IT revision, key topic areas: Topology, Backups, Protocols, File types, Networks, Bandwidth, Latency, Compression, Cache, Data Capture system, Connection methods.

?
What are the advantages and disadvantages of a bus network?
+Cheap, +Easy to add nodes, -If one node breaks it affects the whole network, -Data transfer is slow due to traffic.
1 of 104
What are the advantages and disadvantages of a ring network?
+Faster than a bus network, +Easy to add nodes, -Data only travels one way, +Cheap, -If one node breaks, affects whole network. -Data transfer is still slow.
2 of 104
What are the advantages and disadvantages of a tree network?
+Easy to add nodes, -Expensive, +If one node breaks it doesn't affect the whole network, -Similar to bus network, +Easy to locate problem, +Data transfer is fast.
3 of 104
What are the advantages and disadvantages of a star network?
+Easy to add nodes, +If one node breaks it doesn't affect the whole network, +Easy to monitor, -Lots of cable required, +Data transfer is fast.
4 of 104
What are the advantages and disadvantages of a mesh network?
+Data transfer is very fast, +Easy to add nodes, +Data travels both ways, -Costly, If one node breaks it doesn't affect the whole network, +Secure.
5 of 104
What are the main things which you should consider when evaluating and comparing topology networks? (6)
Cost (cabling, implementation etc), Speed (data traffic), Does data travel both ways, Is it secure, Affects if one node breaks, Easy or hard to maintain.
6 of 104
Name some backup types:
Incremental, Full, Differential, Local, Offsite, Online.
7 of 104
What is an incremental backup?
This is when the device backs up all changes made since the last backup (not full backup).
8 of 104
What is a full backup?
This is a method of backup where all files and folders are backed up.
9 of 104
What is a differential backup?
A backup of all changes made since the last FULL backup.
10 of 104
What is a local backup?
This is when the storage medium is kept close at hand or in the same building as its source. This will mostly be on an external device.
11 of 104
What is an offsite backup?
When the backup storage media is kept at a different geographic location from the source.
12 of 104
What is an online backup?
Backups that are ongoing or done continuously. Data will commonly be backed up to a cloud storage.
13 of 104
What are protocols?
They are the rules that define methods of communicating data between two or more digital devices. They ensure the transmission of data always follows a procedure.
14 of 104
What does TCP and IP stand for?
Transmission Control Protocol & Internet Protocol.
15 of 104
What are these two protocols used for?
TCP is used to create the packets and reassemble them at the end. IP is used to route packets to the intended computer, using their IP address.
16 of 104
What does SMTP stand for and what does it do?
Simple mail transfer protocol, it is the basic protocol for sending mail over the internet between mail servers.
17 of 104
What is POP3 and what is it used for?
Post Office Protocol 3, used to retrieve emails from the mails server. Allows us to download messages to our client software for offline reading.
18 of 104
What is IMAP and what does it do?
Internet Message Access Protocol. Used to retrieve emails from the mail server.
19 of 104
What is VOIP and what does it do?
Voice Over Internet Protocol. Used for the basic communications using voices over the internet.
20 of 104
What is H.323 and what does it do?
Was one of the first successful VOIP protocols. Defines the rules for communicating audio and video over networks.
21 of 104
What is SIP and what does it do?
Session Initiation Protocol. Used to create, control and end VOIP connections.
22 of 104
What is RTP and what does it do?
Real-time Transport Protocol. Designed to transfer audio and video over IP based networks.
23 of 104
What is HTTP and what does it do?
Hyper Text Transfer Protocol. It is the basic protocol for sending data over the internet. It is how we access websites.
24 of 104
What is HTTPS and what does it do?
Hyper Text Transfer Protocol. The protocol for sending personal, private data over the internet such as bank details, email address.
25 of 104
How is this data protected whilst being sent over the internet?
It is encrypted and can only be read/accessed with the encryption key.
26 of 104
What is FTP and what does it do?
File Transfer Protocol. Used to transfer files over a network. The technology used to upload and download files from a server.
27 of 104
What is SSL and TLS and what do they do?
Secure Sockets Layer and Transport Layer Security. Used to ensure that transactions over networks are kept safe.
28 of 104
What is bandwidth?
The rate of data transfer over a network. The amount of data that can be sent from one point to another.
29 of 104
What is latency?
The speed/time it takes for data to be sent from one device to another.
30 of 104
What is compression?
Compression is the process in which reduces the file size so files can be transferred faster.
31 of 104
What are the two main types of compression?
Lossy and Lossless.
32 of 104
What is lossy compression?
Lossy compression is when data is permanently deleted. Commonly used in images, audio and video. It will ultimately, reduce the quality which cannot be reversed.
33 of 104
What is lossless compression?
