Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Question Answer

What are the two types Secure Socket Layer (SSL) and Transport Layer Security (TLS)
of encryption protocols
mentioned?

What is the primary Establishing an encrypted link between a client and a server.
function of SSL and
TLS?

How do SSL and TLS By encrypting data to prevent eavesdroppers and hackers from seeing the transmitted information.
ensure data security
over networks?

What are the Encrypts data, provides confidentiality, integrity and authentication (CIA), prevents phishing, allows online payments, no
advantages of SSL and need for specialized software, includes a digital certificate.
TLS?

What are the May slow down sites, proxy caching problems, expensive to buy and set up trusted SSL certificate, SSL certificates expire
disadvantages of SSL and need renewal.
and TLS?

How does client-server The client requests the digital certificate from the server, SSL/TLS creates an authenticated session using the public key
communication function found in the digital certificate, client and server perform an SSL/TLS handshake, the client uses the server’s public key
using SSL/TLS? (asymmetric encryption) to encrypt a symmetric key, the symmetric key is sent to the server, the server then uses its own
private key (asymmetric encryption) to decrypt the symmetric key, and the client and server communicate using that
symmetric encryption keys.

How can sites with SSL They have 'https' and a padlock symbol.
be identified?

What does SSL and Send data securely.


TLS allow users to do?

Which is older, SSL or SSL, but both are often referred to as SSL.
TLS?

What are the Can use either symmetric or asymmetric encryption, scrambles all data in the disk except the operating system, requires
characteristics of hard encryption key to encrypt, requires decryption key/password to decrypt, automatically encrypts data when written and
disk encryption? decrypts when read, stays encrypted when moved to another computer.

What are the Users without decryption permissions cannot access files, users with decryption permissions can access files without
advantages of hard disk restrictions, disk stays encrypted even if moved to a different computer, any files can be encrypted.
encryption?

What are the If decryption password is lost, access to files are lost, if O.S fails access to files are lost, if O.S is reinstalled, data is
disadvantages of hard deleted.
disk encryption?

What is HTTPs? Hypertext transfer protocol secure, same as client-server communication.

What is the encryption Asymmetric encryption.


method used in email
encryption?

How is email encryption Private key is used for decryption.


decrypted?

What is the significance It verifies that the email was actually sent by the sender and not spoofed.
of the digital certificate
signature in email
encryption?

Why is encryption To protect data from increasingly sophisticated hackers.


needed as technology
becomes more
sophisticated?

Why are email and They can be intercepted by hackers.


passwords insufficient
for security?

Why don't email Encryption may not be a standard practice for email providers.
providers normally
encrypt email
messages?

What is the purpose of To ensure that the entered data is reasonable and sensible.
validation in data
Question Answer

checking?

What does presence It ensures that data is entered and valid, or an error pops up if data isn't entered.
check ensure?

What does range check It ensures that data is within a defined range with maximum and minimum boundaries.
ensure?

What does type check It ensures that data is entered in the correct data type (e.g., age must be entered as an integer).
ensure?

What does format check It ensures that data follows a specified pattern (e.g., dates must follow the dd/mm/yyyy format).
(aka picture check)
ensure?

What does length check It ensures that data is of a defined length (e.g., phone numbers must have a certain length of integers).
ensure?

What does lookup check It ensures that data exists in a list (e.g., gender can only be 'Male' or 'Female').
ensure?

What is consistency It compares data in a column with another column in the same row to see if they both match. For example, gender is
check in data? 'Male' so the person’s title should be 'Mr'.

What is a check digit? A number added to the end of an ID number. An algorithm is performed on the ID to generate the check digit. When the ID
number is used somewhere, the same algorithm is performed on it, and the result must match the check digit. If the result
matches the check digit, data is valid; if not, it's invalid.

What is verification in It is checking that the data entered has been copied correctly from the data source, not whether the data is correct.
data management?

