computer science part of topics 1-6

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/133

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

134 Terms

1
New cards

What is cybercrime?

crime committed using a computer or a network

2
New cards

What are four common types of email scams?

  1. Phishing

  2. Trojan horse (malware)

  3. Fraudulent requests for money

  4. Virus generated email

3
New cards

What is phishing?

An email that tricks you into handing over personal information (login details, bank details...)

4
New cards

What to look out for in a phishing email

The greeting is not personalised, poor spelling and grammar, sense of urgency, the sender's address is often a variation on a genuine address, request for personal information, forged link

5
New cards

What is Trojan horse and malware?

Send you something you want to look at like a funny video but is actually a virud

6
New cards

What is an advanced fee fraud?

A plea for help where they ask for money and in return you'll get millions of pounds

7
New cards

What is a virus generated email?

Will appear to be sent from a friend, that's friends email will have been infected by a virus

8
New cards

What is the computer misuse act of 1990

It's illegal to look at or modify someone else's files without permission

9
New cards

Define hacking

Hacking is illegally accessing or modifying computer files without permission

10
New cards

What are white hat hackers?

They are legal people who check for faults

11
New cards

Who are black hat hackers?

They are hackers with criminal interest

12
New cards

How do hackers do it?

  • Exposing security holes in websites to access information

  • Taking advantage of obvious/common usernames and passwords

  • Tricking people into downloading malware onto their computer, which in turn gives the hacker access to view and modify your files

13
New cards

What is malware?

software that is intended to damage or disable computers and computer systems.

14
New cards

What is a logic bomb?

A logic bomb tells the computer to execute a set of instructions at a certain date and time or under certain specified conditions

15
New cards

What is ransomware?

Ransomware is software illegally installed on a computer so that the user cannot access their files until a ransom is paid

16
New cards

What are 3 common types of malware?

  1. Browser functions

  2. File infector

  3. Macro virus

17
New cards

Can people legally hold info about you?

No

18
New cards

How long does copy right last?

life of author plus 70 years

19
New cards

What is plagiarism

the practice of taking someone else's work or ideas and passing them off as one's own.

20
New cards

What is phishing?

An attempt to trick someone into revealing his/her user name and password or other personal details.

21
New cards

How can phishing be prevented?

give no one your personal information and click on no links via sms

22
New cards

What is a brute force attack?

In a brute-force attack, an attacker simply tries to guess every possible combination for a password.

23
New cards

How can brute force attacks be prevented?

use strong and difficult to guess passwords.

24
New cards

What is malware?

software that is intended to damage or disable computers and computer systems.

25
New cards

What is malware short for?

malicious software

26
New cards

What is a DDoS attack?

A distributed denial of service attack is typically carried out by a botnet consisting of thousands of infected (zombie) computers which simultaneously send traffic to the targeted site.

27
New cards

What does DDoS attack stand for?

Distributed Denial of Service Attack

28
New cards

What is ransomware?

a type of malicious software designed to block access to a computer system until a sum of money is paid.

29
New cards

What is adware?

Software installed on a computer that produces pop-up ads using your browser; the ads are often based on your browsing habits.

30
New cards

Can adware be prevented?

No, it usually isnt harmful and will only annoy the user or slow down the computer

31
New cards

What is data interception?

Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.

32
New cards

What is a white hat hacker?

White hat hackers are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.

33
New cards

what is a black hat hacker

Attackers who violated computer security for personal gain or to inflict malicious damage

34
New cards

What is SQL injection?

technique to manipulate a back-end database and retrieve information that was unauthorized

35
New cards

how can data interception be prevented?

Encryption

36
New cards

How can a DDoS attack be prevented?

firewalls

37
New cards

How can ransomware be prevented?

anti malware software

38
New cards

what is penetration testing

The process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access

39
New cards

Algorithm

A series of steps designed to solve a mathematical or other problem

40
New cards

Instructions

A set of commands that a processor can recognise and act upon

41
New cards

Program

A stored set of instructions for a computer to execute

42
New cards

Software

The programs that run on a computer

43
New cards

Application

Software designed to carry out a useful real-world task

44
New cards

Platform

A combination of hardware and operating system that supports the running of particular applications

45
New cards

Programming language

A way of writing instructions for a computer to execute

46
New cards

Machine code

Instructions in binary used by the CPU

47
New cards

Low-level language

A programming language that is directed at controlling each machine operation

48
New cards

High-level language

A programming language that resembles a natural language. Each instruction translates to many machine instructions. it is problem based rather than machine based

49
New cards

Software engineering

Formal methods to guide the writing of software

50
New cards

Interface

The boundary between systems or between systems and humans

51
New cards

Compiler

Translation software that converts high-level source code into machine (object) code

52
New cards

Interpreter

Translation software that converts source code or user input into machine code which is immediately executed one instruction at a time.

