Compt Sc Flashcards

1
Q

Von Neumann Bottleneck

A

CPU is a lot faster than data/instruction transfer between it and RAM, so a lot of time is wasted by CPU just waiting for data/instructions to arrive after processing.
Effect minimised by Harvard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Unit

A

Manages communication between other PC components
Manages the FDE cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arithmetic Logic Unit

A

Performs arithmetic and logical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Registers

A

Store temporary data while instructions are executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cache

A

Store frequently used instructions or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Buses

A

Transfer control signals, data or addresses between components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Serial Access

A

Data is accessed/stored in chronological order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sequential Access

A

Data is accessed/stored in some order (alphabetical, ascending…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Indexed Sequential Access

A

Records have indexes associated with them in a table, which point to their location in memory where the fields are stored sequentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Random/Hash Access

A

A hashing algorithm output for a given record/field is the address in memory where it is stored.

  • Calculation done on data in [KEY FIELD]
  • Collision are two same memory addresses calculated by alg. for diff. data.
  • Overflow areas/serial files are needed
  • May be too slow
  • Re-hashing needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sequential

A

Master file is copied field-by-field into a new file while the transaction file’s changes are appended into the new file in sequence.

Output is two master files, one backup, one new

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Direct Access

A

Transaction file is appended onto the end of the master file.

Recommended to make a backup of the old master fiel beforehand for a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backups

A

A redundant copy of recent data made frequently.

Important to make periodic backups in case data is lost and relatively recent data can be used instead.

Can be generational (grandfather-father-son, three separate backups are made periodically.) and full, differential or incremental (whole, difference from last whole, difference from last). Exists in case one is corrupted.

Can be made on magnetic tape, cloud storage. On-site or off-site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Archiving

A

Archival data, such as old software systems or out-of-data, is stored in case it becomes useful in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Procedural Programming

A

Step-by-step instructions followed.
Algorithm carries out calculations or other actions.
Each step is controlled tightly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mark-Up Programming

A

Defines the structure and formatting of text files when viewed for presentation.
HTML (used in tandem with JavaScript to create dynamic sites)
Tags used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Feasibility Study

A

Investigation made on a project before anything else to find whether it is feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Feasibility Study - Technical

A

Are enough resources available?
Are developers skilled enough?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Feasibility Study - Economical

A

Does the project fall within budget?
Will a profit be made?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Feasibility Study - Political

A

Is the project controversial?
Would integrity be compromised?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Feasibility Study - Legal

A

Does the project comply with legistlation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Feasibility Study - Operational

A

Will the project solve the problem?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Feasibility Study - Scheduling

A

Can the project be done within a reasonable time?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Design Analysis - Investigation and Analysis techniques

A

Reading documentation - Find current data flow and data structure layout

Questionnaire/Interview - Find out improvements or properties of the system from the stakeholders. (Questionnaire if distributed over large area, interview if specific people w/ lot of info)

Observing - Find out how the current system is being used by the stakeholders directly. they may not be entirely honest.

Research - Desktop searching for similar systems in order to discover inputs/outputs, data structures used, data flow, processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Design Analysis - Design

A

Input/Output
Data Structures & Methods of Access
Processing Methods (algortihms used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Design Analysis - Testing

A

Unit - Each unit of the software is tested individually to evaluate valid inputs and outputs.

Integration - Units are connected and their interaction is tested.

System - The software system as a whole is tested. Includes Alpha and Beta (end-user) testing.

Acceptance - The system is evaluated for its compliance with the user’s requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Design Analysis - Testing test data

A

Typical, extreme, erroneous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Design Analysis - Changeover

A

Direct - The old system is immediately exchanged for the new.

Parallel - The old and new systems are run in tandem until the organisation is confident to remove the old one.

Pilot - The new system is introduced in only one branch and is rolled out everywhere later.

Phased - Parts of the new system replace the old over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Design Analysis - Maintenance

A

Perfective - New features are added or performance is improved.

Adaptive - Changes made to suit new user requirements.

Corrective - Error patching and bugfixing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Design Analysis - Documentation

A

User - Instructions on how to use the system for the users.

Maintenance - Details on the workings of the software system for IT staff, including variable lists, algorithms, inputs and outputs, data flow, data structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Contingency Plans

A

Before - Risk analysis and staff training
During - Staff response, contingency plan carried out
After - Backups retrieved and new hardware/software issued, recovery measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Utility Software

A

Antivirus
Backups
Compression
Defragmentation
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Resource management

A

Storage Devices (FAT & NTFS)
Input and output (devices)
Main memory (virtual memory)
Processing (seamless)
Misc. Hardware (drivers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

FAT & NTFS

A

File Allocation Table - Uses a linked list data structure to store data on a hard drive. Better for non-windows systems.

New Technology File System - Faster as it uses more complex data structures.

