Computer Systems Flashcards

1
Q

ASCII number of characters calculation

A

2 ^ 7 = 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Extended ASCII number of characters calculation

A

2 ^ 8 = 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unicode number of characters calculation

A

2 ^ 16 65536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two’s complement range formula

A

-2ⁿ⁻¹ to 2ⁿ⁻¹ -1, where n is the number of bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer structure

A

Arithmetic Logic Unit (ALU)
Control Unit (CU)
Internal Clock
Registers
Data Bus
Address Bus
Control Bus
Main Memory (RAM)
Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

bitmap graphics

A

edited at pixel level
more storage than vector graphics
good for photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

vector graphics

A

edited based on shapes and values
shape info is stored instead of individual pixels (stores data like length and colour)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

system performane

A

number of processors
width of data bus
cache size
clock speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

environmental impact

A

heating systems
traffic control
car management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

computer misuse act

A

unauthorised access
modifying material without permission
deliberate introduction of a virus
Using Unauthorised Access or modification of computer systems to facilitate further criminal offences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

tracking cookies

A

can pose a security risk if hackers get access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DoS/DDoS

A

DoS is when a single computer causes an attack
DDoS is when multiple computers/bots cause an attack

causes reduced system function
can cause loss of revenue and can be costly to fix
can be motivated by financial, personal, or political reasons
types: resource starvation, bandwidth consumption, DNS (denial of service) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A

symmetric key, asymmetric/public key
symmetric: keys are the same, risk of someone getting the key and decrypting private info.
asymmetric: public key and private key, both keys are linked via large prime numbers, can only be decrypted with both keys, private key is kept secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fetch execute cycle

A
  1. Processor sets up address bus with the relevant address
  2. The control unit read line is activated
  3. An instruction is fetched from the memory location using the data bus and is stored in the instruction register
  4. The instruction is then interpreted by the decoder and carried out

address, read line, instruction, interpreted and carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly