Software System Flashcards

1
Q

Actuators

A

what robots use to manipulate objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Age of Computers

A

this provided the ability to execute complex control algorithms and process large amounts of data in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Aggregation

A

a type of association where the aggregated object has a weaker form of association with the objects that it is aggregating than is the case with composition. These objects have an existence independent of the aggregated object and can continue to exist even after the aggregated object is disposed of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Argument

A

where a parameter is given a specific value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Association

A

having a link to a network in order to authenticate it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Automation

A

use of control systems such as computers to operate on an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fixed Automation

A

assembly lines in manufacturing a single project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Flexible Automation

A

industrial robots that can perform various tasks and be reprogrammed easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Programmable Automation

A

machines that can be reprogrammed for different tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Automation Knight

A

the first robot, built by Leonardo Da Vinci and worked using various pulleys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Backtracking

A

after finding a solution or goal fails, go back to an earlier point and take alternative routes through facts and rules until the goal is achieved or all possibilities are exhausted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backward Chaining

A

a process used by expert systems that starts with a goal and works backwards, step-by-step, to determine what facts or conditions need to be true to achieve that goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backward Propagation

A

a method used in neural networks to update the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control Systems

A

use of computers to control physical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cracking

A

mechanically decrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Declarative Programming

A

where we specify facts, rules and a goal and the program searches for a solution without the programmer specifying how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Defensive Programming

A

program for the worst possible scenario and hope it never happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Early Automation

A

occurred during the Industrial Revolution and relied on steam engines and mechanical looms to perform repetitive tasks but lacked flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Electronics Revolution

A

involved the introduction of programmable logic controllers enabling flexible automation marking a shift from mechanical systems to electronic control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Expert Systems

A

designed to mimic and provide the skills of a human expert to solve a complex problem through reasoning using user interfaces, knowledge bases, facts and rules and inference engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Facts

A

something that is always unconditionally true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fault Tolerance

A

the systems must be designed to handle faults without failing catastrophically; for example, an aircraft control system must have multiple redundancies so if one part fails, another can take over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Formal Methods

A

mathematical techniques are often used to prove the correctness of a system, unlike typical software, where bugs might be annoying, but tolerable, but in safety-critical systems, one bug may lead to disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Forward Chaining

A

a process used by expert systems that starts with known facts and applying rules to infer new facts until a goal is reached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Free Licence
where you can use proprietary software for free
26
Functional Safety
where the system is always safe, and even if it fails, it will not cause serious problems
27
General Public Licence
a licence for proprietary software that is not free and has strict terms and conditions for copying, modifying and distributing the data
28
HARA
Hazard Analysis and Risk Assessment a systematic process used in ISO to identify and evaluate potential hazards in electric cars that ISO applies to
29
High-Level Language
one statement translates to many machine code instructions, resembles English, problem-oriented, has advanced features like mathematical functions, meaningful data types and is easy to learn and debug and is machine/OS independent
30
IEC61508
safety standards for electrical, electronic or programmable electronic systems and products
31
Imperative Programming
where we give the program step-by-step instructions to solve the problem
32
Inference Engine
analyses the links in the data allowing it to infer things that aren’t explicitly specified and deduce new knowledge
33
Instantiation
the creation of a real instance or particular realisation of an abstraction or template
34
ISO26262
safety standards for electric vehicles
35
Internet
consists of a network of interconnected computer networks using a globally unique address space based on the IP and the TCP to support public access
36
Knowledge Base
holds all the knowledge, facts and rules for the expert system allowing it to make decisions
37
Low-Level Language
a programming language that contains basic instructions recognised by a CPU, such as assembly code and machine code, where there is a 1:1 relationship with written code and machine code
38
Middleware
software that acts as a bridge between an operating system or database and applications, especially on a network
39
Page Rank
assigned to each webpage in an index by the web crawler in terms of how relevant it is to the user
40
Predicate
testing a true/false statement
41
Programming Paradigm
method of program organisation
42
Query
something to be solved
43
Race Condition
where a catastrophic error depends on a series of conditions at specific times
44
Real Time Path Planning
how robots like lawn mowers plan their route and respond to real-time obstacles
45
Rigorous Testing
safety-critical systems must comply with strict standards and go through thorough testing and evaluation
46
Risk Based Approach
involves identifying, assessing and managing risks based on the likelihood and impact of them happening
47
Robot
machine that does a task automatically with minimal human intervention using sensors to interpret the environment, actuators to manipulate objects and a control system to process information and make decisions
48
Robot Simulators
enables virtual training, programming and testing of robots through simulation
49
ROS
Robot Operating Systems open-source middleware suite to program robots quickly
50
Rules
something that is always unconditionally true
51
Safety Critical Systems
systems whose failure could result in significant harm, either in terms of loss of life or severe injury or damage to property or severe environmental damage
52
Safety Interlock
login functions that prevents a process from occurring when a hazard exists
53
Search Auctioning
the act of paying search engines to put your websites near the top of their results for certain terms
54
Search Engine
a program that searches for and identifies items in a database corresponding with keywords specified by the user, used for finding sites on the world wide web
55
Crawling
searching the web for content
56
Indexing
storing that content in a database
57
Ranking
identifying the most relevant content
58
Search Engine Optimisation
the act of making lots of fake websites have links back to your website in order to push your website higher up ranking algorithms
59
Specialisation
developing safety critical systems through rigorous testing, fault tolerance and formal methods
60
Spider Trapping
act of having several websites link to each other in a cyclical fashion, slowing down web crawlers
61
Static Analysis
analyses the source code of a program without executing it to check for potential security risks
62
Therac-25
Therac-25 was a radiation machine that used software from earlier versions of the Therac, however certain safety measures had been removed and certain processes automated to make the machine run faster. If the user selected X-ray mode, the machine would begin setting up the machine for high-powered X-rays. This process took about 8 seconds. If the user switched to Electron mode within those 8 seconds, the turntable would not switch over to the correct position, leaving the turntable in an unknown state and leaving the Therac unable to tell if it was giving an underdose or overdose. This killed three people and seriously injured three more. After this, software patches were done on the Therac-25, but a second bug was found in the Therac when a fourth person died after receiving an overdose of radiation. This time, it was because a technician sent a command at the same time the counter overflowed, causing an error and once again leaving the Therac unable to tell if it was giving an overdose or an underdose
63
Unimate
first computerised robot
64
Web Crawler
crawls pages and generates an index which users can search in order to create a list of links to pages
65
WEP
Wireless Encryption Protocol prevent hackers from snooping on wireless data as it is transmitted
66
World Wide Web
internet’s information retrieval service