Please enable JavaScript.
Coggle requires JavaScript to display documents.
Craig n Dave, Advantage of Hard disk > Solid-state - hard disk has a…
Craig n Dave
1.3
Types of Networks
Advantages of Networking:
- Users can share files.
- Users can share peripherals: printers and connections to other networks e.g. the Internet.
- Users can access their files from any computer on the network.
Servers can control security, software updates and backup of data.
- Communication with other people, e.g. email and social networking.
Local area Network (LAN):
- Covers a small geographical area located on a single site.
- All the hardware for a LAN is owned by the organisation using it.
- LANs are wired with UTP cable, fire optic or wireless using Wi-Fi.
Wide area Network (WAN):
- Covers a large geographical area, connecting LANs together.
- Infrastructure between the LANs is leased from telecommunication companies who own and manage it.
- WANs are connected with telephone lines, fibre optic cables or satellite links.
-
Disadvantages of Networking:
- Increased security risks to data.
Malware and viruses spread very easily between computers.
- If a server fails, the computer connected to it may not work.
- The computer may run more slowly if there is a lot of data travelling on the network.
-
-
-
Flash memory cards are best for storing games external to a portable games console, thereby minimising the need for internal flash memory capacity
-
-
-
1.4
Forms of attack
Malware:
- Software which is specifically designed to disrupt, damage or gain unauthorised access to a computer system
- E.g. viruses, worms, trojan horses, ransomware, spyware, adware, scareware etc
Data interception and theft:
- The unauthorised act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
- E.g. To sniff usernames and passwords
-
SQL injection:
- A technique used to view or change data in a database by inserting additional code into a text input box, creating a different search string.
- E.g. Smith " or " "="
Phishing:
- the fraudulent practice of sending emails purporting to be from reputable companies in order to include individuals to reveal personal information
- E.g. to find passwords and credit card numbers.
Brute force attack:
- A trial and error method of attempting passwords and pin numbers. Automated software is used to generate a large number of consecutive guesses
- E.g. By trying every word in the dictionary
Denial of Service (DoS):
- Flooding a server with useless traffic causing the server to become overloaded and unavailable.
-
1.6
Ethical, legal, cultural and environmental concerns
How to investigate and discuss Computer Science technologies, considering ethical, legal, cultural, environmental and privacy issues
- Ethics is not so much about whether something is legal or illegal but more about whether something is morally right or wrong
- Jumping ahead in a queue is not illegal, but morally it is deemed unacceptable in our culture
- The internet presents many legal, ethical and cultural issues
- It has many benefits:
- Vast respiratory of knowledge
- Communication
- Education
- Research
- E-commerce
- It also has drawbacks:
- Increase in piracy
- Distribution of illegal images
- Offensive content
- Fraud
- Hate speech
- Dissemination of fake news
Should the Internet be regulated?:
Yes:
- The internet is no different to other media: radio, TV, newspapers etc
- The Internet has harmful and illegal content
- Children should be better protected
- Profit making organisations on the Internet should share responsibility or policing the Internet the have created
No:
- Freedom of expression is an absolute right
- The Internet is different to other media because anyone can be an author or broadcaster
- The Internet grows too quickly for filtering to be effective
- Censorship is bad for democracy
- Parents should take more responsibility
Privacy issues
- Schools often monitor Internet, emails, and general computer activity
- Companies often monitor their workforce's browser use and record their business calls
- Data is an incredibly valuable commodity
Should smart devices be continually recording?:
For:
- Data encryption makes it private
- Voice input is convenient: the next step in user interfaces
- Processing sound data allows for additional functionality
- Intelligence may save lives
- If you have nothing to hide then privacy is not an issue
- Data is not recorded for other purposes
Against
- Invasion of privacy
- TV may also be taking video footage
- Data is sent over the Internet for processing
- The data may not just be used for the purpose intended
Privacy issues of computer science:
- Number plate recognition
- Face recognition
- Electronic tagging
- Cell phone location and GPS technology
- Recording internet browsing history
- Retention of personal data
- Smart listening devices
-
- Advantage of Hard disk > Solid-state - hard disk has a higher capacity. Before it fails you usually get detectable anomalies - Advantage of Solid-state > hardware - faster access times, more durable, uses less power
-
-