Assessment 4 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

List three functions other than memory management, of an operating system

A

Provides a user interface

Provides security

Manages hardware/peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the memory management technique in which the operating system divides the memory into equally sized chunks?

A

Pagination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how the operating system would use virtual memory to load a program there is not enough space for

A

The operating system uses an area of secondary storage as virtual memory

And moves unused pages of programs currently in memory to virtual memory

Then loads the program there wasn’t enough space for into physical memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain what happens when a search engine indexes a page

A

A program called a crawler traverses the web and takes each word in the document

It adds an entry for the page under the word in the index, alongside the word’s position on the page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain why using a RISC processor rather than a CISC one is likely to result in increased battery life

A

RISC has a smaller instruction set than CISC and as such requires fewer transistors. This means less power is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give two reasons why an operating system may be stored in ROM

A

It cannot be accidentally overwritten or deleted

It will not be lost when the device is switched off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe one advantage to a company of using a RISC processor in a product rather than a CISC processor

A

Costs less to produce because there are fewer transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe what is meant by a peer to peer network

A

Devices on the network have equal status and share data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give one disadvantage of using cloud storage to store photos

A

Potentially vulnerable to hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are secondary keys used for?

A

To search for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is First Normal Form?

A

When a database has:

No repeating fields/data

Data is atomic

Data has a primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Second Normal Form?

A

When a database is:

In First Normal Form

And where every field is dependent on the primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Third Normal Form

A

When there are no transitive relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a primary key

A

A unique identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hash?

A

A result generated by applying an algorithmic process to a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is are advantages of storing passwords as hashes?

A

Hash functions are one way

If someone gains access to a database of password they cannot access users’ passwords

17
Q

What are SQL SELECT related keywords?

A

SELECT

UPDATE

SET

WHERE

FROM

AND

18
Q

What is referential integrity?

A

Ensuring changes are consistent across a database

If a record is removed all references to it are also removed

19
Q

What is a server?

A

A device which provides a central point of control

20
Q

Why is it important for transactions to be checked server-side?

A

Client side processing can be modified

To prevent malicious code such as SQL injection

21
Q

Why is it important for transactions to be checked server-side?

A

Client side processing can be modified

To prevent malicious code such as SQL injection

22
Q

What is meant by the term ‘Atomic’ in the context of ACID transactions?

A

A transaction cannot partially complete

23
Q

What do the letters in ACID stand for

A

Atomic

Consistency

Isolation

Durability

24
Q

Give an advantage and disadvantage of changing character sets from ASCII to Unicode UTF-32

A

Advantage: More characters can be represented

Disadvantage: Text takes up more storage

25
Q

What is a WAN?

A

A Wide Area Network - a network between two different geographical locations in which devices are connected to share data

26
Q

Why are protocols important on a network?

A

Protocols control the rules of a network

Protocols allow devices to communicate by ensuring all devices follow the same rules

27
Q

State the name of the four layers of the TCP/IP stack

A

Application

Transport

Internet

Network Interface

28
Q

What is the TCP/IP stack?

A

Stands for Transmission Control Protocol/Internet Protocol

Protocols are a set of rules for communicating across a network

29
Q

Give one disadvantage of using ASCII rather than Unicode

A

Characters from different languages can’t be represented

30
Q

What is compression?

A

The process of making a file snaller

31
Q

The following sequence has been compressed using Run Length Encoding:

3C3M4C

Show the result of decompressing the sequence

A

CCCMMMCCCC

32
Q

Show the result of using Run Length Encoding to compress the sequence CCCCOLLLCCCCCMOCCCCC

A

4C1O3L5C1N1O5C