What is visual checking It compares data with another copy (doesn’t mean it's correct) and is carried out by the user. It enables users to see if they
in data entry? made any mistakes.

What is double data Data is entered twice and compared to each other to see if they match. It is carried out by the computer, which will alert
entry? the user to any mistakes made.

What is a hash total It is a number produced by adding all numbers in a column, e.g., adding all ID numbers together. After data is input, the
used for in data numbers in a column are recalculated and compared to the hash total. If the two totals are different, then a mistake has
management? been made either during calculating the hash total or inputting data.

What is a control total in Similar to a hash total, but with some useful meaning. For example, a hash total of the ID numbers has no meaning. A
data management? control total of the number of products in a delivery to a shop has some meaning.

What is the purpose of To find errors during data transmission.


parity check?

What are the two types Even parity and odd parity.
of parity check?

How many bits does 8 bits.


each byte contain in
even parity?

What is the purpose of To make the total number of 1’s even.


the parity bit in even
parity?

What is the purpose of To find errors during data transmission.


checksum?

Why is it necessary to To reduce the chances of entering incorrect data.


use both validation and
verification for data?

What are common Transposition and transcription errors.


errors when copying
data?

What is batch Data collected in batches and processed at a later time.


processing?

What are the uses of Payroll and customer orders.


Question Answer

batch processing?

What is the difference Master files store more permanent data, while transaction files store temporary data used to update the master file.
between master files
and transaction files?

What is the role of the It stores any updates needed to be made to the master file.
transaction file in the
process?

What is the first step in Validation of the transaction file.


the process after the
transaction file is
created?

What is the purpose of To put it in the same order as the master file.
sorting the transaction
file?

What does the batch It moves through them and finds the corresponding record in the master file with the same primary key.
process do with the
transaction files?

How are the transaction They are merged together.


file and master file
combined?

What are the It can be scheduled to run at times when demand for computer resources are less, can process large volumes of data at
advantages of a batch once, and has lower operation costs as there is lesser need for operators.
processing system?

What are the It may result in delay as data is not processed until a specific time period, errors cannot be corrected until the batch
disadvantages of a process is complete, users cannot stop the operation, and execution time can be lengthy.
batch processing
system?

What is online An interactive processing where data is input by the user and feedback is given in the form of outputs.
processing?

Where is processed In RAM (Random Access Memory).


data stored in online
processing?

What are some uses of Electronic funds transfer, online stores, automatic stock control, electronic data exchange, business-to-business buying
online processing? and selling.

What are the Easy for online transactions, automatic process, quick responses, immediate error revelation, requires expensive
advantages of online hardware.
processing?

What are the Requires up-to-date anti-virus software, risk of incorrect information passing validation, danger of hackers targeting
disadvantages of online personal data, need for a stable server, possible server downtimes due to electricity supply disturbance.
processing?

What is real-time When data input leads to immediate output, often using sensors instead of human input.
processing?

What are some uses of Air traffic control, central heating system, air conditioning system, and guidance systems.
real-time processing?

What are the Can handle tasks beyond human capability, provides up-to-date information, no data processing delays, ideal for
advantages of real-time processing large data sets, and immediate error detection and action.
processing?

What are the Requires complex computer systems and sensors, constant computer resource usage, limited ability to process large data
disadvantages of volumes at once, and system failure/downtime can be costly.
real-time processing?

What is the primary use Serving several terminals and designed to be used by thousands of simultaneous users for purposes such as census,
of mainframe transaction processing, batch processing, industry statistics, and consumer statistics.
computers?

What does RAS stand Reliability, Availability, and Serviceability.


for in the context of
Question Answer

mainframe computer
characteristics?

What does the term Replacing components while the system is still running.
'hot-swap' mean in the
context of mainframe
computers?

What does MIPS stand Millions of instructions per second.


for in the context of
performance metrics?