All original data can be recovered when uncompressed. Commonly used for documents. Data in files are sorted and grouped so the file size is reduced.
34 of 104
What is a codec?
A codec is a program used to compress and decompress video and audio files.
35 of 104
What are the advantages of codecs?
Reduces internal storage, Allows faster transfer of data/audio over a network.
36 of 104
What is the disadvantage of codecs?
Leads to a loss of quality in the video or audio - in the resolution, frames per second or both.
37 of 104
What is cache memory?
This is memory stored by web browsers in order to improve the speeds of loading frequently visited pages.
38 of 104
What are file types used for?
Used to denote form, or structure, of the data stored within the file.
39 of 104
Name some examples of different image file types.
PNG, GIF, JPG, BMP.
40 of 104
Name some examples of different application software file types.
DOC, RTF, PDF, XLS, ODF, PPT, MDB, ACCDB.
41 of 104
Name some examples of different video file types.
MKV, MOV, MP4, AVI
42 of 104
What does a GIF do and what are the characteristics of its files.
Displays basic animations - small file size and low quality.
43 of 104
What does a JPG do and what are the characteristics of its files.
Often used on images. Good compression but compression is lossy so files can't be decompressed.
44 of 104
What does a PNG do and what are the characteristics of its files.
Uses lossless compression to save high quality photos in a small size.
45 of 104
What does a BMP do and what are the characteristics of its files.
Image quality is very high but as is file size.
46 of 104
What is a DOC file type?
Commonly used for word documents.
47 of 104
What does a PDF do and what are the characteristics of its files.
Used and applied to sending and capturing digital documents in their original format, so they can't be edited.
48 of 104
What is the common file format for files made using spreadsheet software?
XLS
49 of 104
What is the common file format for files made using powerpoint software?
PPT.
50 of 104
What is an MP4 file and what are its characteristics?
Supports high quality video files while compressing it.
51 of 104
What is an AVI file and what are the characteristics of these files?
High quality file but high file sizes.
52 of 104
What file type is good for streaming?
MOV.
53 of 104
What are the 3 areas which can impact individuals and organisations when choosing a file type.
Compatibility - Some file types only work with certain software. Quality - Different image, video and audio file types provide different levels of quality. File size - File type affects file size. Some take up little storage while others take up lots
54 of 104
What is the user interface?
A core part of any OS. It allows the user to interact with the computer system.
55 of 104
What is a CLI?
Command Line Interface, used to enter specific commands into a computer
56 of 104
What is a GUI?
Graphical User Interface, users interact with the device by using touch screens, mouse, selecting icons.
57 of 104
What is a Menu based interface?
Users interact using a simple menu that presents options to choose from. As seen in ATMs or self checkouts.
58 of 104
What does the OS do?
Is the link between the hardware and software and carries out instructions.
59 of 104
What are 5 main roles of an OS? (what does it control)
Networking, Security, Memory Management, Device Drivers and Multi-tasking.
60 of 104
Give some examples of how an OS has a role in security?
User authentication - e.g passwords, Anti virus and Firewalls, Backup Facilities.
61 of 104
Give some examples on how OS manages memory?
Which processes to allocate memory to, How much memory to allocate to each process, When to delete memory, Transferring data to free up RAM.
62 of 104
What are the main issues businesses/people need to consider before buying new computer systems/software/storage etc? (10)
User experience and needs. Specs. Compatibility. Connectivity. Efficiency. Productivity. Implementation. Downtime. Security.
63 of 104
What wired system connection method is used for telephone communications and ethernet connections.
Cat5
64 of 104
What wired system connection method is used for all types of data communication, (e.g commonly used in TV cabling).
Coaxial.
65 of 104
What wired system connection method is used for telephone and internet cables (fastest type).
Fibre optic
66 of 104
What device/s require a wired VGA connection?
Analogue connection of video displays such as projectors.
67 of 104
What device/s require a wired HDMI connection?
Connection of digital audio and sound displays such as TVs, game consoles.
68 of 104
What device/s require a wired USB connection?
Commonly input and output devices such as printers, mice, camera.
69 of 104
What is WiFi used to connect?
Connect wireless devices to LANs and WANs such as the internet.
70 of 104
What is 3G/4G used to connect?
Digital devices, commonly smartphones whilst on the move.
71 of 104
What is satellite broadband used to connect?
Provides connectivity to rural areas.
72 of 104
What is bluetooth used to connect?
Pairing devices across short distances such as speakers, mice and keyboards.
73 of 104
What is WiFi direct used to connect?
Connecting devices and displays.
74 of 104
What does LAN stand for?
Local Area Network. Covers a building or small geographical location.
