Memory / Storage
System Security
System Software
Robust Programs
100

Define what is meant by 'secondary storage'.

Non-volatile storage of data/files

100

Define 'phishing'

E-mail has a link that when clicked directs the user to a fake website that collects personal data

100

Describe with an example, the purpose of 'system information utilities'

Displays data about the current state of the computer. e.g. temp, network speed, amount processor being used

100
Define 'logic error'

Doesn't prevent program from running

Doesn't give the expected output

200

Name 3 types of secondary storage and 2 examples for each

Magnetic - tape, HDD

Optical - CD, DVD, Blu-Ray

Solid State/flash - SSD, Memory card, USB drive

200
Define 'social engineering'

Person being the weak point of the system - e.g. deception // people not keeping their passwords strong/secure

200

What is meant by a 'diagnosis utility'?

Attempts to resolve items that are not working at that time as they should - missing drivers or network connection

200

Define 'syntax error'

Prevents the code from being run - code does not meet the rules of the language

300

State 6 characteristics of secondary storage you might consider when choosing a secondary storage device.

Capacity

Speed

Portability

Durability

Reliability

Cost

300

Name 3 network threats

DOS

Brute force

Phishing

Data interception/theft

People as the 'weak point'

Poor network policy

SQL injection

300

Give 2 functions that an OS can do

Manages resources such as memory

Manages peripherals

Allows software to run (platform for it)

Interface

300

Define 'run time error'

Program can run, but an error occurs during the running of the program - for example, dividing a number by 0

400

Which secondary storage type would be best suited for daily back-ups in a school? Why?

Magnetic

Capacity

Speed

Portability - doesn't need to be moved

Fairly reliable

Cost

400

Explain how a 'denial of service attack' differs from a 'brute force attack'.

Denial of service - lots of requests made to the server - to many for it to handle, which prevent legitimate requests being processed to access the system

Brute force - attempts to access the system by systematically working through various combinations until the correct one has been entered

400

In my business I take orders from my customers. I notice that the system is running slowly. One of my technicians suggested defragmenting the drive. 

How did it become fragmented in the first place?

As orders have been made they are saved to the device and deleted once they have been processed.

When another order comes in, new files are created which may be bigger than the space left by the deleted files

The order files are split up

400

Which error is occurring in this snippet of code?

num = input("Enter number ")

num = input("Enter another number ")

total = num + num

Logic

500

Explain how magnetic, solid state and optical differ.

Magnetic - moving parts, ideal for capacity, cost

Solid state - no moving parts - switches, portable, durable

Optical - CD, durable, cost

500

If my business holds hundreds of customer details on its computer network. Apart from strong passwords, what measures can I take to protect the data on the system?

Include a point and link it to the context.

Firewall - preventing unauthorised access

Anti-malware - removes viruses from infecting the system

Encryption - any intercepted data is rendered useless as hacker will have cipher text, not plaintext

Network policies - rules that govern acceptable use of those that use the system.

500

Define 'open source software'

Source code is distributed with the software

Cx can modify the source code

Cx can redistribute the source code (with same licence/restrictions)

500

How are 'input validation' and 'input sanitisation' similar and how do they differ?

validation - validation technique -  check made by computer to ensure the data entered is sensible/reasonable

sanitisation - validation technique - cleans up the data entered so it is ready for the application to use