35
Q

Off-the-shelf software

A

Cheaper
Available immediately
Low risk of not being functional
Community support

36
Q

Bespoke software

A

Tailored to your needs
Flexible
Competitive advantage
Not tied to a vendor

37
Q

Economic Impacts

A

Saving paper
Communication cost cuts
More efficient
More accuracy and precision

38
Q

Ethical/Moral Impacts

A

Invasion of privacy
Data misuse
Copyright breach
Inappropriate content

39
Q

Cultural Impacts

A

More access to information
World-wide communication
Digital divide

40
Q

GDPR

A

General Data Protection Regulation

In relation to data, indivduals have the right to:
Relevant and adequate [1]
Accurate and up-to-date. [1]
Stored for no longer than necessary, [1]
Individual can check if being held securely. [2]
Processed under legistlation, [1]
As well as with limited function. [1]

41
Q

CMA

A

Computer Misuse Act

Makes it illegal to:
1. Unauthorised access to a computer
2. Unauthorised access to a computer with intent to facilitate crime
3. Unauthorised access to a computer with intent to cause damage

42
Q

FIA

A

Freedom of Information Act

Makes it possible to:
- Authorities must release information about certain activities to the public
- The public is entitled to request information from the authorities

43
Q

RIPA

A

Regulation of Investigatory Powers Act

Makes it legal for organisations to obtain the right to survey and collect digital communications. Police and defense services.

44
Q

CDPA

A

Copyright, Designs and Patents Act

In relation to software, art, books, films, music etc, makes it illegal to:
Make copies
Distribute copies (sell/publish)

45
Q

Field

A

An attribute of an entity

46
Q

Record

A

An iteration of an entity

47
Q

Primary Keyfield

A

Unique identification field of each record

48
Q

Flat File

A

Data that isn’t organised and has no relationships. Introduces data redundancy and inconsistency.

49
Q

Relational Database

A

Data that is organised and has relationships between entities. This reduces data redundancy and data inconsistency.

50
Q

Entity

A

A model of a real-life concept (abstract or physical).

51
Q

Procedural

A

Is sequential
Uses iteration and selection
Executes instructions in the order they are written
Algorithms are written using it

52
Q

Declarative

A

User defines a set of rules (facts and relationships between them).
User poses a task and program decides if the task can be completed and how.
Wolfram

53
Q

Mark-Up

A

Defines the way text is interpreted by a browser.
Describes the visual formatting of the text using tags.
HTML in tandem with JavaScript

54
Q

Visual

A

Allows user to drag-drop simple functions.
Learning tool, but unhelpful for advanced problems.

55
Q

Event-Driven

A

Program sits in a ‘program loop’, waiting for user input.
Once user input is detected the program will activate a function.
Used for GUIs/games.

56
Q

Object-Oriented

A

Non-linear programming that uses classes, templates of real things.
An object of a class creates an instance (the variable that stores all the data about the object in memory)
A class can have attributes and methods to describe it.
Used for data analysis/machine learning

57
Q

OOPs - Concepts

A

Encapsulation -
Idea that data is grouped into classes rather than allowing it to stand individually. This improves flexibility and functionality.

Inheritance -
Some classes may be grouped together as ‘parent’ and ‘child’ classes. Child classes share the attributes and methods of the parent class. This reduces redundancy of code.

58
Q

Internet

A

World-wide communications infrastructure.

59
Q

IMAP

A

Instant Message Access Protocol

Allows users to view email messages from any device, accessing a server with their messages.

60
Q

SMTP

A

Simple Message Transfer Protocol

Allows users to send email messages to another server over a network.

61
Q

HTTP/S

A

Hyper-Text Transfer Protocol / Secure

Allows users to view websites and transfer information over a network.

62
Q

FTP

A

File Transfer Protocol

Allows users to download/upload files of data over a network.

63
Q

TCP/IP

A

Transfer Control Protocol / Internet Protocol

Sets up a connection between two devices over a web of networks (TCP)
Assigns a sender and destination address to packets. (IP)

64
Q

UDP

A

User Datagram Protocol

Sets up a faster connection between two devices over a web of networks with no error checking (packets can be lost).

65
Q

VOIP

A

Voice Over Internet Protocol

Allows users to make audio calls over networks.

66
Q

DHCP

A

Dynamic Host Configuration Protocol

Dynamically assigns IP addresses to devices on a network.

67
Q

SSL

A

Secure Socket Layer

Adds an extra layer of security and authentication to internet communications.

68
Q

TCP/IP 5 Layer Stack

A

Application - Provides the interface between the network and software the user is using, i.e allows software to send and receive data which it can then meaningfully present to the user. (HTTP/S, FTP, SMTP)

Transport - Divides data into suitable packets and sets up a reliable connection between two devices. (TCP, UDP)

Network - Assigns sender and destination addresses to packets and manages flow control. (IP)

Data-Link - Converts packets into frames and relays them from the network layer to the physical layer.

