Past paper 2021/22 Flashcards

1
Q

List some peripheral devices

A

monitor, printers, keyboards, external hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What will increase the speed of a computer?

A

adding additional RAM or processors, increasing the bus speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of storage is a USB an example of?

A

Solid State Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which entity relationship should be removed using a link entity?

A

Many to many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which language is the closest to english?

A

High Level Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe an interpreter?

A

translates source code into object code one instruction at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key features of operating system?

A

Device Management, Interrupt Management, Memory Management, File Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A User Interface…

A

Is an intermediary between the user and the computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Memory…

A

Stores segments of data from RAM on other storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Local Area Network…

A

Operates over a single building or complex. It can be a star or bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An Interrupt….

A

Is used to move the processor onto another task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When starting up the computer, what software is key part of the start up process?

A

Boot Loader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which are the kinds of external attacks?

A

Data Sniffing, Virus, Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which are parts of the TCP/IP Protocol Suite?

A

Transmission Control Protocol and User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTML is used for….

A

Encoding Webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device is handled by the Device Manager?

A

A printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A while loop checks its condition…

A

At the beginning of the loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Two common types of user interface are….

A

Graphical and Command Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Fetch-Execute cycle refers to…

A

The way the processor handles instructions

20
Q

Components that are a part of the CPU

A

CU, ALU, Registers, Cache, Buses, Clock

21
Q

A primary key is…

A

The unique field used to identify a record

22
Q

A foreign key…

A

Used as an attribute in another table to link tables through providing relationships

23
Q

Which device will lose stored data without power?

A

Main Memory

24
Q

With a sorted list of 500 items, how many iterations will a Binary Search take in the worst case to find the target?

25
In OOP, an instance represents
An object create from a class
26
In Relational Databases, each level of Normal Form represents...
Reduced opportunity for errors to arise
27
Describe a relational database?
A series of interlinked tables
28
What is recursion?
A procedure calling itself
29
In Hardware, the role of a Bus is...
Moving data around within the computer
30
The cache provides the CPU with...
Access to a smaller, faster area of memory
31
Which are the standard data types used in programming languages?
Boolean and Integer
32
What does HTTP stand for?
Hyper Text Transfer Protocol
33
What are the elements of the Translation process?
Lexical Analyser and Parser
34
If an algorithm is more efficient, its theta notation will....
be smaller
35
Describe the Fetch-Execute cycle
Fetch: Retrieve the next instruction from memory Decode: Decode the bit pattern Execute: Perform the action described
36
What is an algorithm?
An ordered set of unambiguous, executable steps that defines a terminating process
37
What are the differences between TCP and UDP?
TCP is more reliable and UDP is more efficient
38
Order the components of the internet
Tier 1, Tier 2, Access, End Systems
39
An organisation known as ______ is responsible for allocating _____ to ISPs, which then distribute these to their customers. This organisation is also responsible for maintaining the register of _____ names.
ICANN, IP addresses, domain
40
Describe Public-key encryption, how it secures messages and which messages it can secure?
A method of encrypting data with two different keys. A public key matches to a private key. Data encrypted with the public key can only be decrypted with the matching private key.
41
Describe Binary Search algorithm
Identify middle entry. Round up or down. Compare to target. Eliminate above or below. Call self with remainder. Repeat until result found. Feed back the result to the parent. Present final result.
42
What is an internal bus system and what does it having a different size affect?
A type of data bus that only operates internally in a computer or system. The number of physical wires, the size of memory location and the total amount of memory affects the size
43
Four differences between Verification and Validation?
static vs dynamic no execution vs execution human vs computer low level vs high level
44
4 types of external attacks a networked computer may be subject to
malware, phishing, hacking, brute force attack
45
There are a number of protocols used commonly on the internet: ___ and ____ are used for email, while ___ is used for sending files from place to place. The ____ protocol is used to encrypt communication for remote terminal access and _____ is used for accessing traditional webpages.
POP3, IMAP, FTP, SSH, HTTP