• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/136

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

136 Cards in this Set

  • Front
  • Back

How are data and instructions represented

binary

how many bits are in a byte

8

how many bytes are in a kilobyte

1000

How many bytes make a megabyte

1000

how many megabytes make a gigabyte

1000

how many gigabytes are in a twrabyte

1000

what is a character set

a group of character codes

how to calculate image size

width * height

how to calculate file size of an image

image size * colour depth

how is sound recorded

samples of the amplitude are taken at regular time intervals

what's the sampling rate symbol

Hz

What is sampling rate

number of samples per second

what is sample resolution

number of bits per sample

how to calculate file size for sound file

rate * resolution* seconds

how does lossy compression work

deletes parts of the file permanently

how does lossless compression work

represents the file in a more efficient way

what does compression do

reduces file size

How does Run Length Encoding work

Stores data in frequency value pairs

What is the symbol of the NOT date

A line above the gate name

What is the symbol of the AND gate

A dot

What is the symbol of the OR gate

Addition symbol

What is the symbol of the XOR date

A circle with a cross inside

What is this gate

What is this gate

NOT gate

What is this gate

What is this gate

AND gate

What is this gate

What is this gate

OR gate

What is this gate

What is this gate

XOR gate

What is an application software

A software that carries out tasks useful for end users

What are types of system softwares

Utility software, Operating systems

What does an Utility Software do

Supports the running of the computer system

What dies an operating system do

Manage hardware and other programs

What hardware does the operating system manage

Processor, memory, input/ output devices

What software does the operating system manage

Applications, Security

What is a high level language

A more readable programming language

What is a Low level language

A specific programming language

What are the advantages of a high level language

More readable, portable

What is the disadvantage of a high level language

Slower to execute

What is the advantage of a low level language

Easier to optimise

What is the disadvantage of a low level language

Specific to particular CPUs

What is the purpose of assemblers

Turns assembly code into machine code

What is the purpose of compilers

Turns High level language into Machine Code by producing an executable

What are the advantages of compilers

No source code needed afterwards, fast to execute afterwards

What is the disadvantage of compilers

Errors are only shown at the end

What is the purpose of interpreters

Turns High level language into Machine Code by translating the instruction then executing it

What is the advantage of interpreters

Errors discovered straight away

What is the disadvantage of interpreters

Source code is needed to run

What is the purpose of the CPU

Carries out program instructions using data

What is the purpose of the Arithmetic Logic Unit (ALU) in the CPU

Carry out maths and logic equations

What is the purpose of the Control Unit in the CPU

Decodes instructions

What is the purpose of the Cache in the CPU

a small but fast memory that holds frequently accessed items

What is the purpose of the Clock in the CPU

Produces a regular signal to synchronise components

What is the purpose of the Bus in the CPU

Connect the components

What happens in the "fetch" part of the Fetch - Decode - Execute Cycle

The next instruction is loaded from the main memory

What happens in the "Decode" part of the Fetch - Decode - Execute Cycle

Instruction is interpreted by the Control Unit

What happens in the "Execute" part of the Fetch - Decode - Execute Cycle

Instruction is carried out, results will be written to memory

How will the clock speed affect the performance of the computer system

The rate of the Fetch - Decode - Execute cycle will increase if the clock speed is faster

How will the number of cores affect the performance of the computer system

More instructions can be executed at the same time

How will the Cache size affect the performance of the computer system

More regularly used items can be held which reduces the need to check the slower RAM

What is an Embedded system

A computer inside other devices where they are simple and have one purpose only

What are the properties of RAM

Main memory, Volatile, Holds open programs and data

What are the properties of ROM

Main memory, Non-volatile, Contains the start up program, Loads the OS from storage to RAM

What are the properties of Secondary Storages

Large, Non-volatile, long term storage programs and data

How does a magnetic secondary storage systemwork

uses different levels of magnetic polarity to store data

What is an example of a magnetic secondary storage system

Hard Disk Drive

What are the advantages of a magnetic secondary storage system

Reliable, comes with large capacities

What are the disadvantages of a magnetic secondary storage system

Not Durable, Noisy

What is an example of a Solid State Secondary storage device

Solid State Drive

How does A Solid State Secondary Storage Device works

By using electronic circuitry

What are the advantages of a Solid State Secondary Storage device

Fast read and write speeds, durable

What are the disadvantages of a Solid State Secondary Storage device

Expensive per Gb

What is an example of an Optical Secondary Storage device

DVD

How does the Optical Secondary Storage device work

Using the reflection of light

What are the Advantages of an Optical Secondary Storage device

Portable, Reliable

What are the Disdvantages of an Optical Secondary Storage device

Not durable, Low capacity per disc

What is a Cloud storage device

A storage device that stores data from a different location and can be accessed through the internet

