Central Processing Unit
What does CPU stand for?
uses magnetic metal platters. A read/write head reads the disk much like a record
How does magnetic storage work?
How would you define malware?
The process of checking a user is allowed to access a piece of information or data.
What is authentication?
What are three features of machine code?
This stores the memory address of the current instruction being executed.
what is the memory address register (MAR)?
uses a laser to read and write data to/from a disk.
how does optical storage work?
How people gain important and confidential information through manipulating people.
What is Social Engineering?
To remove any unwanted characters from a user input when entering data
How is input sanitation used?
What are four features of Low level language?
Fetch, Decode Execute
What is the cycle the CPU uses?
CD, DVD, Blu-Ray
What are examples of optical storage?
An attack designed to make a service or website stop working due to a high amount of requests quickly.
what is a DDOS (Directed denial of service) attack?
ensuring other people can maintain, read and use your code!
What is maintainability?
E
What are five features of High level language?
Washing machine, SAT-NAV, vending machine, microwave
What are some examples of embedded systems
Can be scratched and damaged easily
What is one drawback of optical storage?
A trial and error way of attempting to gain access to data
Test data that is valid, but at the boundaries of the range of acceptable input.
What is a compiler?
What are the benefits of embedded systems?
1024
What is the number of Kilobytes in a byte, bytes in a megabyte, ect?
when data is sent over a network or people gain physical access to IT systems and steal data that day.
What is Data Interception
An error that occurs when the program does not run in the way it was intended to.
Can be caused by:
What is a logic error
What is the run-time environment?