P1 Flashcards
Logic gates hierarchy
Not
And
Or
compatibility issues that may occur when two information technology (IT) systems are merged.
Application software cannot run on a particular CPU architecture;
Software cannot run on an operating system;
Computer hardware components may not run with a CPU architecture/bus/motherboard;
Inability of software to interact with files;
Different data representation (units/conventions i.e., dates/currency etc.);
Identify two usability problems that can occur in a voice recognition system
number of rejected/hypothesized words (speech commands); number of audio signal issues (users being either too loud, too slow or too fast/noisy environment – means decreased accuracy of speech recognition); difficulty distinguishing between similar sounding words; different dialects/accents which the system may not be able to deal with; limited database of commands;
State three pieces of information that a data packet must contain.
Data; Protocol; Packet number; Total number of packets; Sender’s IP address; Receiver’s IP address; Control bits/Parity bit/Check digit/Time to live (hop limit);
Outline what is meant by a virtual machine.
A virtual machine (VM) is software that runs programs; without being tied to a physical machine
Identify three functions of the control unit (CU) in the central processing unit (CPU).
Fetches/extracts each instruction from memory;
Decodes/transforms them into several commands/signals/steps (that are passed to the ALU or I/O
or other components in the CPU for execution);
Controls the movements of data within the CPU;
Generates the clock pulses that regulates speed of the instruction cycle;
Generates control signals for all hardware components to regulate their activities;
Synchronizes all the operations of the CPU;
Explain the use for VPNs
Security when working remotely;
VPN’s data encryption features (putting data into a coded format so its meaning is obscured)
before giving the access to data;
VPN allows access to any content in any place;
Because it enables users to send and receive data across shared or public networks as if
their computing devices were directly connected to the private network;
VPNs hide the location/hidden IP address;
Protects the privacy of data;
A VPN will prevent apps and websites from attributing the doctor’s behaviour to her
computer’s IP address/can limit the collection of the location and browser history from the
Internet Service Provider(ISP);
Outline the function of a web browser.
web browser allows users access to information/resources on the WWW;
(when a user asks for a particular website) the web browser fetches the required content
from a web server/ acts as an interface between a client and server;
prepares the retrieved information to be displayed/ interprets the content to be rendered in
a format that can be understood/ displays the resulting web page on the user’s device;
allows user to navigate around website/ open more than one web page/ print/ save page/ etc.
Outline one reason for using Unicode to represent data in a computer system.
Because Unicode is (an established) standard for data representation/ a single encoding scheme
for all languages and characters;
Because of the difference between ASCII and Unicode in the number of bits used to encode
(ASCII (8-bits) and Unicode (16/32 bits);
It can represent over a million characters/ ASCII cannot be used to encode the many types of
characters found around the world;
Because Unicode can be defined with different character encoding like UTF-8, UTF-16, UTF-32,
etc.;
And is used to represent many (over a million) characters from many (more than 150) modern and
historic scripts (along with emoji)
Explain the use of cache memory.
Cache memory is (an extremely) fast memory type;
that acts as a buffer between RAM and the CPU;
it holds frequently requested data and instructions;
so that they are immediately available to the CPU when needed;
Outline what is meant by a collection.
A collection is a term used to describe a data structure designed to contain multiple elements of
any type;
and methods which make this data useful; Accept example methods, such as methods given in IB
pseudocode: hasNext(), getNext(), resetNext(), etc. ;
Collection is a container of discrete values;
Usually of the same type (primitive data values and also some other data
structures);
(But) collection objects can be of different types (pointers afford a flexibility and thus collection objects permit references to any data structure as well as to primitive values);
Collections have a set of methods that define operations performed on the elements/objects of that collection;
Which reduces programming effort (because implementations of data structures
and algorithms are provided);
Which increases performance of the program (because efficient implementations
are provided);
Outline what is meant by the term “abstraction”.
one of the key concepts of OOP languages;
to decompose complex problems;
Hide / remove unnecessary details;
look for recurring patterns;
Outline the meaning of the term “legacy system”
Legacy system is an outdated computer system/(application) software that is still in use/ still
meets the needs it was originally designed for/ is essential for the organization;
it cannot be updated /does not receive support and maintenance/ doesn’t allow for growth/ is
incompatible with current (new) more advanced solutions;
Explain one problem that may occur during data migration.
Data loss/data available in legacy system but after migration process it is not available in the
new system;
because data is accidentally deleted/ something causes data to become corrupted/ viruses/
physical damage/incomplete transfer;VPN
cost involved in rectifying data loss leads to financial risk for the organization / sets back
productivity / reputation risk (can cause the organization to lose customers);
Data Corruption/ Data integrity;
format and content of data in legacy system and new system is different / incompatible data/
anomalies or redundant or duplicated data or presence of non-meaningful data;
this affects the efficiency/ it can totally beat purpose of migration;
State two technologies that are required to provide a virtual private network (VPN)
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);
Explain why data compression would be used when data is transmitted.
(Because) compression reduces the size of a file/ size of data/ the number of packets to be
transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;
State two characteristics of a linear array.
Predetermined size (size should be known in compile time / it should be known in advance
how many elements are to be stored in array);
Fixed size (once the memory is allocated to the linear array, it cannot be increased or
decreased);
An array holds elements that have the same data type;
Array name represents the address of the starting element, all elements of an array can be
distinguished using an index number (direct access to each element);
Array elements are stored in subsequent memory locations;
Identify two differences between a wide area network (WAN) and a local area network (LAN)
WAN covers a much larger area (national/international), LANs usually cover a smaller area
(such as a single site);
LANs are more secure than WANs (due to how WANs transmit the data /how far the data would
need to travel);
A higher bandwidth is available for transmission in a LAN than a WAN/ LANs can have a
higher data transfer rate than a WAN;
LAN is typically cheaper than WAN to implement/ maintain (as the equipment required for LAN is
less expensive);
WAN includes a large number of devices connected together, LAN includes less;
WANs are typically slower than LANs due to the distance data must travel;
Identify one function of a single-user operating system.
Memory management
Outline one reason for the use of standards in the construction of networks.
Standards ensure compatibility between nodes on the network;
Through the use of common techniques/protocols/language;
Describe two appropriate techniques to gather the information needed to find a suitable solution for the updated system.
Examining current systems (using interviews/ surveys/direct observation);
To compare the existing system against possible requirements to identify missing features;
Examining competing products;
To compare own system with competitors to enable decisions on features to add;
Review of organizational capabilities;
To determine how well the organization manages resources to gain an advantage over
competitors;
Identify two fundamental operations of a computer.
Add;
Compare;
Retrieve;
Store;
Define the term variable
Variables define areas in memory in which values (data) are stored;
Variables are unique identifiers that retrieve values from the memory addresses at which they are
stored;
Variables are the names one gives to computer memory locations which are used to store values in a computer program;
Identify two roles that a computer can perform in a network.
Client; Server/email server/DNS server/file server; Router; Firewall;