Graded unit Flashcards

1
Q

Define RAM

A

Random access memory

It is volatile

Can be static or dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ROM

A

Read only memory

Memory is non volatile

PROM,EPROM, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of using direct memory access for handling input/output transfers

A

It is used for transferring blocks of data

It speeds up the data transfer between RAM and peripherals

Bypasses the CPU for certain types of transfers allowing the cpu to carry out other tasks

Suitable for high speed devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the following attribute setting - archive

A

A file with the attribute on which has not been backed up since it was last eddited or since it was created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the following attribute setting - read-only

A

A read-onky file cannot be edited or written to disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explaine the following attribute setting - hidden

A

A file with this attribute on is not displayed within the default settings of the O/S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the following attribute setting - system

A

Is a designated system file and is normally not displayed in modern O/S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Polling is a method which the computer system uses to share processing time. Explain it and give one advantage and disadvantage

A

Polling is a continuous method of checking other programs or devices by one program, or devices to establish its state usually to see if they are still connected or want to communicate

Advantage - even and fair share of processing time

Disadvantage - each device is checked in turn, one at a time, wether the device wants to communicate or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Interruptes are a method which the computer system uses to share processing time. Explain it and give one advantage and disadvantage

A

An interrupt is when a signal is recived from a device attached to a computer or from a program within the computer that causes the main program that operates the computer to stop and work out what to do next

Advantage - priority levels may be set

Disadvantage - it takes turns in which program or set of instructions that it preforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State the main function of DRAM and how it’s used in a computer system

A

DRAM loses its charge over a period of time. A value of 1 stored in this type of chip can be changed to 0 over time unless the chip is refreshed with a frequent charge. This type of memory is used as main memory and considered to be volatile with the contents being lost if the power is switched off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State the main function of ROM and how its used in a computer system

A

ROM is read only memory and is non volatile, ROM does not lose ita contents if the power is switched off. ROM is used in a computer system to store part of the operating system. When the computer is switched on the programs contained in ROM are loaded into the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State the function of SRAM and how’s its used in a computer system

A

SRAM is a volatile memory and often used in cache or where fast ram is required unlike DRAM static RAM can only be changed in two ways, firstly, when the power is switched off, and secondly, when the value in a memory location is changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the address bus

A

This carries the address of the area in memory that is too be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the control bus

A

This carries the signal concerning timings of memory read, write and device I/O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the data bus

A

This carries the data to be transfered or manipulated by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the function of ROM and how is it used within a computer system

A

Bootstrap (ROM) – use to store part of operating system or boot sequence. Small amount of Read only memory, permanent, cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the function of SRAM and how is it used within a computer system

A

Cache (SRAM) – stores regularly used data, instructions, variables used in executing programs, speeds up data transfer to CPU. Faster to access than data stored in main memory or virtual memory. Always accessible as no need to refresh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the function of DRAM and how is it used in a computer system

A

Main memory (DRAM) – Large amount of memory stores application packages and files currently in use by CPU. Faster to access than Virtual Memory but slower than SRAM. Cannot be accessed while being refreshed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the role of cache memory in enhancing the performance of the CPU.

A

Fast memory blocks quicker than DRAM.

Small amount of SRAM

Used to store variables used in programming no need to keep updating slow DRAM.

Faster memory used to transfer data between CPU.

Or any other reasonable answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Backup is an essential task if you are not to lose information. State three different types of backup

A

Full backup

Incremental backup

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is the effect on the archive attribute for a full back up

A

Backup of all files and folders on the system

Consists of data and configuration files

Regular basis but least frequent of the backups

Carried out prior to any major system changes

May be required for restoration purposes along with incremental backups

Unlikely to include software applications

Any other reasonable answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is the effect for the archive attribute for a incremental back up

A

Used on a regular basis eg daily

Faster than full backup, used for day to day data backups

Operational back up of selected data

Backs up only files and folders that have changed since last incremental backup

restoration requires both last full backup and the incremental backups

Archive bit is reset for each file backed up

23
Q

what is the effect for an archive attribute for a differential backup

A

Used on a regular basis eg daily

Faster than full backup but slower than incremental

Operational back up of selected data

Backs up files and folders that have changed since last full backup regardless of whether they were backed up in the last differential backup

Each backup supersedes all previous backups

restoration requires only the final differential backup

does not reset the archive bit

24
Q

describe the following type of a multi user system - networked system

A

Sharing of resources over a number of computers

Use of a server provides network services such as logon and security

Centralised data storage accessible by permissions

May mention physical aspects (LAN, NICs etc)

