XTRA 1 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What signal is sent down the control bus

A

A read signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of notation do high level languages use

A

Natural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is assembly code specific to

A

The instruction set of the given processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does assembly code allow direct control over

A

How memory is used by adressing modes and direct control of hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High level code is more

A

e intuitive and easier to read it
is easier to follow, debug and build as part of a team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is high level code portable

A

The high level code can be recompiled for different
architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

High level paradigms

A

High level languages come in a variety of paradigms so
programmers can choose according to the
problem/their preference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is assembly preffered

A

-compilers or interpreters don’t exist for the target CPU
i.e. embedded systems
-highest possible performance is critical
-memory is very limited.
For larger projects which don’t fall under the
constraints above high level languages are likely to be
preferable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What else does OS provide

A

Provide platform to run other software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Title

A

Very top so for big font just use h1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does search engine indexing actually happen

A
  • A program called a spider/crawler/bot
  • Traverses the web / following the links.
  • It takes each word in the document
  • …It adds an entry for the page (under the word) in
    the index…
  • …alongside the word’s position on the page.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does CISC require

A

More transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For what does SQL do what do you need to do

A

Provide output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secondary key for

A

Searching, index and sorting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Format of data

A
  • CSV/Comma Separated Value (file)…
  • A (text) file/format with values separated by
    commas (or some other delimiter)
  • XML/eXstensible Markup Language…
  • …A markup language that uses tags to denote
    data.
  • SQL/Structured Query Language…
  • …A language for creating/querying databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Problem with ddos attacks

A

Hard to enforce laws as often unwitting participants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What contributes to piracy

A

Fast internet speeds, peer to peer and the dark web all
contribute to making piracy more prevalent and harder
to track.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What can track piracy

A

Digital piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What makes monitoring communications harder

A

End to end encyption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples

A

EXAMPLES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advantages of encapsulations

A
  • Reduces the chance of errors/inconsistences
  • Ensures objects can only be changed in the way
    intended/ Ensuring changes are consistent with
    how the object should behave
  • Protecting data/ Can’t be changed accidentally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does ascii map

A

Values to characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ASCII

A

American standard code for information interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of encyption uses more processing

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When is symettric encryption best used

A

When the same person is encrpyting and decrypting like when backign up data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

non normalised where is floating point

A

After first number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is an embedded OS not system

A

System software/software used to
manage the device
− Which is built into the device itself
− Stored in the device’s ROM/cannot be
changed
− Specific to the hardware/purpose

28
Q

Multi core processors can independently process instructions

A

At the same time

29
Q

High resolution vidoees take up large amounts of

A

RAM

30
Q

Hashing time depends on

A

time to create hash

31
Q

Extra things for utility software

A

A program with one purpose/piece of
system software

32
Q

Applications

A

Perform tasks for user not computer and are generic

33
Q

Servers are

A

A device which provides a central point
of control/access

34
Q

Why is server side validation always needed

A

Client side processing can be modified
2
− And can sometimes be disabled on the
browser
− To prevent malicious code (such as an
SQL injection/XSS)

35
Q

Actual definition of interrupt

A

A signal to the processor indicating a device/process
needs attention (1)

36
Q

Encapsulation in bullet points

A

When an attribute is made private (so it can’t be
directly accessed or changed from outside the class)
(1)
Public methods are used to read / amend the
attribute’s value (1)
The attribute name’s value can only be amended
through the method changeName. (1)

37
Q

Thing to say with inheritance

A

They can have methods and atributes of their own

38
Q

What does pieplining allow

A

Pipelining would allow one instruction to be fetched
as the previous one is being decoded and
the one before that is being executed.(1)

39
Q

Types of validation databases

A

range checks, list checks and presence checks

40
Q

How can redundancy be provided

A

A raid setup or mirroring servers

41
Q

What is ensuring accuracy of transactions down to

A

DBMS AND CODE ACCESSING DBMS

42
Q

What happens without redundancy

A

Data can be lost

43
Q

Public key is

A

Publically distributed and private one kept private

44
Q

font colour or color

A

COLOR

45
Q

What is ip

A

4 numbers each between 0 and 255 AND LOGICAL IDENTIFIER SO CAN CHANGFE ON PHYSICAL DEVICE

46
Q

How many purposes do utilitie softwares hav

A

1

47
Q

fetch signal

A

y

48
Q

What does secondary take more of

A

Space in the database

49
Q

Need for OS

A

To control the hardware

50
Q

INHERITANCE

A

Where a class retains methods and attributes of its parent class aas well as having its own

51
Q

What does procedural programming do

A

Procedural programming breaks a solution down into subroutines.
These subroutines are re built and combined to form a program.

52
Q

What does polymorphism mean

A

Polymorphism means that code can be written that is able to handle
different objects in the same way. This reduces the volume of code
the team need to produce.

53
Q

PageRank extra

A

OUTGOING LINKS

54
Q

HTML

A

Structure and content using tags

55
Q

Css

A

CSS defines the style / appearance
* Using selectors such as classes / IDs / etc
* Can be placed within HTML or externally in a file
* Multiple pieces of CSS can be combined (the more
local instances overriding)

56
Q

Why would it need to be done on server too

A

processing done away from the user’s control/Client

side processing could be altered
* Browser may not support client-side language/
scripting could be turned off
* Booking fee calculation needs to be correct for all
locations

57
Q

Why would it be done client

A

No need to submit to server and wait for response

  • Website will work more quickly for user
    To the company any 2x1:
  • Reduces load on the server
  • Will need to spend less on processing
    power/bandwidth
58
Q

Pagerank

A

Value between 0 and 1 and is probability user will not follow a link

59
Q

How to add 2 4 bit numbers

A

4 full adders

60
Q

Registers are used

A

For specific purposes

61
Q

Uses of immediate adressing

A

Immediate addressing allows simple access to data
with no fetch required, but limited by the data size of the
operand.

62
Q

Uses of direct adressing

A

Direct addressing allows data to be fetched from
memory. Data can potentially be larger in size that with
immediate addressing but address range limited by size
of operand.

63
Q

Uses of indirect adressing

A

Indirect addressing allows a larger range of addresses
to be accessed as address fetched. However, multiple
fetches required to access data.

64
Q

Uses of indexed adressing

A

Indexed addressing allows the Index register to be
manipulated to access data stored sequentially e.g. in
an array.

65
Q
A