GCSE Computer Science- Topic 1
🇬🇧
In Inglés
In Inglés
Practique preguntas conocidas
Manténgase al día con sus preguntas pendientes
Completa 5 preguntas para habilitar la práctica
Exámenes
Examen: pon a prueba tus habilidades
Pon a prueba tus habilidades en el modo de examen
Aprenda nuevas preguntas
Modos dinámicos
InteligenteMezcla inteligente de todos los modos
PersonalizadoUtilice la configuración para ponderar los modos dinámicos
Modo manual [beta]
El propietario del curso no ha habilitado el modo manual
Modos específicos
Aprende con fichas
elección múltipleModo de elección múltiple
Expresión oralResponde con voz
EscrituraModo de solo escritura
GCSE Computer Science- Topic 1 - Marcador
GCSE Computer Science- Topic 1 - Detalles
Niveles:
Preguntas:
78 preguntas
🇬🇧 | 🇬🇧 |
Each core in a CPU can process data independently so the more cores a CPU has, the more instructions it can carry out at once. | Number of Cores |
It is where all data is stored when not in use so is non-volatile. Includes SSDs, CDs and SD cards. | Secondary storage |
Cheaper, higher capacity, longer read/write life. | Advantages of HDDs |
Faster, don't need defragmenting, more shock proof, silent | Advantages of SSDs |
Have very great capacity and are very cheap so are often used by large organisations to store huge amounts of data. | Magnetic Tapes |
Reorganises data on a hard drive to put fragmented files back together and collects all the free space. | Defragmentation Software |
When only the files created or edited since the last backup are copied which takes less storage space and are quicker. | Incremental Backup |
Reduces the size of files so they take up less disk space and is used a lot on the internet to make files download quicker. | Compression Software |
It scrambles the data to stop third-parties from accessing it and has to be decrypted using a special 'key'. | Encryption Software |
A network of networks- WAN. | Internet |
A collection of websites that are hosted on web servers.and accessed through the HTTP protocol. | World Wide Web |
When someone within an organisation exploits their network access to steal information. | Insider attack |
Where a hacker tries to stop users from accessing a part of a network or website by flooding it with useless traffic. | Denial-of-Service Attack |
Malware disguised as legitimate software so users install them not realising their true purpose. | Trojans |
A way of gaining senstive information or illegal access to networks by influencing people like employees of large companies. | Social Engineering |
Pieces of SQL typed into a website's input box which then reveal senstive information. | SQL Injections |
When organisations employ specialists to stimulate potential attacks on their network and is used to identify possible weaknesses in security. | Penetration testing |
Investigations undertaken to find the cause of attacks on a network. | Network Forensics |
They prevent unauthorised users accessing the network and should be strong and changed regularly. | Passwords |
Control which parts of a network different groups of people can access which limit the number of insider attacks. | User Access Levels |