Final Study Flashcards

1
Q

What is a Von Neumann Machine?

A

Architecture where memory code and memory data are one box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the type of architecture that separates the memories into 2 boxes instead of just one?

A

Harvard Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an address bus?

A

A bus used to transfer data between devices that are identified by the hardware address. Handles addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which bus allows for control of direction of information?

A

Control Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What purpose does the data bus serve?

A

It handles instructions and data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four major subsystems of the Von Neumann architecture?

A

Memory, I/O, Arothmetic/Logic Unit (ALU), Control Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two subsystems are located in the Central Processing Unit (usually)?

A

ALU and Control Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is memory?

A

A functional unit where data is stored/retrieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of memory is stored in cells, which is also given a unique address?

A

RAM, or Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Read-Only Memory (ROM)?

A

A type of RAM that is prerecorded and cannot change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the typical cell size/memory width?

A

8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the maximum memory size?

A

2^n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Memory Address Register (MAR)

A

Holds address of data or instruction to be fetched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Memory Data Register (MDR)

A

Any data transferred between memory and CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Program Counter (PC)

A

Keeps track of next instruction to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Current Instruction Register (CIR or IR)

A

Holds the current instruction and splits opcode and operand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Accumulator (ACC)

A

Where calculation results are held temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three stages of this process?

A

Fetch > Decode > Execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two components of the memory system circuits?

A

Decoder and Fetch/Store Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What component converts MAR onto signal to a specific memory cell?

A

Decoder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is cache memory?

A

Memory built into the CPU for fast access times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is opcode?

A

The operator of the overall opcode, usually designates to the first 4 places of it on the left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is operand?

A

Used for inputing data to work with the beginning opcode. Usually is an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Principle of Locality?

