Extra Stuff Flashcards
Name the Arithmetic/Logic instructions
ADD
SUB
MUL
DIV
What protocol us for controlling the right to transmit a message in a network?
CSMA/CD
What is the advantage of larger word size in a computer?
Faster Computation
Which layer of the TCP/IP hierarchy attempts to deliver messages reliably?
Transport
If a hard drive is defragmented, How does this allow a computer to run faster?
Makes the file contiguous
What identifies the application to which a message arriving from the internet should be given?
Port Number
What is used to translate between IP addresses and mnemonic addresses?
Name server
What instruction would likely execute fastest
AND
Which layer of the TCP/IP hierarchy decides which application should receive an incoming message?
Transport
Which protocol implements a secure internet service?
HTTPS
In what way are general purpose registers and main memory cells similar?
Both are memory that can be directly addressed and accessed by the CPU
In what way do general purpose registers and main memory cells differ?
There are relatively few general-purpose registers compared to main memory cells.
General-purpose registers are internal to the CPU and can be accessed more quickly.
What conditions are necessary for deadlock to occur?
Multiple processes attempting to access a limited resource with a partial access.
What mechanisms are used in an operating system to avoid deadlock?
Mutual exclusion is used to avoid deadlock. This can be accomplished through the use of semaphores.
What is the difference between a repeater and a bridge
A repeater extends a network at the physical layer and propagates all bits. A bridge extends a network at the link layer and propagates frames based on the MAC address.
What is the difference between hubs, switches, and routers?
The layer of operation. A hub joins nodes at the physical layer. A switch joins nodes at the link layer. A router joins networks at the network layer.
How does Public-key encryption work?
Public-key encryptions works through an algorithm that uses the public key to encrypt the message but uses the private key to decrypt the message.
What is symmetric key encryption?
Symmetric-key encryption uses the same key to encrypt and decrypt the message.
Advatage of symmetric key encryption?
Symmetric-key encryption algorithms are generally far more simple and efficient to implement than public-encryption.
What is DDL?
Data Definition Language:
Part of the DBMS
Creates tables and structures that hold information about the data
Allows the designer to specify data types
SQL
What does the user interface act as an intermediary to?
The user interfaces acts as an intermediary between the user and the kernel
What are the units called that a programme can be divided into?
Procedural units
What does implementation mean in computing?
Turning an algorithm into a computer program
First generation programming?
First generation programming is in machine code which is also known as binary code
What threats are there to a computer?
Virus
Worm
Hacker
What is a distributed system?
A distributed system is a software or system with parts that run on different computers or processors. This speeds up the execution of software
List four high-level programming languages?
C++
R
C
Java
Describe two object-oriented concepts
Inheritance: Allows new classes to be defined in terms of previously defined classes
Polymorphism: Allows method calls to be interpreted by the object that receives the call
What is Psuedo code?
A simple way of describing a set of instructions that do not have to use specific syntax.