25
Q

describe the following type of a multi user system - multi-tasking system

A

Computer appears to be carrying out tasks simultaneously

May describe either pre-emptive of co-operative multi tasking systems

26
Q

A computer operating system can be broken down into a number of discrete layers, or functional elements, each of which is responsible for a specific task, describe the following functional layer - kernel

A

The low level interaction between the operating system and the computer hardware

An interrupt handler that determines the CPU handling of I/O requests

A scheduler that determines which programs share processing time and in which order

A supervisor that gives use of the CPU to each process when it is scheduled

The kernel services can be requested by other parts of the O/S or by application programs via system calls

27
Q

A computer operating system can be broken down into a number of discrete layers, or functional elements, each of which is responsible for a specific task, describe the following functional layer - file management

A

Provides a user interface to work with file systems.

Keeps track of file locations on disk, including location of fragmented files

Supports the most common operations on files are create, open, edit, view, print, play, rename, move, copy, delete, attributes, properties, search/find, and permissions.

28
Q

Describe the operation of virtual memory

A

Used to spread the load of physical RAM

Portion of hard disk set aside and used as a swap file

Virtual memory is created on backing storage and matches the physical memory available i.e. 4GB RAM has 4GB virtual memory created on disk.

Virtual memory is usually created dynamically during the loading of the OS

Uses a paged addressing system

Any other reasonable answer

29
Q

Explain the advantages of using the Direct Memory Access (DMA) technique for handling input/output transfers.

A

is used for transferring large blocks of data between peripheral devices and memory.

speeds up data transfer between RAM and peripherals.

bypasses the CPU for certain types of transfer, allowing the CPU to carry out

other tasks.

On completion of transfer, DMA controller informs CPU.

suitable for high-speed devices.

Efficiency of the CPU is increased as CPU can continue to process while the transfer is taking place.

30
Q

Define the term ‘cycle stealing’ in the content of DMA explaining priority.

A

When both the CPU and the DMA controller wish to access memory at precisely the same time.

Priority usually given to the DMA because the transfer of data from very fast peripheral devices attached to the DMA cannot be held up. This is known as cycle stealing.

31
Q

Explain two functions of each of the following components of an operating system – file management

A

Creates the link between the logical file and the directory structure

Handles the allocation of space to files and their allocated space

Handles the linkage between areas of non-contiguous storage

32
Q

Explain two functions of each of the following components of an operating system – memory management

A

Allows several programs to run simultaneously

Controls the allocation of memory to programs

The mapping between virtual and real memory

33
Q

Explain two functions of each of the following components of an operating system – input/output

A

Communication between hardware peripherals and system components

Communicating with the File Management re location of files

34
Q

A file can have different attribute settings. Define this term

A

In an operating system, file properties, such as “read-only” or “hidden,” are called file attributes. These attributes which are tagged to a file and can be changed by a user to modify the status of a file.

35
Q

Describe the term “device driver” providing an example.

A

Description — A device driver is a piece of software that provides communication between the Operating System and the device, and operation of the device attached to the computer.

Examples: Printer drivers, sound cards, video cards, graphics cards etc.

36
Q

Describe the term ‘thrashing’ in relation to virtual memory.

A

Virtual memory uses a swap file on hard disk as extended memory.

Used when insufficient amount of RAM for processes required by CPU

Content of virtual memory needs to be loaded back into main memory for use by CPU. This may require processes from main memory to be swapped out to virtual memory to make space in main memory.

‘Thrashing’ occurs when the system is constantly swapping programs and processes from main memory and virtual memory.

37
Q

Computer programs make use of a variety of different data types. Describe two different data types and examples of when they would be used

A

Integer – whole numbers

Char – single character

String – group of characters / array of chars

Float / double – floating point/real numbers

Boolean – true false

38
Q

Data types can either be declared as constants or as variables. Describe each of the following - constants

A

A data item with a fixed value which does not change during execution

Generally global scope

39
Q

Data types can either be declared as constants or as variables. Describe each of the following - local variables

A

Local variable only has scope within the function/module/ method/etc within which it is defined.

Passed throughout the program by use of parameters

Considered good practice

40
Q

Data types can either be declared as constants or as variables. Describe each of the following - global variables

A

Global variable has scope throughout the complete program.

