Paper 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/122

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

123 Terms

1
New cards

sample rate

number of samples per second

2
New cards

bit depth

the number of bits available to store amplitude measures

3
New cards

IPv4

  • dotted decimal as separators

  • 4 numbers

  • each ranging from 0-255

4
New cards

IPv6

  • colons as separators

  • 6 pairs of hexadecimal digits

  • each ranging from 00 to FF

5
New cards

switch

  • provides a dedicated connection for each connected computer

  • has a switching table that contains a list of its physical ports and the MAC addresses of the devices connected to those ports

  • allows efficient data transfer by reducing collisions

6
New cards

router

  • connects different networks together

  • typically found at the boundary of the LAN to the Internet

  • has a list of its physical ports and the IP addresses of other routers connected to those ports

  • uses these to make decisions as to which port to send out a packet to

  • address resolution, converts private IP addresses into public IP addresses

7
New cards

LAN

  • Local Area Network

  • small geographical area

  • network hardware used is usually owned by organisation

8
New cards

WAN

  • Wide Area Network

  • large geographical area

  • network hardware used is usually rented

9
New cards

topology

the physical arrangement of devices in a LAN

10
New cards

POP

  • Post Office Protocol

  • an email protocol

  • it covers the transfer of emails from the server to the client

  • removes (pops) the emails from the server as it does so

11
New cards

IMAP

  • Internet Message Access Protocol

  • an email protocol

  • used for transferring emails from a server to a client

  • does not remove the email from the server

12
New cards

SMTP

  • Simple Mail Transfer Protocol

  • an email protocol

  • used for sending emails from the client to the server

13
New cards

HTTP

  • Hyper Text Transfer Protocol

  • used for the transfer of HTML pages (web pages) from a web server to a client

14
New cards

HTTPS

  • Hyper Text Transfer Protocol Secure

  • covers the transfer of encrypted web pages from a web server to a client

15
New cards

FTP

  • File Transfer Protocol

  • covers the transfer of files from a server to a client and vice versa

16
New cards

IP

  • Internet Protocol

  • covers addressing

17
New cards

TCP

  • Transmission Control Protocol

  • controls the volume of traffic on the Internet (flow control), error detection and correction as well as encapsulation of data into packets

18
New cards

Client server

  • a model

  • one computer (server) is typically more powerful, it provides a service to client computers

19
New cards

Peer to peer

  • a model

  • all computers have equal status

20
New cards

model

a conceptual arrangement of the roles of the devices

21
New cards

star topology

  • has a switch in the centre

  • if the switch fails, the whole network fails

  • easy to add new nodes

22
New cards

mesh topology

  • every node is connected to each other

  • has a high redundancy, no effect on network if a single device goes down

  • difficult to add new nodes and expensive to cable

23
New cards

protocol layers

  • grouping protocols with similarities in their function

  • done to facilitate development at a particular layer, without having to be concerned about the impact on other layers

  • promotes interoperability

24
New cards

standard

  • technical specifications that specify how software and hardware components must work

  • each standard will include one or more sets of protocols

25
New cards

protocol

a set of rules that determine how two devices will communicate

26
New cards

Ethernet

  • a protocol that specifies how devices should be connected in a wired LAN

  • defines how data should be transmitted using MAC addresses to determine which device the data should go to

  • also defines what should happen if a collision occurs on the network

27
New cards

Wi-Fi

  • a set of protocols that specify how devices can communicate wirelessly using radio waves

  • defines the frequency band and channel that should be used for communication as well as transmission rates and how devices authenticate

28
New cards

Bluetooth

  • a wireless protocol

  • much shorter range than Wi-FI

  • uses ultra-high frequency radio waves

  • typically used to transfer files between mobile devices and for headphones

29
New cards

secondary storage

non-volatile storage devices that retains data when power is turned off

30
New cards

types of secondary storage

magnetic, solid state, optical

31
New cards

characteristics of magnetic

  • usually the highest capacity

  • usually the cheapest

  • if kept stable then reliable

  • heavy and bulky

  • moving parts

32
New cards

characteristics of solid state

  • more durable, no moving parts

  • portable (USB stick)

