Lecture Review Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/102

flashcard set

Earn XP

Description and Tags

Flashcards based on lecture notes, covering topics from cybersecurity to programming.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

What is social engineering in cybersecurity?

A method where attackers trick or manipulate people into giving away confidential information
like passwords.

2
New cards

What is phishing?

A type of social engineering where fake emails or messages are sent to trick people into giving
personal data or clicking malicious links.

3
New cards

Give an example of phishing.

An email that says “Your account has been locked—click here to reset your password,” linking to
a fake website.

4
New cards

What is shoulder surfing?

Watching someone enter personal information, like a PIN, over their shoulder.

5
New cards

What is pretexting?

Pretending to be someone trustworthy (e.g. IT staff) to get personal information.

6
New cards

What is baiting?

Offering something tempting (like a free USB stick) to trick someone into installing malware or
giving access.

7
New cards

What is blagging?

Creating a fake story or identity to gain trust and extract sensitive information.

8
New cards

Why is social engineering dangerous?

It can lead to data theft, financial loss, identity fraud, and compromised accounts.

9
New cards

Why is social engineering effective?

Because it targets human emotions like fear, trust, and urgency, which are easier to manipulate
than secure systems.

10
New cards

What is the purpose of a password?

To protect user accounts and data from unauthorised access.

11
New cards

What are three features of a strong password?

Long (8+ characters), unpredictable, and includes a mix of uppercase, lowercase, numbers, and
symbols.

12
New cards

Give one example of a strong password.

Tr0ubL3!nP@rad1se (or any long, random combination of characters)

13
New cards

Why is “password123” a bad password?

It’s easy to guess and commonly used, so it’s more vulnerable to hacking.

14
New cards

What can happen if you use the same password across different websites?

If one site is hacked, attackers can access all your other accounts.

15
New cards

What is two-factor authentication (2FA)?

A security method that requires a password plus another form of ID, like a phone code or
fingerprint.

16
New cards

Name one bad password habit.

Writing your password on a sticky note near your computer.

17
New cards

How does 2FA improve security?

Even if a hacker gets your password, they can’t log in without the second factor.

18
New cards

What does “malware” stand for?

Malicious software—programs designed to harm or steal data from a computer.

19
New cards

Name two common types of malware.

Viruses and ransomware (others include spyware, worms, trojans).

20
New cards

What does a virus do?

Attaches to files and spreads, damaging or deleting data.

21
New cards

What is ransomware?

Malware that locks your files and demands payment to unlock them.

22
New cards

What does spyware do?

Secretly collects personal data like passwords or browsing history.

23
New cards

Name one sign your device might have malware.

It runs slowly, or you see frequent pop-ups.

24
New cards

What are fake antivirus messages a symptom of?

Malware trying to trick you into installing more harmful software.

25
New cards

What’s a good way to protect against malware?

Use antivirus software and avoid clicking unknown links or downloads.

26
New cards

Why should you back up your files?

In case ransomware locks them, you won’t lose important data.

27
New cards

Why is it important to protect your online accounts?

To stop hackers from stealing personal data, money, or your identity.

28
New cards

What does 2FA stand for?

Two-Factor Authentication.

29
New cards

How does 2FA work?

It adds a second step to login, like a code sent to your phone or a fingerprint scan.

30
New cards

Name two ways to keep your online accounts secure.

Use strong passwords and turn on 2FA.

31
New cards

What should you look for in a secure website?

A URL that starts with https:// and a padlock symbol.

32
New cards

Why should you log out of shared devices?

So no one else can access your account.

33
New cards

Give one bad habit that puts your accounts at risk.

Reusing the same password on every site.

34
New cards

What’s a smart way to avoid phishing attacks?

Don’t click on links in suspicious emails or pop-ups.

35
New cards

What does CPU stand for?

Central Processing Unit

36
New cards

What is the CPU often called in a computer?

The “brain” of the computer

37
New cards

What are the three steps in the Fetch–Decode–Execute cycle?

Fetch, Decode, Execute

38
New cards

What does the CPU do during the “fetch” step?

It gets the next instruction from memory

39
New cards

What happens in the “decode” step?

The CPU understands or interprets the instruction

40
New cards

What happens in the “execute” step?

The CPU carries out the instruction (e.g. calculation or moving data)

41
New cards

What is an instruction in computing?

A command that tells the CPU what to do

42
New cards

What is a program?

A list of instructions for the CPU to process

43
New cards

What is clock speed measured in?

GHz (gigahertz)

44
New cards

Name one task the CPU is responsible for.

Running apps, doing calculations, or moving data

45
New cards

What does clock speed measure?

How many cycles per second the CPU can perform, measured in GHz.

46
New cards

How does higher clock speed affect performance?

It allows the CPU to process more instructions per second, making it faster.

47
New cards

What is a CPU core?

