IB Computer science Flashcards

1
Q

Hardware

A

Physical parts of a computer. Includes both internal(RAM+motherboard) and external(keyboards+monitors etc.) Internal-components External-peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peripherals

A

External device providing input/outputCommunicate with system via device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network

A

Multiple devices that can communicate and share resources with one another via a transmission medium2 main networks-LANs and WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software

A

Computer programs or sets of instructions. Consists of lines of codes that have been compiled into a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Human resources

A

Describes both people who work for a company/organisation+dept that manages resources for employeesKnown as end-users and stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client(in networks)

A

Accesses services+resources provided by a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server

A

Provides data to other computers and fulfils a client’s request, Software is specific to type of server,but hardware is not important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client server model

A

Each client is connected to a single serverClients request connections to the serversCan be accepted/rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client server model +ves

A

Centralised management of resources Backups and network security controlled centrally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Client server model -ves

A

High set up and maintenance costs Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS server

A

Translates domain names into IP addresses, so they can be accessed by the userSends corresponding IP address of the needed web server back to the user’s browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Router

A

Routes data from a LAN to another network, Receives+forwards data packets, Determines most efficient path for packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall

A

Acts as a filter protecting a network from incoming and outgoing traffic. Monitors incoming+outgoing traffic,following set rulesHardware/software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social issue

A

Problem that influences a considerable number of individuals Includes crime, health,education,media+propaganda etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ethical issue

A

Problem or situation that needs person/organization to choose between options which are considered right/wrongExamples include: -Computer crime -Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social issues in networks

A

Cyberbullying. Less face-face interaction. Addiction. Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ethical issues in networks

A

Cybercrime, Identity theft, Data privacy, Malware attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Stakeholder

A

Person, group or organisation that has an interest/concern in an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ask yourself… when identifying stakeholders

A

Who will be affected by new system?Who will new system affect?Who will the end-users be?What are their needs?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Methods of obtaining a client’s requirements

A

Surveys, Interviews, Direct observation, Collecting documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Observation

A

Walk around organisation-watching how things are done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Observation +ves

A

Information gathered is first-hand + unbiased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Observation -ves

A

People may act differently than normal when being observed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Interviews

A

Interview key members within a system-find out how it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Interviews +ves

A

Lots of detailed info can be gathered Suggestions for improvements to the system can be heard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Interviews -ves

A

Takes a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Questionnaires/surveys

A

People are given questionnaires to fill out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Surveys +ves

A

Large amount of data from large group can be gathered. Simple / Little time needed to analyse(if done electronically)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Surveys -ves

A

Bias possible-info is limited by survey qs. Quality of responses may be poor/not usefulHard to ask the ‘right question’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Collecting documents

A

Look at documents currently being used in the system-find how system works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Collecting documents +ves

A

Detailed info about current system can be gatheredCan be seen where old system has problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Collecting documents -ves

A

Time consumingDocuments may be hard to understand(forms/outputs etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

4 methods before making a new system

A

Examine current systemsLook at competing products Literature searchOrganisational capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Examine current system steps

A

Who does what? How do they do that?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Organisational abilities steps

A

Determine what organisation can manage+doCan they afford new equipment? Can the staff use new system(do they need training?)? Can they have any ‘downtime’ to upgrade?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Competing products

A

Observe competitors See what is being done/is possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Intellectual property

A

Something unique that you physically create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Literature search

A

Consult literature to see other products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Types of diagrams to represent system requirements

A

System flow chart. Data flow diagramStructure chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Flowcharts

A

Represent algorithms,workflow or processesUsed to show how processes should work+help figure out how to create a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How do flowcharts help developers?

A

Inform decisions that need to be made+ the necessary steps that must be takenEstimate development time framesIdentify who should be involved at each stepIdentify bottlenecks+other problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Input/Output

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Processing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Disk storage (symbol)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Online storage (symbol)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Document

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Communication link

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Data flow

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Tape

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Data flow diagram

A

Shows flow of data in an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Entity symbol(data flow)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Process symbol(data flow)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Data store symbol(data flow)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Data flow symbol

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Entity definition

A

source and destination of information data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Process(data flow)

A

Activities and action taken on the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Data storage(data flow)

A

When, but not how, data is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Structure chart

A

Represent organisation of a system,showing different parts in a hierachy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Prototype

A

Abstract representations of a system,only focusing on one/two aspectsImportant in testing-each component can be tested+idea of system can be illustrated to client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Purposes of a prototype

A

Fail early and inexpensivelyGather more accurate requirements-demonstrate functionality of product+help end-users decide what they want in the productTechnically understand the problem-can see any possible challenges of the designFile patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Iteration(in design process)

A

procedure in which repetition of a sequence of operations yields results successively closer to a desired result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Importance of iteration in design process

A

Helps you be sure on what needs to be improvedImprovements in one iteration only possible due to improvements in last iterationNew technology/techniques can be usedUser’s needs can changeStability and reliability improves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Consequences of not involving end user for the user

A

Software is not suitable for intended use-decrease user productivityUser may be unsatisfiedUnhappy customers-reduced user productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Consequences for developer of not consulting end user

A

Legal action could be taken against developersDecreased reputationLoss of market share/breakdown of companyHarder to get feedback+help from users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Why should we listen to the end-user in the design process?

