paper 1 computing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/171

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

172 Terms

1
New cards

problem with encryption

if they don’t encrypt and use safety measures personal data is leaked , if they encrypt - messages sent by dangerous individuals may be protected

2
New cards

types of online crime

obtaining personal info for identity theft or fraud, blackmail, cyber attacks, selling illegal stuff, sharing copyrighted material

3
New cards

data protection act 2018 principles

collect data lawfully and process fairly, only use for reasons specified , data must be relevant and not excessive, data has to be accurate and up to date, data mustn’t be stored for longer than necessary , data must be stored and processed securely

4
New cards

computer misuse act principles

no unauthorised access, no unauthorised modification, no unauthorised access for further illegal activities

5
New cards

copy right, design and patents act

prohibits copying , downloading and distributing copyrighted material

6
New cards

software licence

how a user can use a software

7
New cards

open source license

users can view and modify the source code

8
New cards

open source advantages

cheap, remove unwanted features, customisable

9
New cards

open source disadvantages

prone to errors , security risk - malicious code , need technical skills to maintain the code, difficult to recieve support as development is distributed

10
New cards

proprietary licence

code is restricted, users can’t modify or edit it

11
New cards

propriety advantages

well tested and secure, help and support, company can be held accountable if performance isn’t to standard

12
New cards

propriety disadvantages

users can’t modify code for their benefit, expensive, must rely on company for updates

13
New cards

o.s

software that helps to manage the resources of a computer system and provide the interface between the user and computer hardware

14
New cards

5 main tasks of OS

memory management, peripheral management, user management, file management, user interface

15
New cards

device driver

program that provides an interface for the OS to interact and communicate with an external force

16
New cards

user management

add , manage or delete accounts

17
New cards

file management

move, rename and delete files

18
New cards

GUI features

windows, icons, menu, pointer

19
New cards

CLI

text based, requires typing commands

20
New cards

Menu driven interface

displays data in a series of menus

21
New cards

utility software

dedicated softwares for the maintenance and organisation of a computer system

22
New cards

utility software types

anti-malware, data compression, encryption

23
New cards

fragmentation

when a file splits into different parts and is stored in different storage parts

24
New cards

defragmentation

collects together empty spaces so similar files can be moved together

25
New cards

GUI advantages

easy to use for beginners, allows multitasking

26
New cards

GUI disadvantages

uses more storage , RAM and processing power than other interfaces

27
New cards

CLI advantages

uses low processing power and little hardware resources

28
New cards

CLI disadvantages

have to learn commands, difficult to use

29
New cards

MDI advantages

low processing power, easy to use

30
New cards

MDI disadvantages

difficult and slow if poorly designed, too many menus can be annoying

31
New cards

malware

harmful program that seeks to damage or gain unauthorised access to your computer

32
New cards

virus

malware that replicates itself and spreads from system to system by attaching itself to infected files

33
New cards

worm

malware that replicates itself and spreads from system by finding software weaknesses

34
New cards

trojan

harmful program that pretends to be legitimate

35
New cards

spyware

secretly records info on someones computer to pass to the attacker

36
New cards

keylogger

secretly logs key presses

37
New cards

ransomware

locks files or holds private files for ransom

38
New cards

SQL injection

when a malicious SQL query is entered Into data input box on a website to gain unauthorised access

39
New cards

fire wall

manages incoming and outgoing network traffic to check if it should be given access to the network

40
New cards

user access levels

only allowing certain users to access and edit files

41
New cards

DDos

repeatedly sending requests to overload a server

42
New cards

brute force

computer software tests every combination from start to finish

43
New cards

social engineering

tricking others into revealing their personal data

44
New cards

data interception

data packets on a network are Intercepted by 3rd party

45
New cards

methods of prevention

anti-malware, penetration, firewall, secure passwords, encryption, physical security

46
New cards

encryption

scrambling data so attackers can’t understand it. converts plaintext into ciphertext using an encryption key.