Why are MIPS The complexity of instructions can vary according to which benchmark program is used, and MIPS do not take into
considered unreliable? account input/output speeds and activity.

What is fault tolerance The ability of a system to continue operating in the event of hardware or software failure.
in the context of
mainframe computers?

What is the primary To manage the hardware and software resources of the system.
function of the operating
system in a mainframe
computer?

What are the Can perform hundreds of MIPs, usually don’t have server downtime, reliable, available and serviceable, fault tolerance,
advantages of can run different operating systems, can handle different types of database, more secure than most other types of
supercomputers? computer as they use complex encryption systems.

What are the Very expensive (can use cloud instead), expensive software, support specialists required, occupies large space, generates
disadvantages of lots of heat; cooling systems expensive.
supercomputers?

What are the Longevity, heat maintenance, performance metrics (FLOPS), fault tolerance, operating system, type of processor.
characteristics of
supercomputers?

What are To carry out large numbers of complex calculations quickly.


supercomputers
designed for?

What are the uses of Quantum mechanics, weather forecasting, climate research.
supercomputers?

What are some Can perform hundreds of FLOPs very fast, fault tolerance, can run different operating systems, can handle different types
advantages of of databases, environment-friendly, provides virtual testing environment.
supercomputers?

What are some Very expensive, expensive software, requires support specialists, occupies large space, generates lots of heat which
disadvantages of makes cooling systems expensive, requires large and fast storage drives.
supercomputers?

What is the definition of Programs needed to operate a computer system.


system software?

What is the definition of The software that manages the hardware; it's the first software that loads after BIOS; it sits between hardware and
an operating system? application softwares and manages any communication between them.

What are some tasks of Allocating memory to software, sending data to hardware, responding to input, opening and closing files.
an operating system?

What is the purpose of To manage specific hardware models; without device drivers, the hardware won’t work.
device drivers?

Where does a device It sits between the operating system and hardware; it tells the operating system how to communicate with hardware and
driver sit in relation to handles the translation of requests between hardware and computer.
the operating system
and hardware?

What is the role of To translate a program written in high-level programming language into machine code that a computer can understand.
translators in
computing?

What does high-level Source code.


programming language
Question Answer

refer to?

What is stored inside an Machine code.


executable file?

What does a compiler Translates source code into machine code all at once.
do?

What type of file does a An executable file.


compiler create?

Can an executable file No, it can only run on the operating system for which the compiler has compiled it for.
created by a compiler
run on any operating
system?

What is the role of It reports on errors as lines of source code are entered.
interpreters in error
reporting?

How does a translator It translates source code into an intermediate stage one line at a time and then executes that line.
program run source
code?

What is the primary Combining separate object files into one executable file.
function of a linker in
programming?

What is the purpose of To perform maintenance on a computer system and manage system resources.
utility software?

What are the main Dealing with threats such as adwares, malwares, and viruses by detecting changes in files behavior, scanning the
functions of an anti-virus computer for viruses, quarantining or disinfecting infected programs, and asking the user whether to delete the infected
program? programs or not.

What is the purpose of To create a second copy of data in storage for restoration in case of loss or destruction, and to ask the user about the
backup software? frequency and type of backups, as well as about restoring/verifying the backup.

What is data Encoding data using fewer bits than the original.
compression?

What are the two types Lossy and lossless.


of data compression?

How does lossless By identifying repeated patterns; no information is lost.


compression reduce the
number of bits?

How does lossy By identifying unnecessary information; information is lost.


compression reduce the
number of bits?

What is disk The rearranging of files stored on a disk.


defragmentation?

How does disk Into the smallest number of fragments.


defragmentation
organize the contents of
the disk?

What is the purpose of To prepare the disk for initial use.


disk formatting?

What does low level Organizes the tracks on a disk into sectors.
formatting do?

What do file-copying Create a new file which has the same content as an existing file.
utilities do?

What does deleting Deletes locked files permanently.


utilities do?