A

Understand own needs+situation far betterSoftware developer has limited domain knowledge-can’t appreciate end users’ needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Topics concerning the introduction of new IT systems

A

Robots replacing humansAI algorithms replacing humansNew systems are addictive/less efficientNew systems lead to new markets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Usability

A

How simple and self-explanatory the use of a system is for inexperienced end-users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Ergonomics

A

How well the form fits the function Discipline concerned with optimising human well being and system performance through the application of theory,principles,data and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Accessibility

A

Ability of the device to meet the needs of as many people as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Problems with devices

A

Difficult to handle hardwareComplex user interfaceSpecialist support needed to use deviceShort battery lifeSmall screen sizeLimited storage/portabilitySmall text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Types of disabilities

A

VisualAuditoryMobility and dexterityCognitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Methods of improving accessibility

A

Touch screensVoice recognitionText-speechBraille keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Usability issues within a system

A

What happens if they can’t access system/only certain parts?Can’t access output?Glitches+crashesIncompatibility-time formats,currenciesInterface language problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Moral issue

A

Issue with potential to help or harm anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Economic issue

A

Issue concerned with organisation of money,industry and trade etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Environmental issue

A

Problem concerned with protection of the natural world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Context definition

A

the background, environment, framework, setting or situation surrounding a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What are 2 considerations when considering a new system’s context

A

The extent of the new systemThe limitations of the new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What are some organisational issues when installing a new system? (1.1.1)

A

Software/hardware incompatibilityUser roles / the organisation restructure their workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Problems with changing a system (1.1.2)

A

Users may not like changeNew systems may omit old features ExpensiveOld systems may be faster in certain situationsData loss during migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Change management steps (1.1.2)

A

PlanCommunicateIntegrateEvaluate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Plan (1.1.2)

A

Business must first need a clear and valid reason for the change process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Communicate (1.1.2)

A

Communicating the change to the key stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Integrate (1.1.2)

A

Consult the stakeholders before enacting the change process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Evaluate (1.1.2)

A

Examining the stakeholders’ and end-users’ response to the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Legacy system definition (1.1.3)

A

An old method, technology, computer system or app that is no longer supported or available for purchase anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Risks with legacy systems (1.1.3)

A

More susceptible to security vulnerabilities and malwareIncreased maintenance costs-less hardware and software for the system, lack of IT staff with the skills for that specific systemIntegrating with other systems can be difficultCompliance risks-data protection and privacy laws etc.Inefficient operations-decreased productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Merger definition (1.1.3)

A

A combination of 2 entities or more, into one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Issues with mergers (1.1.3)

A

Software incompatibilityLanguage differencesTime zone differencesWorkforce cultural differences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Local software definition (1.1.4)

A

Where the software is installed on a particular computer or set of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Remote software (1.1.4)

A

Software that is installed on a server or computer somewhere on the internet to be used via a browser or specific local application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

SaaS (1.1.4)

A

Software distribution model where a third-party provider hosts applications and makes them available to clients over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Benefits of SaaS (1.1.4)

A

Minimises IT responsibilities and costsUseful for small businesses- subscription can be adjusted easily for their specific needsReduction in staff workload-IT workers don’t need to perform tasks associated with onsite hardware+software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Drawbacks of SaaS

A

Companies using multiple SaaS applications or trying to connect them with on site software may experience some integration issuesRelying on a third party to store your data and business processesBusinesses must be mindful of compliance regulations regarding storing data in a remote data centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

4 methods of implementing/installing a new system (1.1.5)

A

Direct changeoverParallel runningPilot runningPhased conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Direct changeover (1.1.5)

A

Old system is stopped and new one is started

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

+ves of direct changeover (1.1.5)

A

Minimal time and effortNew system is available immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

-ves of direct changeover (1.1.5)

A

No backup if new system fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Parallel running (1.1.5)

A

New system is initialised but old system is kept running alongside it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

+ves of parallel running (1.1.5)

A

Backup if new system failsOutputs from both can be compared-ensure new one is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

-ves of parallel running (1.1.5)

A

Expensive to run 2 systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Pilot running (1.1.5)

A

New system is tested using a small part of the organisationOnce it is running properly and all bugs have been fixed, it is implemented everywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

+ves of pilot running (1.1.5)

A

All features are fully tested-any bugs can be foundIf the new system fails only a small part of the organisation suffersStaff part of the pilot can train others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

-ves of pilot running (1.1.5)

A

No backup for subset of the organisation in the pilot group if new system fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Phased conversion (1.1.5)

A

New system is introduced in phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

+ves of phased conversion (1.1.5)

A

People can get used to new systemStaff training can be split into stages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

-ves of phased conversion (1.1.5)

A

No backup for new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Problems arising from data migration (1.1.6)

A

Incompatible file formats Data structure differences Validation rules Incomplete data transfers International conventions on dates, currencies & character sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Incompatible file formats (1.1.6)

A

Same piece of software may have different versions-data from one version may not be compatible with another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Data structure differences (1.1.6)

A

Data being moved from an array to a linked list etc. can cause problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Validation rules (1.1.6)

A

Rules applied to inputsIf different at destination than at source-data can be rejected and lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Incomplete data transfers (1.1.6)

A

Only part of data will be at destination-data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Differences in data/currency/character set (1.1.6)

