"SDD" Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

three different types of design methods

A

rapid application development, agile methodologies, top down design // waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Memory write operation

A

> the processor sets up the address bus with the register memory address by placing it in MAR
the processor sets up the data bus with the value to be stored in memory by placing it in MDR
CU activates write line on control bus
the address bus opens the relevant memory location at that address
the contents of the memory data register are released and sent along the data bus into the memory location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

pre-defined function: random letter lowercase // character

A

randomletter=int(randrange(97,122)

chr(randomletter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

efficient

A

ability to solve the problem without using too much memory and processing time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Memory read operation

A

> the processor sets up the address bus with required memory address by placing in the MAR
CU activates the read line on the control bus
the address bus opens the relevant memory location at that address
the contents of the memory location are released, sent along the data bus and into the MDR
data is then decoded and executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is corrective maintenance

A

fixing the bugs that slipped though the testing stage by updating the section of code containing the error. This is then released as a software patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most expensive to cheapest

Registers, USB/Flash Memory,CPU Cache, RAM

A

Registers, CPU Cache, RAM, USB/Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

standard algorithm for: counting occurrences (8)

A
  1. 1 occurrences = 0
  2. 2 take in value to find
  3. 3 for each item
  4. 4 if current item = value to find then
  5. 5 occurrences = occurrences + 1
  6. 6 end if
  7. 7 next item in list
  8. 8 display occurrences
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IN

A

By Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IN/OUT

A

By Reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

portable

A

ability of the program to be run on different operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is module library

A

contains a set of pre-written and pre-tested subroutines of code that are available to programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Largest to smallest capacity

Registers, USB/Flash Memory,CPU Cache, RAM

A

USB/Flash Memory, RAM, CPU Cache, Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an advantage of using agile design methodologies

A

they should respond to unpredictability and cope with rapid change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

pre-defined function: length

A

len()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the ____ bus identifies the location

A

address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

7 stages of software development

A
analysis
design
implementation
testing
documentation
evaluation
maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

low level language

A

represented by 1’s and 0’s. processors only understand these digits. this is known as machine code. harder for us to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is adaptive maintenance

A

takes into account new conditions such as the customer getting new hardware or software. it updates your software to work under new conditions such as a new operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

agile methodologies

A

a repetitive process that increases bit by bit through iterative and incremental development - are able to respond to unpredictability and cope with rapid change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what does the NON-MASK-ABLE INTERRUPT line do

A

Message from peripheral device causes the processor to stop processing current task. Current data is stored in a temporary area called the stack. The processor deals with the interrupt. The data is then retrieved from the stack and the task is resumed. This cannot be ignored or prevented.
(used to indicate that an interrupt to the fetch/execute cycle is taking place that cannot be ignored)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are dry runs / trace tables in systematic testing

A

a mental run of the program where the programmer examines the code one step at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

an execution error is when

A

the program crashes due to unexpected input whilst it was running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ascii (#bits)

A

(7bits) 2^7=128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

how to get binary for negative number

A

find the binary representation
flip the bits (turn the 1’s into 0’s and vice versa)
add 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

systematic testing involves

A

going through a progression from testing the subroutines and working your way up to testing the entire system. The sort of testing is planned in advance and followed in a logical order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fastest to slowest

Registers, USB/Flash Memory,CPU Cache, RAM

A

Registers, CPU Cache, RAM, USB/Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what does the RESET line do

A

resets the computer to its initial switch on state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

binary addition rules

A

0+0=0
1+0=1
0+1=1
1+1=1 0 (2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what does the INTERRUPT line do

A

Message from peripheral device causes the processor to stop processing current task. Current data is stored in a temporary area called the stack. The processor deals with the interrupt. The data is then retrieved from the stack and the task is resumed.
(used to indicate that an interrupt to the fetch/execute cycle is taking place)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

a procedural program has

A

a clear start and endpoint and follows through the path to give solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

three different types of programming languages

A

procedural, object orientated, declarative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

storing video depends on the:

A

length / time (seconds)
frame rate (fps)
bit depth (bits)
number of pixels in one frame (pixels)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

high level language

A

is similar to human languages easier to understand and spot errors and is more readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

standard algorithm for: finding max (7)

A
  1. 1 max value = first item in list
  2. 2 for each item in list
  3. 3 if next item > max value then
  4. 4 max value = next item
  5. 5 end if
  6. 6 next item in list
  7. 7 display max value
36
Q

what is the implementation stage

A

writing or implementing the code using a particular programming language

37
Q

colours = [number]

colour depth = ?

A

log₂(number)

38
Q

By Val is when

A

a value is passed into a procedure but isn’t passed out.

39
Q

7 stages of software development

A

analysis, design, implementation, testing, documentation, evaluation, maintenance

40
Q

a syntax error is when

A

the program crashes as a result of incorrectly written code.

41
Q

audio =

A

length/time x sampling freq. x no. channels x sampling depth

42
Q

standard algorithm for: finding min (7)

A
  1. 1 min value = first item in list
  2. 2 for each item in list
  3. 3 if next item < min value then
  4. 4 min value = next item
  5. 5 end if
  6. 6 next item in list
  7. 7 display min value
43
Q

a object orientated program involves

A

“creating” specific ‘objects’ and all objects are represented by classes and a set of objects can perform tasks.

