Computer Systems Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What happens in the fetch-execute cycle?

A

The instruction is fetched from the main memory into the CPU and is then executed by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which are the four steps of the fetch-execute cycle?

A
  1. The processor sets up the address bus with the required address.
  2. The processor activates the read line on the control bus.
  3. An instruction is fetched from the memory location using the data bus and stored in the instruction register.
  4. The instruction in the instruction register is then interpreted by the decoder and carried out.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which are the four factors affecting system performance?

A

Number of processors (cores)
Width of data bus
Cache memory
Clock speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the number of processors (cores) affect system performance?

A

The more cores the CPU has, the more CPU’s are found on one chip.
The more cores, the more sets of instructions the processor can receive and process at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the width of the data bus affect system performance?

A

The wider the data bus, the more parallel wires it has available to send data.
The more wires, the more data can be passed at the same time.
For example, between 32 bits and 64 bits, the amount of data that can be transferred is doubled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the cache memory affect system performance?

A

The processor checks cache memory for data or instructions first before accessing main memory.
If the data/instruction is found then it can be accessed quicker as the processor would not have to check the main memory for it.
Many computers have multi-level caches in which case the computer checks level 1 first, which is the fastest cache, followed by level 2, etc.. The less levels the processor has to check for the data the faster the data is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does clock speed affect system performance?

A

Clock pulses are what trigger components to take their next step.
The higher the clock rate, the faster the components move on to the next step so the faster a computer may complete a set of instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you change a decimal number to its floating point representation?

A

Step 1: Move the decimal to the front of the number (i.e. just in front of the first 1)
Step 2: Multiply the new number by 2 to the power of the exponent
Step 3: The exponent is the number of places you have moved the decimal point to bring it to its new position. If you moved the decimal point to the left, the exponent is positive, if you moved the decimal point to the right, the exponent is negative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you write the floating point representation correctly?

A

Step 1: Is the whole number negative? If there is a “-“ it is negative. In this case the sign bit is 1. If there is no “-“ then the number is positive and the sign bit is 0.

Step 2: Write the mantissa, the whole part of the number, in the mantissa section. Remember if you were allocated 16 bits, for example, you need to deduct 1 space as that was taken up by the sign bit. If the number is too large remove digits from the right hand side, if the number is too small add 0’s to the right hand side.

Step 3: Store the exponent using two’s complement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the floating point representation of 1000010.101?

A

-0.1000010101 x 2 ^ 0111

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the floating point representation of -101.00011?

A

-0.10100011 x 2 ^ 011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the floating point representation of 0.0010101?

A

0.10101 x 2 ^ 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the floating point representation of -0.00001101?

A

-0.1101 x 2 ^ 1100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you store a number as two’s complement?

A

Remember the first bit (MSB - most significant bit) is negative.
Change the positive version of the number to binary, if it is not already, making sure the first digit is a 0.
Change all 0s to 1s and all 1s to 0s.
Add 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many bits does Unicode use to represent characters?

A

16 or more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many different characters can Unicode store?

A

2^16 or 65,536 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How are bit-mapped images stored on a computer device?

A

They paint the picture by changing the colour of the pixels which make up the screen display.
They store the colour of each pixel in the image using a fixed number of bits, which can range between 1 and 24 bits.

18
Q

What are the advantages of bit-mapped graphics (versus vector graphics)?

A
  • It can represent more colours than vector graphics (up to 16, 777, 216) which means it can represent more realistic images such as photographs.
  • You zoom in on the image to edit individual pixels.
  • Adding detail to the image will not change the file size as you are only changing the colours of the pixels.
19
Q

What are the disadvantages of bit-mapped graphics (versus vector graphics)?

A
  • Overlapping images will override each other so that only the top image is saved.
  • Larger file size than vector as all bits are stored even if it is blank.
  • Resolution is dependent on the screen you are using. As a result, if zoomed in or scaled up the image can become pixelated and/or blurry, losing quality.
20
Q

How are vector graphics stored on a computer device?

A

Vector graphics draw objects on the screen. These objects produced by a vector graphics package have their descriptions stored as a file of data called object attributes. These attributes are used by the computer to create the graphic using a mathematical equation.

21
Q

What are the advantages of vector graphics (versus bit-mapped graphics)?