Physical - Manages a reliable physical connection between the two devices over a suitable medium like cables, fiber optics, radio waves etc. (Ethernet, WiFi)

69
Q

Packet Contents

A

Header:
Source and destination addresses
Packet sequence number
Total packet number
Protocol
Checksum

Payload:
The actual data

70
Q

Masking

A

Masking determines the value of a bit at a specific location. (clearing, setting, inverting)

71
Q

Serial & Parallel Transmission

A

Serial, transmits data one bit at a time through a single connection. USB, allows for further distance transmission & cheaper, but is slower.

Parallel, transmits data a whole number of bytes at a time (8bits,16bits…) as devices are connected by numerous serial connections. VGA, is faster, but has issues like crosstalk and skew at high bitrates.

72
Q

Compilation Process

A

Lexical Analysis - Whitespace and comments are removed from the code.
Symbol Table - Variables, constants and identifiers are replaced with tokens. Metadata about them (data types, variable scope) is organised into a table.
Syntax Analysis - Tokens are checked for proper grammar and spelling as determined by language standards. If errors are found, a suitable message is produced.
Semantic Analysis - Variables are checked for proper declaration, data type and operations.
Code generation - High level language is converted to machine code.
Optimisation - Remove redundant code to make compiled program more efficient.

73
Q

Compression Techniques

A

Compression is used to decrease the storage size of files.

Lossy:
Lossy compression causes some permanent data loss/decompression doesn’t return original file.
So not a viable choice for text files.
Used for video and audio (MP3 & JPEG)
Threshold truncation - A level is chosen beyond which data is truncated (removed), for example removing frequencies humans can’t hear in audio.

Lossless:
Decompression returns original file. (PNG)
Run-Length encoding - Repeated sequences of bits are stored as the bit times the number it is repeated by. (0000 = 0x4)

Dictionary encoding - Frequently used sequences of bits are stored in a dictionary file along with a key which is referenced on every use of its associated bit pattern.

74
Q

IDEs - Writing

A

Editor
Statement completion
Syntax highlighting
Syntax checking
Automatic formatting
Optimisation
Linker
Loader

75
Q

IDEs - Debugging

A

Debugging - Shows the exact line where an error is detected
Interpreter - Translates code into machine code line by line.
Compiler - Translated code into an executable file.
Break points - User can choose specific points at which to pause the program.
Stepping - Skip to a certain section of the code.
Variable watch - Allows user to view the current value of a variable.
Trace - Logs how the values of variables change as the program runs.
Emulator - Provides users with ability to test programs in different environments (OSs).
Memory inspector - Shows a section of RAM and details on how the program uses it.

76
Q

Software System Uses

A

Weather forecasting - Take in lot of input from orbital satellites, Process a lot fo data, Analyse data and produce useful outputs (numerical data, visual data like heatmaps.), Function in real time.

Robotics - Interpret stimuli accurately, perform a series of tasks repetitively, move/rotate in necessary directions, use energy conservatively.

CAD - Greater accuracy and precision in drawing blueprints, 2D and 3D modelling possible, can be viewed from any angle, pre-made libraries of models available.

CGI - Simulate physics, provide user with creative tools, high-quality rendering of scenes, 2D & 3D animation.

77
Q

Multiplexing

A

Parallel transmissions can be ‘muxed’ together into one serial transmission to give it all the advantages of serial data transport. This can be done via Frequency-Division Multiplexing. It is then ‘demuxed’ into parallel connections again.

78
Q

CD Burning

A

CDs and DVDs encode data using a laser which burns indents.
The absence of a laser burn results in lands.
Burnt in a spiral pattern starting from the middle.

79
Q

Packet & Circuit Switching

A

Circuit switching: A constant connection is estabilished between the two devices over which they exchange data. If it is interrupted, the connection disconnects and the two devices must connect via a different path. When there is an active circuit connection, no other data can be transmitted through it,

Packet switching: Dynamic path is estabilished over which data is sent in packets which are reassembled at their destination. Packets are difficult to intercept and interpret.

80
Q

Data Representation

A

Integer - Short, 16 bits / Long, 32 bits
Real - Single Precision, 32 bits / Double Precision, 64 bits
Boolean - 1 bit
Character - Depends on the character set (7 or 8, 16 or 31)
String - Depends on the character set x length

81
Q

Integer Vs Floating Point

A

Integer
Allows for exact representation of 0.
Less storage space
Faster processing

Flt Point
Larger range
More precision
Can store whole and real numbers

82
Q

OS Modes of Operation

A

Batch Processing - Allows for processing of repetitive operations without user interaction. Performs during off-hours, stores errors for later and doesn’t pause.

Real-Time Control - Allows for near-instantaneous control of functions. Used for critical operations like nuclear power plant controls or plane ticket reservations.

Real-Time Transmission - Allows for near-instantaneous communication between users. Live-chat on apps like Whatsapp.

83
Q

Expert Systems

A

Knowledge base
Rule base
Inference engine
User interface