Extra Stuff Flashcards

1
Q

Name the Arithmetic/Logic instructions

A

ADD
SUB
MUL
DIV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol us for controlling the right to transmit a message in a network?

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the advantage of larger word size in a computer?

A

Faster Computation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which layer of the TCP/IP hierarchy attempts to deliver messages reliably?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a hard drive is defragmented, How does this allow a computer to run faster?

A

Makes the file contiguous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What identifies the application to which a message arriving from the internet should be given?

A

Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is used to translate between IP addresses and mnemonic addresses?

A

Name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What instruction would likely execute fastest

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which layer of the TCP/IP hierarchy decides which application should receive an incoming message?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol implements a secure internet service?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In what way are general purpose registers and main memory cells similar?

A

Both are memory that can be directly addressed and accessed by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what way do general purpose registers and main memory cells differ?

A

There are relatively few general-purpose registers compared to main memory cells.
General-purpose registers are internal to the CPU and can be accessed more quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What conditions are necessary for deadlock to occur?

A

Multiple processes attempting to access a limited resource with a partial access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What mechanisms are used in an operating system to avoid deadlock?

A

Mutual exclusion is used to avoid deadlock. This can be accomplished through the use of semaphores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a repeater and a bridge

A

A repeater extends a network at the physical layer and propagates all bits. A bridge extends a network at the link layer and propagates frames based on the MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between hubs, switches, and routers?

A

The layer of operation. A hub joins nodes at the physical layer. A switch joins nodes at the link layer. A router joins networks at the network layer.

17
Q

How does Public-key encryption work?

A

Public-key encryptions works through an algorithm that uses the public key to encrypt the message but uses the private key to decrypt the message.

18
Q

What is symmetric key encryption?

A

Symmetric-key encryption uses the same key to encrypt and decrypt the message.

19
Q

Advatage of symmetric key encryption?

A

Symmetric-key encryption algorithms are generally far more simple and efficient to implement than public-encryption.

20
Q

What is DDL?

A

Data Definition Language:
Part of the DBMS
Creates tables and structures that hold information about the data
Allows the designer to specify data types
SQL

21
Q

What does the user interface act as an intermediary to?

A

The user interfaces acts as an intermediary between the user and the kernel

22
Q

What are the units called that a programme can be divided into?

A

Procedural units

23
Q

What does implementation mean in computing?

A

Turning an algorithm into a computer program

24
Q

First generation programming?

A

First generation programming is in machine code which is also known as binary code

25
Q

What threats are there to a computer?

A

Virus
Worm
Hacker

26
Q

What is a distributed system?

A

A distributed system is a software or system with parts that run on different computers or processors. This speeds up the execution of software

27
Q

List four high-level programming languages?

A

C++
R
C
Java

28
Q

Describe two object-oriented concepts

A

Inheritance: Allows new classes to be defined in terms of previously defined classes
Polymorphism: Allows method calls to be interpreted by the object that receives the call

29
Q

What is Psuedo code?

A

A simple way of describing a set of instructions that do not have to use specific syntax.