computing Flashcards

1
Q

What are the four layers of the TCP/IP stack?

A

Application, transport, internet/network, link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the application layer in TCP/IP?

A

to provide protocols and standards for applications to communicate and access network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the transport layer in TCP/IP?

A

sets up communication between host devices - agree on parameters such as language and packet size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the internet/network layer in TCP/IP?

A

addresses packets sent in the transport layer - routes packets across network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the link layer in TCP/IP?

A

Facilitates the transmission of data (binary) through physical media across network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocols are used with the application layer of TCP/IP?

A

File Transfer Protocol (FTP), Hypertext Transfer Protocol (Secure) (HTTP/HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol is used with the transport layer of TCP/IP?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocol is used with the network/internet layer of TCP/IP?

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protocols are used with the link layer of TCP/IP?

A

Ethernet, WiFi, Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are both MAC and IP addresses needed in TCP/IP?

A

IP addresses are needed for communication between devices on different networks, while MAC addresses are needed for communication across the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by the TCP/IP stack?

A

The TCP/IP stack is a set of protocols that enables communication between devices on a network, organized into layers, each responsible for a specific aspect of the communication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some benefits of using ASCII over Unicode?

A

Simplicity, compatibility with many computer systems and only using 7 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some benefits of using Unicode over ASCII?

A

Supports a far wider range of scripts and alphabets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a parity bit?

A

An extra bit added to a group of bits that checks if the number of 1s is even or odd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of a parity bit?

A

To detect errors in data and allowing this error to be detected when this data is communicated over a communication channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is backtracking?

A

Incrementally working towards a solution, abandoning partial success when solution can’t be completed and reverting to a previously successful match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What problems are best suited to using backtracking?

A

Logic problems (e.g. path-finding algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is data mining?

A

The analysis of vast amounts of raw data to find information and trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What examples of real life use of data mining are there?

A

Consumer buying habits, stock markets, weather modelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are heuristic methods?

A

Methods that may not find a perfect solution but finds a solution that’s workable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the definition of encryption?

A

The process of encoding a message so that it can only be read by the sender and the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does symmetric encryption work?

A

A single key is used to encrypt and decrypt the message - both parties need access to the key and need to keep it secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some weaknesses of symmetric encryption?

A

Can be fairly easily cracked through interception of the key or duplication of the key generation process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does asymmetric encryption work?

A

The message is first encrypted by one key, and the once the message is sent it is decrypted by a second key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is asymmetric encryption more secure than symmetric encryption?

A

It is impossible to derive one key from the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What makes up a key pair in asymmetric encryption?

A

A public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How secure do the keys in a key pair need to be?

A

The public key can be sent anywhere or published, whilst private keys mustn’t be accessed by anyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How are key pairs used in asymmetric encryption?

A

Public keys are exchanged, the sender uses the recipient’s public key to encrypt the message and then the recipient uses their private key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is another advantage of asymmetric encryption beyond security?

A

Messages can be authenticated if first encrypted with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a combined encryption key?

A

The combination of your private key and the other person’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Name the benefits of asymmetric encryption

A

Both parties know the message hasn’t been read by anyone else, the message can be authenticated and the message can’t be modified in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is hashing?

A

The transformation of a string of characters into a fixed-length value or key that represents the original input string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the difference between encryption and hashing?

A

Hashing is a one-way process - the original data can’t be retrieved from the hashed data even with access to the hashing algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When is hashing useful?

A

Preventing sensitive data like passwords and PINs from being read by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Why is hashing secure?

A

It means data doesn’t have to be sent or stored in plain text - even if intercepted this data is useless to a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are characteristics of Von Neumann architecture?

A

Shared memory and buses for instructions and data, linear FDE cycles, instructions completed serially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are characteristics of Harvard architecture?

A

Separate memory and buses for instructions and data, reading and writing data can be done at the same time as fetching an instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are advantages of using Von Neumann architecture over Harvard?

A

Flexibility and easy program modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are advantages of using Harvard architecture over Von Neumann?

A

Faster data access and higher processing speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the function of the page rank algorithm?

A

To rank search results based on relevance to the search term and the quality of the web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How does the page rank algorithm work?