A

The increased chance that a recently used address is to be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is cache hit rate?
The percentage of times values are found in cache.
26
What is an example of volatile memory?
RAM
27
What are some examples of nonvolatile memories?
Mass storage systems.
28
What is RISC?
Reduced instruction set computer, comprised of small instructions.
29
What is CISC?
Complex Instruction Set Computer, comprised of large instructions.
30
What are tracks?
Rings around the disk (CD/DVD) surface
31
What are sectors?
Fixed line segments of tracks, a unit of retrieval.
32
What is time to retrieve based on?
Seek time Latency Transfer Time
33
What is a register?
A high-speed, dedicated memory connected to circuits.
34
What two word term describes how information flows in the ALU?
Data path
35
What is Machine Language?
A set of binary strings that encode instructions.
36
What does it mean to be interpreted?
A program doesn’t need to be compiled before executed.
37
What does it mean to be interactive?
The interpreter can be directly interacted with through the prompt.
38
What does it mean to be object-oriented?
It’s a technique where code is encapsulated within objects.
39
What is the difference between high and low level programming languages?
High level is way more user friendly, while low level is more focused on interacting directly with the computer.
40
print ()
Prints text within the parenthesis.
41
And
Set up for a conditional where all conditions must be met.
42
Break
Stops a loop at the point of break
43
Continue
Loops the function at the point of continue
44
Def
Defines a function
45
Elif
Used for conditionals with multiple desired results
46
Else
Fallback conditional if none of the other criteria are met
47
If
Start of a conditional.
48
For i in x
Taking the position in a list/string as a value.
49
#
A comment that isn’t executed and is for viewing only
50
‘’’
Similar to #, but for multi-line comments
51
What are the five types of data in Python?
Integer, Float, Boolean, String, List
52
How would you convert a value to a specific data type?
Add the abbreviation for the desired data type before the value. Ex, int(x)
53
+
Can be used to add int with int, str with str Ex. 5 + 6 = 11, ‘5’ + ‘6’ = ‘56’
54
-
Can be used to subtract int from int Ex. 5 - 6 = -1,
55
*
Can be used to multiply int with int, int with str Ex. 5 * 6 = 30, 5 * ’6’ = ‘66666’
56
/
Division of this type results in a float always
57
%
Divides two ints or floats, and outputs the remainder
58
//
Division where the result is always a whole number
59
**
Indicates an exponent
60
>
Greater than
61
<
Less than
62
==
Equal to
63
=
Gives value to a variable.
64
!=
Not equal to
65
>=
Greater than or equal to
66
<=
Less than or equal to
67
or
True if at least one condition is true
68
Not
True if all conditions are false
69
What is e-commerce?
Business conducted with the internet.
70
What are the three types of eCommerce business models?
Business to Business Consumer to Consumer Business to Consumer
71
What is the term for a collection of organized data that allows access and retrieval?
Database
72
What does database software allow someone to do?
Create computerized database Add/modify data Sort and retrieve data Create forms and reports
73
What is a field?
One meaningful piece of info
74
What is a record?
A set of related fields
75
What is a data file?
A set of related records. Represented as tables
76
Database
A set of related data files.
77
Primary key
A field that uniquely identifies each record.
78
Database key
Identifier of a record.
79
What is a SQL (Standard Query Language)?
Used to retrieve data according to criteria.
80
Foreign key
An attribute in one table that is the key on another
81
Database integrity
Verification as data is added/removed
82
What is entity integrity?
No primary key can be missing.
83
Which integrity requires a foreign key to match a primary key in the related table?
Referential integrity
84
What is data integrity?
Values must be valid in their category restraints.
85
What is the file maintenance process?
Adding > Modifying > Deleting
86
What is it called when data is compared against rules or values to find out if data meets criteria?
Validation
87
What was the old way of file processing?
Every part of a company held records of all the other company parts, leading to lots of duplicates and redundancies.
88
What is the new way of databases like?
There is one central storage for all records and data.
89
What is a query?
A request for specific data from database.
90
What is query language?
Set of english-like statements that allows user to specify desired data.
91
What is a form?
A window on the screen that provides areas for entering or modifying data.
92
What does the report writer do?
Allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.
93
What are the three types of security?
Information - Control access Physical - Lock doors Online - Secure network
94
What is authentication?
Establishment of identity
95
What is the term for a one-way encryption?
Hash function
96
What does brute force hacking entail?
Trying common passwords, personal references, and ultimately, all possible passwords.
97
What is social engineering?
A password told by word of mouth.
98
Malware
Malicious software arriving from network.
99
Virus
Program embedded within another program or file
100
Worm
Program that replicates itself onto other nodes on network
101
Trojan horse
Program designed to look beneficial, but hides malicious code within it
102
Keystroke logger
Records all keys typed
103
Drive-by exploit/download
Trojan horse received by visiting an infected website
104
Denial of Service (DoS)
Many computers used to access a singular url at the same time
105
Phishing
Obtain sensitive information by impersonating legitimate sources.
106
White hat vs Black hat
White hats protect from attackers while black hats are infamous and do illegal acts.
107
Information Theft
When someone steals personal or confidential info
108
Encryption
Converting data that is readable into encoded charactera
109
What is cryptography?
Mathematical techniques related to info security.
110
What is cryptanalysis?
The study of methods for obtaining the meaning of encrypted info without accessing the secret info.
111
Symmetric encryption algorithm
Uses a singular key shared between sender and receiver.
112
Asymmetric encryption algorithm
Uses two keys, public and private Think of it like username is public, and password is private
113
Caesar cipher
Mapping character to others a fixed distance away in the alphabet
114
What are some other derivatives of the caesar cipher?
Stream cipher, where each character is encoded as it comes Substitution cipher, where it incorporates other mappings
115
What is the block cipher?
Block of plaintext encoded into a block of cipher text
116
Letter frequency chart
Shows how commonly letters of the alphabet appear in all text. E is most common.
117
What is a digital signature?
Encrypted code that a person attaches to an electronic message to verify identity.
118
What is a digital certificate?
A notice that guarantees a user or a website is legitimate.