Computer Structure/Environmental Impact/Security Flashcards
Write the Steps of the fetch execute cycle
1) The processor sets up the address bus with the required address
2) The processor activates the read line on the control bus
3) An instruction is fetched from the memory location using the data bus and stored in the instruction register
4)The instruction in the instruction register is decoded and executed
Identify the missing steps from the fetch execute cycle:
1) The processor sets up the address bus with the required address
2)
3) An instruction is fetched from the memory location using the data bus and stored in the instruction register
4)
2) The processor activates the read line on the control bus
4)The instruction in the instruction register is decoded and executed
Identify the missing steps from the fetch execute cycle:
1) The processor sets up the address bus with the required address
2) The processor activates the read line on the control bus
3)
4)The instruction in the instruction register is decoded and executed
3) An instruction is fetched from the memory location using the data bus and stored in the instruction register
What is the 1st step of the Fetch Execute cycle?
The processor sets up the address bus with the required address
What is the last step of the Fetch Execute cycle?
The instruction in the instruction register is decoded and executed
Describe the Processor?
Does the ‘thinking’ of the computer. Has three parts - the registers, control unit and arithmetic logic unit (ALU)
The Processor has three parts: registers, control unit, and arithmetic logic unit (ALU).
What are Registers?
Small amount of temporary memory inside the processor, holds data and instructions while they are being processed.
Registers are essential for quick data access during processing.
What is the role of the Control Unit?
Decodes and executes instructions. Keeps all of the other parts of the processor in time with its clock.
The Control Unit is crucial for coordinating the operations of the processor.
What does the Arithmetic Logic Unit (ALU) do?
Does all calculations and logic/comparisons.
The ALU is a vital component for performing mathematical and logical operations.
How is Main Memory organized?
Divided into memory locations, each with a unique memory address.
Main memory is directly connected to the processor via address and data buses.
What is the purpose of the Address Bus?
Carries addresses in one direction from processor to main memory.
The Address Bus is essential for locating data in memory.
What does the Data Bus do?
Carries data/instructions in both directions between memory and processor.
The Data Bus facilitates communication between the processor and memory.
What is the function of the Control Bus?
Indicates if processor is reading from or writing to main memory.
The Control Bus ensures proper communication and data transfer protocols.
What is Cache memory?
A small amount of very fast expensive memory on the same chip as the processor.
Cache stores frequently-used data and instructions, improving processing speed.
Fill in the blank: The Processor has three main parts: registers, control unit, and _______.
Arithmetic Logic Unit (ALU).
These components work together to perform computing tasks.
Which part of the processor is responsible for performing calculations.
Arithmetic Logic Unit (ALU).
The Arithmetic Logic Unit (ALU) performs calculations, while the Control Unit manages instruction execution.
Name the 4 factors which can affect a computers performance
1) Number of processors (cores)
2) Width of the data bus
3) Cache memory
4) Clock speed
Describe how cache memory improves performance.
*Cache has faster access time than main memory
* Stores frequently used data/instructions
* Reducing the need to access/fetch execute from main memory
Explain how Clock speed affects the performance of a computer
Clock speed impact number of instructions executed/carried out
per second, faster the clock speed results in more instructions per second being processed.
Explain how the Data bus width affects the performance of a computer
The data bus width impacts the number of bits/data transferred in a single operation. A larger data bus width reduces number of
fetch operations required which speeds up performance
Explain how the number of cores affects the performance of a computer
The number of cores affects how many instructions can be executed concurrently (at the same time), an increase in the number of core increased the number of instruction which can be processed at one time - which increases performance.
Note: Not all instructions will be able to be ran at the same time.
Describe an 2 intelligent systems used on a car journey that is beneficial for the environment. Justify your answer.