A

By checking the number of links to a page and the quality of the pages that link to it - assuming more important sites are likely to be linked to more by other sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

When is circuit switching most useful?

A

When a constant end-to-end link is needed (e.g. live video)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is circuit switching?

A

Where a dedicated link of fixed bandwidth is created between the source and the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the downside of circuit switching?

A

Lots of potential bandwidth can be wasted, if one part of network fails may go down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is packet switching?

A

Data is broken into smaller blocks and sent independently via the route which is least congested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are the advantages of packet switching?

A

Maximises bandwidth, needs less complex infrastructure, can easily respond if parts of network fail, is more affordable and efficient compared to circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the downside of packet switching?

A

Doesn’t guarantee the quality of the transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the definition of an instruction set?

A

The set of all instructions written in machine code that can be recognised and executed by a given processing unit/CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is an example of the difference between CISC and RISC in practise?

A

CISC multiplies 2 numbers in 1 instruction whilst RISC has to add the number to itself the desired number of times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the benefits of using CISC over RISC?

A

More efficient use of RAM, more cycles executed per second, smaller code sizes, less strain on compiler(software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the benefits of using RISC over CISC?

A

Simpler hardware, supports pipelining, cheaper to produce, leaves more room for general purpose registers and cache, lower energy consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are some key differences between CISC and RISC?

A

CISC instructions of variable length and can be multiple clock cycles while RISC instructions fixed length and are one cycle each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the function of a modem?

A

To transform digital information from a device into analogue signals that can be transmitted through wires, and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the function of a router?

A

Responsible for routing data between devices on a small network, or between devices on a network and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is meant by routing data?

A

Directing data packets from a source device to a destination device across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

From most to least, which cables offer the most bandwidth?

A

Fibre optic, coaxial, twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

From most to least, which cables are the most expensive?

A

Fibre optic, coaxial, twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

When are twisted pair cables generally used?

A

Telephone networks, data networks and cable shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is meant by cable shielding?

A

The blockage of any unwanted electrical interference from affecting signals travelling through a cable

60
Q

What is a twisted pair cable made up of?

A

A pair of insulated copper wires

61
Q

What is a coaxial cable made up of?

A

Four components (from inside to outside) - solid conductor wire, insulation layer, grounding conductor and exterior insulation layer

62
Q

When are coaxial cables generally used?

A

Computer network connections, digital audio and cable television

63
Q

How much can each method of cabling be affected by external magnetic signals?

A

Twisted pair can be the most, coaxial can be impacted but to a lesser extent, fibre optic not at all

64
Q

What are fibre optic cables made up of?

A

Very thin optical fibres (glass or plastic) bundled together into a cable

65
Q

When are fibre optic cables generally used?

A

To support long-distance connections between cities and countries, data centres, organisations that transmit lots of data

66
Q

Why are fibre optic cables unaffected by external magnetic fields?

A

Light rays are unaffected by electrical noise

67
Q

What is the function of a Network Interface Controller (NIC)?

A

To allow wired and wireless communication between computers on a LAN or connected to a WAN using the Internet Protocol (IP)

68
Q

What is the function of a Wireless Access Point (WAP)?

A

To create a wireless LAN (WLAN) by connecting to a wired router, switch or hub and projecting a Wi-Fi signal across the WLAN

69
Q

What is the function of a hub?

A

Allows multiple devices to connect to one network

70
Q

What are the drawbacks of using a hub?

A

Broadcasts all transmissions to all connected devices, meaning network can become flooded with unnecessary traffic and therefore they’re much slower than switches

71
Q

How does a switch operate differently in comparison to a hub?

A

Is an active device meaning transmissions are routed to the correct device limiting unnecessary traffic

72
Q

What is a co-processor?

A

Any additional processor used for a specialised task

73
Q

What is the function of a co-processor?

A

To improve the overall speed of the computer by executing concurrently with the main CPU

74
Q

What are the differences between CPUs and GPUs?

A

CPUs more general purpose while GPUs are specialised - GPU faster and more efficient but only in certain tasks

75
Q

Why are GPUs more efficient in carrying out mass calculations?

