2023 Paper Flashcards

1
Q

Explain why virtual storage is well suited for backups

A

• Allows a section of hard drive to be freed to act as RAM

• Backups not currently being used can be stored in that RAM through paging freeing up memory for other programs in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of LAN networks

A

• Easier to setup the network in a local area
• Inexpensive compared to a Wide Area Network
• Faster communication speeds between networks in a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain what is meant by a network protocol

A

• A network protocol is an established set of rules that determine how data is transmitted between different devices in a same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two protocols may be used in a LAN

A

• File transfer protocol
• TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain why protocol layering is used

A

• Layers each have defined responsibilities and are ordered
• So data moves from one layer to next from application to point where it can be transmitted across a network
• Allows communication systems to be as open as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give the names of three operating systems and state it’s purpose for each

A

• Distributed OS is where load is distributed across the OS to reduce time handling tasks.

• Embedded OS performs a small range of specific tasks catered towards a specific device.

• Multitasking OS enables the user to carry out tasks appearing simultaneously by using time slicing to quickly switch between applications and programs in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how an OS deals with an interrupt

A

• FDE cycle stops and processor saves current tasks ongoing

• Special registers on processor saved onto stack.

• Processor focuses on interrupt and depending on quantity of interrupts the interrupt handler will place them on a queue

• Processor loads Interrupt Service Routine into RAM and sets a flag signal to start ISR.

• After interrupt is serviced flag is reset and ISR repeats for any more interrupts.

• Contents of stack is transferred back onto registers and FDE cycle resumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain how an OS can manage the memory available to applications and why doing so is important (9)

A

• An OS can manage memory available to applications by storing frequently used applications and programs into RAM which loads up these saved applications faster increasing efficiency of OS

• Paging can split up memory into 4K chunks increasing efficiency for organisation of memory in program.

• This then can be swapped between main memory and hard disk when needed.

• Segmentation can be used where memory is split up into sizes which can vary representing the logical flow of the program.

• Virtual memory can be used where the section of the hard drive acts as RAM to shore programs being used when spaces in memory is insufficient.

• Sections of program not currently being used is temporarily moved into virtual memory through paging.

• Memory management important to organise data in an Os to improve performance and efficiency while freeing up space ensuring blocks of memory space are managed to prevent data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe one difference between a stack and a queue

A

In a stack the last element to be added is the first to be removed (FILO) whereas in a queue the first element added is the first to be removed (FIFO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe one difference between an array and a list

A

A list can consist of elements of multiple data types but an array consists of elements of the same data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is a tuple different to a list

A

A tuple cannot be changed but a list can be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe how the second item in a linked list would be accessed using pointer values

A

• The counter variable needs to be set to 0
• The local pointer variable should be pointing to the first node in the list
• If pointer = NULL then it’s the last node on the list
• If local and main pointer = NULL list is empty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe two differences between assembly language and high level languages

A

• Assembly languages uses an assembler to convert instructions into machine code and is machine specific which the processor directly understands

• A high level language is easier to learn and use accepting the input of strings closer to human language then turns this into binary behind the scenes providing abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compare the robots use of encryption and hashing for storing and communicating data (9)

A

• Encryption is the process of scrambling data before sending it and decrypts data upon arrival. Hashing is the process of turning a string of characters into a fixed size value using hash functions which cannot be reversed.

• Symmetric encryption is where both sender and receiver use one key to encrypt and decrypt data and this one private key must be protected to prevent interception from third parties.

• Asymmetric encryption is where both sender and receiver uses two keys to encrypt and decrypt data. Public key is used for encryption and private key is used for decrypting. Keys work as a pair and one robot can communicate using encryption as well as a user while another robot can decrypt the data or a programmer to ensure smooth connection sending messages with security. Private key helps verify sender’s identity through digital signatures.

• Hashing can be used to store passwords across the wireless network by hashing the user’s password and compares it to the stored key for authentication and prevents unauthorised access to passwords that can interfere with robot communication.

• Hash tables are appropriate since it’s used in databases and can store a large amount of information about multiple humans in this context.

• Encryption is used by the robot so data/messages is effectively and safely communicated between robots wirelessly and hashing is used so user’s passwords are protected across wireless network which prevents interception of confidential data providing security for robots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Programmers do not want other people to download and use these images. State name of one piece of relevant legislation and describe it

A

Legislation: Copyright, Design and Patents Act 1988

Description: Protects people’s property online and the copyright automatically applies for original work

Programmers need to use images they have not created. Give ways to make sure images used legally:

• Ask for permission to use these images from owner
• Buy the patent/license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State two requirements for data to be in 1NF

A

• All columns must contain atomic values
• Order of data does not matter and can have duplicate information

17
Q

Regulation of Investigatory Powers Act (2000) Evaluate purpose and use of the Act

A

RIPA: Regulates surveillance, investigation & covers interception of communications
- E.g FBI can wire-trap conversations if warrant has been issued
- Act enforces internet service providers & phone companies to give up information upon request from an authorised authority
- Ensure that networks have sufficient hardware installed to facilitate surveillance.
- Prevents the existence of interception warrants and any data collected with them from being revealed in court
- Controversial as its powers extend to small agencies (E.g local councils)
- Some people feel that the Act is an invasion of privacy, or often improperly used