network with the correct ____ ________.
ethernet, connect, LAN data, frame, transmit, MAC address
42
A router is a piece of hardware that ________ ____ between ____ or more different _________.
transmits data, two, networks
43
NIC (_________ _______ _____) - An expansion _____ that enables computers to ________ to other _________/ a _________
Network Interface Card, card, connect, computers, network
44
WiFi/Wireless uses ______ waves to _______ data. Up to _____ mbps.
radio, transfer, 600
45
Copper cables transmit ______ using ________. E.g. Ethenet. Speed up to _ gbps.
signals, electricity 1
46
______-optic cables ________ data using _______. | _____ in speed, don't suffer from _______ interference and can _______ data over _____ distances. Speed up to __ gbps
Fibre, transmit, light | Fast, signal, transmit, large/long, 10
47
The internet is a set of global __________ networks
interconnected
48
DNS (_______ _____ _______) - _________ the URL of a website into an __ _______.
Domain Name Server, Translates, IP address
49
Hosting is when you ______ files on a ________
store, server
50
The cloud is ________ or _____ services provided over a ________.
software, data, network
51
A Hub is similar to a ______ but it sends ____ to ____ devices instead of _______ to the desired device.
switch, data, all, directly
52
Virtual Network is the _________ of an existing physical ________ into ________ networks.
portioning/splitting up, network, seperate
53
A Star Topology is when all ________ are connected to a _______ ______. All data first goes to the _______ _______ which then sends the data to its __________.
devices, central server central server, destination
54
A Mesh Topology is when all _______ are connected to ____ _____.
devices, each other
55
WiFi has 2 ________ bands - ____ GHz and _ GHz _____ GHz has greater ______ and is better at going through ________ (like walls) but is ______ than _GHz _ GHz has a larger _______ but less ______ and is more worse than _____GHz and going through _______.
frequency, 2.4GHz, 5GHz 2.4GHz, range, obstacles, slower, 5GHz 5GHz, bandwidth/speed, range, 2.4GHz, obstacles
56
The frequency bands of WiFi are split into _______ _______ that each cover a small ________ _____.
numbered channels, frequency range
57
WiFi performance is affected by ________ between networks using ________ channels. To avoid this only certain channels that are _______ apart are usually used. _ GHz has more ___- ________ channels than ____GHz, so it has less __________ overall.
interference, adjacent/near-by, spaced 5GHz, non-overlapping, 2.4GHz, interference
58
Encryption is when data is _______ into a ____ which can only be cracked with the correct ____. Encryption is used to prevent _________ access.
translated, code, key unauthorised
59
Ethernet cables are used to _______ devices on a ___ Cat _, __ and _ ethernet cables are the most common, they have pairs of _______ wires ______ together to reduce _______ __________. Slowest to fastest in speed Cat _, Cat __, Cat _
connect, LAN 5, 5e, 6, copper, twisted, internal interference 5, 5e, 6
60
Coaxial ethernet cables has a ______ _______ wire surrounded by a ______ or _______ mesh to shield _______ _________.
single copper, plastic, metal, external interference
61
TCP (_________ _______ ________) - Sets the ____ for how devices _______ to a network. It is responsible for ________ the data into _______ and __________ them whilst ________ if the data has been _____ correctly.
Transmission Control Protocol, rules, connect splitting, packets, reassembling, checking, sent
62
IP (_________ _________) - Used for sending ____ across a _________. Gives it the senders __ _______ and the _______ __ _______. Sends _______ via different _______.
Internet Protocol, data, network, IP address, receivers IP address, packets, routes
63
HTTP (_______ _____ _______ _______) - Protocol used by ____ _______ to _________ with ___ servers
Hyper Text Transfer Protocol, web browsers, communicate, web
64
HTTPS (_______ _____ ______ _______ _______) - More ______ version of _____, it _______ all data
Hyper Text Transfer Protocol Secured, secure, HTTP, encrypts
65
FTP (_____ _______ _______) - Protocol used to ______, _____ and move _____ between devices on a ________.
File Transfer Protocol, access, edit, files, network
66
POP (_____ ______ _______) - Protocol used to store mail _________ on a ______ until the user has ________ them
Post Office Protocol, temporarily, server, downloaded
67
IMAP (________ _______ _______ ________) - Protocol used to store ____ on a server without the needs of the user __________ them.
