Prelim Work Flashcards

0
Q

What is computer architecture and name some parts of it.

A

This is the make up of a computer system. This includes many computer features such as processors, memory, cache, data bus, address bus, control bus and other buses. You should know about the data bus and address bus, not the control bus, that’s not in the prelim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What’s a virtual machine/emulator?

A

A computer that exists in the real world has an operating system that manages the hardware and software of the computer system. A virtual machine is a computer that runs software to emulate the functions of a real world computer. A virtual machine can be used by organisations to run software applications that are not available for then operating system platforms for real computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a data bus?

A

This bus is used to transfer data between main memory and the processor. It is a two way bus since data can be transferred from a memory location to the processor and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the address bus?

A

This is used to specify the address of the memory location that is to be read from or written to. This bus is a one-way bus, since the processor will use it to specify which memory location it is going to use; but the reverse does not apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is R.A.D?

A

RAD- The rapid application development methodology was developed in response to the need to deliver systems very fast. However the RAD approach is not appropriate to all projects. RAD reduces development time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 3/5 users that will need to be taken into account accessibility wise.

A

Physical disabilities that prevent the user from holding or controlling a mouse.

Physical disabilities that prevent the user from typing or from using a keyboard.

Users with poor vision.

Colour blind users.

Blind users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

Encryption is the conversion of data into a form that cannot be understood by unauthorised people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is open source software?

A

This refers to code used within a program, if ‘open source’ this means that the code is free to see and access is allowed to public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is propriety software?

A

This is the term for when source code is guarded and the general public is not allowed to see the code involved or access it in any way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is distributed storage?

A

Cloud storage is storage made available by hosting companies from which you can purchase it from. Rather than saving your storage on a physical hard drive you can use storage available on the severs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital certificate?

A

This is an electronic passport that allows a person, computer or organisation to exchange information securely over the internet using the public key infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the regulation of investigatory powers act? What did it do?

A

This act governs the use of covert surveillance by public bodies. This includes bugs, video surveillance and interceptions of private communications. (Eg phone calls and emails).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a “Lifetime carbon footprint”?

A

This is how much of a carbon footprint a device will leave in it’s lifetime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What did the computer misuse act of 1990 introduce?

A

Gaining access to data held on a computer without permission e.g.

Gaining access to data held on a computer with the intention to commit a criminal offence. E.g. Hacking into the banks computer and wanting to increase the amount in your account.

Altering data held on a computer without permission. E.g. Writing a virus to destroy someone else’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a company refused to let police search their encrypted emails what law would they be breaking?

A

The regulation of investigatory powers act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a “Dry Run”?

A

This technique involves stepping through the program through the programs instructions and manually working out on paper how the program variables.

16
Q

Examples of variable types in pseudo code are: (4)

A

Integer

Real

Boolean

Character

17
Q

What are examples of structured types? (3) Begin with (A) (S) (B)

A

Array, String, Boolean.

18
Q

Examples of sub programs? (2)

A

Procedure, function.

19
Q

Name some examples of assignments in psuedocode: (1)

A

Set to

20
Q

Name some examples of conditions (3)

A

If

Then

(Else)

End if

21
Q

Examples of fixed repetition (3)

A

Repeat… Times

End repeat

22
Q

Example of iteration in psuedocode? (9)

A

For

From

To

Do

End for

For each

From

Do

End for each

23
Q

Input/output examples in psuedocode? (7)

A

Receive from

Send to

Open

Close

Create

24
Q

Examples of predefined functions? (1)

A

Id(parameters)

25
Q

Think of the code that would be used for Input validation in psuedocode.

A

REPEAT

Receive mark FROM KEYBOARD

If Mark 100 THEN

SEND [“Not possible. Try again!”] To Display

End If

Until Mark >= 0 AND Mark

26
Q

Think of some psuedocode for a linear search.

A

Set position TO 0

Receive Search Value FROM KEYBOARD

REPEAT

IF item (position) =search value

Send [search value] to DISPLAY

END IF

SET position to Position +1

UNTIL Position = No of items in list.

27
Q

Think of some psuedocode for Finding the maximum value in a list.

A

Set Position to 0

Set Max to item (position)

FOR position from 1 to no of items in a list -1 do

IF item (position) > Max THEN

Set max to item (position)

END IF

END FOR

SEND [“The maximum value is”, Max] TO DISPLAY.

28
Q

Think of some psuedocode for finding a minimum value in a list.

A

SET Position to 0

SET Min to Item (position)

FOR position FROM 1 to no of items in list -1 DO

IF item (position)

29
Q

Think of some psuedocode for detecting counting occurrences.

A

SET count to 0

RECEIVE SearchValue FROM KEYBOARD

FOR position FROM 0 TO No items in list -1 DO

If search value = Item(position) THEN

Set Count TO Count +1

END IF

END FOR

SEND [Count] TO DISPLAY

30
Q

Graphic compression method?

A

LZW- This looks for commonly repeated patterns of bits that are stored in a look up table. Each pattern is allocated an index number, so that the index number can be stored instead of pattern.

Clut- This is a facility that enables a subset of colours to be stored as q local palette.

31
Q

Different between Client side and Server Sid scripting?

A

Client side scripting languages is when the scripting language is executed on the client computers of a network.

Server side scripting languages are the class of scripting languages that are executed on the server computers of a network.

32
Q

What are web crawlers?

A

Crawlers are programmes that automatically “crawl” around the web searching for pages to include in search engine databases.

33
Q

What is a ‘Bot’?

A

This is software that performs an automated task over the Internet that would be time consuming, repetitive or impossible for a human.

34
Q

Types of denial of service attacks?

A

Bandwidth consumption: This attack degrades the performance of a server by sending it a large amount of data packets in a short period of time.

Resource starvation: An attack can consume other resources apart from bandwidth in order to bring down a server.

35
Q

What is symmetric encryption?

A

This is the more basic than Asymmetric encryption. It encrypts data by using a secret key and encryption algorithm.

36
Q

What is Asymmetric encryption?

A

Asymmetric encryption is more complex than regular encryption, as it uses a combination of public and a private key to encrypt data.