Comp 1 Revision Flashcards

1
Q

Kerry is looking at two conputers; one has a single core processor and the other has a dual core processor.
Explain why having a dual core processor might improve thpe performance or the computer.

A
  • Dual core means there are 2 processors (double)
  • parallel processing can take place &laquo_space;which means each processor can execute seperate instructions at the same time
    ^ enables multitasking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One computer has 64 kB of cache and the other has 512 kB of cache.
Explain how the cache size can affect the performance of the CPU.

A
  • Cache stores frequently visited sites/ used instructions
    ^ that can be accessed faster than accessing them from main menory (RAM)
  • therefore, a greater cache improves the performance of the CPU
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How bitmap Images are represented in binary?

A
  • The image is split up into pixels
  • Each pixel is given a binary code
    ^ which represents the colour of that pixel
  • Each colour is given a unique binary code
  • Meta-data stored alongside the image
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain why computers represent data in binary form?

A
  • computers consist of logic gates/switches
    ^ which only have two values: honour off/1 or 0/open or closed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe one advantage and one disadvantage of using lossy compression on the image that will be used on the website.

A
  • The file size is reduced therefore it is quicker to upload/download
  • the quality of image is reduced because there are fewer colours/it is a lower resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the similarities and differences between a switch and a router.

A

Similarities:
- they both connect devices
- They receive data from the devices
- They determine the correct correct destination for the data (e.g. they know where to send it)
- They transmit the data to its destination

Differences:
- A switch uses MAC addresses
- A router uses IPs
- router store the addresses of devices attached
- they both know where to send the data (destination), however, the router knows the most efficient/fastest path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how each of the following can contribute to the performance of a network:
1) wi-fi- frequency
2) Interference
3) Number of concurrent users
4) Type of network traffic

A

1)
- 5GHz frequency can carry more data per second than a 2.4 GHz frequency
- 5GHz frequency has a short range so access may be limited
2)
- Causes errors which means signals need re-transmitting which causes more traffic on the network (slower)
- Objects can block/limit the signal range
3)
- more traffic means the same bandwidth is split - therefore each user has less bandwidth and there is more traffic due to more data being sent
4)
- transmitting large files will take up more bandwidth than text files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how packet switching can be used when sending data!

A
  • Data is split into packets
  • Each packet has a fixed size
  • Each packet has a header ~ that includes the packet number/destination
  • Packets are sent individually
  • Package can be sent in different routes
  • Receiving computer wait for all packets to then put them back in order (by packet number)
    ^ also request for missing packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe how an analogue soundwave is converted into digital form.

A
  • The process begins by the soundwave being sampled (in which the amplitude/height of the wave is measured at SET time intervals.
  • each sample is stored as a binary number
  • The binary number for each sample is stored sequentially.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give benefits of compressing the data before it is emailed.

A
  • reduces file size
  • Takes less time to upload/download/transmit
  • Requires less storage space
  • Uses less bandwidth to transmit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give two disadvantages to the company of storing their data in the Cloud.

A
  • you need a constant Internet connection to access it in which lawyers who travel a lot may not always have.
  • It is reliant on third-party for backup connection
  • Data stored in the cloud will be vulnerable to hacking and other threats
  • Data protection act^^
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give two benefits to the customers of Eve choosing an open source license.

A
  • free of charge
  • they can adapt it/add features/help improve the code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give two benefits to Eve of choosing a proprietary license.

A
  • she can charge customers (earn a profit)
  • She can restrict what uses do (uses can’t edit it)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify some pieces of metadata that is often stored with an image.

A
  • height
  • Width
  • Colour/bit depth
  • Date
  • File size
  • File type
  • Author
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With regards to network protocols, define what is meant by a “layer”?

A
  • A division of network functionality
    (A layer is a sub-part of a more complex task)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe one advantage of using layers to construct network protocols.

A
  • it’s self-contained – It allows different developers to concentrate on one aspect of the network
  • Can be taken out and edited without affecting other layers
17
Q

Identify two events that take place during the fetch-execute cycle.

A

1) An instruction is fetched from memory

2) The instruction is then decoded
(OTHER OPTIONS)

  • The decoded instruction is then executed so that the CPU performs continuously
  • the process is repeated
  • the program counter is incremented
18
Q

Identify a second character set (other than ascii)

A

Unicode

19
Q

Define what is meant by a “network protocol”

A

A set of rules for communication

20
Q

So that someone’s images cannot be copied by other people – identify which legislation can help protect their images!

A

Copyrights and patents act

21
Q

Explain how encryption helps to protect someone’s documents.

A

Uses an algorithm to scramble/mix up the data and make it unreadable/it cannot be understood if accessed without a key to decipher it

22
Q

Explain why the TCP/IP model used layers.

A
  • a layer can be removed/changed without affecting any other layers
  • each layer has its own purpose (self-contained)
  • individual protocols are each smaller/simpler to manage