A

In the UK, 3/5/18 means 3 May 2018, but it means 5 March in the USA The $ might mean US dollars, but could be taken to mean Zimbabwe dollars which use the same symbol but is worth significantly less. A set of character used in one country, e.g. ﷼‎ in Saudi-Arabia, might be copied as ?? on Russian computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Consequences of not running tests (1.1.7)

A

System that doesn’t work as expected-reduces productivity and end-user satisfactionSoftware may not be appropiate for intended purposeUndiscovered bugs in systemDecrease in organisation’s reliability and reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Static testing (1.1.7)

A

Involves verification Can include reviews, walkthroughs or inspectionsNo execution of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Dynamic testing (1.1.7)

A

Involves validationProgram is executed Can be done to test specific parts of the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Alpha testing (1.1.7)

A

Performed by internal employees of the organisationDone on the developer’s site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Beta testing (1.1.7)

A

Performed by clients/end-users not part of the organisationDone at client location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Black-box testing (1.1.7)

A

Testing software without knowing its internalsUses software interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

White-box testing (1.1.7)

A

Looks inside the softwareUses that knowledge to help with the testing process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

User acceptance testing (1.1.7)

A

Testing any new/updated system with its end usersChecks if it meets their expectations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Automated testing (1.1.7)

A

Method in software testing using machines to automatically execute tests and compare the results with the expected ones Usually done on large amounts of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

User documentation definition (1.1.8)

A

Any document that explains how to use the features and functions of a system to its end-users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Importance of user documentation (1.1.8)

A

Makes users aware of particular features that may not be obviousIf the documentation is simple-less training needed for users so system implementation is faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Types of user documentation (1.1.9)

A

Help filesOnline supportPrinted manuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Help files (1.1.9)

A

Files supplied together with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

+ves of help files (1.1.9)

A

Accessible any time when using programProvide general instructions on how to use systemGeneral instructions on solving common errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

-ves of help files (1.1.9)

A

Only can be used after system installationOnly deal with general errorsLack a search capability-have to look through the file for your specific solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Online support (1.1.9)

A

Web service hosted by the system’s developer to provide user documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

+ves of online support (1.1.9)

A

More extensive than help filesConstantly updated by developers with FAQsOften have live support-can talk to a real human operatorSearch capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

-ves of online support (1.1.9)

A

Reliant on internet connectionLive support can be ineffective with users unfamiliar with computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Printed manuals (1.1.9)

A

Manuals printed on paper and supplied with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

+ves of printed manuals (1.1.9)

A

Always availableHelp with system installationCan be read by users before they work with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

-ves of printed manuals (1.1.9)

A

Can be lost/destroyedUsually only provides help on system installationRarely updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Importance of user training (1.1.10)

A

Productivity is dependent on familiarity with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Methods of delivering user training (1.1.10)

A

Self-instructionFormal classesRemote training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Self instruction (1.1.10)

A

Users learn how to use the system on their ownUsually use a manual or watch a tutorial etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

+ves of self instruction (1.1.10)

A

Lowest costFlexible timelineTraining is specific to exactly what the user wants to learn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

-ves of self instruction (1.1.10)

A

Certain key features may be missed-learning is unstructuredUser may feel overwhelmed without guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Formal classes (1.1.10)

A

Users sit in a classroom listening to an instructor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

+ves of formal classes (1.1.10)

A

Structured learning environmentExpert on hand to answer questionsCurriculum covers all aspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

-ves of formal classes (1.1.10)

A

ExpensiveRigid schedule+curriculumHardly any personalisation

143
Q

Remote training (1.1.10)

A

Instructor training a user or a group of users via a form of remote connection

144
Q

+ves of remote training (1.1.10)

A

Structured learning environmentExpert on hand for questionsCurriculum covers all aspectsFlexible locations

145
Q

-ves of remote training (1.1.10)

A

ExpensiveComputer based-need basic knowledge to be able to join the meetings etc.

146
Q

Causes of data loss (1.1.11)

A

Hardware/system malfunctionsHuman errorSoftware corruptionMalwareNatural disastersMalicious activity of employees or intruders

147
Q

Things to think about when discussing consequences of data loss (1.1.12)

A

Can the data be replaced? How easy is the data to replace? Who will be affected by the data loss? Are there financial implications to the data loss? Are there ‘life-and-death’ consequences to the loss? Who is responsible for data recovery?

148
Q

Methods for data loss prevention (1.1.13)

A

Failover systemRedundancyRemovable mediaOffsite/online storage

149
Q

Failover system (1.1.13)

A

Failover-constant capability to automatically and effortlessly switch to a backup system

150
Q

Redundancy (1.1.13)

A

Condition in a database or another data storage technology where data is stored in 2 separate places at once

151
Q

Removable media (1.1.13)

A

Use of any storage device that can be removed from a computer while the system is still running

152
Q

Offsite storage (1.1.13)

A

Where data or applications are stored in a facility offsite to the organisation or core IT environment

153
Q

Online storage (1.1.13)

A

Where cloud storage is used to store data from backupsCloud resources and infrastructure can be used to create, edit, manage and restore data along with perform backups

154
Q

Release (1.1.14)

A

Process of launching a new product for a specific market or user base

155
Q

Update (1.1.14)

A

Software file that contains fixes for problems found by users or developersAlmost always free