A
  • Smaller file size as only the information about the objects is stored.
  • Resolution independent, so scaling or zooming in on the image will not lose quality as it is redrawn.
  • Overlapping images do not override each other, the information for all objects is still stored, making it easier to edit individual objects.
  • Objects can be moved around easily.
22
Q

What are the disadvantages of vector graphics (versus bit-mapped graphics)?

A
  • Colours are less realistic so images often have a cartoon feel to them.
  • Adding objects to the image will increase the file size as you need to store information about extra objects.
23
Q

Define tracking cookies.

A

Text files that store information about your browsing habits such as usernames, passwords, time spent on a web page, media that you have viewed, etc.

24
Q

What are the security risks of tracking cookies?

A

Tracking cookies can be used by companies to send (sell) as much data about you to a third party as they can and these details can then be used for identity theft.

25
Q

What is DoS?

A

Denial of Service Attack.

26
Q

What are the symptoms of DoS attacks?

A
  • Slow performance
  • Inability to access the website
27
Q

What are the effects of DoS attacks?

A

Disruption to users and businesses

28
Q

What are the costs of DoS attacks?

A
  • Lost revenue
  • Labour in rectifying fault
29
Q

What types of faults can DoS attacks result in?

A
  • Bandwidth consumption
  • Resource starvation
  • Domain Name Service (DNS)
30
Q

What could the reasons for a DoS attack be?

A
  • Financial
  • Political
  • Personal
31
Q

What is encryption?

A

Encryption is the act of encoding (making unreadable) readable data into encoded (unreadable) data that cannot be read.

32
Q

How is data decoded?

A

Data can be decoded (made readable) by using a specific unique key.

33
Q

Describe public-key encryption.

A
  • Everyone has a public key
  • Each individual has a private key which is kept secret
  • Data is encrypted using sender’s private key to prove the sender
  • Data is then encrypted again using the receiver’s public key
  • When received, the data is decrypted by the receiver’s private key
  • Data is then decrypted using the sender’s public key
34
Q

What is a digital signature?

A

It is created using private keys to prove that the data was sent by a particular person.

It ensures that a message, software or digital document is valid and has not been tampered with.

35
Q

What is a digital certificate?

A

It verifies that data is being sent securely. They include the identity of the sender and information that identifies the issuing authority.

36
Q

What is a criminal offence according to the Computer Misuse Act of 1990?

A
  • To gain unauthorised access to computer material
  • To gain unauthorised access with intent to commit or facilitate commission of further offences
  • To carry out unauthorised acts with intent to impair the operation of a computer or causing or creating risk of serious damage or making, supplying or obtaining articles for use in the commission of these offences.
37
Q

What are the implications of the Computer Misuse Act of 1990 for individuals?

A
  • Passwords that are difficult for others to guess
  • Biometrics as an alternative use to passwords
  • Anti-virus software
  • Firewalls
  • Web proxies
38
Q

What are the implications of the Computer Misuse Act of 1990 for businesses?

A
  • Risk of the computer system being put out of action resulting in a loss of income for the company until repairs have been carried out.
  • Cost of repairing the computer system, restoring the data and improving the security of the system to reduce the change of unauthorised access in the future.
  • Losing customers to alternative businesses or suppliers whose computer systems are unaffected by hacking.
  • Losing trade secrets which may be of value to a competitor’s business.
  • Customers being put at risk if their personal details (including passwords) are revealed.
39
Q

How can smart heating systems be used for a better environmental impact?

A
  • Using activity sensors, some smart systems learn the temperatures that you prefer in certain rooms and at what times.
  • Monitoring the activity in rooms can mean that the smart system adjusts the heating up or down depending on whether there is unusual activity in the house.
  • The thermostat is connected to wi-fi and can be manually controlled by using an app on your phone. This allows you to turn the heating on/off so that it is at the optimum temperature when you arrive home.
40
Q

How can traffic control be used for a better environmental impact?

A

Intelligent transport systems use software, hardware and communications technology, to try to keep traffic moving, reducing the amount of harmful emissions. This is done by guiding drivers away from traffic congestions to more free-flowing routes.

41
Q

How can car management systems be used for a better environmental impact?

A
  • Start/stop systems automatically shut down the engine when the car is not moving to reduce the amount of time the engine spends idling.
  • Engine control units use sensors to ensure the engine’s air/fuel ratio can be controlled very accurately, ensuring optimum fuel consumption and reduction of carbon dioxide emissions.