Important questions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Outline what is meant by a database management system.

A

Database management is an application software;
That allows users to define/create/maintain a database/provides (controlled) access to the data.
Examples of database applications are computerised library, flight reservation, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how data is transmitted by packet switching.

A

Packet switching involves data being separated into specially formatted units (packets);
Each packet contains data and information such as packet number, address that identifies the sending computer and the intended receiver.;
Packets are routed from source to destinations using (different) network switches and routers;
Using these addresses, network switches and routers determine how best to transfer the packet on the path of its destination ;
Packets are reassembled at the destination using packet numbers;
If any of packet is missing it should be retransmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distinguish between random access memory (RAM) and read only memory (ROM).

A

RAM acts as temporary storage of data, instructions and programs
currently running (for the operating system and for the running applications)
whilst ROM is permanent memory (stores the instructions and data that
won’t change/stores the instructions that the computer needs in order to
boot up;
Memory access, both read and write operations are performed on RAM
whilst ROM works with read only operation;
If power failures happened during access to RAM then all data will be
permanently lost/RAM is volatile memory/whilst if power failure happened
during the ROM access no data will be lost/ROM is non-volatile memory;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Outline the function of an operating system in managing primary memory.

A

OS (memory management unit) uses virtual memory which provides secondary memory (external storage) for program that does not have enough space in RAM for execution;
After execution of the program this memory is reallocated (used by other programs)/freed;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the roles of the data bus and the address bus in the machine instruction cycle

A

Bus is defined as a system that transfers data between hardware
components/data bus and address bus enable a processor to communicate with
the primary memory;
When the computer processor needs to fetch an instruction from the memory it
uses the address bus to specify the (physical) address (of the memory block it
needs to access);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Outline the need for higher level languages.

A

Higher level languages are closer to human language;
So programmers find them easier to understand/work with than lower level languages;
HLL saves programmer from knowing details of computer architecture (and using
all the specific (machine) instructions);
So giving more time to creating/developing the best way of coding a
problem/process of coding is simpler and more understandable;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain two benefits of using sub-procedures within a computer program.

A

Problem could be divided into smaller/easier parts;
Which means solving easier/smaller parts of the problem for one programmer; Or for a team of programmers, each programmer could work on different smaller parts;
Simpler testing;
Each part of the program could be separately tested;
By the programmer who created the code or someone else in the team of programmers;
Reusable code;
Sub-procedures already written/tested could be used in various programs;
Simpler maintenance and changes;
Could be done only on required sub-programs;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify three characteristics of a collection.

A

Collections have a set of methods that define operations performed on the
elements/objects of that collection;
Such as adding/removing elements to/from collection, comparing elements of
collection, searching, etc;
Which reduces programming effort (because implementations of data structures
and algorithms are provided);
Which increases performance of the program (because efficient implementations
are provided);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the purpose of the following hardware components of a network

(i) router
(ii) Network Interface Card (NIC)

A

(i )A network router is a hardware device that is connected to multiple channels for different networks;
through an interface that is situated on each network;
Router acts as a processing unit for information packets;
it duplicates information packets for use during transmission from one network to another;
The router uses a protocol or set of rules;
to determine which information packets are to be routed to certain interfaces within the network;

(ii) Network interface cards are used to connect each computer to the network; so they can communicate with the network router to receive information packets;
Interface cards determine the infrastructure of a local area network (LAN); and allow all of the computers to connect to the network;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Outline why protocols are necessary.

A

Protocols define the rules that govern network communication (for example, packet format, type and size, what happens when an error occurs, and which part of the network is supposed to handle the error and how);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the term data encryption.

A

Data encryption refers to calculations/algorithms that transform plain text into a form that is non-readable to unauthorized parties (authorized recipient of an encrypted text uses a key and the algorithm to decrypt the data/ to transform
it to the original plain text version);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Evaluate the use of trusted media access control (MAC) addresses as one method of network security.

A

Each (wireless network) adapter has a unique label called a MAC address;

Routers uses these addresses to identify/authenticate computers (routers include an option to whitelist or blacklist certain devices based on MAC addresses, so access could be restricted to any device which is not in the whitelist);

One disadvantage is that the whitelist should be amended any time a new device is purchased / when access to guests should be granted;

Also this method is useless against hackers who use programs which intercept data passing through network and report the MAC address of any device communicating on the network;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define the term client

A

A client is a computer network that utilises the resources of other network computers including other clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the term Server

A

A server is a network computer that share resources with and responds to requests from other network computers , including other servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A school has a local area network (LAN) connecting its computers and peripheral devices.
The LAN also provides access to the internet.
(a) Describe the role of a router in this network.

A

controls the flow of data in the network;
inspects address of data packets;
directs to the appropriate network path/ selects a path between networks (by inspecting address of data packets);
securely transmits data packets (across that path toward the intended destination);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline two reasons why there might be a reduction in data transmission speed at
certain times.