What are the slowest Read/write heads.


Question Answer

moving parts in HDD?

What is custom written Software written especially to meet the requirements of a client.
software?

What are the It meets the client’s requirements, has no unnecessary features, can be adapted for use, and programmers are available
advantages of custom to make changes/rectify bugs.
written software?

What are the It is expensive, testing is limited, support is limited to the team of programmers, and it can take a long time to develop with
disadvantages of many potential bugs.
custom written
software?

What is off-the-shelf General purpose software available to a large market that can be purchased.
software?

What are the It is immediately ready for use, has shared development cost, is rigorously tested, and may receive upgrades and wide
advantages of range of support.
off-the-shelf software?

What are the It has to be adapted for use, may have unnecessary features, call centre support may not solve specific business
disadvantages of problems, may not be compatible with existing hardware and software, and requires a license.
off-the-shelf software?

What is proprietary Software owned by an individual or a company with major restrictions on its use, and the source code is kept secret.
software?

What legal basis does Copyright, which provides an exclusive right to the owner.
proprietary software
have?

What are the Free, openly available, source code published, can be modified and shared, not protected by copyrights.
characteristics of open
source software?

What is a command-line An interface that uses commands that need to be typed.


interface (CLI)?

What are the Can be faster if the user is experienced, does not take up much hard disk space, does not need much memory, can
advantages of a perform complex operations that other interfaces cannot.
command-line
interface?

What are the Need to remember commands, slower because it needs to be typed, errors can easily be made, has to be in a specific
disadvantages of a syntax to work, needs specialist knowledge as help facilities are not helpful.
command-line
interface?

What is a graphical user WIMP - windows, icons, menus, pointer.


interface (GUI) based
on?

What are the User friendly, no commands to remember, easier and faster, can exchange data between applications, help facilities.
advantages of a
graphical user interface
(GUI)?

What are the Takes up more hard disk space, uses more memory, needs a powerful processor, may be slower for experienced
disadvantages of a programmers to use.
graphical user interface
(GUI)?

What is a dialogue A system that uses speech to communicate with a computer.


interface?

What are the Can be used by users with physical disabilities, allows contactless control, quicker than typing.
advantages of a
speech-based
interface?

What are the Background noise, speech impediment, computers' ability to detect different accents/voices, needs specific commands,
disadvantages of a may require training to use.
speech-based
Question Answer

interface?

What is a gesture-based A system that recognizes human motion.


interface?

What are the Fast to use and learn, can be used by disabled users (e.g. eye tracking), can be used to prevent the spread of germs.
advantages of a
gesture-based
interface?

What are the Less effective with background movement, some gestures may not be socially acceptable, needs physical interface,
disadvantages of a requires line of sight.
gesture-based
interface?

What is a sensor? An input device that automatically collects data about a physical environment.

What is the purpose of To remove the need for manual monitoring and input data into a computer for necessary actions.
sensors?

What are the 24/7 operation, more frequent and accurate readings, reduced need for human labor, and ability to work in dangerous
advantages of using conditions.
sensors for monitoring
and control?

What are the High initial cost, susceptibility to dirt and grease affecting performance, and potential for anomalous results if the sensor is
disadvantages of using faulty.
sensors for monitoring
and control?

What is calibration in the The process of testing and modifying a sensor to ensure it is taking correct readings.
context of sensor
technology?

Why is calibration To maintain accuracy over time, especially as sensors may deteriorate with constant use and other devices in the
important for sensors? monitoring system may also deteriorate.

What are the two Calibration reference and physical reference.


methods of calibrating a
sensor?

What are some types of Light/UV, temperature, pressure, humidity, moisture, sound, infrared, touch, electromagnetic field, proximity, pH, etc.
sensors used in
monitoring and control?

What is a characteristic A graph mapping out the sensor’s response in comparison to an ideal response.
curve in the context of
sensors?

What are the three main Offset, Sensitivity, Linearity.


results given by
sensors?