75 of 104
What does WAN stand for?
Wide Area Network. Covers a large geographical area such as a country or the whole world. e.g the internet.
76 of 104
What does PAN stand for?
Personal Area Network. Used to connect devices in a short distance to one network which is personal. e.g a mobile phone hotspot.
77 of 104
What does VPN stand for?
Virtual Private Network.
78 of 104
What are the two main ways in which devices connect to a LAN network?
Cabling or WiFi.
79 of 104
What is a WAN usually made up of?
Usually made up of several LANs connected together.
80 of 104
What role does the router/switcher have in a LAN?
Connects the LAN to the internet or a WAN.
81 of 104
What does a VPN allow?
Allows businesses to have a secure network connection over a public network, usually the internet.
82 of 104
How is it made a secure network?
By using encryption.
83 of 104
What are accessibility devices/adaptive technologies and give some examples.
Devices which have been designed to aid people with disabilities. Such as voice input, ergonomic keyboards and mice.
84 of 104
What are data capture systems/devices?
Devices/systems that collect data for a specific task from an automatic device.
85 of 104
Give some examples of data capture systems/devices.
ANPR, Barcode readers, Biometric readers (fingerprints etc), Smart meters (electricity).
86 of 104
What are some examples of manual processes of data.
Keying in client information. Entering customer orders into a device. Marking digital exam scripts.
87 of 104
What are the main category uses for IT systems within businesses? (7)
Stock control, Data logging and analysis, General office tasks, Creative tasks, Creative tasks, Online advertising, Manufacturing, Security.
88 of 104
For data to be reliable, what two things must it be?
Complete and accurate.
89 of 104
Why is it important to keep data accurate?
Lead to spending/ordering too much/little. Lead to inconveniences in peoples lives and cause disruptions. Mislead people and customers e.g if a website says there is no stock left when there is.
90 of 104
What is validation?
Ensures data is entered sensible and reasonable.
91 of 104
What is verification?
Ensures data entered matches the original source.
92 of 104
What are some checks carried out used to validate data?
Type check - data must be the correct type (e.g letters, numbers). Range check - Numerical data must be between set values. Format check - data must be in the correct format. Length check - data must not be more/less than a certain number of charactr
93 of 104
What are some checks carried out used to verify data?
Double entry check - data must be entered twice, and both must match. Proofreading check - data must be read through to ensure there are no entry errors.
94 of 104
What does data modelling ensure?
Ensures that the database is correctly structured, allowing the data to be efficiently processed.
95 of 104
What are the two ways in which data can be presented?
1) Tabular data - such as tables (text). 2) Graphical data - such as graphs or charts.
96 of 104
What can the collection of data allow businesses to do?
Identify trends so they can remain competitive. Also allows them to plan financially such as predicting sales.
97 of 104
What 5 main things should a user interface be able to do in regard to processing and presenting data?
Reduce errors. Be easy to use and accessible. Be intuitive. Have a strong performance and compatibility. Be functional.
98 of 104
Name the 4 offences in the computer misuse act.
1)Unauthorised access to a computer system. 2) Unauthorised access to a computer system with intent to commit a crime. 3) Unauthorised modification of computer material/systems. 4) Making supplying or obtaining anything that can be used in a crime.
99 of 104
What is the punishment for unauthorised access to a computer system?
Up to 2 years in prison and/or a fine.
100 of 104
What is the punishment for unauthorised access to a computer system with intent to commit a crime?
Up to 5 years in prison and/or a fine.
101 of 104
What is the punishment for unauthorised modification of a computer system or material?
Up to 10 years in prison and/or a fine.
102 of 104
What is the punishment for unauthorised supplying, creating or obtaining in a computer crime?
Up to 10 years in prison and/or a fine.
103 of 104
List 3 of the acts in the Data Protection Act.
Used fairly and lawfully, Used for limited+specifically stated purposes, Used in a way that is adequate+relevant and not excessive, Accurate, Kept for no longer than is necessary, Handled according to people’s data protection rights, Kept safe.
104 of 104

Other cards in this set

Card 2

Front

What are the advantages and disadvantages of a ring network?

Back

+Faster than a bus network, +Easy to add nodes, -Data only travels one way, +Cheap, -If one node breaks, affects whole network. -Data transfer is still slow.

Card 3

Front

What are the advantages and disadvantages of a tree network?

Back

Preview of the front of card 3

Card 4

Front

What are the advantages and disadvantages of a star network?

Back

Preview of the front of card 4

Card 5

Front

What are the advantages and disadvantages of a mesh network?

Back

Preview of the front of card 5
View more cards

Comments

MONSTERENERGY

Report

Nice

Similar ICT resources:

See all ICT resources »See all Systems and Software resources »