paper 1 computing

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 166

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

167 Terms

1

problem with encryption

if they don’t encrypt and use safety measures personal data is leaked , if they encrypt - messages sent by dangerous individuals may be protected

New cards
2

types of online crime

obtaining personal info for identity theft or fraud, blackmail, cyber attacks, selling illegal stuff, sharing copyrighted material

New cards
3

data protection act 2018 principles

collect data lawfully and process fairly, only use for reasons specified , data must be relevant and not excessive, data has to be accurate and up to date, data mustn’t be stored for longer than necessary , data must be stored and processed securely

New cards
4

computer misuse act principles

no unauthorised access, no unauthorised modification, no unauthorised access for further illegal activities

New cards
5

copy right, design and patents act

prohibits copying , downloading and distributing copyrighted material

New cards
6

software licence

how a user can use a software

New cards
7

open source license

users can view and modify the source code

New cards
8

open source advantages

cheap, remove unwanted features, customisable

New cards
9

open source disadvantages

prone to errors , security risk - malicious code , need technical skills to maintain the code, difficult to recieve support as development is distributed

New cards
10

proprietary licence

code is restricted, users can’t modify or edit it

New cards
11

propriety advantages

well tested and secure, help and support, company can be held accountable if performance isn’t to standard

New cards
12

propriety disadvantages

users can’t modify code for their benefit, expensive, must rely on company for updates

New cards
13

o.s

software that helps to manage the resources of a computer system and provide the interface between the user and computer hardware

New cards
14

5 main tasks of OS

memory management, peripheral management, user management, file management, user interface

New cards
15

device driver

program that provides an interface for the OS to interact and communicate with an external force

New cards
16

user management

add , manage or delete accounts

New cards
17

file management

move, rename and delete files

New cards
18

GUI features

windows, icons, menu, pointer

New cards
19

CLI

text based, requires typing commands

New cards
20

Menu driven interface

displays data in a series of menus

New cards
21

utility software

dedicated softwares for the maintenance and organisation of a computer system

New cards
22

utility software types

anti-malware, data compression, encryption

New cards
23

fragmentation

when a file splits into different parts and is stored in different storage parts

New cards
24

defragmentation

collects together empty spaces so similar files can be moved together

New cards
25

GUI advantages

easy to use for beginners, allows multitasking

New cards
26

GUI disadvantages

uses more storage , RAM and processing power than other interfaces

New cards
27

CLI advantages

uses low processing power and little hardware resources

New cards
28

CLI disadvantages

have to learn commands, difficult to use

New cards
29

MDI advantages

low processing power, easy to use

New cards
30

MDI disadvantages

difficult and slow if poorly designed, too many menus can be annoying

New cards
31

malware

harmful program that seeks to damage or gain unauthorised access to your computer

New cards
32

virus

malware that replicates itself and spreads from system to system by attaching itself to infected files

New cards
33

worm

malware that replicates itself and spreads from system by finding software weaknesses

New cards
34

trojan

harmful program that pretends to be legitimate

New cards
35

spyware

secretly records info on someones computer to pass to the attacker

New cards
36

keylogger

secretly logs key presses

New cards
37

ransomware

locks files or holds private files for ransom

New cards
38

SQL injection

when a malicious SQL query is entered Into data input box on a website to gain unauthorised access

New cards
39

fire wall

manages incoming and outgoing network traffic to check if it should be given access to the network

New cards
40

user access levels

only allowing certain users to access and edit files

New cards
41

DDos

repeatedly sending requests to overload a server

New cards
42

brute force

computer software tests every combination from start to finish

New cards
43

social engineering

tricking others into revealing their personal data

New cards
44

data interception

data packets on a network are Intercepted by 3rd party

New cards
45

methods of prevention

anti-malware, penetration, firewall, secure passwords, encryption, physical security

New cards
46

encryption

scrambling data so attackers can’t understand it. converts plaintext into ciphertext using an encryption key.

