Comprehensive Guide for Computer Science Students
Denial of Service Attack - (correct answer --->)Large
number of requests are sent to a server all at once,
designed to flood a server with useless traffic, sever will
come to a halt to deal with all traffic, prevents a user from
gaining access to a website
difference between text based and biometric - (correct
answer --->)Characters can be typed at a keyboard, can
be changed by the user
Biometric password, a stored physical measurement e.g.
fingerprint, compared to a previously scanned human
measurement
Difference, text based passwords easier to hack, biometric
are unique to that person and cannot be shared.
how to prevent accidental loss or damage of data -
(correct answer --->)1. Use backups, so if data is lost
or damaged, original data is still there, to the cloud
2. Use passwords, so only specific users can access and
thus chances of loss is less
3. Set data to read only, to prevent accidental editing
4. Save data on a regular basis
5.Use correct shut down and start up procedures
6. Keep storage devices in a safe place
,Copyright - (correct answer --->)ownership of
intellectual property,
plagiarism - (correct answer --->)take someones
ideas and claim them as your own
Free software - (correct answer --->)users have
freedom to run, copy change, adapt available software,
users can run software as they choose, study how
software works and change to meet their own needs,
redistribute their modified copies and distributes modified
versions of software
Freeware - (correct answer --->)software can be
downloaded for free and then use without price but
copyright laws apply for freeware and not possible to
modify
Shareware - (correct answer --->)Gives users chance
to ry out of software free of charge before buying it,
subejct o all copyright laws features of full version of
software is not available until full version is bought
Importance of ethics - (correct answer --->)Help stop
the misuse of computers, use of computers needs to be
governed, helps users to be safer when using computers,
provides rules for using computers, helps stop intellectual
property theft, helps prevent the misuse of personal
information, laws such as ... and security issues such as ...
,Computer use regulations - (correct answer --->)Set
of laws that regulate the use of computers, covers
intellectual property rights, privacy issues and the impact
of computers on society.
Double Entry Verification Technique - (correct answer
--->)Data is entered twice and the computer checks that
they match up and error message is outputted if there are
any discrepancies
Visual Check Verification Technique - (correct answer
--->)Manual system, whee original data is compared to
data typed in manually, reading it and checking against
other doc
Problems with parity check - (correct answer --->)If >
two bits have been changed its possible for parity check to
fail and find error
Parity byte - (correct answer --->)Parity byte is also
sent along with other binary numbers which uses a parity
check for each number. Parity byte is the additional parity
bits found from a vertical parity check on the binary
numbers, sent to indicated end of binary block
Finding errors in parity bytes - (correct answer ---
>)See which rows have an incorrect parity and columns,
, find intersection of row and column and change to make
correct parity.
Automatic repeat request verification technique -
(correct answer --->)ARQ = error control method used
during data transmission, uses acknowledgements
(messages sent by receiver indicating that data has been
received correctly) and timeouts (time period allowed to
elapse before an acknowledgement has been received. If
sender doesn't receive an acknowledgement before
timeot, then data is usually re-transmitted automatically.
binary numbers are used in - (correct answer ---
>)computer systems
conversion from denary to binary and from binary to den -
(correct answer --->)use place values
memory size of a computer is measured in terms of the
number of - (correct answer --->)bytes
1 kilobyte is - (correct answer --->)2 to the 10 bytes
1 megabyte is - (correct answer --->)2 to 20 bytes