Including: brute-force attack, data interception, distributed denial of service (DDoS) attack, hacking, malware (virus, worm, Trojan horse, spyware, adware, ransomware), pharming, phishing, social engineering. Including: access levels, anti-malware, including anti-virus and anti-spyware, authentication (username and password, biometrics, two-step verification), automating software updates, checking the spelling and tone of communications, checking the URL attached to a link, firewalls, privacy settings, proxy-servers, secure socket layer (SSL) security protocol.
Understand that a computer needs a network interface card (NIC) to access a network
The CPU processes instructions and data that are input into the computer so that the result can be output. A microprocessor is a type of integrated circuit on a single chip. Including: units: arithmetic logic unit (ALU) and control unit (CU), registers: program counter (PC), memory address register (MAR), memory data register (MDR), current instruction register (CIR) and accumulator (ACC), buses: address bus, data bus and control bus. How instructions and data are fetched from random access memory (RAM) into the CPU, how they are processed using each component and how they are then executed. Storing data and addresses into specific registers. Using buses to transmit data, addresses and signals. Using units to fetch, decode and execute data and instructions. The number of cores, size of the cache and speed of the clock can affect the performance of a CPU. An instruction set is a list of all the commands that can be processed by a CPU, and the commands are machine code. An embedded system is used to perform a dedicated functions. For example in, domestic appliances, cars, security systems, lighting systems or vending machines. This is different to a general purpose computer that is used to perform many different functions. For example in, a personal computer (PC) or a laptop.