A

Designed for efficient use of parallel processing

76
Q

Why are GPUs not limited to graphics any more?

A

Any situation that requires a large number of simple calculations being done will be far quicker on a GPU than a CPU

77
Q

What does IDE stand for?

A

Integrated development environment

78
Q

What is the purpose of an IDE?

A

To provide a range of tools and features that help speed up and enhance program development

79
Q

What are examples of features in an IDE?

A

Code editors, error diagnostics, run-time environments, translators and auto-documentation

80
Q

What is an example of an IDE?

A

Python IDLE (Integrated Development and Learning Environment)

81
Q

What is a run-time environment?

A

Software that supports the running of programs allowing programmers to easily run code during development

82
Q

What is done in auto-documentation?

A

Variables and modules are tracked with a view to produce documentation that aids in program maintenance, debugging and support

83
Q

What is concurrency?

A

Where multiple tasks are executed at overlapping time intervals on one core, allowing progress to be made simultaneously

84
Q

What is parallelism?

A

Tasks are actually executed simultaneously on different cores

85
Q

What is polymorphism?

A

Where one instruction can do multiple things depending on the inputs given

86
Q

What is the purpose of a hash table?

A

To immediately find an item in a list without the need to compare to other items in the data set

87
Q

How does a hash table work?

A

Data is first hashed into a unique number, then this value is used as an index for the data. When you want to retrieve that data it is hashed again to find its corresponding index in the hash table

88
Q

What is a collision in a hash table?

A

Where the algorithm returns the same index value for multiple data items

89
Q

What are the main priorities of the hashing function?

A

Speed, result in few collisions and use little memory

90
Q

What is open addressing and how does it resolve collisions?

A

Checks the next available space in the hash table until an empty position is found and stores data there

91
Q

What is linear probing?

A

Used with open addressing - hashing function delivers start position and then uses linear search until data is found

92
Q

What are the disadvantages of linear probing?

A

Prevents other items from being stored in correct positions, clustering (several positions filled around common collision values)

93
Q

What is the trade-off made with hash tables?

A

A bigger hash table takes up more memory however is less likely to result in collisions

94
Q

What is ‘chaining’?

A

Where two items with the same hash index are stored in the same address using a 2D array

95
Q

What second tables can you use to deal with overflows?

A

Overflow tables or linked lists, searched sequentially

96
Q

What examples of applications of hash tables are there?

A

File systems linking a file name to a file path, identifying keywords in a programming language during compilation

97
Q

What three operations can be performed on a hash table?

A

Add an item, delete an item, retrieve an item using its hash value

98
Q

What is a flip flop?

A

Logic circuit that can store one bit and flip it between 0 and 1

99
Q

What are a flip flop’s inputs?

A

Single bit data input (D) and a clock signal (C)

100
Q

What are a flip flop’s outputs?

A

Single bit data output (Q) and the inverse of this data output (¬Q)

101
Q

How is the clock signal provided to a flip flop?

A

By another circuit that changes state and timed intervals/pulses

102
Q

When is the output of a flip flop changed?

A

When the clock pulse is at a rising/positive edge

103
Q

What logic gates make up a half adder?

A

XOR for the digit and AND for the value carried

104
Q

What is the limitation of a half adder?

A

Can’t store carried over digits

105
Q

What makes up a full adder?

A

Two half adders combined with an additional or gate

106
Q

What is the purpose of the Data Protection Act?

A

To control how your personal information is used by companies and the UK government

107
Q

What were the roles defined by the Data Protection Act?

A

Data subject (has data on them stored), data controller (determines what data is stored and how data is stored by orgs) and data commissioner (independent public body that enforces the act)

108
Q

What are some of the principles of the Data Protection Act?

A

Accurate data, kept secure, collected legally, only used for intended purpose, not held longer than necessary

109
Q

What rights does the Data Protection Act give to data subjects?

A

Right of access of data, right of correction, right to prevent marketing, right of complaint, right to compensation if flaw found

110
Q

What does the Computer Misuse Act outlaw?

