computing Flashcards
What are the four layers of the TCP/IP stack?
Application, transport, internet/network, link
What is the purpose of the application layer in TCP/IP?
to provide protocols and standards for applications to communicate and access network services
What is the purpose of the transport layer in TCP/IP?
sets up communication between host devices - agree on parameters such as language and packet size
What is the purpose of the internet/network layer in TCP/IP?
addresses packets sent in the transport layer - routes packets across network
What is the purpose of the link layer in TCP/IP?
Facilitates the transmission of data (binary) through physical media across network
What protocols are used with the application layer of TCP/IP?
File Transfer Protocol (FTP), Hypertext Transfer Protocol (Secure) (HTTP/HTTPS)
What protocol is used with the transport layer of TCP/IP?
Transmission Control Protocol (TCP)
What protocol is used with the network/internet layer of TCP/IP?
Internet Protocol (IP)
What protocols are used with the link layer of TCP/IP?
Ethernet, WiFi, Bluetooth
Why are both MAC and IP addresses needed in TCP/IP?
IP addresses are needed for communication between devices on different networks, while MAC addresses are needed for communication across the same network
What is meant by the TCP/IP stack?
The TCP/IP stack is a set of protocols that enables communication between devices on a network, organized into layers, each responsible for a specific aspect of the communication process.
What are some benefits of using ASCII over Unicode?
Simplicity, compatibility with many computer systems and only using 7 bits
What are some benefits of using Unicode over ASCII?
Supports a far wider range of scripts and alphabets
What is a parity bit?
An extra bit added to a group of bits that checks if the number of 1s is even or odd
What is the function of a parity bit?
To detect errors in data and allowing this error to be detected when this data is communicated over a communication channel
What is backtracking?
Incrementally working towards a solution, abandoning partial success when solution can’t be completed and reverting to a previously successful match
What problems are best suited to using backtracking?
Logic problems (e.g. path-finding algorithms)
What is data mining?
The analysis of vast amounts of raw data to find information and trends
What examples of real life use of data mining are there?
Consumer buying habits, stock markets, weather modelling
What are heuristic methods?
Methods that may not find a perfect solution but finds a solution that’s workable
What is the definition of encryption?
The process of encoding a message so that it can only be read by the sender and the intended recipient
How does symmetric encryption work?
A single key is used to encrypt and decrypt the message - both parties need access to the key and need to keep it secret
What are some weaknesses of symmetric encryption?
Can be fairly easily cracked through interception of the key or duplication of the key generation process
How does asymmetric encryption work?
The message is first encrypted by one key, and the once the message is sent it is decrypted by a second key
Why is asymmetric encryption more secure than symmetric encryption?
It is impossible to derive one key from the other
What makes up a key pair in asymmetric encryption?
A public key and a private key
How secure do the keys in a key pair need to be?
The public key can be sent anywhere or published, whilst private keys mustn’t be accessed by anyone else
How are key pairs used in asymmetric encryption?
Public keys are exchanged, the sender uses the recipient’s public key to encrypt the message and then the recipient uses their private key to decrypt it
What is another advantage of asymmetric encryption beyond security?
Messages can be authenticated if first encrypted with private key
What is a combined encryption key?
The combination of your private key and the other person’s public key
Name the benefits of asymmetric encryption
Both parties know the message hasn’t been read by anyone else, the message can be authenticated and the message can’t be modified in transit
What is hashing?
The transformation of a string of characters into a fixed-length value or key that represents the original input string
What is the difference between encryption and hashing?
Hashing is a one-way process - the original data can’t be retrieved from the hashed data even with access to the hashing algorithm
When is hashing useful?
Preventing sensitive data like passwords and PINs from being read by a hacker
Why is hashing secure?
It means data doesn’t have to be sent or stored in plain text - even if intercepted this data is useless to a hacker
What are characteristics of Von Neumann architecture?
Shared memory and buses for instructions and data, linear FDE cycles, instructions completed serially
What are characteristics of Harvard architecture?
Separate memory and buses for instructions and data, reading and writing data can be done at the same time as fetching an instruction
What are advantages of using Von Neumann architecture over Harvard?
Flexibility and easy program modification
What are advantages of using Harvard architecture over Von Neumann?
Faster data access and higher processing speeds
What is the function of the page rank algorithm?
To rank search results based on relevance to the search term and the quality of the web page
How does the page rank algorithm work?
By checking the number of links to a page and the quality of the pages that link to it - assuming more important sites are likely to be linked to more by other sites
When is circuit switching most useful?
When a constant end-to-end link is needed (e.g. live video)
What is circuit switching?
Where a dedicated link of fixed bandwidth is created between the source and the destination
What is the downside of circuit switching?
Lots of potential bandwidth can be wasted, if one part of network fails may go down
What is packet switching?
Data is broken into smaller blocks and sent independently via the route which is least congested
What are the advantages of packet switching?
Maximises bandwidth, needs less complex infrastructure, can easily respond if parts of network fail, is more affordable and efficient compared to circuit switching
What is the downside of packet switching?
Doesn’t guarantee the quality of the transmission
What is the definition of an instruction set?
The set of all instructions written in machine code that can be recognised and executed by a given processing unit/CPU
What is an example of the difference between CISC and RISC in practise?
CISC multiplies 2 numbers in 1 instruction whilst RISC has to add the number to itself the desired number of times
What are the benefits of using CISC over RISC?
More efficient use of RAM, more cycles executed per second, smaller code sizes, less strain on compiler(software)
What are the benefits of using RISC over CISC?
Simpler hardware, supports pipelining, cheaper to produce, leaves more room for general purpose registers and cache, lower energy consumption
What are some key differences between CISC and RISC?
CISC instructions of variable length and can be multiple clock cycles while RISC instructions fixed length and are one cycle each
What is the function of a modem?
To transform digital information from a device into analogue signals that can be transmitted through wires, and vice versa
What is the function of a router?
Responsible for routing data between devices on a small network, or between devices on a network and the internet
What is meant by routing data?
Directing data packets from a source device to a destination device across a network
From most to least, which cables offer the most bandwidth?
Fibre optic, coaxial, twisted pair
From most to least, which cables are the most expensive?
Fibre optic, coaxial, twisted pair
When are twisted pair cables generally used?
Telephone networks, data networks and cable shielding