To execute instructions through the fetch-decode-execute cycle.
What is the main function of the CPU?
One is directly accessible by the CPU, while the other is used for long-term data storage.
What is the difference between primary and secondary storage?
It is a network covering a small geographical area
What is a LAN?
This is a set of networking protocols that enable communication over the internet
What is TCP/IP?
This filters incoming and outgoing network traffic for security
What is a firewall?
It connects all components of a computer and allows communication between them.
What is the purpose of the motherboard?
It stores data magnetically on spinning disks.
What is a hard disk drive?
One is limited to a small area, while the other spans large distances
What is the difference between a LAN and a WAN?
This involves devices requesting services from a centralised resource
What is the client-server model in networking?
This secures data by converting it into a coded format that only authorized users can read
What is encryption?
One is volatile memory used for temporary data storage, while the other is non-volatile and stores firmware
What are the differences between RAM and ROM?
It is a section of the hard drive used as RAM when physical memory is full.
What is virtual memory and why is it used?
It connects different networks and directs data packets between them
What is the function of a router?
They include HTTP, FTP, SMTP, IMAP, UDP
What are common network protocols used in the internet?
It provides a secure, encrypted connection over the internet
What is a VPN?
It is a small, high-speed memory located close to the CPU that stores frequently accessed data.
What is cache memory?
It is non-volatile storage used in SSDs, USB drives, and memory cards
What is flash memory?
One of these two uniquely identifies a device on a network, and the other defines its network segment
What is the meaning of the terms IP address and subnet mask?
This transfers web data, while the other one adds encryption for security
What is the difference between HTTP and HTTPS?
These include malware, phishing, and denial-of-service attacks.
What are common types of cyber threats?
It is a computer design model that uses a single memory for both instructions and data.
What is the Von Neumann architecture?
It is used to manage multiple storage drives for redundancy and performance improvements
What is the role of a RAID system?
This server assigns IP addresses automatically to devices
What is the role of a DHCP server?
This translates domain names into IP addresses
What is the purpose of DNS in networking?
This verifies user identity to prevent unauthorized access
What is user authentication?