Internet Message Access Protocol, mail, downloading
68
SMTP (_______ ____ ________ ________) - Protocol used to _____ ______.
Simple Mail Transfer Protocol, send emails
69
A MAC address is a _______, ________ address that is _________ (can't change) and is assigned by the __________. They are __ or __ bit _____ numbers They are mainly used by the protocols for ________ on ____ for ________ on the same _________.
unique, numerical, permanent, manufacturer 48, 64, binary ethernet, LANs, communication, network
70
IP addresses are used for ________ data between ____/__ networks (e.g. over the internet). The two types of IP addresses are ______ and _______. IP addresses can either be __ bit or ____ bit binary number, depending on the ________ of the IP.
sending, TCP/IP static, dynamic 32 bit, 128 bit, version
71
Static IP addresses are _________ addresses. They're used to connect _______ on a ____, and for ________ websites on the ________. Static IP addresses on the ________ are usually very ________.
permanent printers, LAN, hosting, internet internet, expensive
72
Dynamic IP addresses are _______ when a device ____ __ to a _______, so the device may have a _______ address every time it ________. ISPs (_______ _______ ________) commonly use dynamic IPs as they are _______ and can be ______.
assigned, logs on, network, different, connects Internet Service Providers, cheap, reused
73
________ Switching is used to ______ the data across ________. 1) The data is _____ into _______ 2) Each _______ contains a _______ number which determines the ______ they are _____ in. 3) The _______ reads the packets and _____ them 4) The ________ device ________ the _______ according to the _________ number. 5) The _________ device requests the ______ to resend the _______ if any are packets are _______. 6) _______ checks if the data is _______, if it is an ______ message is _______ 7) A _________ message will be sent from the ______ device to the _______ device
Packet, direct/send, networks ``` split, packets packet, sequence, order, sent router, sends receiving, assembles, packets, sequence receiving, sender, packets, missing Checksum, corrupted, error, displayed confirmation, receiving, sending ```
74
Properties of packets They have a ______ which contains the _______ information - this contains the _____ and ______ address and the packet _________. The ______ is the actual ______ of the packet (e.g. a part of an email, doc, web page, etc) They also have a _______ number which is a form of ________ used to check that the _______ hasn't been _______ in transit.
header, control, source, destination, number payload, content checksum, validation, payload, corrupted
75
A layer is a group of ______ which have similar _______. Layers are ____-______ -- ________ in each layer do their job without needing to _____ what is happening in _____ layers. Each layer _____ the layer _____ it - it does the hidden ____ needed for an action on the layer ______ it.
protocols, functions self-contained, protocols, know, other serves, above, work, above
76
The 4 types of layers are - A_______ layer - Layer 4 - T_______ layer - Layer 3 - I_______ layer - Layer 2 - _____ ____ layer - Layer 1
Application, Transport, Internet, Data Link
77
Layer 4 - ________ layer is responsible for turning data into _______ and other ________ and vice versa Protocol examples include ____, FTP, ____
Application, websites, applications HTTP, SMTP
78
Layer 3 - ________ layer is responsible for controlling _____ ____ (e.g. splitting data into ______ and _______ if they are correctly ____ and delivered) Protocol example includes ___
Transport, data flow, packets, checking, sent TCP
79
Layer 2 - _______ layer is responsible for making ________ between _______, _______ data _______ and handling ______. Protocol example includes __
Internet, connections, networks, directing, packets, traffic IP
80
Layer 1 - _____ _____ layer is responsible for _______ data over the _______ network, and for how ___ are sent as ________ _____ over cables, _______ or other hardware. Protocol example includes _______
Data Link, passing, physical, bits, electrical signals, wireless Ethernet
81
Advantages of using layers - It breaks network ________ into _________ _____. This helps _______ concentrate on only ___ area of the _______ without having to worry about others - As layers are ___-______, they can be ______ without the other ______ being _______. - Having __ ____ for each layer forces companies to make ________, universal hardware and _______, so ________ brands will ____ with each other in the same way.
communication, manageable pieces, developers, one, network self-contained, changed, layers, affected set rules, compatible, software, different, work
82
Frames are ____ sent around a ____, handled by a ______.
data, LAN, switch
83
Malware is _______ that can ____ devices by ______/modifying files, locking files and more.
