Looks like no one added any tags here yet for you.
3 example of input devices
Keyboard, Mouse, Microphone
3 examples of output devices
monitor, speakers, printer
What is a general term for input and output devices
Peripherals
What does CPU stand for (what else is it known as)
Central Processing Unit also known as a microprocessor
What does RAM stand for
Random Access Memory
What does BIOS stand for
Basic Input/Output System
What is the role of BIOS
It's the memory that tells the computer what to do when it starts up
Why is it important for computers to keep memory when they are turned off
So that they know how to start up again and that they keep the memory stored on them for the future.
What does ROM stand for
Read Only Memory
1 type of removable storage
USB stick
What is the role of a hardrive
Where files are stored permanently as a permanent part of the computer even when the computer is turned off
How is data stored on a CD-ROM
Stored by laser dents that have been burnt onto it
What type of device is used to read data from a CD
A laser reader writer that is used to read the dent and highs and lows
How does RAM work
It has a structure with many holes where one byte is stored and the CPU can access certain holes via an address.
What is serial access and how does it compare to random access
When you chronologically search for something one by one not moving on until you look at the one before, RAM is much quicker
How many bits in a byte
8
How many bytes in a megabyte
1 million
How many bytes in a gigabyte
1 billion
What is the basic function of the CPU
It can do basic maths and organises everything. It is mainly for completing tasks and instructions set out.
Why do we have the internet
so that we can communicate, do work and entertain ourselves.
What is the internet
The internet is a system of worldwide communication where anyone can access
What does it mean to data stored in the cloud
Is a mode of computer data storage where digital data is stored in an off-site location
How is a video uploaded in the USA seen in Australia
The video is uploaded to youtube's servers and then anyone who has access to the server can access the videos
Can deleted pictures be found again
Deleted pictures can be found because anything uploaded is now history and the compaines store their history in their servers.
What is binary code
a coding system using the binary digits 0 and 1 to represent a letter, digit, or other character
What are the 3 physical stystems built to send messages with pros and cons
Electricity - pro- cheap, con - signal loss
Light - pro - really fast with no signal loss, con - expensive and hard to work with
Radio - pro - totally mobile, con - short range
What is the order of binary digits from smallest to 128
1,2,4,8,16,32,64,128
What are clients
computers set up to access services through the internet
What are routers
devices which help information get to where it needs to be across theinternet
What are servers
computers set up to provide internet services
What does an oval mean in flowcharts
Start/End
What does an rectangle mean in flowcharts
Task, action or process
What does an diamond mean in flowcharts
Decision or condition
What does a tilted rectangle/parallelogram mean in flowcharts
Input/Output
What does a line mean in flowcharts
Flow line
What is encryption
The process of converting data into an unreadable form of text
What is decryption
The process of converting data in an unreadable form of text back to its original form
What is a Caesar cipher?
A substitution cipher that shifts characters a certain number of positions in the alphabet
How do you get more difficult encryption
Increasing the length of the digit key
How do companies use data
Websites track the data you input to target content at you like advertising
What can companies do in their terms and conditions
Can make you accept them using your videos and photos for other media
How can connecting computers into networks introduce new vulnerabilities
With such a large internet we have to downsize on the amount of sercurity.
What are some ways computers can be compromised
Records with personal information can be leaked allwoing for people to steal identities.
What can we do to protect our own privacy online
Change passowords regularly, block online trackers, use a VPN
What is threat modeling
It is a process of creating a guard against threats tailored to you.
What is artifical intelligence
the ability of machines to perform tasks that are typically associated with human intelligence.
What are 2 positive and negitives of AI
Positives -
We can connect with the world further than our senses
We can use computers to work with challenges we have never faced before
Negitives
It can be equipped with human intuition and can approximate human intuition.
The machines can improve themselves, they could control us
List 1 way AI can solve issues in our society
Agriculture - can track and moniter regular crop growth with weather patterns to make farming more efficent
What are the ethics of using AI
privacy, copyright, accountability, employment, autonomy, and human rights.
What is the Internet of Things
It is about the physical internet- connected devices connecting to everything in it to share information.
What are the technologies behind the internet of things
Sensors can pick up physical signals from its surrounding environment