53
New cards

Linker

Software that combines together a number of separate object code files

54
New cards

Debugger

Software that helps a programmer track down faults in a program

55
New cards

Operating system

The software that controls the hardware. It acts as an interface between the user and the hardware and also between the applications and the hardware

56
New cards

Self-booting

The ability of a program to load itself. Some small devices load their applications directly without the need for a conventional operating system

57
New cards

Web server

A server that handles requests to a website

58
New cards

Kernel

The lowest level of an operating system that controls the hardware

59
New cards

Process

A program currently being executed

60
New cards

Command Line

The place where types commands are given to the operating system

61
New cards

User interface

The boundary between the computer and the user

62
New cards

Graphical user interface

A user interface that makes use of icons for interacting with the user

63
New cards

Icon

A picture on screen that represents a file, program or an action

64
New cards

Shell

Software that provides a traditional text based interface to an operating system

65
New cards

Device driver

A program that enables communication between a computer and a periphral

66
New cards

Interrupt

A signal to the operating system to stop what it is doing and perform a different task instead

67
New cards

Applet

A small application that performs one specific task

68
New cards

Embedded system

A computer system that forms part of an electronic device

69
New cards

Firmware

Software that is stored permanently in a device, such as control programs for devices

70
New cards

Client

Software or hardware that request services from a server

71
New cards

Server

Software that provides services to a client, or the hardware that is running it

72
New cards

Utility

A small program designed to carry out a limited maintenance task

73
New cards

Virus detection

The process of discovering possibly harmful viruses in a computer system

74
New cards

Spyware

Malicious software that detects what a user is doing and sends the details back to the originator

75
New cards

Trojan

Harmful software that is disguised as something useful

76
New cards

Firewall

Software and/or hardware that limits access to and from a computer system

77
New cards

Disk Organisation

The process of arranging files and data bytes on a secondary storage device

78
New cards

Defragmentor

A utility that brings together file fragments on a disk and collects all the free space in one area

79
New cards

Editor

Software used for entering source code when writing a program

80
New cards

Pretty printer

An editor that automatically sets out program code in an easy to read way

81
New cards

Assembly language

A low-level programming language that uses more memorable mnemonic codes and labels to represent machine-level code. Each instruction corresponds to just one machine operation

82
New cards

Assembler

Software that translates assembly language code into machine code

83
New cards

Off the shelf

Software that is aimed at many users and is sold 'as is'

84
New cards

Custom written

Software developed specially for one or a few customers

85
New cards

Decimal to Binary

Divide by two and keep remainders to form binary (read from bottom up)

86
New cards

Decimal to Hex

Divide by 16 to get remainders (read from bottom up)

87
New cards

Binary addition

Normal addition form

1+0=1 1+1=0 (carry 1) 1+1+1=1 (carry one)

Make 8 bits by deleting first extra digit(s)

88
New cards

Binary subtraction

Same as addition, but make sure the binary is negative numbers

89
New cards

Binary multiplication

Find first number in binary

Add designated zeros (2- 1 zero, 4- 2 zeros, 8- 3 zeros)

Make it 8 bits by deleting first digits

90
New cards

Binary division

Find first number in binary

Get rid of designated number of digits on the right

Make 8 bits by adding 0's to the left ( if dividing by negative, add ones to the left)

91
New cards

What 2 digits does binary consist of?

1 and 0 (base 2)

92
New cards

What is a bit?

Short for a binary digit, it is the smallest unit if data a computer can hold.

93
New cards

What is a nibble?

4 bits.

94
New cards

What is a byte?

8 bits.

95
New cards

What is the largest denary number you can represent with 8 bits in binary?

255

96
New cards

what numbers can be represented in binary? (up to a byte)

1, 2, 4, 8, 16, 32, 64, 128

97
New cards

What is 0001 in denary?

1

98
New cards

what is 1111 in denary?

15

99
New cards

what is 7 in binary?

0111

100
New cards

What is 21 in binary?

00010101