Computer science terms Flashcards

1
Q

Legacy system

A

A system that is outdated and no longer updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bits vs Bytes

A

One byte is equal to eight bits
A bit can either be a 0 or 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Design cycle

A

1.empathize
2.define
3.ideate
4.prototype
5.test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accessibility

A

the practice of making your websites usable by as many people as possible (disabilities usually)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Usability

A

a quality attribute that assesses how easy user interfaces are to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implementation approaches

A

Pilot
Direct
Parallel
Phased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data migration challenges

A

Incompatible file formats
Data structure differences
Validation rules
Incomplete data transfers
International convention on dates, currencies & character sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Black box vs White box testing

A

Black box testing is when you don’t know anything about design. White box testing is when you know about the internal design and analyze it while testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User documentation

A

Manuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Change management

A

a systematic approach to dealing with the transition or transformation of an organization’s goals, processes or technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Causes of data loss

A

Human error
Hackers
Natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Failover system

A

the ability to switch automatically and seamlessly to a reliable backup system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data loss prevention plans

A

Failover system
Redundancy: having data in two locations, redundant because you have it twice
Removable media: CDs, USB, tapes, etc
Offsite/online storage: External location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User acceptance testing

A

a phase of software development in which the software is tested in the “real world” by the intended audience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer storage options

A

Primary memory is the computer’s main memory and stores data temporarily. Secondary memory is external memory and saves data permanently. Data stored in primary memory can be directly accessed by the CPU, which cannot be accessed in secondary memory.

17
Q

RAM

A

Random Access Memory
type of memory that can be accessed randomly (any byte of memory can be accessed without touching the preceding bytes).
Found in servers, PCs and other devices.
Volatile : all data is lost when device is turned off.

18
Q

CPU & functions of the arithmetic logic unit

A

The ALU performs simple addition, subtraction, multiplication, division, and logic operations, such as OR and AND. The memory stores the program’s instructions and data.

19
Q

The CPU and its elements

A

The control unit (CU) responsible for the operation of the CPU. It controls the retrieval of instructions from the primary memory as well as the sequence of their execution. It does the fetching of data and instructions in the fetch-decode-execute cycle.

The arithmetic logic unit (ALU)
performs all the basic arithmetic, logical or input/output operations. The CU is responsible for providing the ALU with the data that needs to be processed as well as the instructions of how the data should be processed.
The primary memory used as storage contains two types of memory - the random access memory (RAM) and the read-only memory (ROM).
The basic registers in the CPU are the memory address register (MAR) and the memory data register (MDR).

The memory address register (MAR) holds the address of the data (address - the specific location in the RAM) to be used by the ALU, so that the ALU can fetch the corresponding content from the memory and process it accordingly.

The memory data register (MDR) holds the data that is to be used by the ALU and then saved to the RAM. The MAR tells us the location and the MDR finds/fetches the data. That data/connection is done using the Data Bus.

20
Q

SAN vs NAS

A

NAS is a single storage device that serves files over Ethernet and is relatively inexpensive and easy to set up.
SAN is a tightly coupled network of multiple devices that is more expensive and complex to set up and manage

21
Q

CPU Cache memory

A

Cache is the temporary memory, it is a chip based feature of your computer that lets you access some information more quickly than if you access it from your computer’s main hard drive.

22
Q

Identify the relevant stakeholders when planning a new system

A

Stakeholder: a person, group or organization that has interest or concern in an organization.
Internal stakeholders: Employees, Manager, Owners
External stakeholders: Suppliers, Society, Government, Creditors, shareholders, customers

23
Q

Describe methods of obtaining requirements from stakeholders

A

Surveys
Interviews
Direct observation
Collecting documents

24
Q

Fiber optics

A

Fiber optics, or optical fiber, refers to the technology that transmits information as light pulses along a glass or plastic fiber. Fiber optics transmit data in the form of light particles – or photons – that pulse through a fiber optic cable. The glass fiber core and the cladding each have a different refractive index that bends incoming light at a certain angle.

25
Q

Fetch-Execute cycle

A

AKA Machine cycle
1. The CPU fetches the instructions one at a time from the main memory into the registers. One register is the program counter (pc).
2. The CPU decodes the instruction.
3. The CPU executes the instruction.
4. Repeat until there are no more instructions.

26
Q

WEP

A

WEP: Wired equivalent privacy, oldest and most common Wi-Fi security protocol.

27
Q

VPN

A

Virtual private network, establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity.

28
Q

Network topologies diagram

A
29
Q

Lossless vs lossy compression

A

Lossless: You can revert to the original format (PNG, GIF)
Lossy: You are unable to revert to the original format (JPEG, PDF)

30
Q

OSI Model

A

7 - Application layer: Human- computer interaction layer, where applications can access the network services
6 - Presentation layer: Ensures that data is in a usable format and is where data encryption occurs
5 - Session layer: Maintains connections and is responsible for controlling ports and sessions
4 - Transport layer : Transmits data using transmission protocols including TCP and UDP
3 - Network layer : Decides which physical path the data will take
2 - Data Link layer: Defines the format of data on the network
1 - Physical layer: Transmits raw bit stream over the physical medium

31
Q

Protocol, data packet

A

Protocol: A protocol defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event
Data Packet: a unit of data made into a single package that travels along a given network path

32
Q

WPA

A

Wi-Fi protected access is a security standard for computing devices equipped with wireless internet connections. It provides more sophisticated data encryption and better user authentication than WEP.

33
Q

WPA2

A

2nd generation of WPA wireless security protocol. Secures and protects Wi-Fi networks just like its predecessor

34
Q

WPA3

A

The third iteration of a security certification program developed by the Wi-Fi alliance. It’s the updated implementation of WPA2

35
Q

WPS

A

Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network

36
Q

ROM

A

Read Only Memory
Computer memory on which data has been pre-recorded.
Once data has been written onto a ROM chip, it cannot be removed and can only be read.
Non-volatile : data is kept even when the device is turned off.
Used extensively in calculators and peripheral devices such as laser printers, whose fonts are often stored in ROMs.