software, harm, deleting
84
_______ engineering is the ______ of people (as a ____ point) to give out ________ data
social, manipulation/tricking, weak, important
85
Phishing is a type of ______ ________, often sends an ______ or _____ pretending to be a large ________ (e.g. Amazon) in order to gain crucial ____ (e.g. usernames and passwords).
social engineering, email, text, organisation/company, data
86
______ force attacks are the use of _______ that uses _____ and _____ to ______ a password
Brute, software, trial and error, crack
87
A ______ of _______ attack is when _______ is used to ______ a ___ server with ____ _______ in order to cause the server to _______.
Denial of service, software, flood, web, fake requests, crash/go down
88
Data ________ and ______ is when a hacker ______ ____ travelling on a _______ and ________ any _______ pieces of _____/info.
interception and theft, monitors data, network, intercepts, valuable, data
89
___ injection is when _______ code is _____ into a websites _____ box to ____, delete or ______ information
SQL injection, malicious, entered, input, gain, modify
90
Poor network policy is when the _____ governing a ______ are not ______ enough.
rules, network, good/adequate
91
What are all the _____ posed to networks? - M_______ - P_______ - _______ ________ - _______ force _______ - ________ of ________ ________ - _____ _________ and ______ - ____ injection - ____ network _______
threats ``` Malware Phishing Social Engineering Brute force attacks Denial of service attacks Data interception and theft SQL injection Poor network policy ```
92
__________ testing is when _________ employ _______ to simulate potential _______ on their _______ in order to find _________.
Penetration, organisations/companies, hackers, attacks, networks, vulnerabilities
93
________ f______ are _________ undertaken to find the ____ of _______ on a network
Network forensics, investigations, cause, attacks
94
A _______ p_____ is the ____ governing a _______. | Having a _____ ______ p_____ will help prevent ______.
Network policy, rules, network | Good network policy,
95
____ - _______ software is designed to ____ and stop _______ from ________ a network and the ______ connected
Anti-malware, find, malware, affecting, devices
96
A f_______ is used to block ________ ______. | It _______ all data ________ and _______ the _______ to block any potential _______.
firewall, unauthorised access | monitors, entering, leaving, network, threats
97
____ ______ levels ______ which parts of a _______ different _____ of _____ can _______.
User access, control, network, groups, users, access
98
P_______ help prevent ________ ____ from _______ the network. P______ should be _____ - they should be many ________ long, use a _______ of letters, _______ and symbols, and be ______ regularly.
Passwords, unauthorised users, accessing Passwords, strong, characters, combination, numbers, changed/updated
99
E_______ is when data is _______ into a ____ which can only be cracked with the correct ____. E_______ is used to prevent _________ access.
Encryption, translated, code, key Encryption, unauthorised
100
All the methods of preventing ______ on a network - _________ testing - _________ f______ - Good _______ ______ - ____ - _______ software - F_______ - _____ ______ levels - P________ - E________
threats ``` Penetration Network Forensics Good Network Policies Anti-Malware software Firewalls User Access Levels Passwords Encryption ```
101
System software is designed to ___ and _______ a _______ system.
run, maintain, computer
102
__________ systems manage ________ and run ________, examples include Windows, MacOS etc The functions of an OS are - _________ with _______ and external _______ via device _______ - Provide a user _________ which allows the ____ to __________ with the computer - Provide a _________ for different ________ to run - Allow the computer to _____-____ by ________ memory and the ___. - Deal with ___ and ___ management - Manage system _______ and user _______. Check CGP page 8-9 for more details You can ignore this flashcard
Operating, hardware, software Communicate, internal, hardware, drivers interface, user, communicate platform, applications multi-task, managing, CPU file, disk security, accounts
103
The functions of an operating system - ______ interface - _______ management/_____-tasking - ________ management and d_____ - U____ management - F____ management
``` user, memory, multi peripheral, drivers User File ```
104
A ______ interface allows the user to ______ with the ________ system. The two types of UIs are GUIs (_________ _____ ________) and _______-____ interface
user, interact/communicate, computer Graphical User Interface, Command Line
105
GUIs are the most ________ type - they're designed to be ____ for ________ users by making them _____, ________ and intuitive. GUIs are ________ for specific _____ methods. In the past, they used to be WIMP - based (_______, ____, _____ and ______). iOS and stuff were created for ________ devices, using finger ______ (e.g. swiping) in place of using a ________.
