Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.1 revision computer science, REVISION:, threats, tech terms, CPU…
-
REVISION:
embedded systems:
embedded systems are computers build into other devices, like dishwashers, microwaves and TVs. they are usually dedicated systems
embedded systems are often used as control systems - they monitor and control machinery in order to achieve a desired result. for example in a dishwasher the embedded system could control the water pumps and water release mechanisms, manage the various dishwasher cycles and control the thermostat to keep the water at an appropriate temperature.
as they're dedicated to a single task, embedded systems are usually easier to design, cheaper to produce and more efficient at doing their tasks than a general purpose computer.
-
-
mesh topology
a mesh topology is another popular network layout. it is decentralised - networking devices are either directly or indirectly connected to every other one without the need for one central switch or server. mesh networks work by sending data along the fastest route from one device to another. the main advantage of a mesh topology is that there is no single point where the network can fail. if the central switch or server of a star network fails then the whole network fails. but in a mesh network if one device fails the the data is sent along a different route to get to its target.
the purpose of a computer is to take data, process it, then output it. computers were created to help process data and complete tasks more efficiently than humans.
a computer system consists of hardware and software that work together to process data/ complete tasks.
hardware is the physical stuff that makes up your computer system, like the CPU, motherboards, monitor and printer
there are many types of computer systems. these range from small devices like calculators and watches, up to large supercomputers used by banks or for scientific applications. computers may be general purpose or dedicated systems.
threats
malware
spyware
spyware is malware that comes packaged with another software such as a free software that the user can download on to there device
ransomware
ransomware is malware that interferes with a user's operation of a computer unless a sum of money (ransom) is paid
worms
worms are different to viruses as they do not need to be hosted in another program. they often create a back door so that a hacker can take over an infected computer
-
viruses
a virus is a computer program that is hidden within another program. the virus code is only run when the host program is executed
trogans
trojans are programs that users are tricked into installing under the pretence that they are legitimate and useful
malware
malware is any kind of malicious program that is installed on a computer system with the intention to cause damage and disrupt its functionality or to steal information
-
social engineering
phishing
phishing uses fake emails and websites to trick people into giving away their sensitive data and information. Emails usually claim or appear to be from a bank or building society an e - commerce site or a email provider.
pretexting
pretexting also known as blagging is often done by phone but can also be carried out face to face. here the criminal invents a scenario to persuade the victim to divulge information that they might not do otherwise. often, they will pretend to be from and official organisation such as a bank insurance company or the police or to be another employee of the company or a network administrator.
shouldering
shouldering or shoulder surfing, involves finding out login details passwords and pins by watching people enter them. this could happen by looking over someone's shoulder as they enter their pin at a cashpoint or checkout or even by using recording equipment
-
-
brute force attacks
a brute force attack is where a hacker attempts to crack a password by systematically trying different combinations of letters and numbers until the correct on is found.
-
-
-
CPU CONFIGURATION
clock speed
-
the clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz)
the clock speed refers to the rate at which a computer's central processing unit (CPU) executes instructions.
by reducing the clock speed, you are slowing down the processing caabilities of your central processing unit. (CPU)
CPU clock speed is a good indicator of overall processor performance. though applications like video editing and streaming are known to rely on muli-core peformance.
Cache
cache memory is located between the main memory and the CPU. it is used to hold data that needs to be accessed very quickly. accessing ache memory is much faster than accessing main memory,
the data in a cache is generally stored in fast access hardware such as RAM and may also be used in correlation with a software component. A cache's primary purpose is to increase data retrieval performance by reducing the need to access the underlying slower storage layer.
A cache's primary purpose is to increase data retrieval performance by reducing the need to access the underlying slower storage layer.
the more cache memory a computer has, the faster it runs. however, because of its high-speed performance, cache memory is more expensive to build than RAM. therefore, cache memory tends to be very small in size.
-
a cache's primary purpose is to increase data retrieval performance by reducing the need to access the underlying slower storage layer.
cores
in computing a core refers to an individual processing unit within a CPU responsible for executing instructions and performing calculations
-
-
In summary, a core is a small CPU or processor built into a big CPU or CPU socket. It can independently perform or process all computational tasks
-
-