A processing unit inside the CPU that can run its own Fetch–Decode–Execute cycle.

48
New cards

Why does having more cores improve performance?

It allows the CPU to carry out more tasks at the same time (parallel processing).

49
New cards

What is cache?

A small, fast type of memory inside the CPU used to store frequently accessed data.

50
New cards

How does a larger cache improve CPU performance?

It reduces the time the CPU spends fetching data from main memory.

51
New cards

Is RAM part of the CPU?

No, but it affects performance by storing data that programs use while running.

52
New cards

What happens if there is too little RAM?

The computer slows down because it has to use the hard drive instead of fast memory.

53
New cards

What is an input device?

A device that sends data into a computer.

54
New cards

Give two examples of input devices.

Keyboard and mouse (others include microphone, scanner, touchscreen).

55
New cards

What is an output device?

A device that sends data out of a computer to the user.

56
New cards

Give two examples of output devices.

Monitor and printer (others include speakers, projector, headphones).

57
New cards

What is a storage device?

A device that saves data for later use.

58
New cards

Name two types of storage devices.

USB stick and solid state drive (others include HDD, cloud, CD/DVD).

59
New cards

What is the difference between an SSD and an HDD?

SSDs are faster and have no moving parts; HDDs are slower and use spinning disks.

60
New cards

What type of device is a touchscreen?

It’s both an input and output device.

61
New cards

What type of storage is Google Drive?

Cloud storage.

62
New cards

What does a projector do?

Displays output on a large screen or surface.

63
New cards

What is a network?

A group of connected computers that share resources like files, internet, and printers.

64
New cards

What does LAN stand for?

Local Area Network.

65
New cards

Where is a LAN used?

In a small area like a home, office, or school.

66
New cards

What does WAN stand for?

Wide Area Network.

67
New cards

What is the largest example of a WAN?

The Internet.

68
New cards

What is the World Wide Web (WWW)?

A collection of websites and web pages on the Internet.

69
New cards

What is an IP address?

A unique number used to identify a device on a network.

70
New cards

What are data packets?

Small chunks of data sent across a network, including part of the message and destination info.

71
New cards

Why are data packets numbered?

So they can be reassembled in the correct order at the destination.

72
New cards

What is encryption?

A method of scrambling data so it can only be read by the intended recipient.

73
New cards

Why is encryption important?

It protects your data and keeps your online activity private and secure.

74
New cards

What does a router do?

It connects different networks together, such as a home network to the internet.

75
New cards

What does a switch do?

It sends data only to the correct device within a network.

76
New cards

What does a hub do?

It sends data to all devices on a network, whether they need it or not.

77
New cards

Why is a switch better than a hub?

A switch is more efficient because it only sends data to the intended device.

78
New cards

What does a modem do?

It converts digital signals so data can travel over phone or cable lines.

79
New cards

What does NIC stand for?

Network Interface Card.

80
New cards

What is the purpose of a NIC?

It allows a computer or device to connect to a network.

81
New cards

What is a wireless access point?

A device that connects wireless (Wi-Fi) devices to a wired network.

82
New cards

What is the difference between a router and a modem?

A modem connects to the internet; a router shares that connection with other devices.

83
New cards

What is encryption?

A method of scrambling data so only someone with the correct key can read it.

84
New cards

Why is encryption important?

It keeps your personal data private and secure, especially online.

85
New cards

How can you tell if a website is secure?

It has https:// and a padlock icon in the browser bar.

86
New cards

What is a firewall?

A security system that blocks harmful or unwanted network traffic.

87
New cards

What does antivirus software do?

It detects, blocks, and removes viruses and other types of malware.

88
New cards

What is phishing?

A scam where someone tries to trick you into giving personal information (often by email or fake
websites).

89
New cards

What does 2FA stand for?

Two-Factor Authentication.

90
New cards

How does Two-Factor Authentication work?

It requires a password and a second form of verification (e.g. text code or fingerprint).

91
New cards

What is cyberbullying?

Bullying or harassment using digital platforms like social media or messaging apps.

92
New cards

Name two ways to stay safe online.

Use strong passwords and don’t click on links from unknown senders.

93
New cards

What is a bitmap image made of?

Tiny squares called pixels.

94
New cards

What is a vector image made of?

Lines, shapes, and mathematical formulas.

95
New cards

What happens to bitmap images when you zoom in?

They become pixelated and lose quality.

96
New cards

Why are vector images better for logos?

They can be resized without losing quality.

97
New cards

What does resolution mean in images?

The number of pixels in the image, usually measured as width × height.

98
New cards

What does colour depth mean?

The number of colours each pixel can show, measured in bits per pixel (bpp).

99
New cards

Which shows more colours: 8-bit or 24-bit colour depth?

24-bit (can show over 16 million colours).

100
New cards

What affects the file size of an image?

Resolution, colour depth, and file format.