47
New cards

physical security examples

biometrics, cctv, alarms, keycards, locks , security staff

48
New cards

network

more than one computer system connected together for communication and sharing of resources

49
New cards

LAN

computers are situated geographically close together, infrastructure is usually owned and managed by network owner

50
New cards

WAN

computers are situated geographically distant to each other, infrastructure usually owned by service provider

51
New cards

client server

network model where client sends request and server sends response

52
New cards

advantages of client server

easy to scale, easy to back up data and update software, hardware/software can be shared

53
New cards

disadvantages of client server

need to pay for IT technician, if server fails the whole network is down

54
New cards

p2p network

all computers are equal. a computer can send requests and responses

55
New cards

advantage of p2p

optimal for sharing files, not dependent on server

56
New cards

disadvantage of p2p

backups have to be performed individually on each computer, adding more devices slows the performance

57
New cards

what do data packets do

split large files into small pieces. send them to destination where they are reassembled

58
New cards

data packet order

header, payload, trailer

59
New cards

what does the header have

source and destination address, protocol , packet number

60
New cards

payload

the data

61
New cards

trailer

checksum - calculation to check for data errors or corruption in transmission

62
New cards

bandwidth

maximum amount of data that can be sent across a network at once

63
New cards

cloud storage

series of servers on the internet that you can upload files to via the internet

64
New cards

internet

global network of interconnected networks

65
New cards

advantages of star topology

easy to add new systems, security, speed

66
New cards

disadvantages of star topology

dependent on switch , extra hardware - expensive

67
New cards

full mesh advantages

multiple routes for data transfer, can withstand large traffic

68
New cards

full mesh disadvantages

redundant cabling, hard to set up, expensive

69
New cards

w.a.p

provides a link between wireless and wired networks

70
New cards

router

transfers data packets between networks

71
New cards

switch

connects devices on a LAN. sends data to exact computer using MAC address

72
New cards

NIC

hardware required to connect to a network. has a MAC address used to send data across a LAN

73
New cards

3 types of transmission media

ethernet cable , fibre optic, coaxial

74
New cards

DNS server process

type in domain name, query sent to local DNS server for corresponding IP address, finds the IP and sends it to the web browser, browser receives IP and displays website

75
New cards

what happens if the DNS server can’t find the IP

asks a larger DNS server

76
New cards

protocol

set of rules that allow devices to communicate

77
New cards

Transmission Control Protocol

allows data packets to be sent and received between computers. splits data into packets and reassembles them at destination

78
New cards

Internet Protocol

routes and addresses packets, gives devices an IP address

79
New cards

Hypertext transfer protocol

transfers web pages over the internet so users can view it on a web browser

80
New cards

HTTPs

encrypted and more secure versions of HTTP

81
New cards

File Transfer Protocol

transfers files across a network

82
New cards

Simple Mail transfer protocol

send email to a mail server and between mail servers

83
New cards

what do POP and IMAP do

recieve and store emails from a mail server

84
New cards

POP

deletes an email from sever once it has been downloaded to a device

85
New cards

IMAP

syncs the message with a mail server so it can be used on different devices

86
New cards

MAC address

unique hexadecimal number on a NIC. Can’t be changed. Used to identify devices in a LAN

87
New cards

IP address

address given to devices connected to a network. used to route packets in a WAN, can be changed

88
New cards

IPv4

32 bit address

89
New cards

IPv6

128 bit address in hex

90
New cards

4 layers

application, transport, network, data link

91
New cards

application

allows usage of the network - HTTP,HTTPS,SMTP,FTP

92
New cards

transport layer

TCP protocol

93
New cards

network layer

IP protocol

94
New cards

data link

ethernet/wifi sets out format of data packets and handles transmission errors

95
New cards

primary storage

fast memory which the cpu can access directly

96
New cards

what does primary storage consist of

RAM, ROM, cache

97
New cards

volatile storage

temporary storage, when computer turns off data is lost

98
New cards

non-volatile storage

long term storage, doesn’t get lost when computer turns off

99
New cards

RAM

randomly access memory - stores programs that are currently running

100
New cards

ROM

read only memory - non-volatile memory that stores the OS