1/47
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
List 8 common input devices
Keyboard
Mouse
Scanner
Light Pen
Magnetic card reader (ATM, Doors)
Barcodes
Kimball tags
Voice Data Entry (VDE)
Optical Character Recognition (OCR)
Magnetic Ink Character Recognition (MICR)
Touch Sensitive Screen
Explain Local Area Network
A network connecting computers within a limited area - often in the same building or group of buildings.
The computers can be connected by cables or wireless communication.
In a server/client network, a computer called a server stores common data which it then ‘serves’ to the other computers called clients
Wide Area Network
Computers as well as networks, are linked together over a large distance.
A WAN operates like a LAN but not on a much larger scale.
i.e. A multinational company can link its computers in different parts of a country or in different parts of the world. The computers communicate via satellite links.
Metropolitan Area Network
A computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns or any given large area with multiple buildings.
MAN is larger than LAN but smaller than WAN
Explain Dial Up Connections with regard to Internet Connection
Is a technology used to connect to the internet using a standard telephone line.
it works by dialing a specific phone number provided by an internet service provider (ISP) and establishing a connection through a modern.
What does a driver do?
A driver is specialised software component that allows an operating systems to communicate with and control a hardware device.
It serves as a bridge between the higher-level software applications and the low-level hardware components, facilitating the translation of commands from the operating system into a language that the hardware understands.
Drivers are essential for proper functionality and compatibility of hardware devices with computer systems.
Explain the Internet
The Internet is a global network of interconnected computers and devices that allows users to access and share information and devices, allowing them to communicate and exchange data.
Requirements to connect:
Internet Service Provider (ISP)
Computer
Modem (modulator/demodulator - digital to analogue conversion)
WiFi/Phone Line/Cable
Software - a browser i.e. Internet Explorer
ISP services - connectivity, email, web hosting
Describe what Encryption is
An algorithm (program) encodes or scrambles information during transmissions or storage.
Decoded/unscrambled by only authorized individuals to read it.
How is it done?
Both parties agree on the encryption method (there are many) using keys:
Symmetric Key - Sender and receiver have the key which can be risky.
Public Key - Use a public and private key where the public key is used to send an encrypted message and private key that the receiver uses to decode the message
Describe what Authentication is
Persons accessing the information is who they say they are.
Factors of Identification:
Something you know - user ID and Password
User ID identifies you while the password authenticates you.
Easy to compromise if weak password.
Something you have - Key or Card
Can be lost or stolen.
Something you are - Physical Characteristics (i.e. Biometrics)
Much harder to compromise.
A combination of at least 2 factors is recommended.
Describe what Message Integrity is
A process of verifying that the received message is intact and is exactly as sent.
this ensures that the transmitted message from the sender to the receiver is not altered by any type of manipulation such as changing content, adding fragments, removing fragments or content transposition.
Describe what Digital Signature is
Is a mathematical technique used to validate the authenticity and integrity of digital document, message or software.
Its the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security.
Describe what Digital Certificates is
A file or electronic password that proves the authenticity of a device, server or user through the use of cryptography and the public key infrastructure (PKI)
Digital Certificate Authentication helps organizations ensure that only trusted devices and users can connect to their networks.
Describe what Digital Wallets is
Is a software-based systems or an application that runs on any connected device.
it stores your payment information and passwords of numerous payment methods and websites.
Digital wallets run primarily on mobile devices but may be accessible from a computer - Mobile Wallets, which are a subset, are primarily used on mobile devices.
Define Adware
Is the term used for various pop-up advertisements that show up on your computer or mobile device.
Adware has the potential to become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.
Define Spyware
Is a malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.
A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user’s consent.
Define Grayware
Is commonly referred to as potentially unwanted programs or PUPS.
Those are all the applications that perform activities that can slow down the user’s devices.
Most common grayware exists for advertising or adware and spyware which tracks and records the user information and behaviour.
Explain the term Social Engineering
Is the term used for a broad range of malicious activities accomplished through human interactions.
It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
Explain Viruses
Is a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
Computer viruses aim to disrupt systems, cause major operational issues and result in data loss and leakage.
Explain Worms
Is a types of malware or malicious software that can replicate rapidly and spread across devices within a network.
As it spreads, a worm consumes bandwidth, overloading infected systems and making them unreliable or unavailable.
Worms can also change and delete files or introduce other malware.
Explain Hacking
Is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime.
Explain Trojans
Is a virus that disguises itself as legitimate software to trick users into installing it.
Once inside, it can steal data, damage files, take control of your computer, or create a backdoor for further attacks
Differentiate between Data Security and Data Integrity
Data Security:
Involves protecting data from unauthorized access and preventing data from being corrupted or stolen.