A

malicious software/spyware/malware / viruses; attacking the system;

the type of connection;
valid outline for the slow down (depending on the type of connection);

hardware malfunction;
internet speed can considerably slow down if modem-router configuration is not correct / updated;

external factors;
during the peak hours of daytime the most visited websites encounter more network traffic than what has been anticipated;

17
Q

Outline two measures that the school could take to safeguard its data from unlawful
access via the internet.

A

Preventing unauthorized access/No access without user names/passwords; which should be regularly changed/made difficult to guess;
Data should be encrypted;
Allowing only those with decrypting code access;
Teachers/students should be trained for safe practices;
to create a risk-conscious /security-aware culture within the school;
Installation of virus checkers/spyware software;
to prevent damage to data files or the system / to prevent data being extracted from the files/system;

18
Q

Outline one feature of a word processor that could reduce the amount of typing
required when writing letters.

A

Auto-correct/short sequences/codes;
can be used to represent longer phrases;
N20/4/COMSC/SP1/ENG/TZ0/XX/M
Mail merge;
allows production of many letters by only typing the (body of a) letter once;
Voice recognition; allows easy entry of text;

19
Q

State the purpose of technical documentation provided with software

A

Technical documentation explains how to install software;

Technical documentation describes the hardware configuration/operating system needed (to install this software);

20
Q

Describe the steps involved in using the bubble sort algorithm to sort an array.

A
  • Goes through a list of data that needs to be sorted, compares a pair of adjacent data and swaps the data if needed.
  • Keeps passing through a list repeatedly until no swaps are needed (sorted).
  • It is very slow.
21
Q

Define the term peripheral.

A

A peripheral is an external (computer) device that is connected to a computer, such as
a keyboard;

22
Q

Identify two features of a graphical user interface (GUI).

A

Menus;
Dialogue boxes; Windows; Icons;
Pointers; Buttons;

23
Q

Outline the purpose of the memory address register (MAR) in the central processing unit (CPU).

A

The MAR holds the memory location of data/instructions; …that need to be accessed (read/write) (fetch/store);

24
Q

Outline one reason why protocols are used in communications between computers.

A

To provide a set of rules/procedures;
To enable two or more different electronic devices/computers/entities to understand each
other during data transfer / enable successful communication;

25
Q

Explain how data is transmitted by packet switching.

A
26
Q

State the purpose of persistent storage on the computers.

A

To store programs / files / data in a non-volatile device so it isn’t lost;
Stores more data as it has a larger capacity;

27
Q

Identify two types of general application software that would be installed on the training computers.

A

Word processor;
Spreadsheet;
Database management system; Email;
Web browser;

28
Q

The company has decided to allow the teachers to use their own devices in its training room by adding wireless networking.
(d) (i) Outline one advantage to the company of implementing this change.

A

May save money;
Due to not having to supply all the training computers;
May be able to increase the size of the training group; Which may generate more income;
Trainees / teachers likely to be more familiar with software on own machine
(and how new training software interacts with OS / user interface);
Making training sessions more efficient / allowing trainer to concentrate on
the training rather than using generic applications;

29
Q

Outline one disadvantage to the company of implementing this change.

A

May cause security issues;
Due to multiple users having network access from their “unsecured” devices;
May interfere with running of training sessions;
As some machines may not be compatible;

30
Q

Describe one method of security that may be used on this wireless network.

A

Encryption;
Scrambles the contents of the network transmissions so that if they are intercepted they can’t be understood (without the decryption key);
User ID (and password);
Only allows authorized users to access the network;
Media Access Control (MAC) addresses;
Unique identification codes embedded in networkable equipment so that only authorized equipment may access the network;
Firewall;
Checks traffic coming into the network and leaving the network, and can block
suspicious data;

31
Q

Explain why the speed of data transmission on the wireless network in the training room may vary.

A

The speed of data transmission (on a wireless network) slows down; The further the receiver is from the transmitter;
Passing through obstructions such as solid walls;
Can slow down transmissions (on a wireless network);
The bandwidth available for transmission on a wireless network is finite;
So, transmission speeds can be affected if the number of users on the network increases;

32
Q

Outline the role of the memory data register in the machine execution cycle.

A

Holds (a copy of) the contents of the memory;
Which are to be transferred from/to memory to/from other CPU components; Allowing the processor and memory to act independently/processor not affected by differences in the speed of operation;

33
Q

Explain the importance of the memory management function of an operating system.

A

Allocates and de-allocates memory/ assignes blocks of memory to programs; Ensures a program has sufficient memory to run/manages virtual memory if needed; To avoid overwriting /clashing of programs/optimise system performance/maximise memory usage

34
Q

Define the term concurrent processing.

A

Processes/task are carried out simultaneously/at the same time;