What is the role of IP addresses in the internet? - An IP address uniquely identifies devices on the internet and enables communication by locating and routing data to and from devices., How does a domain name relate to an IP address? - A domain name is the human-readable version of an IP address, and the Domain Name System (DNS) translates it into the corresponding IP address., What is the function of a Domain Name Server (DNS)? - A DNS translates domain names into IP addresses, allowing users to access websites using easy-to-remember names instead of numerical IP addresses., Explain how a web browser retrieves a web page after a URL is entered. - The browser sends a request to the DNS to resolve the domain into an IP address, then connects to the web server, retrieves the page's HTML, and renders it on the device., What is the difference between session cookies and persistent cookies? - Session cookies are temporary and deleted after the session ends (e.g., when the browser is closed), while persistent cookies remain stored for a set period to retain user preferences across sessions., What is a proxy server, and how does it enhance internet security? - A proxy server acts as an intermediary between the user and the internet, masking the user's IP address and filtering traffic to provide anonymity and security., What is the difference between centralized and decentralized digital currencies? - Centralized digital currencies are controlled by a single authority, such as a bank, while decentralized currencies, like cryptocurrencies, operate without a central governing body using blockchain., How does blockchain ensure transparency and security in digital transactions? - Blockchain records every transaction in a decentralized, immutable ledger. Each block contains a timestamp, and once added, it cannot be changed, ensuring transparency and security., What is a brute-force attack, and how can it be prevented? - A brute-force attack involves attempting every possible password combination to gain unauthorized access. Prevention methods include strong password policies and limiting login attempts., Explain how phishing attacks are carried out and how users can protect themselves. - Phishing involves sending deceptive emails or messages to trick users into revealing sensitive information. Users can protect themselves by checking email addresses, avoiding suspicious links, and enabling two-factor authentication, What is a Distributed Denial of Service (DDoS) attack, and what impact does it have on websites? - A DDoS attack overwhelms a website's server with excessive traffic from multiple sources, making the site slow or inaccessible. It can be mitigated using load balancing and traffic filtering., How do firewalls protect a network from external threats? - Firewalls monitor incoming and outgoing network traffic and block unauthorized access based on pre-set security rules., What is the purpose of two-step verification, and how does it improve security? - Two-step verification requires a user to provide two forms of authentication (e.g., a password and a code sent to a mobile device), adding an extra layer of security to prevent unauthorized access., How can automating software updates help prevent cyber attacks? - Automating software updates ensures that systems receive the latest security patches and bug fixes, reducing vulnerabilities that attackers could exploit., What role do microprocessors play in automated systems? - Microprocessors are the central processing units that control automated systems by interpreting data from sensors and making decisions on how actuators should respond., Give an example of an automated system in agriculture and describe how it works. - In agriculture, automated irrigation systems use sensors to measure soil moisture levels. The microprocessor processes the data, and if the soil is dry, the actuator activates water sprinklers., What is one benefit of using robots in industrial settings? - Robots in industrial settings can perform repetitive or dangerous tasks with greater precision and speed, reducing human error and increasing productivity., What is one potential drawback of using robots in industry? - A drawback is the initial high cost of purchasing and maintaining robots, which can be prohibitive for smaller businesses., What is machine learning, and how does it differ from traditional programming? - Machine learning allows computers to learn from data and improve their performance without being explicitly programmed, whereas traditional programming follows a set of predefined rules., What are expert systems, and how are they used in real-world applications? - Expert systems use a knowledge base and rule engine to simulate human expertise and are used in fields like medical diagnosis, where they assist doctors in making decisions based on input data., Explain how artificial intelligence (AI) can be used in autonomous vehicles. - AI in autonomous vehicles processes sensor data (like cameras and radars), makes real-time decisions (such as avoiding obstacles), and controls actuators (like steering or braking) to navigate safely.,
0%
IGCSE Computer Science - Chapter 5 and 6 (Internet and its uses, Emerging Technologies)
공유
공유
공유
만든이
Collinhalim8
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
플래시 카드
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?