Data Integrity:
Is typically a benefit of data security but refers to data accuracy and validity rather than data protection.
What is the difference between Data Validation and Data Verification?
Data Verification involves checking the accuracy and completeness of data, while data validation involves ensuring that the data meets certain standards or criteria.
What are the roles and responsibilities of Data Controllers when storing data?
The Data Controller is responsible for ensuring that personal data is processed, lawfully, transparently in accordance with the rights of the data subjects.
A data controller is an individual or entity that determines the purposes, conditions, and means of processing personal data.
In the context of data protection regulations like the General Data Protection Regulation.
Defining the purpose for which data is processed.
Deciding what data is collect and implementing measures to protect the privacy and security of the data.
Data controllers may include businesses, organizations or individuals who collect and process personal information.
Define Software Copyright
It protects the expression of an idea in a software program, like the code itself. It prevents others from copying, distributing or creating derivative works without permission.
Define Intellectual Property
It refers to creations of the mind that are legally protected from unauthorized use by others.
these creations can include inventions, literary and artistic works, designs, symbols, names and images used in commerce.
what does Patent mean?
Is a form of intellectual property that grants/protects computer software and the inventor exclusive rights to a unique software-based invention or process, preventing others from using, copying or selling it without permission for a period of time.
Define Plagiarism
Is the act of using someone else’s work, ideas, words or creations without proper acknowledgment and presenting them as your own.
It is considered unethical and can have serious academic, professional and legal consequences.
It can be intentional or accidental but both can be taken seriously, especially in educational and creative fields.
List 5 types of Information Systems (pt1 of long question)
Personal Information System
Transaction Processing System (TPS)
Management Information System (MIS)
Decision Support System (DIS)
Expert Systems (ES)
Explain Personal Information Systems in detail (pt2 long question)
A personal information systems is a type of information systems designed to help individuals collect, organize, store and manage their personal data for decision making, productivity or communication purposes. Unlike organizational information systems that serve entire businesses or departments, personal information systems focus on individual users and their specific needs. for example Contact Management systems are used for phone contact apps and Health Tracking apps are used for apps that cant track your health like Apple Health.
Explain Transaction Processing Systems in detail (pt3 long question)
A Transaction Processing Systems is a type of computerized information system designed to process large volume of routine, structured transactions efficiently and accurately. These transactions are the fundamental operations of an organization, such as sales, purchases, deposits, withdrawals, orders, payroll, and reservations. TPS is the backbone of any organization’s daily functioning and plays a critical role in supporting business operations. For example Airlines use Reservation systems for booking flights and managing passenger information.
Explain Management Information Systems in detail (pt4 long question)
A Management Information System (MIS) is a computerized system that provides managers with the tools to organize, evaluate, and efficiently manage departments within an organization. MIS collects data from various business operations, processes it, and then produces meaningful information in the form of reports that managers use for decision-making and strategic planning. For example Sales Management Systems Track sales performance, customer trends, and revenue targets.
Explain Decision Support System in detail (pt5 long question)
A Decision Support System (DSS) is a computer-based information system that supports business or organizational decision-making activities. DSS helps managers and business professionals make informed and data-driven decisions by analyzing large volumes of data, applying models, and offering simulations, forecasts, or alternative solutions The main goal of a DSS is to support rather than replace decision-making. It provides relevant information and analytical tools that help managers explore different scenarios, For example Marketing DSS Analyzes market trends, customer behavior, and campaign performance.
Explain Expert System in detail (pt6 long question)
An Expert System (ES) is a branch of artificial intelligence that attempts to replicate the decision-making abilities of a human expert. It is designed to solve complex problems by reasoning through bodies of knowledge, represented mainly as if-then rules, rather than through conventional procedural code. The primary goal of an expert system is to mimic human expertise and provide reliable solutions to problems that would otherwise require human specialists For example
Explain Topology in Network Design (pt1 LQ)
Network topology refers to the arrangement of different elements (links, nodes, devices, etc.) in a computer network. It is a structural layout that defines how computers, printers, routers, and other devices are interconnected, either physically or logically. Choosing the right topology is crucial in network design, as it affects performance, scalability, fault tolerance, and cost.
List 5 main types (pt2 LQ)
Bus
Ring
Star
Tree
Mesh
Explain Bus in detail (pt3 LQ)
Bus topology is a type of network design where all devices (nodes) are connected to a single central cable, known as the bus or backbone. Data sent by one device travels along the bus and can be received by any of the other devices on the network. In a bus topology, each computer or device is directly connected to a single central cable (the bus) using T-connectors. Both ends of the bus must be connected to terminators to prevent the signal from bouncing back along the cable, which would cause interference.