common/popular, easy, everyday, visual, interactive optimised, input, windows icons menus and pointers, touchscreen, gestures, mouse
106
A ________- _____ interface is ____ based. The users enter specific ________ go complete ____. They are less ________ heavy than ____. They can be far more _______ and ________ than ___ for advanced users. They can ________ processes using _______.
command-line, text, commands, tasks, resource, GUIs efficient, power, GUIs automate, scripts
107
The OS helps the ___ carry out _____-______ by efficiently _______ memory and ____ processing time - When an _______ is opened, the OS moves ________ parts of the ________ to ________, followed by additional parts if they are _________. _________ and features that aren't recent may be _______ from memory - To run multiple _______, the OS needs to make sure the _________ don't ________ or ________ with each other. A memory________ allocates certain _______ certain ______ ________, to make sure their _______ are placed in separate _________. - Only _ application can be ________ at a time by the ___, so other _______ must wait. The OS ______ ___ time between _________ and may _______ some over others in order to be _______ in the most _______ order. - The OS may also ________ the movement of ___ to and from _______ _______.
CPU, multi-tasking, managing, CPU application, necessary, application, memory, required, applications, removed applications, applications, interfere, overwrite, manager, applications, memory addresses, processes, locations 1, processed, CPU, proccesses, divides CPU, applications, prioritise, processed, efficient organise/manage, data, virtual memory
108
The OS helps the ___ carry out _____-______ by efficiently _______ memory and ____ processing time - When an _______ is opened, the OS moves ________ parts of the ________ to ________, followed by additional parts if they are _________. _________ and features that aren't recent may be _______ from memory - To run multiple _______, the OS needs to make sure the _________ don't ________ or ________ with each other. A memory________ allocates certain _______ certain ______ ________, to make sure their _______ are placed in separate _________. - Only _ application can be ________ at a time by the ___, so other _______ must wait. The OS ______ ___ time between _________ and may _______ some over others in order to be _______ in the most _______ order. - The OS may also ________ the movement of ___ to and from _______ _______.
CPU, multi-tasking, managing, CPU application, necessary, application, memory, required, applications, removed applications, applications, interfere, overwrite, manager, applications, memory addresses, processes, locations 1, processed, CPU, processes, divides CPU, applications, prioritise, processed, efficient organise/manage, data, virtual memory
109
OSs use device ______ software to communicate with ______ hardware or ________ connected. - Every piece of _______ connected to the _______ system requires a ______ driver. ______ act as a ________ for the ______ between OS and _______. - When a computer is booted up, the OS will select the correct ______ drivers for the _______ it _____. New _______ will be installed for any new ________ connected. - Updates to device ______ can fix ___, add _____ or improve _________, they can be installed _______ by the user or _________ by the OS.
driver, internal, peripherals hardware, computer, device, drivers, translator, signals, hardware device, hardware, detects, drivers, hardware drivers, bugs, features, performance, manually, automatically
110
OSs can be S_____- user (where only ___ user can use the _______ at ____) or _____-user (where _____ users can use the _______ at ______). OS also deals with ____ _______ control. These ____ _______ allow different users to have _______ to ______ data or ________ on a system, On most OSs, each ____ has access to their own _______ ____ and _______, but can't access other user's ________ ____. ____ ______ usually require _______, ___ or some sort of ________ to grant ______ to the account.
Single, one, computer, once/one time, Multi, multiple, system, once/one time user account, user accounts, access, specific, resources user, personal data, desktop, personal data User accounts, passwords, PINs, authentication, access
111
U_____ ______ _______ helps to ________ and _______ a computer. The 4 we need to know are - D_______ ______ - B_______ ______ - C________ ________ - E________ ________
Utility System Software, maintain, configure - Defragmentation Utility - Backup Utility - Compression Software - Encryption Software
112
D_______ ______ put _____ up ____ back _______. 1) Files are ____ on ____ ____ in available _____. Ideally, entire ___ would be _____ together 2) As files are _____, deleted and change ___, lots of small ___ begin to appear on the ____. The OS ____ files into smaller ____ to fill these ___ when ______ data. 3) Over ___ the ___ becomes more and more _________ (data more _____ apart). - This slows _____ and _____ speeds as the ____/____ ____ has to move back and _____ across the ____. 4) ________ software __-_______ data on the ____ ____ to put ________ files back _________. It also ____ files to collect all the ____ space _______. This helps to ______ further d________. F_______ doesn't cause any problems for ____. D_______ ____ can actually ______ the l_____ of the ____ since they have ______ number of _____ and _____.