156
Q

Patches (1.1.14)

A

Software update where code is inserted into the code of the programMay: -Fix a software bug -Install new drivers -Address security vulnerabilities

157
Q

How to get updates: (1.1.14)

A

Manually Automatically

158
Q

+ves and -ves of manual updates (1.1.14)

A

Full controlTime consuming

159
Q

+ves and -ves of auto updates (1.1.14)

A

No need to worry about updatesNo control

160
Q

Types of release management (1.1.14)

A

Continuous deliveryAgile software developmentDevOps

161
Q

Continuous delivery (1.1.14)

A

Teams produce software in short cyclesAllows more incremental updates to the application

162
Q

Agile development (1.1.14)

A

Requirements of the software evolve through collaboration between end users and cross functional teams within the organisationDone in iterations (sprints)

163
Q

DevOps (1.1.14)

A

Aims to unify software development and operationUtilises lots of automation Monitors each step of the software construction

164
Q

Network definition

A

Group of computer systems and nodes linked together via transmission media to allow for communication and resource sharing

165
Q

LAN characteristics

A

Local Area NetworkUses MAC addresses and switchesPrivate infrastructureUsually almost always use Ethernet protocol

166
Q

WAN characteristics

A

Wide Area NetworkIP addresses and routersPublic infrastructureCollection of other networks

167
Q

VLAN characteristics

A

Virtual Local Area NetworkGroup of nodes that appear to be on the same LAN despite not being geographically in the same areaSoftware implementedAble to quickly adapt to changes in the network requirements

168
Q

SAN

A

Storage Area NetworkSecure high speed data transfer networkAllows access to a centralised storage systemAllows multiple servers to access a network of storage devices

169
Q

WLAN

A

Wireless Local Area NetworkNetwork that uses radio-waves and usually an access point to the internetAllows the users to have mobility

170
Q

Internet

A

Uses TCP/IP protocols for data transmissionnetwork of networksGlobal communication systemBoth hardware and infrastructure

171
Q

Intranet

A

Private LAN that cannot be accessed remotely(only can be accessed via VPN or on the organisation’s premises)

172
Q

Extranet

A

Intranet that can only be accessed remotely via authenticationUtilised to allow 3rd parties to gain information without granting access to the entire network

173
Q

VPN

A

Virtual Private NetworkUses the internetAllows people to access a network remotely but encrypts the connectionData is transmitted through a secure pathway known as a tunnel-tunnelling

174
Q

PAN

A

Personal Area NetworkA network covering a very small areaBluetooth etc.

175
Q

P2P

A

Peer to Peer networkNetwork model where nodes are connected directly to one anotherDirectly exchange files and resources etc.

176
Q

Network standards definition

A

Rules followed by manufacturers of network hardware to ensure interoperability between devices

177
Q

Importance of standards

A

Allows devices to be compatible and communicate with each otherHelps ensure data transmission is secure-minimum latency and good integrity of dataAllows manufacturers to have a framework on which to build their system

178
Q

2 types of network layer models

A

OSI Network layer-7 layersTCP/IP Network layer-4 layers

179
Q

+ves of layers

A

New protocols can be added to each layer easilyChange to one layer doesn’t affect functionality of another layerSimilar protocols can be grouped into layers with a specific function in data transmission

180
Q

OSI Model layers

A

7 -Application6-Presentation5-Session4-Transport3-Network2-Data link1-Physical

181
Q

TCP/IP model layers

A

ApplicationTransportNetworkLink

182
Q

Function of application layer in TCP/IP model

A

Collects data to be transmitted

183
Q

Function of transport layer in TCP/IP model

A

Breaks up data into packetsAdds packet sequence numberAdds checksum

184
Q

Function of network layer in TCP/IP model

A

Adds IP addresses of the sender and receiver node

185
Q

Function of the link layer in TCP/IP model

A

Adds MAC addresses of sender+receiver nodePhysically transmits data as bits

186
Q

Comparison of TCP/IP and OSI model layers

187
Q

What 2 main technologies does a VPN use?

A

EncryptionTunnelling

188
Q

VPN encryption

A

Converting plaintext to ciphertext via a private keyNeed a decryption key to understand the dataComputers at each end of the tunnel encrypt incoming data and decrypt it at the other end

189
Q

VPN tunnelling

A

Tunnel-secure pathway through the public networkOn this connection packets are constructed via the specific VPN protocol format and sent privately over public networks via encapsulation

190
Q

VPN components

A

Client VPN softwareVPN infrastructureVPN server

191
Q

VPN infrastructure characteristics

A

Need to use specific VPN-routers and firewalls which allow legitimate VPN traffic to pass through

192
Q

VPN server characteristics

A

Handles and manages incoming VPN trafficEstablishes and manages VPN sessions and their access to network resources

193
Q

+ves of telecommuting

A

Improved productivityReduced costs for businesses and employeesFlexibility for the employeesNo need to commute to workLess environmental impact

194
Q

-ves of telecommuting

A

Social isolationLack of expertise or support on certain issuesNeed specific hardware and a network connection etc.May be more distractions in a home environment

195
Q

+ves of VPN

A

Allow for telecommutingImproves data security-encryption and tunnellingBypass geo restricted content via masking IP addresses

196
Q

-ves of VPN

A

Reliability of VPN is controlled by ISPNot all VPNs are compatible with products May lead to increased latency on the user’s connection if the nearest VPN server is very far

197
Q

Protocol definition

A

Set of rules for data communication over a network

198
Q

Data packet definition

A

Small unit of data that is used in network communication

199
Q

3 components of a data packet?

