Paper 2 Flashcards
Four functions of an operating system:
- Processor management
- Memory management
- Storage management
- Network management
Low level language:
- Code is not translated using a compiler
- Code can directly manipulate computer registers
It is a program translator
Assembler:
Translates assembly language into machine code.
How does an interpreter work:
- Interpreters don’t produce machine code, so the program needs to be translated each time it’s executed.
- They call machine code subroutines withhin their own code to carry out their commands
- Translates a line at a time, which it then executes
- If a runtime error is found, the interpreter stops
Why do computers have more RAM than cache memory?
- RAM is cheaper
- Cache memory is not enough to store both data and programs
Two advantages of using cloud storage, rather than local storage:
- Cloud storage is automatically backed up by the host
- Allows user to access their data from more devices
Many new computers use solid-state storage for secondary storage rather than magnetic storage.
Explain why solid-state storage is not fitted to every new computer.
- SSD’s are expensive
- They have a lower capacity than magnetic hard drives
Sample resolution:
Number of bits per sample
Differences between a Local Area Network (LAN) and a Wide Area Network (WAN):
- LAN’s and WAN’s use different protocols
- WAN’s are slower than LAN’s
- WAN’s have a larger number of users
Give three advantages of using a wireless network instead of a wired network:
- Users can move around whilst using their device
- Able to add users/devices to the network
- No need to install cabling
- BUT, BANDWITH IS LOWER THAN WIRED NETWORKS
System software:
Controls computer hardware
Application software:
Is for ending user tasks
e.g social media application or gaming software
Network protocols:
A set of rules for how devices communicate and how data is transmitted. Covers how communication between two devices should start and end.
Security measures:
- Two-factor authentification, asks for a second form of identification
- Biometrics- biometrics is unique to the individual, prevents hackers
Why might data be compressed?
- Reduces file size
- Uses less memory
Relational database
A database with multiple tables that are linked together.
ADVANTAGES- reduces data inconstistency
- Saves storage space
Foreign key:
A field that references the primary key in a different table.
What are the equations of file size?
- File size (in bits)- image size * colour depth
- File size (in bits)- Sample rate (Hz) * sample resolution * length (s)
Network protocol 1- the APPLICATION LAYER:
Sends web pages, using an encrypted connection(e.g. http/s).
Network protocols 2- the TRANSPORT LAYER:
Sets up communication between two devices, splits data into packets, checks if packets are correctly sent and delivered (e.g. TCP).
Network protocols 3- the INTERNET LAYER:
Adds IP adress to packets, directing them between devices. Used by routers (e.g. IP)
Network protocols 4- the LINK LAYER:
Passes data over the physical network. Responsible for how data is sent as electrical signals over cables (e.g. wifi)
Increase sampling rate- effects:
- The file size would increase
- The more samples means that the sound would be recoded at a higher quality
RAM
- Is used for main memory
- Is used for volatile memory
- Temporary storage of instructions and data
- Holds information being executed by the processor
- Much faster than the hard disk
Factors that affect CPU performance- clock speed:
Clock speed:
* The more pulses per second, the more fetch-execute cycles
* Higher clock speed- more instructions can start per second
Factors that affect CPU performance- the number of processor cores:
Number of processor cores:
* Different processor cores deal with different types of instructions
* Each processor core can fetch it’s own instruction- increases the speed at which instructions can be executed.
Factors that affect CPU performance- Cache size:
Cache size:
* Instructions take less time to transfer to the processor from cache
* Because cache is held closer to the processor
Computer network:
- Two or more computers
- Connected together
How does two-factor authentification work?
- Asks for a second piece of identification
- Such as something you know
Data privacy concerns
(wireless network):
- Malware infiltration- Wifi is more exposed to an attack because it is visible
ASCII
7 bits per character. Room for 2^7= 128 characters.
Disadvantages: Does not have enough characters for many languages.
Unicode
Represents thousands of characters.