Last Minute Revision Flashcards

1
Q

Assembler

A

a computer program that will take the mnemonics used in assembly language and convert them into machine code so they can be processed by the computer. This is done by converting one word assembly instructions into opcode, and allocating memory to variables, often resulting in an operand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Check Digit

A

checks to see if an error has occurred by doing some mathematical calculations, normally with one or two digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Double Entry

A

used in situations where the same identical piece of data needs to be entered twice, such as when changing a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Format Check

A

checks the format of something, e.g. that a postcode or NI number has been entered correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Length Check

A

restricts how many characters can be entered into a text box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lookup Table

A

reduces error, used in situations such as to select a title from a menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Presence Check

A

checks something has been entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Range Check

A

checks data is between two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Address Bus

A

where the address of the data is communicated to main memory. The width (number of wires) defines the amount of physical memory that can be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control Bus

A

used to tell the memory or device which operation is to be performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Bus

A

a series of wires that connects the processor to the main memory (RAM) or cache memory. Can be used to read from or write to memory. Characterised by its width.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Audio Port

A

connector to plug ANALOGUE audio signals into a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Visual Interface

A

to connect a video source to a computer monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethernet

A

mainly used for networking and internet connectivity, carries broadband signals between different wired internet-capable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

High-Definition Multimedia Interface

A

used to transfer audio/visual data to compatible monitors/IDTV/video projectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IEEE1934 Interface / Firewire

A

used for high speed data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PS/2 Connector

A

a six-pin connector used to connect mice and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Universal Serial Bus

A

allows high-speed connectivity with peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attribution Licence

A

allows work to be shared, copied and modified, but the creator must be credited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Non-Commercial Licence

A

allows work to be shared, copied and modified, but the creator must be credited and the work cannot be used to make a profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

No Derivative Works Licence

A

allows work to be shared and redistributed, but not modified in any way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Share-Alike Licence

A

allows work to be shared, copied and modified, but the creator must be credited and the modified work must be released under the same terms as the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

First Data Protection Principle

A

processing of personal data for any of the law enforcement purposes must be lawful and fair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Second Data Protection Principle

A

the law enforcement purpose for which personal data is collected on any occasion must be specified, explicit and legitimate, and personal data so collected must not be processed in a manner that is incompatible with the purpose for which it was collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Third Data Protection Principle

A

personal data processed for any of the law enforcement purposes must be adequate, relevant and not excessive in relation to the purpose for which it is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fourth Data Protection Principle

A

personal data processed for any of the law enforcement purposes must be adequate, relevant and, where necessary, kept up to date, and every reasonable step must be taken to ensure that personal data that is inaccurate, having regard to the las enforcement purpose for which it is processed, is erased and rectified without delay

27
Q

Fifth Data Protection Principle

A

personal data processed for any law enforcement purposes must be kept for no longer than is necessary for the purposes for which it is processed

28
Q

Sixth Data Protection Principle

A

personal data processed for any of the law enforcement purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical and organisational measures

29
Q

Fetch-Decode-Execute Step 1

A

The fetch cycle takes the address required from the memory, stores it in the instruction register, and moves the program counter on one so that it points at the next instruction.

30
Q

Fetch-Decode-Execute Step 2

A

The control unit checks the instruction in the instruction register. The instruction is decoded to determine the action that needs to be carried out.

31
Q

Fetch-Decode-Execute Step 3

A

That actual actions that happen during the execution cycle depend on the instruction itself.

32
Q

FOIA exemption 1

A

correspondence with royal family

33
Q

FOIA exemption 2

A

information relating to criminal investigations

34
Q

FOIA exemption 3

A

information where disclosure may cause a specific type of harm

35
Q

FOIA exemption 4

A

information that would breach health and safety

36
Q

FOIA exemption 5

A

information prejudicing law enforcement

37
Q

FOIA exemption 6

A

information prejudicing someone’s commercial interests

38
Q

Bitmap Image

A

a type of raster image and is composed of many tiny parts, called pixels, which are often many different colours. It is possible to edit each individual pixel

39
Q

Raster Graphics

A

dot matrix data structures representing a grid of pixels and cannot scale up without loss of apparent quality. They tend to be large in terms of the memory required to store them

40
Q

Vector Graphics

A

allow the graphic to resize without losing quality, unlike the other two. This is because they use geometrically primitive objects such as points, lines, curves and shapes or polygons which are based on mathematical expression to represent images.

41
Q

Layer 1

A

Applications Layer

tells the computer how data is to be used

42
Q

Layer 2

A

Presentation Layer

changes the data into a form that can be read

43
Q

Layer 3

A

Session Layer

tells whether it is full or half-duplex

44
Q

Layer 4

A

Transport Layer

how data is going to be transported, broken up and put back together

45
Q

Layer 5

A

Network Layer

how things are sent across e.g. traffic control, uses internet protocol, keeps addresses of different computers to each computer, decides routes which data takes

46
Q

Layer 6

A

Data Link Layer

says how quickly it will be carried

47
Q

Layer 7

A

Physical Layer

the raw bit of data that streams over the physical medium

48
Q

RIPA Power 1

A

powers concerning interception of telecommunications

49
Q

RIPA Power 2

A

powers concerning acquisition of telecommunications

50
Q

RIPA Power 3

A

powers concerning intrusive surveillance

51
Q

RIPA Power 4

A

powers concerning covert surveillance

52
Q

RIPA Power 5

A

powers concerning CHISs and UCOs

53
Q

RIPA Power 6

A

powers concerning access to encrypted data

54
Q

Translation Stage 1

A

Lexical Analysis

takes the sequence of characters you wrote and translates it into a series of tokens, removing any white space, allowing the computer to see the collection of typed words

55
Q

Translation Stage 2

A

Symbol Table Construction

created to store variable names and subroutines, checking that variables have been declared properly

56
Q

Translation Stage 3

A

Syntax Analysis

checks to ensure the code conforms to the rules of that particular language, eg for missing semi-colons

57
Q

Translation Stage 4

A

Semantic Analysis

checks to ensure the program makes sense, eg checking that variables have been given suitable types and have been declared before use

58
Q

Translation Stage 5

A

Code Generation

the tokens are translated into object code

59
Q

Translation Stage 6

A

Optimisation

optimises the program for the processor that it is run on, stopping the process from doing unnecessary work

60
Q

Scheme

A

either http or https

61
Q

Subdomain

A

part of the URL after http or https, for example www.

62
Q

Second Level Domain

A

after www.

63
Q

Top Level Domain

A

for example .com

64
Q

Sub Directory

A

after .com