Computer Mocks

?
  • Created by: Danaed
  • Created on: 24-06-17 18:14
Explain the purpose of HTTP
To transfer data (receiving and sending) between web browsers and web servers, often to display pages.
1 of 16
Identify the type of cyberattack from which HTTPS offers some protection
Eavesdropping
2 of 16
Explain how HTTPS provides increased security
As data sent between the web browser and the web server is encrypted so that data that is being sent and received can not be read by a third party
3 of 16
Identify the protocol used to send email messages to an email server
SMTP
4 of 16
Explain the role of Ethernet protocol
Checks how data is sent, checks for errors and the speed that data can be transmitted at
5 of 16
State the name of a two part user authentication which can be used a security measure
Username and Password
6 of 16
Describe the roll of an ethical hacker
A computer expert who works on behalf of a systems owner looking for weaknessess in software and systems that a malicious hacker could exploit. They then document any vulnerabilities and give advice on how to fix them
7 of 16
Identify one alternative usage model to a client server network, where all workstations have equal statue
Peer to Peer
8 of 16
Describe the role of a client workstation
It enables users to access network resources provided by the server. It also, authenticates the user and gives the user access to files it has been given permission to access
9 of 16
Key points about RAM
Random Access Memory. It is temporary memory - the store for data and instructions. It is volatile - data is lost when the power is turned off. Normally measured in Gigabytes
10 of 16
Key points about ROM
Read Only Memory. It is permanent memory - the store for start up data etc. It is non volatile - data is not lost when the power is turned off
11 of 16
Cache Memory
Memory used to make up for the difference in speed between the RAM and CPU. Data is loaded in chunks from the slower RAM. CPU accesses cache memory at its own fast speed. CPU isn't slowed down by RAM or overloaded with data
12 of 16
Bits to Bytes
*8
13 of 16
Bytes to Bits
/8
14 of 16
Bytes to kilobytes, kilobytes to megabytes, megabytes to gigabytes
*1024
15 of 16
kilobytes to bytes, megabytes to kilobytes, gigabytes to megabytes
/1024
16 of 16

Other cards in this set

Card 2

Front

Identify the type of cyberattack from which HTTPS offers some protection

Back

Eavesdropping

Card 3

Front

Explain how HTTPS provides increased security

Back

Preview of the front of card 3

Card 4

Front

Identify the protocol used to send email messages to an email server

Back

Preview of the front of card 4

Card 5

Front

Explain the role of Ethernet protocol

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »