1.1 System Architecture
1.3 Storage
1.6 System security
2.3 robust programs
2.5 Translators and languages.
100

Central Processing Unit

What does CPU stand for?

100

uses magnetic metal platters. A read/write head reads the disk much like a record

How does magnetic storage work?

100
Malicious software

How would you define malware?

100

The process of checking a user is allowed to access a piece of information or data.

What is authentication?

100
  • Binary data.
  • Each binary instruction carries out one CPU instruction.
  • Difficult to understand by humans.

What are three features of machine code?

200

This stores the memory address of the current instruction being executed.

what is the memory address register (MAR)?


200

uses a laser to read and write data to/from a disk.

how does optical storage work?

200

How people gain important and confidential information through manipulating people.

What is Social Engineering?

200

To remove any unwanted characters from a user input when entering data

How is input sanitation used?

200
  • Uses commands words to make it easier for human to follow.
  • Each line of code translates to one CPU instruction
  • Not transferable across CPUs as they have different instructions.
  • Must be translated by an assembler before a CPU can understand the instructions.


What are four features of Low level language?


300

Fetch, Decode Execute

What is the cycle the CPU uses?

300

CD, DVD, Blu-Ray


What are examples of optical storage?

300

An attack designed to make a service or website stop working due to a high amount of requests quickly.

what is a DDOS (Directed denial of service) attack?

300

ensuring other people can maintain, read and use your code!

What is maintainability?

300

E

  • asy to understand by humans as it is like the English language.
  • High level language code is known as source/object code.
  • One line of code can carry out multiple CPU operations.
  • Can be used across different CPUs.
  • Must be translated to be understood by the CPU.

What are five features of High level language?

400

Washing machine, SAT-NAV, vending machine, microwave

What are some examples of embedded systems

400

Can be scratched and damaged easily

What is one drawback of optical storage?

400

A trial and error way of attempting to gain access to data

What is a Brute force attack
400

 Test data that is valid, but at the boundaries of the range of acceptable input.

What data is needed for extreme/boundary testing?
400
  • Translates high level language into machine code.
  • Converts entire program at once.
  • Error log is given after it has been compiled.
  • Once compiled the program can be run on any computer without the need of a translator.

What is a compiler?

500
  • They do not need an operating system as they are completing simple tasks 
  • Cheap to produce as they require less processor power
  • They can be small in size so are good for small devices 
  • The hardware used to create them is often far more rugged and can be used in a range of scenarios  

What are the benefits of embedded systems?

500

1024

What is the number of Kilobytes in a byte, bytes in a megabyte, ect?

500

when data is sent over a network or people gain physical access to IT systems and steal data that day.

What is Data Interception

500

An error that occurs when the program does not run in the way it was intended to.

 Can be caused by:

  • Incorrect use of logical operators (<,> etc)
  • Endless loops
  • Dividing by zero


What is a logic error

500
  • Allows the code to be run whilst being developed to check it works.
  • Does not compile the code, just runs it.

What is the run-time environment?

M
e
n
u