0% found this document useful (0 votes)
8 views3 pages

Cs Notes For Past Paper

The document provides an overview of various types of malware, including spyware, worms, and ransomware, along with their functionalities and impacts. It also discusses the roles of firewalls and proxy servers, the advantages of high-level programming languages, and the purpose of operating systems and cloud storage. Additionally, it highlights the differences between primary and secondary storage, as well as the benefits and drawbacks of using cloud storage for companies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Cs Notes For Past Paper

The document provides an overview of various types of malware, including spyware, worms, and ransomware, along with their functionalities and impacts. It also discusses the roles of firewalls and proxy servers, the advantages of high-level programming languages, and the purpose of operating systems and cloud storage. Additionally, it highlights the differences between primary and secondary storage, as well as the benefits and drawbacks of using cloud storage for companies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Spyware – software that records all key presses and - Machine independent/portable ---> can be used on

transmits these to a third-party any computer without a need for understanding of


the hardware
Malware Description - Easier for programmer to read/write/understand ---
Worm Software that replicates
> less likely to make mistakes
itself on a network
- Easier to debug ---> can find and correct errors in
without an active host and
takes up the less time
bandwidth/memory space Data that is commonly stored in RAM
Ransomware Software that stops the
user from accessing their - Currently running application software
data by encrypting the - Currently running instructions/data
data. A fee has to be paid
- Currently running part of the operating system
to decrypt the data.
Purpose of Secondary Storage – for long-term
storage of data/ to store data that is not currently
Similarities and differences between firewall
required by CPU/ to store data it to transfer it to
and proxy servers –
another computer
- Similarities:
Pixel – The smallest component of the image
- Both can be hardware or software-based.
- Both check incoming and outgoing transmission Resolution – the number of pixels wide by the number
- Both keep a log of traffic of pixels high
- Both store whitelist and blacklist
Why parity block check detect an error that
- Differences could not be detected by parity byte check – In
- Proxy server can hide user ’s IP address but parity check, interchange of bits won ’t be detected.
firewall does not Parity check cannot detect errors if the parity remains
- Proxy server ’s purpose is to divert attacks from correct. However, parity block will identify all the
the server while a firewall ’s is to stop horizontal and vertical position of all changes.
unauthorized access
- Proxy server transmits website data to the user
but a firewall does not

Advantages of cookies –
Advantages of high level language: - Storing account details so that the user does not
have to enter their username and password every
time they visit the site
- Storing the pages the user has visited to tailor the Purpose of the cache – it is a type of storage that
adverts stores frequently used instructions in order to speed up
- Storing shopping basket so that when the user the access. Cache is faster to access than RAM.
leaves the website, the items are still in the
basket. SSL protocol secures the data for transmission by
- Storing preferences so that the user does not have encrypting the data and using digital certificates.
to select their preferences every time they visit Operating of ARQ –
the website
Timer is started when the sending device sends the
Robotics – the design, construction and operation of data packet to the receiving device. The receiving
robots to perform tasks device checks the data packet if the data is error free.
Characteristics of AI – If the data is error-free, the receiving device sends the
positive acknowledge back to the sending device. Then,
- Collect data the next package is sent. If the sending device does not
- Store rules for using the data receive any acknowledge before the timer ends, timeout
- The ability to adapt occurs and the data is resent until positive
- The ability to reason acknowledgement is received or max number of
- Machine learning attempts is reached.
- Analyse patterns

How the program would use AI to find the way


through different puzzles
The program would use machine learning algorithms
and collect data about where it has been and data
about obstacles. The program would use AI to store the
unsuccessful and successful actions to identify patterns Advantages for the owners of the company for
so that the robot does not repeat the same incorrect using cloud storage
route and find what is likely to work - Hardware is maintained by the third party so there
Purpose of operating system – is no need for the company to maintain
- Data would be automatically backed up by the
- It performs the basic functions of a computer cloud system so the company does not have to
- It manages the hardware back up by themselves
- Data can be accessed from any location so the
- It provides the user interface
employees can work from any locations with a
- It provides a platform to run software connection.
- The storage capacity can be increased easily
without buying new hardware
and unsupervised meaning that it can learn with or
without human interactions as well. Machine learning
Differences between primary storage and can analyse the patterns and store successful and
secondary storage unsuccessful results to influence future decisions.
- Primary storage is directly accessible by the CPU
but secondary storage is not
- Primary storage normally has small capacity but
secondary storage normally has large capacity
- Primary storage has faster access speed to data
while secondary storage has slower access speed
to data
- Primary storage stores data that is currently in
use for the system while the secondary storage
stores the user ’s files, operating system

Disadvantages to the employees of the


company using
- Internet connection is needed to ensure stable
access to the data, if the internet is unstable,
data is unable to be accessed.
- Employees could be pressured to work outside of
their office hours as they can access data from
anywhere

Machine learning capabilities


Machine learning is a form of artificial intelligence. This
means that it can adapt to its own processes and can
edit its own data. Machine learning can be supervised

You might also like