44
Q

a cache

A

is a hardware or software component that stores data so that future requests for that data can be served faster

45
Q

robust

A

ability to cope with errors when the program is running

46
Q

maintainable

A

ability for the program to have alterations and updates made at a later date

47
Q

a declarative program has

A

a collection of facts and rules that describe the problem. a query is entered and a solution is provided

48
Q

unicode (#bits)

A

(16bits) 2^16=65536

49
Q

what is a local variable

A

a variable that is used within a single block of code and cannot be seen or accessed from other parts of the program

50
Q

rapid application development

A

minimal planning in favour of rapid prototyping

51
Q

an advantage of using rapid application development

A

allows software to be written much faster and it makes it easier to change requirements

52
Q

top down design / waterfall

A

the problem at the top is worked downwards into smaller manageable problems

53
Q

advantage of a module library

A

don’t have to rewrite code to problems and they have already been checked for errors so are error free.

54
Q

what is a global variable

A

a variable that is created with the main part of the program and can be seen and accessed from all parts of the program

55
Q

what does the READ line do

A

informs memory data is to be sent to the processor from specific memory location

56
Q

what is the scope of a variable

A

it defines which part of the program can see the variable and change its value

57
Q

what does the WRITE line do

A

informs memory data is to be stored in a specific memory location

58
Q

standard algorithm for: input validation (5)

A
  1. 1 ask user for input
  2. 2 do while data is invalid
  3. 3 ask user to re-enter data
  4. 4 user re-enters data
  5. 5 loop
59
Q

what are breakpoints in systematic testing

A

when the programmers program the program to stop at scheduled intervals in the program so that the status of the program can be examined in stages in the program

60
Q

By Reference is when

A

a value is passed in and changed then gets passed out again.

61
Q

a logic error is when

A

the program is executed fully but with unexpected output

62
Q

what is perfective maintenance

A

updates being made to the software that add new features to the software.

63
Q

what does the CLOCK line do

A

generates a constant pulse which regulates flow of information (dictates the pace of the fetch/execute cycle)

64
Q

comprehensive testing involves

A

the process of testing normal, exceptional and extreme data.

65
Q

increasing the exponent increases the _________ of decimal numbers that can be represented

A

range

66
Q

each line for the control bus has _______

A

a different purpose

67
Q

reliable

A

ability to work correctly if the correct data is entered

68
Q

video =

A

length/time x frame rate x bit depth x num. px in one frame

69
Q

pre-defined function: string

A

str()

70
Q

storing audio depends on the:

A

length / time (seconds)
sampling freq. (Hz)
number of channels (mono/stereo)
sampling depth (bits)

71
Q

standard algorithm for: linear search (9)

A
  1. 1 ask user for value to find
  2. 2 take in value to find
  3. 3 found = false
  4. 4 do
  5. 5 if current item = value to find then
  6. 6 found = true
  7. 7 position = current item position in list
  8. 8 end if
  9. 9 loop until (found=true) or (end of list)
72
Q

increasing the mantissa increases the _________ of decimal numbers that can be represented

A

accuracy

73
Q

readable

A

ability of the program to be understood by another programmer

74
Q

advantages of using dry runs and trace tables

A
  • see what the code will do before you run it

- spot errors in the code

75
Q

extended ascii (#bits)

A

(8bits) 2^8=256

76
Q
Declarative Language:
Line 1 human(einstein).
Line 2 human(pascal).
Line 3 human(lovelace).
Line 4 mortal(X):-human(X).
State the feature being used in line 4 and explain a benefit of its use
A
Adds information/meaning
based on other facts/rules
or Reduces need for repetition of
facts/rules or improves
efficiency by reducing code
or Facilitates queries
or Use of variables allow values to
be returned
77
Q

symptoms of a DOS attack

A

slow performance and inability to access data. bandwidth consumption, resource starvation

78
Q

effects / costs of a DOS attack

A

disruption to users and businesses and lost revenue, labour in rectifying fault

79
Q

Explain the difference between a public key and a private key when securing the transmission of data.

A

A public key is used to encrypt the personal data. A private key is used to decrypt the personal data.

80
Q

Name and describe a feature of a declarative language.

A

Rules; Use variables which can be applied to existing fact/rules. Pattern; allows facts/rules to be matched.

81
Q

Advantages of using a public cloud

A

Public cloud services can be easily increased or decreased to match current needs.
Can set up or easily expand capacity of public cloud storage without the company purchasing hardware.
Public cloud removes need for backup/maintenance/ administration strategies the company
Public cloud has lower initial costs than private cloud.

82
Q

State two precautions used to ensure security of data on public cloud storage.

A

Username and passwords to access public cloud.
Use of encryption.
Firewall.
Require use of digital certificate

83
Q

Describe how interframe compression is also used to reduce the file size of the video.

A

Key frames/I-frames are stored and saves changes between (key) frames.

84
Q

Explain how Run Length Encoding would compress this image.

A

Stores the colour of a pixel and the number of repetitions of that colour.

85
Q

The developers of the app are using agile methodologies. They employ usability testing as part of this. Describe how usability testing influences the development of the app. (3)

A

Create prototypes/wireframes/ design of user interface.
Prospective users perform tasks.
Developers observe/interview/ discuss scenarios with users.
Obtain feedback to influence changes.

86
Q

What are personas and test cases for wdd

A

Personas: a type of user with a specific age and experience Test cases: a set of actions to verify a particular feature or function