How does the Cloud store data

Using HDDs and/ or SSDs

What are the Advantages of the Cloud Storage device

Versatile, easily scalable

What is the Disadvantage of an Optical Secondary Storage device

Reliant on the cloud provider

What is PAN

Personal Area Network which is used by a single person

What is LAN

Local Area Network located in a small geographical area

What is WAN

Wide Area Network which is owned by multiple entities

What are the advantages of a Wired Network

Less prone to interference, Consistent Range which means that it wont be affected by obstacles, Greater Reliability and Bandwidth

What are the advantages of a Wireless Network

Flexible, Easy to add new devices, Fewer wires to free up more space

How does Star Topology work

Connecting a lot of devices to a central node

What is the Advantage of using Star Topology

Easy to add new devices

What is the Disadvantage of using Star Topology

Reliant on the central node

How does Bus Topology work

Chaining all devices on a backbone cable

What is the Advantage of using Bus Topology

Simple and cheap to set up

What is the Disadvantage of using Star Topology

Low performance

What is a protocol

A set of rules enabling devices to communicate with each other

How are protocols grouped together into layers

By their functions

What are examples of protocols in the Application Layer

HTTP, FTP, IMAP, SMTP

What does HTTP mean

Hypertext Transfer Protocol

Some websites have HTTPS instead of HTTP, why

The website is encrypted

What does the FTP (File Transfer Protocol) do

Send files

What does the IMAP (Internet Message Access Protocol) do

Receive Emails

What does the SMTP (Simple Mail Transfer Protocol) do

Send Emails

What are examples of the Transport Layer

TCP, UDP

What does the TCP (Transmission Control Protocol) do

Splits data into packets and handles errors

What does UDP (User Datagram Protocol) do

Splits data into packets but doesn't check if they arrive or not

What is an Advantage of the TCP and UDP

TCP handles errors, UDP is quicker

What is an Disadvantage of the TCP and UDP

TCP takes more time, UDP wont handle errors

What is an example of the Internet Layer

IP

What does IP (Internet Protocol) do

Assigns IP address to show where the device is located

What are the examples of the Link Layer

WIFI, Bluetooth, Ethernet

What are the properties of WIFI

Wireless, Used for WLANs

What are the properties of Bluetooth

Wireless, For PANs

What are the properties of Ethernet

Wired, For LANS primarily

What is Pharming

Redirecting a site's traffic to a fake website

What should a desired password be consisted with

At least 8 characters, Contains both Upper and Lower case letters, Contains Letters and Symbols

How to make sure that your password wont be recorded by hackers

Do not save the password on untrusted devices, change your password once a month

What is Misconfigured Access Rights

When a user can access something that they shouldn't

What is Removable Media

USB sticks, discs

How can Removable Media be harmful

The removable data can extract information or install malware

What does Unpatched or Outdated Software do to your device

Hackers can exploit the bug before it's been patched

What is malware

Malicious Software

What are the types of Malicious Software

Virus, Trojan Horse, Spyware

What does a Virus do

Replicates when the host runs

What does a Trojan Horse do

A harmful software that appears harmless and useful

What does a spyware do

Record your actions

What is an example of a Spyware

A Keylogger

What is Blagging

Trick someone by creating a fake scenario and use feelings to convince them to give out information

What is Phishing

Getting fake information through messages

What is Shouldering

Observing the entering of passwords through someone or cameras

What is Penetration Testing

Simulating an attack to find issues

What is a White Box Penetration Testing

Simulates an Internal attack

What is a Black Box Penetration Testing

Simulates an External attack

What is CAPTCHA

A test method to see if the user is human

What is Anti-Malware

A software that relies on an updated database and Scans for unknown malware and Removes it

What is a Firewall

A virtual wall that checks for packets and block them if they don't meet a rule

What is Mac Address Filtering

Declining Mac Addresses which blocks the networked devices

What are examples of Biometrics

Fingerprints, Iris Pattern, Facial Recognition, Voice Recognition

Why are Biometrics used

Every person had unique biological characteristics

What is Encryption

Scrambling data so that only people with a key can decrypt and understand the data

What is a Primary Key

A special identifier in a record

What is a Foreign Key

A primary key from another table

What does a relational database do

Reduces redundancy and Inconsistancies