Note answer should include feature and justification (any 2 below)
- autonomous driving (1) is more fuel efficient due to system controlling accelerating/decelerating and detecting/anticipating braking (1)
- intelligent route planning (1) reduces driving time by monitoring external factors such as accidents/volume of traffic which reduces fuel consumption (1)
- tracking parking (1) reduces driving time searching for space and therefore fuel consumption (1)
- engine management system (1) optimises engine efficiency reducing fuel consumption (1)
- intelligent road traffic management systems (1) adjusting speed limits to optimise traffic flow reducing fuel consumption (1)
Describe 2 potential ways an intelligent heating system can benefit the environment
Energy consumption can be reduced by using pro-active decision making by software/apps such as;
* automatically switch heating off/on when within temperature range
* monitoring/responding to external weather conditions
* adjust heating based on historical patterns of data
* zoned heating
Describe 2 potential ways an intelligent Traffic control can benefit the environment
Any 2 from the below list - need feature + benefit
*Intelligent systems work to reduce traffic jams because cars that are stationary or stop/starting consume greater amounts of fuel.
*Use sensors, cameras and computer software to maximise traffic flow which reduces fuel consumption
*Navigation systems on cars can be used to detect traffic jams and re-route the driver away from the congestion which reduces the amount of fuel used
Describe 2 potential ways an intelligent Car management systems can benefit the environment
*Start-stop systems detect when the car is not moving and shut down the engine until the driver presses the accelerator or clutch which reduces fuel consumption
*Sensors are used to control the engine’s air/fuel ratio to achieve the optimum fuel consumption and reduce carbon dioxide emissions.
What are the 3 main offences under the computer misuse act 1990
- Unauthorised access to computer material.
*Unauthorised access with intent to commit a further offence.
*Unauthorised modification of programs or data on a computer.
What constitutes unauthorised access with intent to commit a further offence?
Accessing files or data belonging to someone else without permission with illegal intentions
Often referred to as hacking.
List possible reasons for unauthorised access with intent to commit further offences.
- Steal money from a bank account
- Impersonate someone online
- Discover private information about an organisation or an individual
What are some possible methods of unauthorised access?
- Guessing login details by trial and error
- Spyware / keylogging software
- Phishing
What does unauthorised modification of programs or data on a computer relate to?
Hacking and deleting/modifying files or data
This includes creating and knowingly spreading viruses.
What is unauthorised access to computer material.
Accessing files or data belonging to someone else without permission.
What are tracking cookies?
Small data files created when a user accesses a website
What do tracking cookies store?
Details which are then sent back to the cookie’s author
What actions can tracking cookies log?
The actions a user has carried out online
What type of data can tracking cookies track?
Location, device information, purchase history, IP address, and search history
What is one use of tracking cookies?
To gather marketing data or target personalised ads
Where is a cookie stored?
On the client rather than the server
What is a potential risk of tracking cookies?
They can be used for identity theft
Fill in the blank: A _______ is a small data file created when you access a website.
[cookie]
Name a benefits of using tracking cookies
The help websites remember you and your information such as, your logins, shopping carts anduser preferences such as colour schemes, preferred options ect.
What is a Denial of Service attack?
An attempt to prevent legitimate users from accessing an online service by bombarding a server with excessive network messages
What are the symptoms of a Denial of Service attack?
- Slow performance of the website or service
- Inability to access data/resources held on the website or service
What are the effects of a Denial of Service attack?
- Disruption to users
- Disruption to businesses
What are the costs associated with a Denial of Service attack?
- Lost revenue
- Labour cost to fix the fault
What type of faults can occur during a Denial of Service attack?
- Bandwidth consumption
- Resource starvation
- DNS attack
What is meant by bandwidth consumption in the context of DoS attacks?
Using all of the website’s available bandwidth
What is resource starvation in a Denial of Service attack?
An attempt to use enough server resources to make the system unresponsive
Name 2 reasons reasons for launching a Denial of Service attack?
Financial - bringing down a commercial website will cost that company money.
Political - prevent access to the website of a political rival.
Personal - the attacker may have a personal grudge against the owner of the website.
What distinguishes a Denial of Service attack from a Distributed Denial of Service attack?
DDoS attacks come from multiple computers instead of just one
What are the symptoms of DoS attacks?
- Slow performance of servers
- Inability to access resources held on the server
What are the effects of DoS attacks on businesses?
- Genuine users may not access resources
- Businesses may suffer reputational damage
- Customers may choose competitors
What impact does bandwidth consumption have during a DoS attack?
Flood of requests fills the connection limit, preventing other requests from getting through
What is the impact of resource starvation during a DoS attack?
Requests use resources until the server runs out and can no longer function correctly