  • limited lifespan

  • quickest read/write speed

33
New cards

characteristics of optical

  • relatively cheap

  • light and portable

  • drive used to read the disc is considered unreliable

34
New cards

encryption software

  • encrypts plain text into cipher text

  • cipher text cannot be understood

  • decryption requires encryption key

35
New cards

defragmentation

moving separated parts of a file together in memory (secondary storage)

36
New cards

compression

when the file size if reduced so it either takes less storage or is faster to transmit/download/upload

37
New cards

lossless compression

  • no data is lost upon compression

  • decompressed file is identical to the original file

38
New cards

lossy compression

  • data has been lost after decompression

  • decompressed file will be lacking some data that was originally present

  • decompressed file is smaller than lossless decompressed file

39
New cards

utility software

  • small programs that assist the OS in its running

  • they are often bundled with the OS, although they can be downloaded separately

40
New cards

types of utility software

  • encryption software

  • defragmentation

  • data compression

41
New cards

what operating systems provide

  • user interface

  • memory management and multitasking

  • peripheral management and drivers

  • user management

  • file management

42
New cards

user interface

provides a means for the user to interact with the computer

43
New cards

memory management and multitasking

  • manages the allocation of RAM and the use of virtual memory as the RAM gets full

  • controls multitasking, when the computer rapidly alternates between multiple tasks

44
New cards

peripheral management and drivers

  • peripheral is any device that sits outside of a computer like a keyboard

  • driver is a specific piece of software designed to the let the OS interact with the specified peripheral

45
New cards

user management

  • provides basic security

  • requires a password to authenticate the user

  • different users can be assigned different levels of access

  • user profiles can be created and deleted

46
New cards

CPU

  • Central Processing Unit

  • carries out the execution of instructions required for programs to run

  • also takes part in FDE cycles

47
New cards

FDE cycle

  • Fetch Decode Execute Cycle

  • instructions are fetched (from RAM)

  • instructions are decoded

  • instructions are executed

  • the process is repeated

48
New cards

common CPU components

  • ALU

  • CU

  • Cache

49
New cards

ALU

  • Arithmetic Logic Unit

  • carries out addition, subtraction, shifts and logical operations such as NOT, AND and OR

50
New cards

CU

  • Control Unit

  • carries out the decoding of instructions

51
New cards

Cache

  • memory with very fast read-write speed

  • temporarily holds recently/frequently used instructions

52
New cards

Von Neumann architecture (registers)

  • PC

  • ACC

  • MAR

  • MDR

53
New cards

PC

  • Program Counter

  • temporarily holds the address of the location of the next set of instructions/data to be fetched

  • increments each FDE cycle

54
New cards

ACC

  • Accumulator

  • temporarily holds the results of calculations that have been carried out by the ALU

  • also temporarily holds data that has been inputted or is about to be outputted

55
New cards

MAR

  • Memory Address Register

  • holds the memory location/address of the next instruction to be fetched

56
New cards

MDR

  • Memory Data Register

  • holds the data that has been fetched or is being sent to memory

57
New cards

embedded system

a computer system with a single function, inside a larger mechanical unit

58
New cards

examples of embedded systems

  • microwave

  • washing machine

  • cars

59
New cards

properties of embedded systems

  • highly efficient

  • reliable

  • cheap to produce

  • compact in size

  • low in power consumption

60
New cards

purpose + characteristics of embedded systems

  • designed to carry out a limited number of tasks

  • built within a larger device

  • use a micro controller

  • use firmware

61
New cards

units of data

  • bit (0 or 1)

  • nibble (4 bits)

  • byte (8 bits)

  • kilobyte (1000 bytes)

  • megabyte (1000 KB)

  • gigabyte (1000 MB)

  • terabyte (1000 GB)

  • petabyte (1000TB)

62
New cards

purpose of binary format

CPU is made up of many very small switches which are either on (1) or off (0), the states of these switches are represented with binary

63
New cards

sound file size

sample rate x duration (s)

64
New cards

image file size

colour depth x image height (px) x image width (px)