A

HeaderPayloadTrailer

200
Q

What is contained in the packet header?

A

IP address of sender and receiverMAC address of sender and receiverSequence number

201
Q

What is contained in the packet payload?

A

Actual data block

202
Q

What is contained in the packet trailer?

A

Check SumParity Bit

203
Q

Key functions of protocols

A

Maintain data integrityManage flow controlPrevent deadlockManage congestionError checking

204
Q

Data integrity definition

A

The overall completeness,accuracy and consistency of the data

205
Q

Flow control

A

Mechanism which ensures the rate at which data is being transmitted is in proportion with the receiver’s receiving capabilitiesEnsures receiving node is not overwhelmed with data

206
Q

Congestion control

A

Congestion-where a node or link carries so much data network service quality deterioratesThis leads to queuing delay,frame or data packet loss and new connections unable to be made

207
Q

Error checking

A

Techniques used to detect noise or other impairments introduced to data during transmissionUtilises parity bits and checksums

208
Q

Deadlock

A

Where 2 nodes/processes are trying to access the same node at once-neither is able to proceedRelevant protocol needs to stop and re-queue them

209
Q

Primary factors affecting speed of data transmission

A

TrafficNumber of users

210
Q

Secondary causes affecting speed of data transmission

A

Time of dayDistanceInfrastructureType of cabling

211
Q

Tertiary factors affecting speed of data transmission

A

Environmental issues(temperature etc.)Infrastructure limitations due to financial reasonsType of data being transmitted

212
Q

Compression definition

A

Encoding data to use fewer bits than the original version

213
Q

Lossless v lossy compression

214
Q

Uses of compression

A

Backups/archivingFile transferMedia file transfer over the webEncryption/protection

215
Q

Backups/archiving (compression)

A

Compressed data is smaller in size than original file-saves storage space

216
Q

File transfering (compression)

A

Fewer bits transferred per second-faster transmission ratesLower bandwidth needed for uploads and downloads

217
Q

Encryption/protection (compression)

A

Compressing files scrambles their data adding an extra layer of protection against any hackers etcReduces amount of data needing to be encrypted

218
Q

4 characteristics of transmission media

A

Security ReliabilityCostSpeed

219
Q

UTP-Unshielded Twisted Pair cables characteristics

A

Security-moderate if encryptedSusceptible to EMIRelatively cheapRelatively fast(faster than radiowaves)

220
Q

Fibre optic cables

A

Security-very secureGenerally quite fragile(glass)Very expensiveFastest transmission media

221
Q

Radio waves

A

Security-insecure unless encryption is usedSusceptible to interferenceTechnically freeQuite slow speeds

222
Q

Packet switching definition

A

Routing data packets through a network depending on the destination address contained in each packet

223
Q

Packet switching steps

A

Data is broken up into packetsRouted from source to destination using switches and routersThe most efficient routes for the packets are found via the MAC and IP addresses in the headerReassembled at destination using sequence numberChecked for errors using checksumIf any packets are missing data is retransmitted

224
Q

+ves of wireless networks

A

Radiowaves are technically freeNo need for cablingGlobal standardsMinimal set up costsAllows for user mobility

225
Q

-ves of wireless networks

A

InterferenceLimited rangeWAPs can be used to steal dataTransfer speeds are slower than wired networksEach WAP only has a finite amount of bandwidth

226
Q

Hardware components in a wireless network

A

NodesWireless NICRadio wavesConnection point(WAP etc)

227
Q

Software components of a wireless network

A

Network Operating System (with drivers)Protocol stackApplications

228
Q

Types of wireless networks

A

WiFiWimax3GLTE

229
Q

Wi-Fi (Wireless Fidelity)

A

Also known as WLANMost commonly used for home networksBackwards compatible with most older Wi-Fi standardsRelatively slow to quick data transmission

230
Q

WiMAX

A

Worldwide Interoperability for Microwave AccessLarge distance internet connectionsRelatively cheap

231
Q

3G (Third Generation)

A

Primary way mobile phones access the internet todayAllows tunnelling of phone linesRelatively fast

232
Q

Key factors concerning security

A

ConfidentialityIntegrityAvailability

233
Q

Why is system security difficult ?

A

Users’Arms race’-constantly evolving malware etc.Systems may have a weak point which can cause it to collapse

234
Q

One factor authentication

A

Something you know-password etc.

235
Q

2 factor authentication

A

Something you haveOTP etc.

236
Q

3 factor authentication

A

Something you areBiometrics etc.