Defragmentation utilities, broken, files, together stored, hard disks, spaces, file, stored modified, size, gaps, disk, splits, blocks/parts, gaps, writing time, data, fragmented, further, read, write, read/write head, forth, disk Defragmentation, re-organises, hard disk, fragmented, together, moves, free, together, prevent, defragmentation Fragmentation, SSDs, Defragmenting SSDs, shorten, lifespan, SSD, limited, read and writes
113
A b_______ is a ____ of a system's files and ______ stored ________. - So data can be _______ if data ____ occurs (coz of fires, loss of power etc). The 2 types of b______ are. - ____ ______ - _________ _______
backup, copy, settings, externally, recovered, loss backups - Full backup - Incremental backup
114
____ backup is where a ____ is taken of _____ file on the ______. They use a lot of _______, takes ____ to perform, but is ______ to re____ from.
Full, copy, every, system, storage, long, faster, restore
115
_________ backups is where only the files ______ or ______ since the ____ ______ are copied. They take up l___ ______, are ______ to perform, but a ___ system re____ is ____ since the last ___ backup as well as every ________ backup after it has to be _______.
Incremental, created, edited, last backup, less storage, faster, full, restore, slow, full, incremental, restored.
116
C_______ _______ reduces the ____ of files so they take up less ______. Used often on the _______ to make files ______ to _______/______. File ______ include .___ and .rar, C______ files need to be _______ before they can be _____.
Compression software, size, storage, internet, quicker, download/upload, formats, .zip Compressed, extracted, used
117
E_______ software _____ data to stop ____-_____ from ________ the data. The E______ data can only be ________ using a special ___.
Encryption, scrambles, third-parties, accessing, Encrypted, decrypted, key
118
The two types of software are - ____ ____ software - ________ software
Open source Propietary
119
____ _____ software (eg Linux) is where the ______ code is made freely _______. Users can ______ modify the _____ code to make their own ______ of the software, which can be _____ under the same _______ and _____ as the original ________. Popular ____ _____ software are ______ by a strong _____ _______, where users can actively ____ to _______ the software by suggesting ___ fixes or ________ to the original ________.
Open source, source, available legally, source, version, shared, licence, terms, software] open source, supported, online community, help, improve, bug, improvements, developers
120
The advantages of ___ ____ software are - Usually ____ of charge - Software can be ______ by users to meet their ____ - Lots of ________ can be more creative and _______ than the _________ of one company - ______ software is very ______ and secure - _______ can quickly be solved by the __________.
open source free adapted/modified, needs collaborators, innovative, developers Popular, reliable, problems, community
121
The disadvantages of ___ ____ software are - No _______ if something goes wrong - No _______ _______ - Small projects may not get regular _______, so they can be _____ and have _______ flaws. - ______ code can't be ______ away from other people, such as _________.
open source warranties customer support updates, buggy, security source, hidden, competitors
122
_______ _______ is software where only the ______ code (eg .exe file) is released, the ______ code is ______. _______ software licences ______ the _______, copying and r________ of the software. They are usually ____ for. ________ use this type of _______ as it tends to have ______ and reliable ______ ______ when compared to ____ _____ software.
Proprietary Software, compiled, source, hidden Proprietary, restrict, modification, redistribution, paid Businesses, software, better, customer service, open source
123
Advantages of _______ software are - Comes with _______, documentation and _______ ______ - Fixes and ______ come _______ - Usually is well-_____ and _______ - _______ in cost for companies than _________ their own ______ software
proprietary warranties, customer support updates, regularly tested, reliable Cheaper, developing, custom
124
Disadvantages of ________ software are - Can be ________ in cost - Software may not _____ the user's _____, and they can't do anything about that - Older software may not be _______ after some years, which forces businesses to spend _____ to _______ later on.
proprietary expensive meet, needs supported, money, upgrade