XTRA 1 Flashcards
What signal is sent down the control bus
A read signal
What type of notation do high level languages use
Natural
What is assembly code specific to
The instruction set of the given processor
What does assembly code allow direct control over
How memory is used by adressing modes and direct control of hardware
High level code is more
e intuitive and easier to read it
is easier to follow, debug and build as part of a team
Why is high level code portable
The high level code can be recompiled for different
architectures.
High level paradigms
High level languages come in a variety of paradigms so
programmers can choose according to the
problem/their preference
When is assembly preffered
-compilers or interpreters don’t exist for the target CPU
i.e. embedded systems
-highest possible performance is critical
-memory is very limited.
For larger projects which don’t fall under the
constraints above high level languages are likely to be
preferable.
What else does OS provide
Provide platform to run other software
Title
Very top so for big font just use h1
How does search engine indexing actually happen
- A program called a spider/crawler/bot
- Traverses the web / following the links.
- It takes each word in the document
- …It adds an entry for the page (under the word) in
the index… - …alongside the word’s position on the page.
What does CISC require
More transistors
For what does SQL do what do you need to do
Provide output
Secondary key for
Searching, index and sorting
Format of data
- CSV/Comma Separated Value (file)…
- A (text) file/format with values separated by
commas (or some other delimiter) - XML/eXstensible Markup Language…
- …A markup language that uses tags to denote
data. - SQL/Structured Query Language…
- …A language for creating/querying databases
Problem with ddos attacks
Hard to enforce laws as often unwitting participants
What contributes to piracy
Fast internet speeds, peer to peer and the dark web all
contribute to making piracy more prevalent and harder
to track.
What can track piracy
Digital piracy
What makes monitoring communications harder
End to end encyption
Examples
EXAMPLES
Advantages of encapsulations
- Reduces the chance of errors/inconsistences
- Ensures objects can only be changed in the way
intended/ Ensuring changes are consistent with
how the object should behave - Protecting data/ Can’t be changed accidentally
What does ascii map
Values to characters
ASCII
American standard code for information interchange
Which type of encyption uses more processing
Asymmetric
When is symettric encryption best used
When the same person is encrpyting and decrypting like when backign up data
non normalised where is floating point
After first number
What is an embedded OS not system
System software/software used to
manage the device
− Which is built into the device itself
− Stored in the device’s ROM/cannot be
changed
− Specific to the hardware/purpose
Multi core processors can independently process instructions
At the same time
High resolution vidoees take up large amounts of
RAM
Hashing time depends on
time to create hash
Extra things for utility software
A program with one purpose/piece of
system software
Applications
Perform tasks for user not computer and are generic
Servers are
A device which provides a central point
of control/access
Why is server side validation always needed
Client side processing can be modified
2
− And can sometimes be disabled on the
browser
− To prevent malicious code (such as an
SQL injection/XSS)
Actual definition of interrupt
A signal to the processor indicating a device/process
needs attention (1)
Encapsulation in bullet points
When an attribute is made private (so it can’t be
directly accessed or changed from outside the class)
(1)
Public methods are used to read / amend the
attribute’s value (1)
The attribute name’s value can only be amended
through the method changeName. (1)
Thing to say with inheritance
They can have methods and atributes of their own
What does pieplining allow
Pipelining would allow one instruction to be fetched
as the previous one is being decoded and
the one before that is being executed.(1)
Types of validation databases
range checks, list checks and presence checks
How can redundancy be provided
A raid setup or mirroring servers
What is ensuring accuracy of transactions down to
DBMS AND CODE ACCESSING DBMS
What happens without redundancy
Data can be lost
Public key is
Publically distributed and private one kept private
font colour or color
COLOR
What is ip
4 numbers each between 0 and 255 AND LOGICAL IDENTIFIER SO CAN CHANGFE ON PHYSICAL DEVICE
How many purposes do utilitie softwares hav
1
fetch signal
y
What does secondary take more of
Space in the database
Need for OS
To control the hardware
INHERITANCE
Where a class retains methods and attributes of its parent class aas well as having its own
What does procedural programming do
Procedural programming breaks a solution down into subroutines.
These subroutines are re built and combined to form a program.
What does polymorphism mean
Polymorphism means that code can be written that is able to handle
different objects in the same way. This reduces the volume of code
the team need to produce.
PageRank extra
OUTGOING LINKS
HTML
Structure and content using tags
Css
CSS defines the style / appearance
* Using selectors such as classes / IDs / etc
* Can be placed within HTML or externally in a file
* Multiple pieces of CSS can be combined (the more
local instances overriding)
Why would it need to be done on server too
processing done away from the user’s control/Client
side processing could be altered
* Browser may not support client-side language/
scripting could be turned off
* Booking fee calculation needs to be correct for all
locations
Why would it be done client
No need to submit to server and wait for response
- Website will work more quickly for user
To the company any 2x1: - Reduces load on the server
- Will need to spend less on processing
power/bandwidth
Pagerank
Value between 0 and 1 and is probability user will not follow a link
How to add 2 4 bit numbers
4 full adders
Registers are used
For specific purposes
Uses of immediate adressing
Immediate addressing allows simple access to data
with no fetch required, but limited by the data size of the
operand.
Uses of direct adressing
Direct addressing allows data to be fetched from
memory. Data can potentially be larger in size that with
immediate addressing but address range limited by size
of operand.
Uses of indirect adressing
Indirect addressing allows a larger range of addresses
to be accessed as address fetched. However, multiple
fetches required to access data.
Uses of indexed adressing
Indexed addressing allows the Index register to be
manipulated to access data stored sequentially e.g. in
an array.