237
Q

Firewalls

A

Hardware or software or combo of bothAnalyses data packets based on predetermined rulesActs as a filter monitoring incoming and outgoing network traffic

238
Q

MAC Address filtering

A

Hard-coded into devices by manufacturersCan be used to identify specific pieces of hardwareRouters can keep track of allowed and banned MAC addresses

239
Q

Physical security examples

A

Locks on doorsSecurity personnelReinforced roomsBarbed wire fences

240
Q

Encryption in wireless networks

A

Using algorithms to convert plaintext into ciphertext, so that it cannot be understood by any hackers3 main standards-WEP,WPA,WPA2

241
Q

WEP

A

Wireless Equivalent PrivacyVery quickly broken and replaced by WPA

242
Q

WPA and WPA2

A

WPA-intrusions could still occur from outside the networkWPA2-intrusion can only occur by those who have accessed the network previously

243
Q

+ves of userID

A

Access rights can be set for each userUser groups can be created-manage access rights in batches

244
Q

-ves of userID

A

userIDs can be stolenSystem can be bypassedNo protection against interception

245
Q

+ves of encryption

A

Strong encryption is very difficult to breakMaintains confidentiality of dataData is encrypted so even if transmission media is insecure, data is still secure

246
Q

-ves of encryption

A

Hard to encode-need specialistsComputationally expensiveSome encryption methods may have built in backdoors

247
Q

+ves of MAC filtering

A

Another layer of security

248
Q

-ves of MAC filtering

A

Danger of whitelist being discovered, so MAC addresses can then be spoofedDifficult to manage whitelistDoesn’t help against data interception

249
Q

+ves of firewalls

A

Effectively prevents unauthorised access to a network

250
Q

-ves of firewalls

A

May slow the networkIssues with censorship on a software firewall

251
Q

What does RAM do? (6.1.1)

A

Memory which stores currently running programs and data being used.

252
Q

Effect on system if RAM is too limited (6.1.1)

A

Part of secondary storage needs to be used as virtual memory (much slower than RAM)Less processes can be executed simultaneouslyIf virtual memory is not available, programs or data won’t load

253
Q

What does secondary storage do (6.1.1.)

A

Permanent storage of data and programs including vital programs such as OSNon-volatile

254
Q

Effect on system if secondary storage is too limited (6.1.1)

A

May not be enough space to permanently store programs and data-data loss occursNot enough space available to use virtual memoryLess data can be stored on the system in general

255
Q

What does the processor speed do (6.1.1)

A

Processor performs all calculations and instructions in a systemSpeed - measurement of how many instructions executed per second

256
Q

Effect on system if processor speed is too limited (6.1.1)

A

Processor takes longer to perform tasks

257
Q

What cores do (6.1.1)

A

Each processor has at least one core (ALU) which performs arithmetic and logic operations

258
Q

Effect on system if cores are limited (6.1.1)

A

Without multiple cores, tasks cannot be executed simultaneously More cores=more tasks executed simultaneously

259
Q

What is screen resolution (6.1.1)

A

Measurement of the number of pixels in the height x width of a display

260
Q

Effect on system if resolution is too limited (6.1.1)

A

Number of pixels displayed is lower-pixelated displayPoorer quality images but also smaller file size

261
Q

What does a sound processor do? (6.1.1)

A

Helps the system with sound reproduction and processing-frees up CPUAlso may contain bank of sampled sounds-helps to produce better quality audio

262
Q

Effect on system if sound processor is too limited (6.1.1)

A

CPU has to help with processing sounds-reduces system performanceOverall quality of audio is not as high without use of sound processor

263
Q

What does a graphics processor do (6.1.1)

A

Complex graphics processing-3D rendering etc.

264
Q

Effect on system if graphics processor is too limited (6.1.1)

A

CPU is less efficient at graphics processing-lower quality or slower

265
Q

What does cache do ? (6.1.1)

A

Stores instructions and data most likely to be requested next by the CPU from the RAMCPU doesn’t need to wait for instruction or data to arrive all the way from RAM

266
Q

Effect on system is cache is too limited (6.1.1)

A

CPU will have to wait longer for instructions/data to be fetched from RAM, decreasing performanceLess cache hitsSlower processing of common tasks on the system

267
Q

What is bandwidth (6.1.1)

A

Measurement of the amount of data able to be sent at the same time in a certain time frame

268
Q

Effect on system if bandwidth is too limited (6.1.1)

A

Lower data transmission speeds from one point to another-slower network performanceTakes longer to process data in its entirety

269
Q

What is network connectivity (6.1.1)

A

The type of network connection being used within a network

270
Q

Effect on system if network connectivity is limited (6.1.1)

A

Reduced data transmission speeds, and higher latencyPossibly more interference and transmission errors depending on the type of connection Lower download and upload speeds

271
Q

Mainframes:Processor, primary and second memory

A

Contains thousands of coresVast amounts of primary and secondary memory

272
Q

Common uses of mainframes

A

Virtualise smaller computersWeather/financial models and predictions

273
Q

Servers and server farms:Processor,primary and secondary memory

A

Many high spec PCs running in parallelVast amounts of primary memory (less than mainframes, more than PCs) along with secondary memory

274
Q

Common uses of servers and server farms

A

Serve networksData centres for cloud storageOnline data backups

275
Q

Desktop PCs: Processor,memory

A

Single processor, but multiple coresQuite a lot of primary ( less than servers) and secondary memory (much less than servers)Upgradeable

276
Q

Common uses of desktop PCs

A

Companies and schools with no need for portabilityGaming

277
Q

Sub-laptop (netbooks): processor and memory

A

Single or low multi-coreLimited RAMQuite little secondary storage,usually a SSD

278
Q

Common uses of sub-laptops

A

Personal computing devices

279
Q

Cell phones/mobiles: processor, memory

A

Single or multi-coreModerate RAMQuite limited secondary storageConstrained by screen size along with input options

280
Q

Common uses of cell phones

A

Personal computing devices

281
Q

Tablets: processor,memory

A

Single or multi-coreNot much RAMModerate secondary storage(less than PC)Very portable

282
Q

Common uses of tablets

A

Media consumptionPersonal computing device

283
Q

PDAs:processor,memory

A

Single coreVery limited RAM and secondary storage

284
Q

Common uses of PDAs

A

Not used that much anymoreCalendars/emailsDelivery drivers

285
Q

Digital camera:processor,memory

A

Single coreLimited secondary and primary memory,however secondary storage is expandable

286
Q

Common uses of digital camera

A

Higher end photography

287
Q

Think about consequences on a system of limiting which 5 things ?