Explain Ring in detail (pt4 LQ)
Ring topology is a type of network topology in which each device (also called a node) is connected to exactly two other devices, forming a circular pathway for signals. Data travels in one direction (unidirectional) or both directions (bidirectional) around the ring, and each device in the ring has exactly two neighbors for communication purposes. In a ring topology, the devices are connected in a closed loop. Each device has a dedicated point-to-point connection with the two devices on either side. This setup forms a circle, or a “ring,” through which data is transmitted.
Explain Star in detail (pt5 LQ)
Star topology is a type of network design where all devices (also known as nodes) are individually connected to a central networking device such as a hub, switch, or router. This central device acts as a controller to manage and direct data flow among the connected nodes. In star topology, each device has a dedicated point-to-point connection to the central hub. Devices do not connect directly to each other; instead, all communication passes through the central hub or switch. This layout forms a star-like structure.
Explain Tree in detail (pt6 LQ)
Tree topology is a hierarchical network topology in which the structure is similar to a tree. It combines characteristics of both star topology and bus topology. The network is organized in levels, with a root node at the top, and all other nodes connected in a parent-child hierarchy.
The topmost node is known as the root node (often a central hub, router, or server).
The root connects to one or more intermediate nodes (like switches or secondary hubs), forming branches.
These intermediate nodes further connect to end devices (computers, printers, etc.), forming sub-branches.
This creates a structure that resembles a tree: with branches, leaves, and nodes.
Explain Mesh in detail (pt7 LQ)
Mesh topology is a type of network topology where each device (node) is interconnected with every other device in the network, either directly or through multiple hops. This creates a highly robust and reliable communication network.
There are two types of mesh topologies:
Full Mesh Topology – Every device is directly connected to every other device.
Partial Mesh Topology – Some devices are connected to all others, while others are only connected to specific nodes.
What is an Operating System (pt1 LQ)
An Operating System (OS) is a system software that acts as an intermediary between the user and the computer hardware. It manages hardware components, software resources, and provides a platform for running application programs. Without an operating system, a computer cannot function. The primary purpose of an OS is to enable users to interact with the computer system efficiently and conveniently. It ensures that all hardware and software components work together smoothly and that system resources like CPU, memory, and storage are allocated and managed properly.
List some functions that an Operating System is responsible for(pt2 LQ)
Process Management
Memory Management
File Management
Device Management
User Interface
Security and Access Control
Job Scheduling
Input/Output Management
Error Detection and Handling
Networking
What are the 4 main structural components in a computer? (pt1 LQ)
Central Processing Unit (CPU)
Memory (Primary Storage)
Input/Output (I/O) Devices
System Interconnection (Buses)
Describe Central Processing Unit in detail (pt2 LQ)
The Central Processing Unit (CPU) is often referred to as the “brain” of the computer. It is the most critical component of any computing device, responsible for executing instructions, processing data, and managing system operations. Every task performed by a computer, from the simplest calculation to running complex applications, is carried out under the direction of the CPU. The CPU is a hardware component that performs all the processing tasks of a computer. It interprets and executes the instructions from both software applications and the operating system. The speed and efficiency of a computer are largely determined by the power and design of its CPU.
Describe Memory (Primary Storage) in detail (pt3 LQ)
Memory, also known as primary storage or main memory, is a vital component of a computer system. It is responsible for temporarily storing data and instructions that the CPU needs while performing tasks. Without memory, the CPU would have no data to work on, and a computer would not function. Memory plays a critical role in determining the speed and efficiency of the system. Primary memory is the part of a computer where the operating system, application software, and currently used data are kept so that they can be quickly accessed by the CPU. It is volatile, meaning that all data is lost when the power is turned off.
Describe Input/Output Devices in detail (pt4 LQ)
Input/Output (I/O) devices are essential components of a computer system. They serve as the communication link between the user and the computer. Input devices allow users to provide data and commands to the computer, while output devices allow the computer to display or communicate the results of processing. Without I/O devices, users would not be able to interact with or make use of computer systems effectively. Input/Output devices are hardware components that facilitate data exchange between the computer and the outside world. They either send data to the system (input) or receive data from the system (output), and some can even perform both functions.
Describe System Interconnection in detail (pt5 LQ)
A computer system is made up of several components, such as the CPU, memory, and input/output devices, all of which must work together efficiently to perform tasks. The System Interconnection is the internal communication mechanism that links all these components, allowing them to share data and instructions. Without it, the components would be isolated and unable to function as a unified system. System Interconnection refers to the communication pathways—typically called buses—that connect the major components of a computer system. These pathways allow data, addresses, and control signals to be transferred between the Central Processing Unit (CPU), memory, and input/output (I/O) devices.