CS401A's Prelims: Comp. Sys. Architect. Module 02 Flashcards
For preliminary exams.
is a fact, figure, or information that is represented in a set of bits - ones and zeros.
Data,
It is a name given to a specific kind of file.
File Type
It is a unique file identifier and may be named by a human or a computer.
File Name
It is a 1- to 4-letter character identifier for the specific file type.
File Extension
It is a common identifier for file extension.
File Extension Icon
It is a program associated with the file extension.
File Association
It is a structure or layout of a computer file in terms of how data is contained and organized.
File Format
It provides additional information about a certain item’s content.
Metadata
These are setting associated with computer files that grant or deny certain right to how a user or the operating system can access that file.
File Attributes
It allows a file to be read, but nothing can be written to the file or changed.
Read-only
It tells Windows Backup to back up the file.
Archive
It is a system file.
System
It is a file that cannot be seen when doing a regular directory.
Hidden
was originally developed as a standard by the ANSI.
American Standard Code for Information Interchange (ASCII)
has also defined 8-bit extensions to the original ASCII codes that provide various symbols, line shapes, and accented foreign letters for the additional 128 entries.
American National Standards Institute (ANSI)
Its use is restricted mostly to IBM and IBM-compatible mainframe computers and terminals.
Extended Binary Coded Decimal Interchange Code
supports approximately a million characters, using a combination of 8-bit, 16-bit, and 32-bit words.
Unicode
16-bit code pages,
which allows space for about a million characters.
called planes,
are images that are characterized using an image scanner, digital camera or mobile device, or video camera frame grabber.
images (e.g., photographs and paintings)
Bitmap objects
are images made up of graphical shapes that can be defined geometrically.
graphical shapes (e.g., lines and curves)
Graphical objects
was first developed by CompuServe in 1987 as a proprietary format that would allow users to store and exchange online bitmap images in 256 colors on different computing platforms.
Graphics Interchange Format (GIF)
Now, it is extensively used on the Web due to its animated frame-by-frame images.
Graphics Interchange Format (GIF)
Is the best known compressed alternative to GIF.
Portable Network Graphics (PNG)
can store up to 48 bits of color per pixel and can store a transparency percentage value and a correction factor for the color in a monitor or printer.
PNG (Portable Network Graphics)
employs a compression algorithm to reduce the amount of data stored and transmitted.
Joint Photographers Expert Group (JPEG)
This algorithm reduces the image resolution under certain circumstances, particularly for sharp edges and lines.
Joint Photographers Expert Group (JPEG)
are a result of a sequence of bitmap image frames.
Video images
is determined by a codec or encoder/decoder algorithm referred to as a “container”.
The video format
serves as a superstructure to
encode, decode, hold, and stream video.
The container
that converts the analog value to a digital (binary) equivalent (consists of sampling, quantization, and encoding).
ADC (Analog-to-Digital Converter)
lays out of the analog signal in a graph.
Sampling
layers the discrete signal in the analog signal with less margin of error.
Quantization
converts discrete signals into highs (1) and lows (0), hence the binary equivalent of a time-bound discrete signal.
Encoding
These are data types represented as interpretation from programming languages.
Internal Computer Data
constant values (true/false)
Boolean
alphanumeric character code
Char
user-defined data type
Enumerated
whole numbers (+ / -)
Integer
numbers with a decimal portion
Real / Float
compresses the data in such a way that the application of a matching inverse algorithm restores the compressed data exactly to its original form.
Lossless algorithm
operates on the assumption that the user can accept a certain amount of data degradation as a trade-off for the savings in a critical resource.
Lossy algorithm