A

Primary memorySecondary storageCPU speedCPU coresConnectivity

288
Q

Questions to think about and their consequence to the user (6.1.4)

A

If the processor is too slow? If the processor has only one core? If the amount of primary memory is limited? If the amount of cache is limited? If network connectivity is limited? If user access is limited to a single user per device?

289
Q

Multi-user system definition

A

Many users on the same machine or many users connected to the same network

290
Q

Multi-programming system definition

A

System that can have different programs installed

291
Q

Single programming system

A

Can only run one program/set of programs

292
Q

4 main functions of the OS (6.1.5)

A

Device configurationFile managementMemory managementInterface platform

293
Q

How does device configuration work with the OS? (6.1.5)

A

OS uses device drivers (software program that acts as a translator) to allow the system to communicate with peripherals

294
Q

How does managing primary memory work with the OS (6.1.5)

A

OS ensures each process runs in its own allocated memory spaceTherefore OS allocates and deallocates memoryPrevents overwritingEnsures a program has sufficient memory to run

295
Q

Virtual memory management with the OS (6.1.5)

A

Virtual memory is part of the secondary storage that is used as RAM when RAM is fullVirtual memory is transferred in the form of pagesData from RAM is temporarily transferred to secondary storage

296
Q

Managing secondary storage with the OS (6.1.5)

A

Provides structure and access methods for the storageKnown as folder-structureOS manages security access of these folders and files also

297
Q

Providing an interface with the OS (6.1.5)

A

User gives commands to computer and enters dataOS translates I/O and sends it to correct memory or folder address to be processedProvides link between user and computer hardware

298
Q

Time slicing

A

Multi-user system-time slice is set amount of processing time each user getsSingle user system-time slice is set amount of processing time each program getsAllocating a fixed period of time to each process for which they are allowed to runCPU time is allocated dependent on time and priority

299
Q

Interrupt handling (6.1.5)

A

Function of the OS which is executed when an interrupt is detectedInterrupt-signal to processor emitted by hardware/software indicated an event needs immediate attention

300
Q

Security management with the OS

A

Utilises authentication and access rightsIn multi user systems OS also isolates each users tasks, data and programs along with controlling access rights to specific parts of memory and secondary storage

301
Q

Parallel processing with the OS (6.1.5)

A

Multi-core systemsUtilises prioritising where highest priority tasks are executed until a higher priority task appearsScheduler sorts tasks into order of priority

302
Q

Main resource management techniques (6.1.7)

A

SchedulingPolicies and mechanismsMultitaskingVirtual memoryInterruptPolling

303
Q

Scheduling (6.1.7)

A

Action of deciding which processes can occur when and for how longAllocating CPU time amongst running programs and tasks

304
Q

Policies (6.1.7)

A

Policies-what is to be doneMechanism-how it is to be donePolicies are rules followed by the system in order for it to run as effectively and safely as possible

305
Q

Multi-tasking (6.1.7)

A

The OS allows more than one program or task to be executed simultaneously on a systemOS keeps track of the progress of each of these tasks and allows you to move from one to another without any loss of information

306
Q

Virtual memory + paging (6.1.7)

A

Feature of the OS where secondary storage is used as an extension to RAMInvolves transferring pages from RAM to VM when you are running many programs or large onesOS is constantly swapping data between the 2 locationsOS will transfer back pages they need from VM and then send other pages to the VM so there is space for these needed pagesMemory manager determines this by sending the least-used page usually to VM

307
Q

Interrupt (6.1.7)

A

Signal emitted by hardware or software indicating an event needs immediate attentionOS responds first suspending its current activities,saving these tasks then execute an interrupt handlerAfter interrupt handler is finished the system resumes its previous activities

308
Q

Polling (6.1.7)

A

Process of where OS regularly checks another device or peripheral in order to see its status(ready or not)Often done with low-level hardware

309
Q

Dedicated OS definition (6.1.8)

A

OS designed for a specific device or purpose

310
Q

+ves of a dedicated OS (6.1.8)

A

Higher level of security-developers can restrict possible entry methods for malware etc.Can be customised for maximum speed and efficiency for whatever specific device or purpose it is being used forSince you know the purpose and hardware for the OS, developers can eliminate elements of a typical OS which may not be needed in this scenario(less resource usage)

311
Q

Abstraction (6.1.9)

A

In general, it is omitting the unnecessary and complex info in a systemIn OSs certain hardware details may be hidden and higher-level functions may be provided

312
Q

Drive letters (6.1.9)