A

Unauthorised access to a computer system (hacking), unauthorised access to digital material with intent to commit further crime, unauthorised modification of data (e.g. deleting/changing files), making tools used to commit computer misuse

111
Q

What is the purpose of the Computer Misuse Act?

A

To protect computer systems/data from unauthorised access and misuse

112
Q

What is meant by intellectual property?

A

“Creations of the mind” (e.g. artwork, music, logos, inventions)

113
Q

What is meant by copyright?

A

The rights a creator has over their own work

114
Q

What is a patent?

A

An exclusive right granted to an inventor for their invention

115
Q

What is the purpose of the Copyright, Designs and Patents Act?

A

To protect the rights of creators and innovators and to grant legal protection to original works

116
Q

What does the Copyright, Designs and Patents Act do?

A

Makes it illegal to copy any work without the copyright holder’s permission

117
Q

What does the Regulation of Investigatory Powers Act (RIPA) do?

A

Provides certain bodies the right to monitor communications and internet activities

118
Q

What are examples of public bodies which have a right to monitor internet communications through the RIPA?

A

Police, security services, environment protection agency, office of fair trade, serious fraud office

119
Q

What are some examples of data that public bodies can access through RIPA?

A

Customer communication through ISPs, mass surveillance of communications, monitoring of an individual’s internet activity

120
Q

What is the impact of RIPA on Internet Service Providers (ISPs) and other businesses?

A

Provide access to digital communications when asked, implement hardware/software that facilitates surveillance

121
Q

What are the concerns regarding RIPA?

A

Invasion of privacy, freedom of speech, unnecessary censorship, can be misused

122
Q

What is a checksum?

A

A small piece of data calculated from a larger set of data

123
Q

What is the purpose of a checksum?

A

To detect errors or changes made during transmission or storage of data

124
Q

How does a checksum work?

A

An algorithm first generates a unique value, then generates it again when the data is received - if checksums match it shows the data hasn’t been corrupted

125
Q

What is a logical protocol and what are some examples of them?

A

Logical protocols define formatting, structure and interpretation of data at a higher level (e.g. HTTP, SMTP, FTP)

126
Q

What is a physical protocol and what are some examples of them?

A

Physical protocols operate at a lower level and focus on the physical transmission of data over a network (e.g. Ethernet and WiFi)

127
Q

In terms of relational databases, what is a key?

A

A field that uniquely identifies each record in a table

128
Q

In terms of relational databases, what is a primary key?

A

The main key that uniquely identifies each record in a table

129
Q

In terms of relational databases, what is a foreign key?

A

A field in a table that refers to the primary key of another table

130
Q

What are the 5 components of first normal form in a database? (PUSON)

A

Primary key, unique field names, same data type in field, only one data element in field, no duplicates

131
Q

What are the 3 components of second normal form in a database?

A

Already in 1NF, remove partial dependencies, fix many to many relationships created as a result

132
Q

What are the 2 components of third normal form in a database?

A

Already in 2NF, remove transitive dependencies

133
Q

How do you select data in SQL?

A

SELECT

134
Q

What does the FROM command do in SQL?

A

Sets the table that is to be operated on

135
Q

How do you make selection in SQL based on a criteria?

A

WHERE

136
Q

How do you select all fields in SQL

A

*

137
Q

How do you ensure multiple criteria needs to be met in selection in SQL?

A

AND

138
Q

What does the LIKE command do in SQL?

A

Allows selection based on only parts of the data

139
Q

What does a % do in SQL?

A

Means the data is only selected based on the data in the field before the %

140
Q

How do you ensure one of multiple criteria needs to be met in SQL?

A

OR

141
Q

What does the INSERT INTO command do in SQL and what is the syntax?

A

Allows data to be inserted into a table: “INSERT INTO [table name] ([field1]), VALUES ([value1])”

142
Q

How do you delete data in SQL?

A

DELETE FROM

143
Q

How do you combine data from multiple tables in SQL?

A

JOIN

144
Q

What does the ON command do in SQL?

A

Specifies a common field between two tables being joined together

145
Q

How do you delete an entire table in a database on SQL?

A

DROP TABLE

146
Q

What are the two rules of Big O notation?

A

Remove all terms except one with largest exponent, remove any constant from this