65
New cards

text file size

bits per character x number of characters

66
New cards

CPU characteristics that affect performance

  • clock speed

  • number of cores

  • cache size

67
New cards

metadata

data about data

68
New cards

examples of metadata

resolution, colour depth, file size

69
New cards

left shift

  • multiplication

  • leftmost bit is discarded

  • all bits move to the left

70
New cards

right shift

  • division

  • rightmost bit is discarded

  • all bits move to the right

71
New cards

overflow

when the result of binary addition exceeds the available bits

72
New cards

loss of precision

when multiplying binary values and the overflow is lost

73
New cards

primary storage

  • holds the data and instructions that the CPU needs to access while the computer is turned on

  • includes RAM and ROM

74
New cards

RAM

  • Random Access Memory

  • holds the instructions that are currently in use

  • is volatile, contents are lost when power is turned off

  • has very fast read-write speed

  • larger capacity than ROM

  • can be edited

75
New cards

ROM

  • Read Only Memory

  • holds the first instructions a computer needs in order to start up

  • contains BIOS (Basic Input Output System) and stores boot sequence

  • fast read-write speed but slower than RAM

  • is non-volatile, contents are not lost even when the power is turned off

  • is read only, data can only be read and can’t be edited

76
New cards

virtual memory

  • an extension of RAM located in secondary storage

  • when RAM is close to being full, virtual memory is used so the computer remains operational

  • data currently not in use is transferred here

  • much slower read-write speed and negatively impacts system performance

77
New cards

factors that affect network performance

  • number of users

  • bandwidth

  • latency

  • error rate

  • transmission media

78
New cards

number of users

too many users can slow down the network if there is not enough bandwidth for all the users

79
New cards

bandwidth

  • the amount of data that can be sent and received at any given time

  • measured in bits per second (bit rate)

80
New cards

latency

the delay between data being send and received

81
New cards

error rate

the measure of how many packets do not reach their destination

82
New cards

transmission media

  • the type of cable used in wired connections

  • wired connections offer a higher bandwidth than wireless connections

83
New cards

types of transmission media

  • UTP

  • coaxial

  • fibre optic cable

84
New cards

WAP

  • Wireless Access Point

  • allows wireless devices to connect to a LAN

  • it can share out its allocated frequency range amongst connected devices

85
New cards

NIC

  • Network Interface Card

  • can be wired or wireless

  • provides the connection between the computer and a network

  • stores the MAC Address

86
New cards

DNS

  • Domain Name System

  • a system for resolving a URL to an IP address

  • needed because humans work with URLs whilst computers work with IP addresses

87
New cards

how DNS works

  • a website is hosted on a computer called a web server

  • a computer that accesses th website is the client

  • the user enters a web address (URL) into the web browser

  • the web browser send a request to a DNS server for the matching IP address

  • if found, the IP address is returned to the user computer which then uses it to send a webpage request to the web server

88
New cards

hosting

typically storing data online (e.g. One Drive)

89
New cards

cloud services

other online servers that provide software as a service

90
New cards

cyber attack examples

  • hacking

  • malware

  • data interception

  • DoS and DDoS attacks

  • brute force attacks

  • SQL injection

  • social engineering

  • physical threats

91
New cards

hacking

gaining or seeking to gain unauthorised access to a computer, a network or its data

92
New cards

penetration testers

  • preventative method for hacking

  • legally ‘hack’ into a system and report suggestion on how the organisation can improve their cyber security

93
New cards

malware

  • software designed to do harm to computer, a network or its data

  • there are various types e.g. ransomware, viruses

94
New cards

anti-malware software

  • preventative method for malware

  • automatically scans any files downloaded to check they are not harmful and report if there is a risk

95
New cards

data interception

when data streams conveyed over a network are intercepted and usable data is captured

96
New cards

encryption

  • preventative method for data interception

  • prevents the hacker from being able to interpret intercepted data

97
New cards

DoS attack

  • Denial of Service attack

  • a deliberate attempt to stop users of a network accessing the services provided by overloading it with network traffic

98
New cards

DDoS attack

  • Distributed Denial of Service attack

  • computers from all over the world are innocently hijacked to take part in a DoS attack, each sending only a small part of the flood

  • hijacking is usually done with malware

99
New cards

brute force attack

where the hacker makes repeated attempts to gain entry to a computer or a network, commonly by repeatedly trying to guess their password

100
New cards

strong password

  • preventative method for brute force attacks

  • one that is not easily guessed or discovered

  • should contain: upper and lowercase letters, digits, special characters, and minimum 8 character in length