Paper 2 Flashcards

chapters 5 - 12

1
Q

Intermediate code

A

code which is not directly executable, it will be interpreted/run by a virtual machine and can be run on different platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

advantages of an interpreter

A
  • used for testing - don’t have to run the entire code
  • translated line-by-line and therefore can run with errors
  • the program can be executed immediately and doesn’t have to wait to be compiled
  • when executed, the interpreter and source code are always required.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

advantages of a compiler

A
  • more secure as you can’t access the source code
  • translated all at once into object code
  • once compiled, it can run at any time
  • when executed, the compiler isn’t needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

compression

A

the process of reducing the number of bits required to represent data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

bitmap

A

pixels of an image are mapped to positions in memory that store binary codes which represent the colour of each pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

pixel

A

the smallest possible addressable area (smallest solid block) of colour in an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cartesian product

A

combining the elements of 2 or more sets to create a set of ordered pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

subset

A

a set where the elements of one set are entirely contained within another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

proper subset

A

where one set is entirely contained within another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

real numbers

A

any number that can represent a distance along a line. this includes all rational numbers and all irrational numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

limitations of caesar cipher

A
  • computationally insecure
    • letter frequency analysis can be used to determine the shift
    • there are only 25 possible shifts
  • key exchange problem - key needs to be wecurely sent to the recipient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

encryption

A

the process of converting plaintext into cyphertext which cannot be understood without the key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

why was unicode introduced?

A
  • to share more characters across more languages
  • can represent a wider range of characters
  • however, it uses more bits for each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why is hexadecimal used?

A
  • easier for humans to read and understand
  • more compact when displayed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

advantages of thin-clients

A
  • easy and cheaper to set up new clients
  • hardware and software updates only need to occur on the server
  • easier for the network manager to control clients
  • greater security due to reduces access rights for clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

thick-client system

A

resources are distributed between the server and the client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

thin-client system

A

one computer has the majority of the resources and it distributes these resources to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

features of a public IP

A
  • globally unique
  • visible to all devices on the internet
  • routable
  • direct connect to internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

features of a private IP

A
  • locally unique
  • not visible to devices outside the LAN
  • non- routable
  • connects to internet through a gateway
20
Q

differences between JSON & XML

A

JSON is easier to read, more compact, and quicker to parse than XML

21
Q

concurrent access

A

two users try to update the same record at the same time

22
Q

serialisation

A

ensures only one transaction at a time is executed

23
Q

primary key

A

an attribute which uniquely identifies a record in a table

24
Q

composite key

A

a collection of attributes which uniquely identifies a record in a table

25
Q

foreign key

A

an attribute in a table which corresponds to the primary key field of a different table

26
Q

what are check digits and how are they calculated

A
  • added to the end of binary data to check (but not correct) the date is accurate
  • it is calculated by applying a function to the value, until the result is a single number

e.g. 12975 -> 1+2+9+7+5 = 24
2+4 = 8//

27
Q

MIDI (musical information digital interface)

A

a way of representing the sounds made by an instrument

28
Q

clock

A

device that generates the signal used to synchronise the components of a computer

29
Q

software

A

programs to be executed by hardware

30
Q

cardinality

A

the number of elements in a set

31
Q

utility programs

A

performing specific tasks to assist the computer

32
Q

library programs

A

compiled routines which other programs can use

33
Q

object code

A

compiled code which can be run as an executable file

34
Q

processor

A

executes programs and supervises the other parts of the system

35
Q

RAM

A

holds instructions and data for programs currently running. the contents of RAM are lost when the computer is turned off

36
Q

registers

A

fast memory location inside the processor

37
Q

factors affecting processor performance

A
  • increasing the word length
  • increasing the bus width
  • multi-core
  • cache memory
  • doubling clock speed, doubles processor performance
38
Q

cache memory

A

temporary memory that’s separate from main memory and can be accessed much more quickly, so programs can run faster.
Increasing cache memory increases the speed at which programs can accessed

39
Q

logical bus topology

A

data packets are broadcast to all devices, but only the intended recipient processed the information

40
Q

packet switching

A

a method for transmitting packets of data on a network (usually the internet)

41
Q

world wide web

A

a service provided on the internet for viewing hypertext documents

42
Q

when to use peer-to-peer LAN’s

A
  • there are a small number of devices
  • the users are all located in the same area
  • security is not an issue between peers
43
Q

laser printers

A

a rotating drum inside the printer is coated in a chemical which holds an electrical charge. the laser is reflected onto the drum via a rotating mirror. the laser neutralises the electric charge on the drum where the image should be black. the toner is given a positive charge and the drum picks up the toner. the drum is rolled onto paper, the toner is transferred to the paper. the paper is heated to fuse the toner to the paper.

44
Q

digital still camera

A

the shutter opens and lets light in through the lens. the light is focused onto a sensor, usually a CCD. the sensors are made up of millions of transistors, each stores the data for a pixel. as the light hits the sensor, the amount of charge is recorded for each pixel as binary. camera uses 3 sensors per pixel (R,G,B)

45
Q

optical disk

A

data is encoded as a series of bumps or pits within the track. a protective layer is then put over the surface to prevent corruption. pattern of pits represent binary data.
when the CD is read, pits and lands are read by a laser which then interprets an electrical signal. electrical signals are then converted to binary