Miscellaneous Flashcards
What is a search engine
a SOFTWARE PROGRAM WHICH SEAERCHES A DATABASE OF OINTERNET ADRESSES TO LOCATE RESOIRCES SEARCHED FOR BY CLIENT CRITERIA
hOW IS A PROGRAMMKNG LANGUAGE USED IN DECLARITIV LANGUIAGES
dETERMINE how to acheiive result best way whilst abstraction details of the process from the user
2 pros of static linkers
Kess compatibility issues as updates to modules/libraries will not affect program and specific versions of modules and libraries can be used
3 uses of client side processing
Initial data validation
Web page interactivity
offline web
second normal for m
No partial dependencies so has to rely on all of primary key
third normal form
No non key dependencies
What is consitency
- A transaction must maintain the referential integrity rules between linked tables
Database consistency ensures that a database remains in a valid state before and after any transaction. This means that any data written to the database must adhere to all predefined rules, constraints, and relationships
Space for merge
n
space for quick
log n
time for quick
n squared
What is compression
The process of making a file smaller/take up less storage
What is an expert system
a piece of software which uses databases of expert knowledge to offer advice or make decisions in such areas as medical diagnosis.
Cons of dynamic linkers
Your executable file may not run if the libraries are missing, outdated, or corrupted. Second, it degrades the performance of your program, as it introduces the overhead of loading and resolving the library symbols at run time.
What is disk defragmentation
a utility that will better organise files on the hard disk so that the operating system can access them more efficiently
what is an overhead
any combination of excess or indirect computation time, memory, bandwidth, or other resources that are required to perform a specific task
Difference between get and post requests used for http
GET is for fetching data, appending parameters in the URL, ideal for searches. POST, used for updates, sends data securely in the request body, perfect for forms.
When are pages and segments transferred onto main memory
When they are needed
How could mameory be changed for instructions and data
Instrictions read only and data rea /write, larger word size used to instructions
What is word size
the amount of data a CPU’s internal data registers can hold and process at one time
What type of access does RAM offer
Direct access
What is 7 DIV 2
3
What does breadth first traversal use
Queues
What does depth first traversal use
Stacks
What is the system stack
LIDO data structure in memory
A
<a> sss </a>
What do co processors help with
Floating point arithmetic and graphics processing
What is referential integrity
Ensures the consistency of the data in a database. Generally, you would want to enforce referential integrity in a database.
It requires that, whenever a foreign key value is used it must reference a valid, existing primary key in the parent table
Durability
Changes resulting from a transaction are straightaway written back to permanent storage and not held in volatile memory (RAM). You never have to click Save in a database and a sudden power cut won’t mean a transaction is lost.
What is RAM a form of
Primary memory and is volatile
What does multi taskign allow
Multiple programs to run at same time
What is a firewall
A hardware device/piece of software that
monitors (and filters/blocks) traffic/packets going
to and from a network. (
Why would a firewall be used
Prevent unauthorised access to a network. (1)
To restrict applications that are used internally that
have internet access. (1)
To restrict websites that can be accessed from within
the company. (1)
To protect the company’s data/intellectual property.
What else do you need to do when removign node from linked list
create a new node but no that is for adding
How does compression save money
Using less bandwidth or data usage
What do hash tables allow
Direct access
What does RLE rely on
Consecutive pieces of data/characters being the same
What happens in dictionary encoding
Frequently occuring pieces of data/groups of characters are replaced by symbols/tokens a dictionary is then used to say which symbols/tokens mathcn which group of characters
How is dictionary decpompressed
Dictionary used to replace tokens with original text
Remember space
Is a character
What is RLE suited for
simple images not natural language
When should you send the key to decrypt something
When you want it to be decrpyed
What does TEN DAT 10 do
- Stores the value 10 (1)
- In a memory location (1)
- Given the label/symbolic address ten (1)
What changes value in PC
Branching
and
Outputs it
RIGHT SHIFT
Moves everything to right so divides by 4 does not move decimal to right
What is a hash
A result generated by applying an algorithm/numeric
process to a valu
What are some AI techniques
AI techniques include neural networks, evolutionary computation, Bayesian
networks etc.
What is AI the study of
Artificial Intelligence (AI) is the study of computers displaying intelligent
behaviour (usually characterised by decision making)
When could the use of humans be unethical
And in the case of certain tasks (e.g. surgery) would make the use of
human workers unethical
Difference between ID and class
Only one element can have a given id/id is unique.
(1)
Class can be used assigned to multiple
elements/used multiple times. (1)
Do you need speech marks in css
No
Disadvantages of client side example
- Won’t work if JavaScript is disabled. (1)
- Shows incorrect message if user’s computer’s
clock is wrong/in different time zone. (1) - (Source) code is visible allowing it to be
copied/modified. (1)
Libraries
Can have been written in dif language!
What do symbol tables in lexical analysis also hold
Scope and data type
wHAT ELSE DONE in lexical analysis
White space and stuff removed
Amount of CPU is left idle
ok
What happens if a swap is made in a bubble sort
A flag is set to determine wether another pass needs to be made (if it is flag is reset)
Why would chefs use a linked list
Orders can be processed in the order they are in the queue
Orders can be inserted at any place in the list e.g. high priority item
inserted earlier in the list
Orders can be deleted from any position in the list once they are
complete
List is dynamic…
… to allow orders to be added / deleted
Concurrent processing what are individual processes
Threads and each of them has a life line
How does depth first work
Depth-first goes to left child node when it can…
If there is no left child it goes to the right child
when there are no child nodes the algorithm ‘visits’ it’ and backtracks to
the parent node.
What can be used to represent elements of a problem with abstraction
Symbols
What is recursion a type of
A subroutine
Advantage and disad of compilers and interpreters
Code needs to be interpreted each time it is run however it is not platform dependant
Why do compilers require more memory
Generates Object Code which further requires linking, hence requires more memory. whereas interpreters do not generate object code
Give two examples of reusable components
Objects and functions
What is ISR
a software routine that hardware invokes in response to an interrup
What does a secondary index require
Increases data need to be kept consistent
Secondary index is not
Less accurate
Method of capturing temperature
Thermistor
What is thinking ahead
the planning of inputs, ouputs and preconditions that the program will adhear to. By ‘Thinking Ahead
What does cashing free
Bandwidth on the network for other tasks
What is a virtual core
A CPU that has separation between two areas of the processor is
Are procedural and OOP imperitive or declaritive
Imperitive
2 specific things about lists
sequenced and abstract
4c or c1
4C
header html
header not head as different