Avoid use as this memory is set up at the beginning but may not be required

41
Q

When writing code for any problems there are a number of good programming practices that should be adopted to ensure that in the future code is easily maintained. Outline the good practices that lead to well maintainable code.

A

Follow statement of standards for best practice

Use of comments throughout

Indentation

Use of modular code

Appropriate use of variables – local and parameter passing – avoid global

Meaningful names throughout variables and methods

Appropriate lay out and use of whitespace

42
Q

In a project which you have carried out describe, with examples, the use of inbuilt functions

A

Inbuilt Functions:, We might need to work with dates and times. We can use inbuilt functions from Python’s datetime module for this purpose.

43
Q

In a project which you have carried out describe, with examples, the use of functions that you wrote yourself.

A

Custom Functions: We may need to perform specific operations related to our task that aren’t covered by inbuilt functions. For example, we might want to calculate the average mark for a pre-set number of students. We can write a custom function for this

44
Q

In functions defined by the programmer data is often passed between functions in the form of parameters. Give a description of the use of the type of parameter listed below - passing by value

A

Actual value passed

Value does not alter in any way

Eg student grade passed to calculate average – grade does not change

45
Q

In functions defined by the programmer data is often passed between functions in the form of parameters. Give a description of the use of the type of parameter listed below - passing by value

A

Uses address of operator (&)

Address of variable passed

Value will be altered in some way and new value stored in the address and passed back to calling routine

Eg student average grade – calculated average

46
Q

A program is written that calculates the average grade based on three individual scores. Each of the three scores is passed for calculation of the average which is then calculated and passed back to the calling functions.

Identify, for the three individual grades and the average, what is passed by reference and what is passed by value giving a brief reason why.

what is value and what is refrence for actual grades and average

A

Actual grades passed as value. They will not change

Average passed as reference will be used to store result of calculation and passed back

47
Q

Before software is handed over to the client it must be tested. Testing is a very important stage in the software development process and as such there are a vast range of tests that require to be carried out.

Describe, with reasons, the test strategy that you followed in the Developing Software Introduction unit.

A

Any acceptable and justified answered but the following is expected

Test strategy - white box bottom up approach

Given test logs with test data and expected results

Carried out by the programmer

Results of testing documented

Retested where necessary

48
Q

You were provided with, and made use of, a given test plan. Describe what you would normally expect to find in a test plan.

A

Module to be tested

Reasons for test

Test data

Expected result

49
Q

You would expect to test a system using data that would produce normal test conditions. Describe what other types of test you would carry out and give one example

A

Boundary
tests upper or lower limits

Extreme
Tests data of correct type that would not be within normal range

Exceptional
Data of a different type will throw an exception and crash program

50
Q

When referring to Troubleshooting what is meant by the term Half – Split?

A

Divide and conquer method for finding a fault. Applying previous knowledge and attempting to solve a problem at a set level.

51
Q

When troubleshooting what type of fault-finding tools are commonly used to assist with fault diagnosis?

A

Flowcharts, Company Faults database, Internet, previous experience

52
Q

What is the purpose of Preventative Support on a computer system

A

The purpose of preventative support on a computer system is to proactively identify and address potential issues before they escalate into problems that can disrupt operations or cause downtime. By implementing preventative support measures, organizations can minimize the risk of system failures, optimize performance, and enhance overall reliability

53
Q

Why is documentation very important when completing the troubleshooting process?

A

It provides a record of all the steps taken during troubleshooting. This record helps in tracking what has been done, what worked, and what didn’t. Without documentation, it’s easy to forget steps or repeat them unnecessarily.

Documentation allows for knowledge sharing among team members. If multiple people are involved in troubleshooting a problem, documentation ensures that everyone is on the same page regarding the current state of the issue and the steps taken so far.

Well-documented troubleshooting processes serve as a valuable reference for similar issues in the future. If a similar problem occurs again, the documentation can be revisited to see how it was resolved previously, saving time and effort.

Detailed documentation aids in conducting root cause analysis. By documenting the symptoms, tests conducted, and solutions attempted, it becomes easier to identify patterns and underlying causes of recurring issues.

In some industries, documentation is essential for auditing and compliance purposes. Properly documented troubleshooting processes demonstrate that proper procedures were followed and can be crucial for regulatory compliance.

Documentation can be used for training new team members or for refreshing the knowledge of existing ones. A well-documented troubleshooting process serves as a guide for understanding how to approach and resolve similar issues in the future.