Extra paper 1 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of application package/software to do with databases

A

Database/DBMS
to store/query/sort data about
customers/staff/stock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Example of application package/software to do with documents

A

Word processor
to create documents / letters / invoices for
clients/staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of application package/software to do with presentations

A

Presentation software
to create presentations for clients/staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of application package/software to do with emails

A

Email software
for staff to communicate with each other or
with customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of application package/software to do with graphics

A

Graphics manipulation
to produce adverts / images for sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of application package/software to do with web

A

Web browser
to view websites to purchase materials/stock
// view competitor’s website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Drawbacks to closed source software

A

No access to source code

● Cannot modify//improve to meet business needs
● Cannot fix bugs
● (Usually) cost to purchase licences // licence
conditions to meet//ongoing fees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Avantages of LAN (remember to be specific and say printer)

A

Share hardware (e.g. printers)
● Share files
● Share Internet connection
● Centralised security
● Log on / access files from any machine on the
LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can be centralised with LAN

A

Central maintenance
● Central backup / storage
● Central installation / update of programs
● Can monitor user activity
● Can control access levels // Centralised user
admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is virtual storage well-suited for storing back ups

A

Stored away from the computer(s)/remote…
● … so in case of disaster, data is not also damaged
● All of the data (from multiple machines) can be
backed up at the same time
● Can be accessed from elsewhere / other machines
● Storage can be expanded as necessary//no limit on
size
● Speed of access is not a priority for a backup
● Can make recovery from another site easier

● No on site maintenance required
● Allows more local storage capacity for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another important advantage of storing back ups

A

No physical space needed for backup hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does multi tasking OS do

A

Multi-tasking…

● …runs multiple programs at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does multi user OS do

A

Multi-user…
● … allows multiple users at the same time (must
be clear that candidate is not discussing an OS
that simply has multiple accounts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does distributed OS do

A

allows multiple computers to work together on
a single task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does embedded OS do

A

Embedded…
● …has a dedicated/limited function
● …is read-only / cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When are interrupts checked for

A

Start/end of each fde cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens if an interrupt is raised

A

contents of registers copied to
stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do flags do in link to interrupts

A

Flags are set to determine if interrupts are enabled /
disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What happens at end of interrupt

A

After interrupt complete, previous register values
restored back from stack
● Flag is reset
● If higher priority interrupt received during servicing of
interrupt…
● …this is added to stack and new interrupt dealt with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is garbage collection

A

Removes data not needed anymore (memory management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do paging and segmentation do

A

Split up memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When is virtual memory used

A

When RAM is almost full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens if RAM is full

A

applications cannot be
loaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is memory management important

A

If not, RAM would rapidly run out and fill up
with unneeded data/instructions and so no new
applications could run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a page table

A

A page table is used to map page location which is
slower than a segmentation table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What type of fragmentation does paging cause

A

internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of fragmentation does segmentation cause

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Is virtual memory cheaper than RAM

A

yes

30
Q

Advantage of paging over segmentation

A

Paging can be more effective because any free
memory space can be used to swap data in and out
whereas with segments, lots of space will sit unused
until a segment the right size is available

31
Q

When can a segmentation error occur

A

Segmentation errors can cause memory leakage
which would cause the system to crash

32
Q

How does memory management do security

A

Security issues – applications can only access
memory allocated to them so (for example) a
malicious application cannot access the memory
allocated to a banking app. Also when applications
are closed, data is removed before being reallocated
so that applications cannot see historic data

33
Q

What is a stack underflow

A

happens when we try to pop (remove) an item from the stack, when nothing is actually there to remove

34
Q

What is a stack overflow

A

a type of buffer overflow error that occurs when a computer program tries to use more memory space in the call stack than has been allocated to that stack.

35
Q

What difference should you NOT NOT NOT state for an array and list

A

Do not talk about the contiguous/non contiguous nature of them

36
Q

Difference between array and list 1

A

Array is of fixed/defined size // static
● List size can be changed // no defined size //
dynamic
● Array holds data of single data type
● List can hold data of multiple / different types

37
Q

What does a tuple being immutable mean

A

Cannot be changed at run time

38
Q

How are values accessed from linked lists

A

Go to the first position indicated by the start

pointer
● From the first position, read the next pointer
value…
● …follow this pointer value and access the data
item

39
Q

Binary 0.1 or 10.