What is offset in the Sensor readings are higher or lower than the ideal reference.
context of sensor
readings?

What is sensitivity with Sensor readings change over a range at a different rate to the ideal reference.
respect to sensor
readings?

What is linearity in the Sensor readings are directly proportional to the ideal reference.
context of sensor
readings?

What is one point To correct an offset calibration curve and bring sensor readings closer to the ideal reference based on a single reading.
calibration used for?

What is the process for Take reading with sensor, compare sensor reading with ideal reference, subtract sensor reading from ideal reference to
one point calibration? get offset, add the offset to every sensor reading to get calibrated value.

What is two point To correct an offset and sensitivity calibration curve, and it rescales sensor readings, providing a more accurate calibration
calibration used for? than one point calibration.
Question Answer

What is the process for Take two different sensor readings, compare sensor readings with ideal reference, calculate the range of sensor reading
two point calibration? and ideal reference, then use a specific formula for calibration.

What is multipoint It is similar to two point calibration but uses more than two readings, increasing accuracy, and can calibrate non-linear
calibration used for? sensors.

What is the formula Range = (sensor reading - lowest value) * ideal range value / sensor range value + ideal low value
used for range
calculation during
multipoint calibration?

What is a monitoring A system that collects data and stores it for later use.
system?

What are the main Sensors.


components in a
monitoring system?

What type of sensors Light sensors.


are used to measure the
level of light in a
greenhouse?

What type of sensors Temperature sensors.


are used to measure
ambient temperature in
weather stations?

What sensors are used Moisture sensors.


to measure water
content of soil?

What type of sensors Pressure sensors.


are used to measure
atmospheric pressure?

What type of sensors Sound sensors.


are used in burglar
alarm systems to detect
the level of sound an
intruder might make?

What type of sensors Infrared sensors.


are used to detect the
movement of human
bodies in burglar
systems?

What type of sensors Touch sensors.


are incorporated within
detection devices used
to measure fluid levels?

What is a control A system that collects data and sends it to a computer for analysis.
system?

What are the main Sensors, microprocessors, and actuators.


components in a control
system?

What is a To process instructions and perform mathematical calculations.


microprocessor used for
in control systems?

What are the Easily programmed, small in size, fast at moving data, low power consumption.
advantages of
microprocessors in
control systems?

What are the Limited data holding size, overheating, no internal memory, expensive.
disadvantages of
microprocessors in
control systems?
Question Answer

Name some types of Light/UV, temperature, pressure, humidity, moisture, sound, infrared, touch, electromagnetic field, proximity, pH.
sensors used in
monitoring systems.

What is an actuator? A type of motor used to move and operate another device.

What are the High performance speeds, relatively cheap, safe, easy to use, fire and explosion proof, low technical requirements.
advantages of
pneumatic actuators?

What are the Fluids can leak.


disadvantages of
hydraulic actuators?

What is the function of a To collect data.


sensor in the sensor,
microprocessor, and
actuator process?

What does the Compares collected data with pre-set values.


microprocessor do in
the sensor,
microprocessor, and
actuator process?

How are analogue data Using ADC - analogue to digital converter.


converted into digital
data in the sensor,
microprocessor, and
actuator process?

What is the purpose of To make the device function to bring it within pre-set limits.
actuators in the control
system process?

Name some control Greenhouse, central heating/air conditioning, burglar alarms, traffic control (traffic lights), car park barriers, smart homes,
system uses. wireless sensor and actuator networks.

What is personal data? Data that can be used to identify a living person.

Why should personal To prevent identity theft, fraud, blackmail, scams, misuse hindering future job opportunities, theft of banking details, and to
data be kept prevent crime.
confidential?

What are some ways to Using strong passwords, encrypting personal data, using firewalls, anti-virus, biometrics, visiting SSL websites, not
keep personal data opening email attachments from strangers, removing geotags, using secure privacy controls, reporting and blocking
confidential? suspicious users, and using a VPN.