New cards
47

physical security examples

biometrics, cctv, alarms, keycards, locks , security staff

New cards
48

network

more than one computer system connected together for communication and sharing of resources

New cards
49

LAN

computers are situated geographically close together, infrastructure is usually owned and managed by network owner

New cards
50

WAN

computers are situated geographically distant to each other, infrastructure usually owned by service provider

New cards
51

client server

network model where client sends request and server sends response

New cards
52

advantages of client server

easy to scale, easy to back up data and update software, hardware/software can be shared

New cards
53

disadvantages of client server

need to pay for IT technician, if server fails the whole network is down

New cards
54

p2p network

all computers are equal. a computer can send requests and responses

New cards
55

advantage of p2p

optimal for sharing files, not dependent on server

New cards
56

disadvantage of p2p

backups have to be performed individually on each computer, adding more devices slows the performance

New cards
57

what do data packets do

split large files into small pieces. send them to destination where they are reassembled

New cards
58

data packet order

header, payload, trailer

New cards
59

what does the header have

source and destination address, protocol , packet number

New cards
60

payload

the data

New cards
61

trailer

checksum - calculation to check for data errors or corruption in transmission

New cards
62

bandwidth

maximum amount of data that can be sent across a network at once

New cards
63

cloud storage

series of servers on the internet that you can upload files to via the internet

New cards
64

internet

global network of interconnected networks

New cards
65

advantages of star topology

easy to add new systems, security, speed

New cards
66

disadvantages of star topology

dependent on switch , extra hardware - expensive

New cards
67

full mesh advantages

multiple routes for data transfer, can withstand large traffic

New cards
68

full mesh disadvantages

redundant cabling, hard to set up, expensive

New cards
69

w.a.p

provides a link between wireless and wired networks

New cards
70

router

transfers data packets between networks

New cards
71

switch

connects devices on a LAN. sends data to exact computer using MAC address

New cards
72

NIC

hardware required to connect to a network. has a MAC address used to send data across a LAN

New cards
73

3 types of transmission media

ethernet cable , fibre optic, coaxial

New cards
74

DNS server process

type in domain name, query sent to local DNS server for corresponding IP address, finds the IP and sends it to the web browser, browser receives IP and displays website

New cards
75

what happens if the DNS server can’t find the IP

asks a larger DNS server

New cards
76

protocol

set of rules that allow devices to communicate

New cards
77

Transmission Control Protocol

allows data packets to be sent and received between computers. splits data into packets and reassembles them at destination

New cards
78

Internet Protocol

routes and addresses packets, gives devices an IP address

New cards
79

Hypertext transfer protocol

transfers web pages over the internet so users can view it on a web browser

New cards
80

HTTPs

encrypted and more secure versions of HTTP

New cards
81

File Transfer Protocol

transfers files across a network

New cards
82

Simple Mail transfer protocol

send email to a mail server and between mail servers

New cards
83

what do POP and IMAP do

recieve and store emails from a mail server

New cards
84

POP

deletes an email from sever once it has been downloaded to a device

New cards
85

IMAP

syncs the message with a mail server so it can be used on different devices

New cards
86

MAC address

unique hexadecimal number on a NIC. Can’t be changed. Used to identify devices in a LAN

New cards
87

IP address

address given to devices connected to a network. used to route packets in a WAN, can be changed

New cards
88

IPv4

32 bit address

New cards
89

IPv6

128 bit address in hex

New cards
90

4 layers

application, transport, network, data link

New cards
91

application

allows usage of the network - HTTP,HTTPS,SMTP,FTP

New cards
92

transport layer

TCP protocol

New cards
93

network layer

IP protocol

New cards
94

data link

ethernet/wifi sets out format of data packets and handles transmission errors

New cards
95

primary storage

fast memory which the cpu can access directly

New cards
96

what does primary storage consist of

RAM, ROM, cache

New cards
97

volatile storage

temporary storage, when computer turns off data is lost

New cards
98

non-volatile storage

long term storage, doesn’t get lost when computer turns off

New cards
99

RAM

randomly access memory - stores programs that are currently running

New cards
100

ROM

read only memory - non-volatile memory that stores the OS

New cards
robot