F451 Explain Flashcards
Explain how the Program Counter is used in the functioning of the processor.
Stores the address of next instruction. control order of instructions executed. Number incremented after read.
Explain why the problem must be defined accurately before the analyst starts work.
Client understands full potential of the system. Client expert in the problem, analyst expert in solution. Defined accurately so we know whether the problem is solvable and the right problem is solved. Final product might not match requirements (too little or too many features)
Explain why it is important to the client and to the analyst to evaluate the finished system.
Determines whether analyst would be paid based on the final product produced. Make sure all the requirements have been met that the client requested. To prove that the system works as intended. Opportunity identify areas that are lacking.
Explain how communication links are established between devices.
Handshake signal is sent from the one device and acknowledged by another to agree that they are ready to communicate. Logical protocols are agreed such as baud rate, parity.
Explain why text files and streamed video may use different bit rates.
Video file is larger therefore sending across more data therefore sending more bits per second. Time sensitivity is factor. Streamed video is sent real time so has to be received instantaneously.
Explain why a menu based interface is offered to visitors, rather than a GUI.
limited choices available limiting access to restricted parts of the program therefore finding their destination quicker. You do not need to be very computer literate to use a menu based interface/more universal. Can be touch screen therefore less vandalism. It is easy to use.
Explain what is meant by the character set of a computer.
Symbols that the computer may recognise. Each symbol has a unique code. e.g. ASCII (8 bits per code), UNICODE (16 bits per code)
By referring to two examples of applications that need character sets of different sizes, explain how codes are used to represent character sets.
Word processing software/Spreadsheet software. Each character has a unique binary code. The more bits in the character set the more symbols it can have. e.g. ASCII (8 bits per code) - max 256 characters, UNICODE (16 bits per code) max 512 characters
Explain the difference between system software and applications software.
Applications software allows the user to perform useful tasks whereas systems software manages the hardware and provides a platform for the applications software to run on. SS has housekeeping utilities.
Explain why a batch operating system is used to produce the payroll.
large amounts of data is collected inputted and stored over a long period of time. once its collected it is processed. e.g. once a week/month. No human interaction is required therefore can process at night. All similar data goes through a similar process
Explain the need for legislation to govern the use of computers for storing personal data.
Information is confidential and sensitive Information must be accurate Clients must have confidence that measures are taken to protect their data (Data stored must be refreshed regularly to) ensure irrelevant data is not kept Worry about identity theft/fraud.Stop data being passed on
Explain the changes to the staff’s work expectations following the introduction of the computerised system.
(Worry about) job loss (Worry about) competence/training
More information available/available when needed Change of stress levels More chances of improved qualifications/training makes workers
more skilled enhanced job prospects/more pay Expected to be more literate with system Increased work load to bring new system on line
Explain why a handshake signal is necessary.
To ensure that both devices are ready for data transmission. To ensure that same protocol are being used. e.g. agree error detection rules
Explain the difference between the hardware and the software of a computer system.
Hardware is physical parts of system Software is instructions/code/programs
Explain the importance of accurately defining the problem to be solved and state what each
of the analyst and the manager are able to contribute to the problem definition.
The two people involved will have very different ideas of the problem /
Necessary that they solve problem which they agree on… …or manager will be unhappy/software will be useless… …analyst will not be paid.Analyst is expert in use of computers Manager is expert in area of problem
Explain how echoes can be used to check data transmissions.
Data is transmitted from sending device to receiving device. A copy of received data is retransmitted back to sending device. There the data transmitted is compared to what was originally sent. If any differences the data is retransmitted from sending device.
Explain why custom-written software is often used rather than generic applications software.
Process is a unique/a one off
Generic software will not exist (to just do this)
The generic control software will have many unused features/bespoke written specifically for this purpose
Custom written software can be written to allow ease of changes to production
Explain why the quality of the interface design is important in applications.
Critical nature of application.
Large amount of information…
…only one operator.
…operator may miss seeing some important piece of information
…information must be ordered in terms of importance r according to a logical pattern.
…danger of information overload
Remove irrelevant information
…need for information presentation to be prioritised according to importance
some information is crucial eg possible conflict between signal and points arrangement
Use of colour must be consistent.
Consistency of presentation
Use of sound must be minimal otherwise it will be ignored
Must consider operator eg is the operator colour blind/deaf
Explain why the protocol used to create an interface between two devices is layered.
Enables manufacturers to design for a particular layer
Layers are ordered…
…which simplifies the creation of the protocol
Changes can be made by altering a single layer…
and the links to the other layers in contact with it