Social engineering
A range of techniques used by cyber criminals to deceive users into giving away sensitive information
Modular testing
Testing individual units or components of the software
Give two ways that computer scientists demonstrate professionalism
Adhering to ethical standards and staying up to date with changes in the field.
System spftware
Runs operations of a computer
Application software
Allows users to run tasks
How media is transferred in a wired network
Packets travel over copper cables
How media travels in a wireless network
Packets travel over the air
Ethernet
A protocol used in wired networks
Why is cache used in a computer
Cache is high speed memory which acts as a buffer between a high and low speed device
Two Advantages of cloud storage
Data can be accessed anywhere and data is at a reduced risk of system failure
Two disadvantages of cloud storage
Requires internet and it’s difficult to migrate data to another cloud provider