Theory Flashcards
Symmetric Encryption
A
Symmetric Encryption is when the same key is used to encrypt and decrypt the message. Both party’s must know the key and also keep it secret.
linked lists
A list of data together with a set of links to sort the data. Data is stored in the order its input and pointers are used to link the data into the desired order.
Peer-to-Peer Networking
No central computer, all computers are connected to each other locally or over a WAN
components of a packet
senders address, recievers address, packet contents, sequence number
Program Counter
stores the address of the next instruction
Real-time Operating system
Designed to carry out actions within a guaranteed amount of time even when left running for long period.
Asymmetric Encryption
Asymmetric Encryption is when a public key and a private key is used. The public key is used to encrypt the data and the private key is used to decrypt the data. If you use person X’s public key to encrypt the data only person X’s private key will be able to decrypt it
Current instruction register
stores the actual instruction that is being decoded
Optical storage advantages
Cheap
light weight and portable
Resilient
Address Bus
A one directional bus that transmits memory addresses that are used as operands in programming instructions, so that data can be retrieved from main memory
stack data structure
A stack is known as a LIFO, a single pointer is used to point to the top item of the stack, when a new item is pushed onto the stack the pointer is incremented. When an item is popped off the stack the pointer decrements to point to the new top of the stack.
second normal form
Check the data is already in 1NF
Remove any partial dependencies
‘fix’ any many to many relationships you discover
polling
The CPU checks with each device if it needs attention. Inefficient and wastes time as some devices will not want attention when called upon
Solid-State Storage
uses flash memory so data is read and written directly to blocks and pages on the silicon micro-chips
De Morgan’s Law
¬ (A∨B) = (¬ A) ∧(¬ B)
NOT (A OR B) is the same as (NOT A) AND (NOT B)
Peer-to-Peer Model:
all terminals have equal status and there is no powerful central server, each computer acts as both a client and a server.
Absorbtion Law OR
A∧(A∨B)=A
X AND (X OR Y) is the same as X
Algorithm for insertion into a binary tree:
If tree is empty enter data item at root and stop; Current node = root
Else repeat:
a. If new data item is less than value at current node go left, else go right.
b. Current node = node reach (null if no node)
c. Until current node is null
Create new node and enter data
TCP/IP stack
Application Layer
Transport Layer
Internet layer
Link Layer
Hashing
Hashing is the process used to transform a data item into something different. A hashing function provides a mapping between an arbitrary length input and a fixed length output. It is a one-way transformation meaning you cannot get back to the original form.
Open Source Software
the source code for the software is available,
it is free
Lossy Compression
Actual data is removed from the file in order to reduce its size. An algorithm is used to strip out the least important data. The original file cannot be restored as data is physically removed.
Packet Switching
the data to be transmitted is broke up into individual packets at the source computer. each packet is labelled with an address and sequence number. The packet is then forwarded onto the network and follows its own individual route. Depending on network traffic each packet will take different routes at different times to reach their destination where is is then reassembled.
Uses of virtual machines
used on networks to avoid redundant processors
translating code (Java)
running different operating systems
Memory Data register (MDR)
stores the data which is to be sent or fetched from memory
uses of a GPU
- Machine learning
- Oil exploration
- Image processing
- Financial transactions
Embedded Operating Systems
embedded systems are often run on dedicated hardware so they run with maximum efficiency, with low powered processors and minimal memory
Multi-tasking operating system
one processor is scheduled so that each process receives a very small time slice of processor time giving the impression of them running simultaneously.
Utility software
small programs each with a very specific purpose, which is normally concerned with the maintenance and wellbeing of a computer system
Buffer
a region of a physical memory storage used to temporarily store data while it is being moved from one place to another
scheduler
manages which process to execute next and how much time is allowed to execute a process
interpreter
takes one line of high level source code and converts it directly into machine code then runs it.
this has a one to many relationship and is useful for debugging code however the security is bad and the code is executed slowly