Prelim Work Flashcards
What is computer architecture and name some parts of it.
This is the make up of a computer system. This includes many computer features such as processors, memory, cache, data bus, address bus, control bus and other buses. You should know about the data bus and address bus, not the control bus, that’s not in the prelim.
What’s a virtual machine/emulator?
A computer that exists in the real world has an operating system that manages the hardware and software of the computer system. A virtual machine is a computer that runs software to emulate the functions of a real world computer. A virtual machine can be used by organisations to run software applications that are not available for then operating system platforms for real computers.
What is a data bus?
This bus is used to transfer data between main memory and the processor. It is a two way bus since data can be transferred from a memory location to the processor and vice versa.
What is the address bus?
This is used to specify the address of the memory location that is to be read from or written to. This bus is a one-way bus, since the processor will use it to specify which memory location it is going to use; but the reverse does not apply.
What is R.A.D?
RAD- The rapid application development methodology was developed in response to the need to deliver systems very fast. However the RAD approach is not appropriate to all projects. RAD reduces development time.
Name 3/5 users that will need to be taken into account accessibility wise.
Physical disabilities that prevent the user from holding or controlling a mouse.
Physical disabilities that prevent the user from typing or from using a keyboard.
Users with poor vision.
Colour blind users.
Blind users.
What is encryption?
Encryption is the conversion of data into a form that cannot be understood by unauthorised people.
What is open source software?
This refers to code used within a program, if ‘open source’ this means that the code is free to see and access is allowed to public.
What is propriety software?
This is the term for when source code is guarded and the general public is not allowed to see the code involved or access it in any way.
What is distributed storage?
Cloud storage is storage made available by hosting companies from which you can purchase it from. Rather than saving your storage on a physical hard drive you can use storage available on the severs.
What is a digital certificate?
This is an electronic passport that allows a person, computer or organisation to exchange information securely over the internet using the public key infrastructure.
What is the regulation of investigatory powers act? What did it do?
This act governs the use of covert surveillance by public bodies. This includes bugs, video surveillance and interceptions of private communications. (Eg phone calls and emails).
What is a “Lifetime carbon footprint”?
This is how much of a carbon footprint a device will leave in it’s lifetime.
What did the computer misuse act of 1990 introduce?
Gaining access to data held on a computer without permission e.g.
Gaining access to data held on a computer with the intention to commit a criminal offence. E.g. Hacking into the banks computer and wanting to increase the amount in your account.
Altering data held on a computer without permission. E.g. Writing a virus to destroy someone else’s data.
If a company refused to let police search their encrypted emails what law would they be breaking?
The regulation of investigatory powers act.
What is a “Dry Run”?
This technique involves stepping through the program through the programs instructions and manually working out on paper how the program variables.
Examples of variable types in pseudo code are: (4)
Integer
Real
Boolean
Character
What are examples of structured types? (3) Begin with (A) (S) (B)
Array, String, Boolean.
Examples of sub programs? (2)
Procedure, function.
Name some examples of assignments in psuedocode: (1)
Set to
Name some examples of conditions (3)
If
Then
(Else)
End if
Examples of fixed repetition (3)
Repeat… Times
End repeat
Example of iteration in psuedocode? (9)
For
From
To
Do
End for
For each
From
Do
End for each
Input/output examples in psuedocode? (7)
Receive from
Send to
Open
Close
Create
Examples of predefined functions? (1)
Id(parameters)
Think of the code that would be used for Input validation in psuedocode.
REPEAT
Receive mark FROM KEYBOARD
If Mark 100 THEN
SEND [“Not possible. Try again!”] To Display
End If
Until Mark >= 0 AND Mark
Think of some psuedocode for a linear search.
Set position TO 0
Receive Search Value FROM KEYBOARD
REPEAT
IF item (position) =search value
Send [search value] to DISPLAY
END IF
SET position to Position +1
UNTIL Position = No of items in list.
Think of some psuedocode for Finding the maximum value in a list.
Set Position to 0
Set Max to item (position)
FOR position from 1 to no of items in a list -1 do
IF item (position) > Max THEN
Set max to item (position)
END IF
END FOR
SEND [“The maximum value is”, Max] TO DISPLAY.
Think of some psuedocode for finding a minimum value in a list.
SET Position to 0
SET Min to Item (position)
FOR position FROM 1 to no of items in list -1 DO
IF item (position)
Think of some psuedocode for detecting counting occurrences.
SET count to 0
RECEIVE SearchValue FROM KEYBOARD
FOR position FROM 0 TO No items in list -1 DO
If search value = Item(position) THEN
Set Count TO Count +1
END IF
END FOR
SEND [Count] TO DISPLAY
Graphic compression method?
LZW- This looks for commonly repeated patterns of bits that are stored in a look up table. Each pattern is allocated an index number, so that the index number can be stored instead of pattern.
Clut- This is a facility that enables a subset of colours to be stored as q local palette.
Different between Client side and Server Sid scripting?
Client side scripting languages is when the scripting language is executed on the client computers of a network.
Server side scripting languages are the class of scripting languages that are executed on the server computers of a network.
What are web crawlers?
Crawlers are programmes that automatically “crawl” around the web searching for pages to include in search engine databases.
What is a ‘Bot’?
This is software that performs an automated task over the Internet that would be time consuming, repetitive or impossible for a human.
Types of denial of service attacks?
Bandwidth consumption: This attack degrades the performance of a server by sending it a large amount of data packets in a short period of time.
Resource starvation: An attack can consume other resources apart from bandwidth in order to bring down a server.
What is symmetric encryption?
This is the more basic than Asymmetric encryption. It encrypts data by using a secret key and encryption algorithm.
What is Asymmetric encryption?
Asymmetric encryption is more complex than regular encryption, as it uses a combination of public and a private key to encrypt data.