A

Single A-Z letter assigned to a physical drive or drive partition in a systemExample of abstraction

313
Q

Virtual memory (example of abstraction) (6.1.9)

A

OS handles paging in the optimal manner to maximise performance, we can just alter settings of virtual memory

314
Q

Java virtual machine (6.1.9)

A

Interprets compiled Java binary code for a computer’s processor Each platform has its own JVM

315
Q

Control system definition

A

Device/set of devices that manages,commands or regulates the behaviour of other devices or systems

316
Q

2 main types of control systems

A

Open-loop control systemsClosed-loop control systems

317
Q

Key features of an open-loop control system

A

Non-feedback system(output has no impact on control action of input)No self correction of errors

318
Q

Examples of open loop control systems

A

ToasterElectric hand dryerAutomatic washing machine

319
Q

Key features of a closed loop system

A

Utilises feedback-output can influence control action of inputOutput is measured to be compared with inputSelf correction can then occur based on the output

320
Q

Examples of closed loop systems

A

Air conditionerCentralised heating system

321
Q

Main steps in control systems operation cycle

A
  1. Analogue inputs taken from the sensors 2.Analogue data converted to digital using ADC 3.Digital data is processed by the microprocessor and digital output generated 4.Digital data converted to analogue using DAC 5.Output executed using actuators
322
Q

Automated doors features (example of control system)

323
Q

Heating system (example of control system)

324
Q

Microprocessor definition

A

Computer system that contains all the functions of a CPU

325
Q

Sensor definition

A

A device that converts a physical stimulus into a readable output

326
Q

Actuators function

A

Part of a device or machine that helps it with physical movementConverts energy into mechanical force

327
Q

Accessibility input devices examples

A

Adapted keyboardBigger keysErgonomic(help with Carpal Tunnel Syndrome)Adapted mouse,trackball and joystickErgonomic mouseXbox Adaptive Controller(large buttons+is affordable)USB mouse with a large trackball

328
Q

Assistive technology examples

A

Screen readersScreen magnification softwareAlternative input devicesMotion/eye trackingHead pointersSpeech input software

329
Q

Medical sensors examples

A

Airflow sensorBody temp sensorAccelerometerElectrocardiogram sensor

330
Q

Transducers definition

A

A device which converts signals from analogue to digital and vice versa

331
Q

+ves of transducers

A

Compatible with microprocessors and computersEase of convertibility between analogue and digitalRemote controllability

332
Q

What is feedback?

A

Modification or control of a process or system by its results or effects

333
Q

Examples of processes that use feedback

A

Missile tracking moving targetA heating system in a houseAuto-pilot

334
Q

Embedded system definition

A

A computer system within another mechanical or electrical device with a specific purpose

335
Q

Tagging prisoners-arguments for:

A

Allows non-dangerous criminals to moveReduces number of people needed to be in prisonAllows for tracking at all times

336
Q

Tagging prisoners-against

A

Could be hacked to track innocent peopleTracking data could be sold to make moneyLoss of freedom of movement

337
Q

Surveillance

A

Monitoring/observation from a distance using electrical equipment

338
Q

Arguments for surveillance

A

Greater securityCan be used as evidence in court casesFewer people need to monitor others-physical security replaced by cameras etc.

339
Q

Arguments against surveillance

A

Loss of privacyCould be hacked and used for malicious purposesUtilised to spy on people

340
Q

CCTV-how it works

A

Video surveillance techniqueWorks independently to monitor a certain area

341
Q

Arguments for CCTV

A

Reduces crime-deterrentCost effective solution to criminal damagePeople may feel safer

342
Q

Arguments against CCTV

A

Doesn’t stop crimeExpensive to install and maintainMay be used for illegal spying

343
Q

What is a centralised control system?

A

Control system where all processing occurs at a single, central location such as a microprocessorMicroprocessor controls numerous terminals (sensors/actuators)

344
Q

What is a distributed control system?

A

Control system where multiple decentralised microprocessors control multiple sensors and actuatorsThese terminals all communicate with one another via a network

345
Q

+ves of centrally controlled systems

A

Easier to maintain-everything is managed centrallyMore controlCheaper-just need one microprocessor

346
Q

+ves of distributed systems

A

Quicker accessSharing of tasks and resourcesNo single point of failureResponse will be more specific to environment

347
Q

-ves of centrally controlled systems

A

Single point of failureSlower processing-single processor has to manage all terminals and respond to all sensors etcActuators will be less responsive to their environments

348
Q

-ves of distributed systems

A

Much more expensive-multiple microprocessors and sensorsMuch more complex-harder to maintain Harder to fix any potential errors

349
Q

What is an autonomous agent?

A

Software entity that carries out a set of operations on behalf of a user or another program with some degree of independence

350
Q

4 key features of an autonomous agent

A

A-autonomyB-reactive behaviourC-concurrency/socialityD-persistence

351
Q

Autonomy key features

A

Self activation-agents don’t need to be triggered to perform a taskNo human intervention-agents can select task themselves without human intervention

352
Q

Reactive behaviour key features

A

Agent senses environment it is in (use of sensors) and decides what to do

353
Q

Concurrency/sociality key features

A

Agents able to interact with other agents through communication in various modesInclude coordination,cooperation and competition

354
Q

Persistence key features

A

Code describing an agent runs continuously like a processNot executed on demand