A

0.1

40
Q

3 other advantages of two’s complement

A

Calculations are more easily performed on two’s
complement

No additional hardware is required in two’s
complement // Addition and subtraction are carried
out using only an adder
● Two’s complement has only one representation for 0

41
Q

Assembly language and processor

A

Assembly language is likely to be specific to the
processor type used // is machine dependent
● HLL is portable // can be used for multiple
processor types // programmer can pick from a
number of HLLs and paradigms // is machine
independent

42
Q

Assembly language and knowledge of the processor

A

Assembly language requires more knowledge of
the processor // allows direct control of the
processor
● HLL provides more abstraction // requires less
knowledge of the processor

43
Q

Assmebly language and conversion

A

Assembly language is a one-to-one conversion
to machine code
● HLL may produce multiple lines of machine code
per line of code // one-to-many

44
Q

Why may multi core processors not be faster

A

Some instructions may not be able to be run in

parallel
● An instruction may be dependent / waiting for other
instructions to be completed
● Other factors influence processing speed – clock
speed / cache / bottlenecks / etc
● Program / OS needs to be written to specifically use
multiple cores

45
Q

Is Encryption one or two way

A

2 so can be reversed

46
Q

Is hashing 2 or one way

A

1 so cannot be reversed

47
Q

What does asymmetric encryption allow

A

Also possible to verify identity of sender / origin of
data using asymmetric encryption.

48
Q

Why is asymmetric encryption useful for passwords

A

Hashing is useful for information (e.g. password) that
needs to be verified but does not need to be known
at any point; once hashed, it is impossible to return
to it.

49
Q

Why is encryption useful for most data storage

A

Encryption useful for most data storage as anyone
hacking into the robot will not be able to
read/understand the data.

50
Q

Why is hashing useful for passwords

A

Hashing is useful for data storage of password /
other items that need to be verified, hash of input
compared against hash stored to confirm
correctness.

51
Q

Where is hashing not useful

A

Hashing is not useful for data that needs to be
returned to the user as impossible to return to.

52
Q

Why is encryption useful for data transmission

A

Encryption useful for data transmission as data
intercepted cannot be decrypted without the key.

53
Q

Actual name of copy right act

A

Copyright Designs and Patents Act

54
Q

What does copyright act do

A

● Gives the author (the programmers)
ownership/copyright of the photographs
● …no need to apply // this is automatic
● Others cannot use/distribute // can be
prosecuted/fined for using/distributing…
● …without permission
● Permission can be granted / bought / licenced

55
Q

For karnaugh maps what is important

A

Least amount of boxes to cover all 1s, biggest boxes possible

56
Q

Prison sentence for not handing over keys to encrypted files

A

2 years

57
Q

Another issue with RIPA

A

with more organisations using their powers
for minor offences such as detecting those lying
about their address to get children into a better
school or fly-tipping.

58
Q

What is damping factor

A

The pageRank theory holds that an imaginary surfer who is randomly clicking on links will eventually stop clicking the probabilityat anyy step that the person will continue is a damping factor

59
Q

How does the PageRank Formula work?

A

(1 - 0.85) + 0.85 x (Previous Page Rank / How many arrows going out of the page)

60
Q

Disadvantages of virtual storage

A

Dont have control over how it is stored

61
Q

What is a call stack

A

Data structure that stores information about the active subroutines of a computer program like local variables

62
Q

What does agile methodoligies require

A

Skilled developers

63
Q

Interrupts extra

A

Complete current FDE cycle, relevant ISR loaded, into program counter

64
Q

First main point of spiral model

A

Analysing system requirements

65
Q

Second main point of spiral model

A

Pinpointing and mitigating risks

66
Q

Thirs point of spiral model

A

Development, testing and implementation

67
Q

Final point of spiral model

A

Evaluating to inform next iteration

68
Q

Why is spiral model only suited to large scale projects

A

If the project is too risky it is terminated, however hiring risk assessors is expensive which makes methodology suited to large

69
Q

What does the opcode contain

A

Adressing mode and istrunction

70
Q

LMC how do you store 10

A

TEN DAT 10

71
Q

Branching lmc

A

BRP POSITIVE
POSITIVE LDA TEN

72
Q
A