Digital Environment - Tiddy Flashcards

1
Q

Hardware:

A

Physical components/parts. Also things you can physically touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The instruction cycle:

A

Cycle a computer system follows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Input device :

A

A physical piece of hardware that you connect to a computer e.g mice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Output Device:

A

A piece of hardware which displays out the result of the input once it has been processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Abstraction:

A

Ignoring irrelevant information that is not needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

North bridge:

A

One of the two chips located in the direction towards North in the motherboard. The main function of Northbridge is to manage the communications between the CPU and parts of motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

South Bridge :

A

South bridge is the another chip of the logical chipset architecture. It is located to the South of (PCI) bus in the motherboard. The main function of South bridge is to control the Input/Output functioning. The North bridge is the medium that connects South bridge and CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Actuator:

A

A sensor that spins and vibrates your phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Abstraction:

A

Eliminating useless/unnecessary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Primary (Memory):

A

This refers to memory areas that the CPU can directly access. E.g. RAM, ROM, Cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secondary (Memory):

A

Non volatile storage that isn’t directly accessible by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 Types of Computers systems :

A

Mobile Devices, Smart Devices, Personal Computer, Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe what clock speed is:

A

The number of cycles your CPU executes per second, measured in GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating Software

A

A software that runs the computer, manages how hardware receives and processes data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Batch OS

A

Used for banking for example payrolls that the system automatically transfers a set of funds on the day of payday (e.g midnight)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Time Sharing OS

A

Each task is given time to execute so it all round smoothly - The time given to each process is called a Quantum

17
Q

Network Operating System

A

Designed primarily to support workstations, personal computers and in some cases, older terminals that are connected via LAN (Local area network).

18
Q

NAS

A

Name

NAS - Network Attached Storage.

Who

Enterprises Field/Region of Offices.

How

Allows users to store their files on a
centralized appliance or a storage array.

Can also keep a backup of files incase the
Local drive gives out.

19
Q

SAN

A

Name

SAN - Storage Area Network

How

High speed network that provides block-level network access to storage
SANS may also span multiple sites

Computers connect to the SAN

20
Q

RAID

A

Redundant
Array
Inexpensive
Disks

21
Q

CSMA ( CD )

A

Carrier
Sense
Multiple
Access

Crash
Detection

An network protocol which operates in a MAC address. It senses whether the shared channel for transmission is busy or not and so diverts transmissions appropriately until the channel is free.

22
Q

CSMA ( CA )

A

Carrier
Sense
Multiple
Access

Collision
Avoidance

An protocol for carrier transmission in 802.11 networks, Twas developed in order to minimize the potential of a collision occurring when two or more stations send their signals over a data link layer.

23
Q

MAC Address

A

The MAC address is embedded into the device when it is manufactured and the owner cannot change it.

A MAC address is a unique code which is built into the Network Interface Card (NIC)

24
Q

Layer 1 - Physical

A

When a networking problem occurs, many networking pros go right to the physical layer to check that all of the cables are properly connected and that the power plug hasn’t been pulled from the router, switch or computer, for example.

Easy: So in a sense basic troubleshooting.

25
Q

Layer 2 - Data Links

A

The Data Link Layer provides node-to-node data transfer (between two directly connected nodes), and also handles error correction from the physical layer. Two sublayers exist here as well - the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer.

Easy: Between 2 ports directly connected, it handles errors from the physical Layer 1

26
Q

Layer 3 - Network (Packets)

A

Here at the Network Layer is where you’ll find most of the router functionality that most networking professionals care about and love. In its most basic sense, this layer is responsible for packet forwarding, including routing through different routers.

You might know that your Boston computer wants to connect to a server in California, but there are millions of different paths to take. Routers at this layer help do this efficiently.

Easy: This layer forwards packets through routing within different routers; IP address also work in this layer.

27
Q

Layer 4 - Transport (Segments)

A

TCP and UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network Layer.

Easy: TCP (The Transport Layer) deals with the coordination of the data transfer between end systems and hosts. How much data to send, at what rate, where it goes, etc.

28
Q

Layer 5 - Session

A

When two devices, computers or servers need to “speak” with one another, a session needs to be created, and this is done at the Session Layer.

Functions at this layer involve setup, coordination (how long should a system wait for a response, for example) and termination between the applications at each end of the session

Easy: A session is when 2 devices attempt to communicate/speak to each other mainly through data; this makes a session

29
Q

Layer 6 - Presentation

A

A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

30
Q

Layer 7 - Presentation

A

Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications that rely on Layer 7.

31
Q

Protocol for NBNS

A

Computer: Hey, what’s your IP?
User: I’m not sure, can you check?
Computer: Checks computer name through NBNS and converts that computer name to an IP address its linked to

Layer - Application Layer

32
Q

Protocol for SNTP

A

User: What is the time?
Computer: Checks system time through SNTP
Computer: Outputs “11:51”

Layer - Application Layer

33
Q

Protocol for SMTP

A

User: Sends an email
Computer: Receives the request by the user
Computer: Passes the request to an SMTP email server
Computer: Relays that email to the recipient

Layer - Application Layer

34
Q

Protocol for DNS

A

User: Opens google.com
Computer: Converts the URL to Google’s IP address (as this is the only way the computer can comprehend the request

Layer - Application Layer

35
Q

Error handling - Cyclic Redundancy Check

A

A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data.

36
Q

Describe how a data packet is constructed -

A

A data packet is structured by 3 main parts - the header, the payload and the trailer.

First the header receives the instructions about the payload which consists information such as the source address, a destination address, protocol, and packet number.

Next is the payload, the payload consists of data that is the actual data information the packet carries to its destination. This is what is delivered/transported (being data).

Then lastly is the trailer, its role is to Generally, a trailer contains a few bits that inform the receiving device that it has gotten to the end of the packet, as well as a Cyclic Redundancy Check (CRC), which enables the computer to determine if all the packets were received completely.

37
Q

TTL - Time to Live

A

How long a packet can remain on a network for

38
Q

Data Encapsulation

A

When a protocol on the sending host adds data to the packet header, the process is called data encapsulation.