Computer Systems Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What do computers store all data as?

A

Binary numbers (base 2, 1s and 0s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are integers stored

A

Twos complement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Range of positive integers?

A

2^n‐¹ -1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Range of negative integers

A

-2^n‐¹

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you know if binary is positive or negative?

A

Most significant bit (MSB) 0=POSITIVE 1=NEGATIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are real numbers stored?

A

Using floating point representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mattissa determines what?

A

The accuracy of the number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exponent determines what?

A

The range of the number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Increasing the number of bits for the Mantissa and decreasing the number of bits for the exponent does what?

A

Increases accuracy but decreases range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unicode advantages?

A

Represents a large variety of languages including emojis UTF-16 HAS 65 536 characters UTF-32 HAS over 4 mill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unicode disadvantage?

A

Takes up double the storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bitmap advantages

A
  1. Able to edit at pixel level
  2. Realistic images
  3. Same appearance in all systems regardless of hardware or software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bitmap disadvantage?

A
  1. Scaling causes pixelization
  2. Only the image can be edited.
  3. Difficult to convert to vector formats.
  4. File sizes can be large.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vector graphic advantages

A
  1. Individual objects can be easily edited
  2. Smaller files
  3. Can be scaled to large sizes, keeping quality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vector graphic disadvantages?

A
  1. Unable to edit on pixel level
  2. Unrealistic images
  3. Resolution dependent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bit depth

A

Number of bits used to store each pixel in a image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fetch execute cycle

A
  1. The processor sets up the address bus with the required address.
  2. The processor activates the read line on the control bus.
  3. An instruction is fetched from the memory location by the data bus and is stored in the Instruction register.
  4. The instruction in the instruction register is interpreted by the processor, decoded and carried out.
18
Q

Number of cores

A

More cores the more instructions the processor can process

19
Q

Width of the data bus

A

By increasing the data bus from 32 to 64 wires the computer can transfer twice as much info at one time

20
Q

Cache Memory

A

Small fast accessible memory. the processor checks the cache before the main memory for data or instructions

21
Q

Clock speed

A

Clock pulses are used to trigger components to take their next step. The higher clock speed, the faster the computer completes a set of instructions. but at the cost of increased power consumption and overheating

22
Q

Heating system

A

Knows when the house is empty so turns off heating, checks weather forecast.
zoning GPS data
reduces co2

23
Q

traffic control

A

transport emits 25% of co2 emissions.
Adaptive traffic signals
intelligent routing systems

24
Q

Car management

A

Start/stop system
Air to fuel ratio

25
Q

Computer Missuse Act 1990

A

Unauthorised access to computer material6 months
unauthorised access with intent to commit or facilitate a crime 5yr
unauthorised modification of computer material 5yr

26
Q

Tracking Cookies

A

A tracking cookie is a small data file created when you access a website. Tracks web browsing data about you so it can target ads at you. Can pose a risk as the TC can be sell your account details and data to a 3rd party company

27
Q

DOS symptoms

A

inability to access or slow performance

28
Q

DOS effect

A
29
Q

DOS COST AND REASON

A
30
Q

DOS TYPE

A
31
Q

Bandwidth consumption

A

Bandwidth consumption is when a flood of requests fills the connection up to its limit so no other requests can get through. The effect only lasts as long as the attack is maintained.

32
Q

Resource starvation

A

is when the requests take up a few other resources, like disk space until the server runs out and is no longer able to function correctly

33
Q

DNS Dmain name service

A

These attack the servers that route internet traffic so it can impact multiple websites. It also can lead to congestion and consumption of bandwidth.

34
Q

Encryption key

A
35
Q

Public key

A
36
Q

PRibate key

A
37
Q

Sym

A

An encryption method in which the same key is used to encrypt and decrypt a message

38
Q

DIgital cert

A

A digital version of passport that confirms the identity of a person or organisation. This allows individuals and companies to feel secure in exchanging information as they can confirm each other’s identities.

39
Q

Digital signature

A

Is an electronic siganture that is used to validate the identity of the person sending a message or the integrity of a document

40
Q

digi sig

A

A digital signature is a method of ensuring that a message is authentic (unaltered).

You obtain a message hash (A mathematical summary of the contents of the message).
You can encrypt this message hash (this time with the private key as this has to be private - hence the private key).
This ‘signature’ is attached to a message.