RevisionYr11

advertisement
Revision
Preparation for Unit 2 Software Development Exam
Revise the following chapters:
Chapter 9 – Communications and Networks
Chapter 10 - Database Management
Chapter 11 - Computer Security and Safety, Ethics and Privacy
Also theory:
Databases
Implementation and Evaluation
Networks
Glossary Terms:
1. Antivirus program
2. Cybercrime
3. Denial of service attack
4. Encryption
5. Firewall
6. Hacker
7. Passphrase
8. Pharming
9. Phishing
10. Trojan horse
11. Virus
12. Worm
13. Backup
14. Data dictionary
15. Data type
16. Data Integrity
17. Data warehouse
18. Distributed database
19. File processing system
20. Multidimensional database
21. Object-oriented database
22. Primary key
23. Query language
24. Recovery utility
25. Database Management System
26. Structured Query Language
27. Validation
Short Answer
1. Describe how the global positioning system (GPS) works.
2. How are a local area network (LAN), a metropolitan area network (MAN), and a wide area network
(WAN) different?
3. What is wireless LAN?
4. What is a network topology?
5. What are the five types of digital dedicated lines?
6. What are the three different types of digital modems? How does each one function?
7. What is a network?
8. Describe the main difference between a Local Area Network and a Wide Area Network.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
List and describe 3 advantages of using a network over stand-alone computers.
Describe the peer-to-peer network?
Describe the client/server network?
Describe the following network topologies and list one advantage and one disadvantage of each:
a. Star
b. Mesh
c. Bus
Describe the following protocols:
a. Ethernet
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
Briefly describe the following types of communication devices:
a. Network Interface Card (NIC)
b. Hub
c. Switch
d. Firewall
Briefly describe the following physical transmission media:
a. Twisted-pair cable
b. Fibre-optic cable
List and describe two types of servers.
What is a Network Operating System?
List and describe two main functions of a Network Operating System.
What is validation?
What are five types of validity checks?
What are the advantages of object-oriented databases?
Describe four examples of object-oriented databases.
What is the definition of a database?
List 4 qualities of valuable information.
List the three main functions of a database.
List one example for each of the above functions.
What is a Database Management System?
Describe the following parts of a database:
a. Character
b. Field
c. Record
A database defines each field by a number of characteristics such as field size and data type. List 3
common data types.
Describe the difference between a Flat-file database and a Relational database.
What is one advantage of a relational database system?
Describe the following terms:
a. One-to-one relationship
b. One-to-many relationship
Many-to-many relationship
Apart from data entry screens, list and describe three other database features.
Why is data security so important?
List and describe two ways in which data can be kept secure
a) Why is data Privacy so important?
b) Describe two ways that data can be kept private.
How do antivirus programs detect and identify a virus?
What is virus hoax?
What is information privacy?
List 5 ways to safeguard your personal information.
What are two methods for avoiding phishing attacks?
How does clickjacking work?
Who uses content filtering and why?
Programming:
Revise code on using combo boxes – eg ListIndex, Select Case, etc
Download