y12 End of Years Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Methods of obtaining requirements from stakeholders

A

Structured + unstructured interviews
Questionaires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Structured Interviews

A

strictly standardised and prescribed
set of prepared questions
same manner and order to each stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

unstructured interviews

A

flexible
stakeholders encouraged to express thoughts and beliefs freely

but sometimes yield data too difficult to summarise, evaluation or perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is survey methodology?

A

Refers to a domain of applied statistics that focuses on taking samples from a population, as well as imporoving on the various data collection techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

restricted requetsioareis

A

yes or no
short answer question
box checking
facilitates statical analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unrestricted questionnaires

A

greater depth of responses
makes it difficult to analswtuse or interpret
makes statical analysis impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what do questionaries gurantee>

A

uniformity of questions
yield data is easier to compare
saves time
cost efficient
can reach a lot of stakeholders quickly

but stakeholders may not respond at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

direct observation of current processes

A

spending time in different departments
study where different procedures and processes could be more efficient
where possible bottlenecks may be present
makes the collection of different types of data possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a prototype?

A

working or non-working preliminary version of the final product
or a simple version of the final system used in design phase
to demonstrate how the final phase will work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does the prototype?

A

attracts the attention of the client
encourages them to use and get a feel for it
provides just enough of the concept for investors to decide if they want it or not
encourages active participation between users and developers
gives an idea of the final product
helps in the identification of problems with the efficient or the design
increases system development speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a CPU?

A

processes basic data and instructions in the process phase of input, process output

hardware component of computer system
can perform basic arithmetic and logic operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an operating system?

A

a set of software that controls a computer’s hardware and provides services for computer programs
acts as an intermediary between software and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the main services that an operating system provides?

A

peripheral communication
memory management
resource monitoring and multi-tasking
networking
disk access and data management
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

memory management

A

OS manages how memory is used in applications
ensures that one application does not interfere with memory being used by another application
if it does, it could lead to the latter to stop functioning or data being erased or overwritten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

colour representation

A

monitors use pixels to display information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a pixel

A

smallest controllable element in the display
every pixel is only one colour
each pixel stores data about its state and colour in a memory location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how is each colour represented

A

hexadecimal value of two digits
RBG hex representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a data packet?

A

portion of a message that is transmitted through a network
contains data such as check digits and destination address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what comprises a computer network?

A

two or more computer systems that are connected and are able to communicate and exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

LAN

A

connects devices over a small gerographical area
eg school, home
usually have a high data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what mode of operation is commonly used in a LAN?

A

client server
allows for a signle computer to act as a server and be responsible for supplying data to the clients in the network

22
Q

what does a LAN allow?

A

sharing of peripheral devices
eg printers + scanners
can be used by any device connected to the network
eliminates the need to buy individual peripheral devices

23
Q

WLAN

A

same as LAN but wireless
less secure
allows mobile phones and laptops to be connected so you can move around
uses wifi
radio waves

24
Q

similarities between LAN and WLAN

A

both act on local level
both allow communication
sharing of resources
connect devices

25
Q

differences between LAN and WLAN

A

different transmission medium
LAN is faster and safer
WLAN offers greater flexibility

26
Q

linear search

A

simple
brute force
compares every term to search item

27
Q

binary search

A

an algorithm searching method used only in sorted arrays
relies on a divide and conquer strategy
in every search iteration, half of the elements of the array are eliminated as possible solutions
very efficient for large arrays
its performance makes it ideal when resorting is not required

28
Q

steps in binary search

A

c
ompares the search value with the value of the middle element of the array
if the values match, the value is found
if search value < middle element. Algorithm discards the right and repeats the action to the left of the sub-array to the left of the middle element
if the search value > middle item, vice versa
if the remaining array to be search is empty, then the value is not found

29
Q

VPN

A

virtual private network
creates ‘tunnelled’ network connection through internet or other private network
establishes secure connections
enables a device to exchange data across the internet as if it was directly connected to a private connected

30
Q

VPN lan/wan

A

allows clients from remote locations to connect to the network
managed through server - software application

31
Q

VPN benefits

A

easier commincaiotion
companies take advantage of the internet to provide secure connections
decreases operational costs vs trad WANs
improves overall productivity
improves productivity of remote employees
offers employees felxibity
global networking oppurtnies
teleworker support
reduces environmental footprint
travel time for remote workers
simplifies network topologies for administrators and companies

32
Q

concurrent processing

A

execution of different instructions simultaneously by different processors to achieve best performance

33
Q

concurrent processing simplified

A

programs are broken down into procedures and then sub-procedures
assigned to a different processing units to perform simluatenously

34
Q

sequential processing

A

execution of all sub-procedures one after the other
by a single processing unit

35
Q

methods of preventing data loss

A

regular back up of files using hard disks or magnetic tapes

36
Q

what can be used for fast backup and data storage

A

removable media
used for fast data backup and storage
eg DVD Blu-ray
non voalite
can store data permanently

37
Q

WPA2

A

Wireslles protected access
uses AES advanced encryption standard block cypher
considered to be the best protection

38
Q

MAC addresses

A

Media access control
static address
associated with specific device
router will only accept messages saved from the database

39
Q

authenticity

A

user providing identity to gain access to a computer system behind reasonable doubt
requiring more than one independent factor
increases the difficulty of providing false credentials

40
Q

protocols

A

a set of rules that governs the transmission of data

41
Q

TCP/IP

A

transmission protocols and connects to the internet
communication protocols used to connect hosts on int internet

42
Q

why are protocols required for communication?

A

presence of:
an identified sender
an identified receiver
an agreed upon method of communication
grammar
language
speed
confirmation of acknolwdgemnt of requirements

43
Q

Control unit

A

operation of CPU
controls the retrieval of instruction from the primary memory as well as the sequence of their execution
providing ALU with data that needs to be processed as well as the instructions of how the data should be processed
contains registers

44
Q

ALU

A

mathematical operations; logic imput/output

45
Q

MDR

A

memory data register
stores instruction about to be used by the CPU
all saved to RAM
wihcver address MAR is holding, corresponding is loaded onto MDR, then sent to all
after processing, goes back to MDR
data copied to memory address location in RAM, specified by MAR

46
Q

MAR

A

memory address register
holds address about to be used by the CPU
so that the ALU can fetch the corresponding content from memory and process it accordingly
may also hold the memory address of where data has been processed will need to be stored

47
Q

address bus

A

connect MAR to RAM/ primary memory

48
Q

data bys

A

RAM and MDR

49
Q

fetch

A

CPU sends approporatie address
instruction is copied onto data bus and sent to CPU

50
Q

decode

A

instruction is decoded
required data that needs to be loaded from RAM is fetched
on address bus

51
Q

execute

A

CPU calucautes result
stores in memory
address specific with address bus
data sent with data bus
checks for next instruction
repeat