Year 9 End Of Years Flashcards
(11 cards)
What is meant by the term malware?
Malware is an umbrella term, used to describe any piece of software/code that aims to have a negative effect on when run on the victim’s computer. Malware comes in many forms.
What is meant by the term virus?
A piece of code that can copy itself, corrupts the system or destroys data.
What is meant by the term Trojan?
A program that appears to be harmless but is malicious, user will be invited to click on a link and download a fake benefit.
What is meant by the term Worm?
Similar to virus, however it can spread and copy itself without human interaction.
What is meant by the term Ransomware?
Encrypts the victim’s files, attacker demands ransom from the victim to de-crypt them.
What is meant by the term Spyware?
Collects and monitors all sorts of data and activities.
What is meant by the term Social Engineering?
Social Engineering is a form of attack, which seeks to exploit humans as the weak point in computer systems; it uses a series of techniques to try to trick users into voluntarily giving confidential data to the attacker.
What is meant by the term Phishing?
Phishing is when attackers send scam emails (or text messages) that contain links to malicious websites. The websites may contain malware (such as ransomware) which can sabotage systems and organisations. Or they might be designed to trick users into revealing sensitive information (such as passwords), or transferring money.
What are some common signs in Phishing scams?
Urgency, too good to be true, links rather than go to home page, informality, discouraging you from checking the actual website, strange email.
Example of the bubble sort algorithm:
Consider a list of numbers: [5, 3, 8, 4, 2]
First Pass:
Compare 5 and 3 → swap because 5 > 3 → [3, 5, 8, 4, 2]
Compare 5 and 8 → no swap because 5 < 8 → [3, 5, 8, 4, 2]
Compare 8 and 4 → swap because 8 > 4 → [3, 5, 4, 8, 2]
Compare 8 and 2 → swap because 8 > 2 → [3, 5, 4, 2, 8]
After the first pass, the largest element, 8, is at the end.
Second Pass:
Compare 3 and 5 → no swap → [3, 5, 4, 2, 8]
Compare 5 and 4 → swap because 5 > 4 → [3, 4, 5, 2, 8]
Compare 5 and 2 → swap because 5 > 2 → [3, 4, 2, 5, 8]
After the second pass, 5 is in its correct position.
Third Pass:
Compare 3 and 4 → no swap → [3, 4, 2, 5, 8]
Compare 4 and 2 → swap because 4 > 2 → [3, 2, 4, 5, 8]
After the third pass, 4 is in its correct position.
Fourth Pass:
Compare 3 and 2 → swap because 3 > 2 → [2, 3, 4, 5, 8]
Now, the list is sorted!
Explain how the bubble set algorithm work:
It orders values in a data set by comparing each value to its neighbour and swapping them until the end of the list is reached, then running the algorithm as many times as needed until no more swaps are needed for the list to be in order.