How can personal data Fraudsters send emails pretending to be from a bank/organization, provide a link to a bogus website, and try to obtain
be collected through personal details.
phishing?

What are some Never give out personal details through an email, don't respond to emails from strangers, check for addressing by name,
prevention methods for report any phishing activity, don't click on .exe file attachments, and check for spelling and grammar mistakes.
phishing?

What is smishing? Sending text messages to deceive the user into providing personal details.

How does smishing By relying on the user clicking links in the SMS.
typically attack the
user's device?

What should one do to Never give out personal details through text messages, ignore texts from strangers, and report and block any smishing
prevent falling victim to activity.
smishing?

How can one identify a By checking for spelling and grammar mistakes, and being cautious of messages promising unrealistic rewards.
potential smishing
message?

What is vishing? Fraudsters using phone calls to deceive victims into providing personal details.

What technology is VOIP (Voice over Internet Protocol).


often used in vishing
Question Answer

attacks?

How should one Hang up on phone calls you think are suspicious and report the caller's contact to the police.
respond to suspicious
phone calls to prevent
falling victim to vishing?

What should one do if It's most probably a vishing attempt.


the caller asks to
transfer money to a
bank account?

What is encryption? The process of scrambling data so that it can’t be understood.

How is data encrypted? Using an encryption key.

What happens if a It becomes meaningless.


hacker intercepts
encrypted data?

How is encrypted data Using a decryption key.


decrypted by the
intended user?

When is encryption When sending or storing sensitive personal data, to prevent interception by hackers, and to secure data on storage
needed? mediums.

What are the Can encrypt and decrypt large amounts of data quickly, easy to use, and requires less processing power.
advantages of
symmetric encryption?

What are the Private key transportation can be intercepted, and it may not use digital certificates.
disadvantages of
symmetric encryption?

What is asymmetric Public key cryptography.


encryption also known
as?

What are the More secure as it uses two different keys, eliminates key transportation problem, and uses digital certificates.
advantages of
asymmetric encryption?

What are the Slow, if private key is lost data can't be decrypted, requires more processing power, and cannot verify if public key belongs
disadvantages of to sender.
asymmetric encryption?

What is data? A collection of text, numbers, and symbols without meaning on its own.

What is information? Processed data with structure and context, having a meaning to it.

What is the formula for Data + meaning & context = information.


information from data?

What is a direct data Data collected from an original source without the need to request data from a third party.
source?

What are some methods Questionnaire, interview, data logging and sensors, observations, survey.
of collecting direct data?

What are the Accurate, relevant, original source of data is known, only needed data is collected, can sell to other organizations, less
advantages of direct chance of sampling bias.
data sources?

What are the Time-consuming, may be obsolete, expensive, need to purchase logging equipment, difficult to process statistical data,
disadvantages of direct small sample size.
data sources?

What is an indirect data Data collected from a third party or data that is old and already exists.
source?

What are the methods Electoral register and organizations collecting personal data & then selling this data to other organizations.
of collecting indirect
Question Answer

data?

What are the Data is immediately available, less expensive and time-consuming, likely to be collected from large samples, can gather
advantages of using data that may not be possible to gather by yourself, and can be of higher quality as they have already been processed.
indirect data sources?

What are the Some data may be extra, some required data is absent, original source of data is not known and not as trusted, data may
disadvantages of using be obsolete, and there can be sampling bias.
indirect data sources?

What are the Accuracy, relevance, age, level of detail, and completeness of the information.
characteristics of quality
information?

What does accuracy Information needs to be accurate.


refer to in quality
information?

Why should information Information needs to be relevant to its purpose without any extra and irrelevant information.
be relevant in quality
information?

Why should information Information must be up to date.


be up to date in quality
information?

What does All required information must be provided.


completeness of the
information refer to in
quality information?

You might also like