Sharing resources can save money
data is easy to back up
Easy collaborative working
reliable, if one device fails the whole network isn’t affected
High performing as no data collisions occur
More secure- not all devices receive data sent (unlike in bus topology)
Devices connected via one cable
As more devices are added, performance decreases
When data is sent, all devices receive it (only the intended recipient processes it)
If main cable falls, the whole network will crash
self replicating
Damage or delete files on a computer
Can be spread computer to computer
expensive / may need to hire a network manager
Hackers / viruses can infiltrate the network more easily
fetch- instructions are fetched from memory, it is them carried to the control unit
Decode - control unit decodes instructions, if arithmetic or logic is needed, instructions sent to ALU
The instructions are then executed (may require additional data held in memory)
use read write heads
Contain electromagnets on the surface
Split into sectors of magnetised regions
Require movements (therefore not as robust as SSDs
Have a spiral track
disks eg cds and dvds
Light is shined onto them
Have a spiral track and rotate
Consists of a series of pits and lands each of which reflect differently when the light is shone onto it, and can either represent a 1 or 0
blagging
Phishing
Shouldering
translates whole code into machine code before it is run
Can store compiled code as an executable file
translate code into machine code line by line (so makes errors easier to spot)
Does NOT save machine code
makes it easier to distribute code, since the executable file can be shared rather than the source code (less risk of companies stealing machine code)
faster since they’re not line by line
code only has to be translated one instead of each time it is needed to be used
No installation needed.
application
transport
Internet
Link
http, https, smtp, IMAP and Ftp operate at this layer
This is where network applications eg browsers/ email programs operate
sets up communication between two hosts (computers)
Agrees settings eg size of packets
TCP and UDP operate at this layer
where addresses are added to packets
IP operates at this layer
where network hardware is located
WIFI and Ethernet operate at this layer
Protocol used when files are transferred from one computer to another over a network
Used by web devs when uploading web pages to web server
Family of related protocols rather than a single protocol
Used by LANs
similar to Ethernet - family of related protocols
WLAN (used by comps in a wireless network)
personal area network
Group of computers connected around an individual (usually using Bluetooth)
wide area network
Group of computers connected over a large geographical area/ global scale
Collective or distributive ownership
Local area network
Connected over one building/ site
Uses Star/ bus topology
less malware risks/ hacking
Faster speed (since networks can become slow as usage increases)
No need to employ network manager (so cheaper)
hardware devices can be charged (eg printers) - so cheaper
Data/ files can be shared easily, so collaborative working is easier
Central management can handle backups
Work can be accessed from any computer on the network
Computer usage can be monitored by employers
usage anywhere in range
Not limited by cables
No cable cost
No trip hazards
Very easy to add new computers to network
slower network speed than wired
Not as secure
Signals can be affected by other electrical devices
by clock speed - higher clock speed = more executes per second
Increase num of cores = more executes at same time
Increase cache memory - more data/ instructions can be fetched from fast memory
Analogue sound is converted to an electronic signal
Strength of signal is measured at regular intervals (samples)
Each sample is rounded to nearest lvl and represented as a bit pattern
devices used to store data that can be moved from one machine to another
Not very safe - could get lost/ carry sensitive data
done by someone who has some access rights/ knowledge of system, but not all
Used to simulate an internal attack (eg rouge employee)
done by a person who has no knowledge of system/ no access rights
Used to cumulate external attack
Examples include fingerprint scans, face recognition, retina cans
Used to biologically identify an individual
improve security - allow programs to be patched
Does not rely on person remembering to update
SS is faster than magnetic, is also smaller, lighter and generates less heat, more robust
Magnetic is cheaper per byte and has large capacity
Optical is very cheap but low capacity and slow access time