Y13 Mocks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a CPU?

A

Central Processing Unit

key component of a computer system
contains the necessary circuitry to interpret and execute program instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALU

A

All arithmetic and logic operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CU

A

controls operations in the ALU and directs data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MDR

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAR

A

Memory Address Register
holds the memory address of data about to be used by the ALU
so that the ALU can fetch the content from memory and process it
may also hold the address of where processed data needs to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unicode?

A
  • an international coding standard
  • for use with different languages and scripts
  • each letter, digit or symbol is assigned a unique numeric value
  • that applies across different platforms and programs
  • each character is represented in 2 bits and the whole set is represented in 16 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RAM?

A

see notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cache?

A

see notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of an array/collection?

A

to store multiple pieces of data of the same data type together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an OSI?

A

Open systems interconnection
the communications between a computing system are split into 7 abstraction layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 7 OSI layers?

A

Physical
Data Link
Network
Transport
Session
Presentation
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hardware components of 7 osi layers

A

look at OSI downloaded image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are legacy systems?

A

old method, computer, technology, application or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reasons for using legacy systems

A

old data still not recovered to new system
discontinued software
( no new releases and that business needs that sofware)
interacting with old hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of maintaining a legacy system

A

high cost
tech support
data compatibilty
security threats
There is a high cost to maintaing any legacy system. It might even be costlier than maintaining a more updated version. Staff training might be needed since staff might not be familiar with the older version of the software.
* Tech support may no longer be available.
* The data In the system might not be compatible with newer systems and conversion may not be possible.
* Legacy systems are more vulnerable to security threats due to lack of patches * Integration of new systems will be complicated as the system might be so old that the new system is using completely different technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

requirement gathering

A

see notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of new systems

A

Data migration
Parallel running
Direct changeover
Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data migration

A

process of transferring data between two different formats
Problems:
* Incompatible file formats.
* Data structure differences.
* Conflicting Validation rules.
* Incomplete data transfers.
* International conventions on dates, currencies & character sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Parallel Running

A

old and new systems run together
advantages: if the new system has problems, the old one will still wokr
disadvantages: expensive + shortage of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Direct changeover

A

old system is removed and immediately replaced by the new system
advantages - fast and cheap
disadvantages - risky because old systems can’t be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Trainings

A

self instruction, formal classes, remote classes

22
Q

self instruction classes

A
  • users read manual or watch tutorial
  • only suitable for experienced computer systems
  • as they are more confident in using a familiar system on their own
  • gives user more freedom with study schedule
23
Q

formal classes

A
  • users sit in a formal class and are taught by a teacher
  • useful in training large amounts of staff
  • cheap and fast
  • if class size is too big, might be ineffective
24
Q

remote/online training

A
  • instructor trains a single user
  • most effective
  • but v expensive
25
Q

What is a VPN?

A

Virtual Private Network
* Makes a ‘tunnelled’ network connection through the Internet or any other public network
* Ideal for establishing a secure connection between private networks with remotes users
* Enables a device to exchange data across the internet as if it was directly connected to a private connected

26
Q

What is the technology required for a VPN?

A

a LAN is connected to the internet
one computer outside of the LAN is also connected to the internet
VPN client and server running on the lone machine and the original LAN
Internet connection

27
Q

What factors affect the speed of transmission on VPN?

A

see notes

28
Q

Data compression + VPN

A

see notes

29
Q

What is encryption?

A
  • Uses complex mathematical algorithms and encryption keys to alter a message into a form that is not understand to an unauthorised person
  • Only the person with the correct key can decode the message and read it
30
Q

What are two computer encryption categories?

A
  • Symmetric key encryption
  • Public key encryption
31
Q

What is symmetric key encryption?

A
  • Single key or secret key encryption
  • Same key used for encryption and decryption
  • Each device has a secret code that is sued to encrypt a packet before it is sent over an untrusted network
  • Receiving device should know and use the same key to decode the packet received
  • A well-known symmetric algorithm developed for computer was the Data Encryption Standard (DES)
  • Uses a 56-bit key
  • 72,057594,037,927,936 possible combinations for a brute force attack btw
32
Q

What is a public key encryption?

A
  • Also known as asymmetric key encryption
  • Uses a public key for encryption and a private key for decryption
  • Two keys are mathematically linked
    This type of encryption is used on the interne t
  • Transport Layer Security (TLS) AND Secure Socket Layer (SSL) encryption protocols, used for secure web communication, are based on public key encryption
33
Q

file encryption + protection

A

compressed data where data is scrambled and is unintelligible

34
Q

advantages of public key

A

Two sides don’t need to have already shared secret key to communicate using encryption.

35
Q

disadvatanges of public key

A

Messages take more time to encrypt and decrypt.
Public key authenticity needs to be verified.

36
Q

advantages of symmetric key

A

Encryption speed is faster and uses less resources that public-key encryption

37
Q

disadvatanges of symetic key

A

Keys must be shared before they can be used.
If the key becomes
unknown by unauthorized individuals then a new key must be made

38
Q

What is a firewall?

A

computer or software package used for a NETWORK
- needs specific hardware
- monitors and protects the network traffic of a computer or computer network
- decides which computer gets access to the network based on a set of rules
-

39
Q

What is a software firewall?

A

a network security system that determines what data comes in and goes out of a network or pc
- may slow down computer

40
Q

What is a router hardware firewall?

A

will prevent hackers and unauthorised people on the internet from getting onto the network
- but can’t stop people in range from getting wifi

41
Q

What is an array?

A

fixed size structure of data of the same type

42
Q

Sequential search definition

A

sequential search
used to find specific component in array
does this by checking each component sequentially

43
Q

Sequential search pseudocode

A

PSEUDOCODE:
Array = [2,9,5,6,7,8]
Search = 7
Found = false
Counter = 0
loop Counter from 0 to Array.length – 1
if Array[Counter] = Search
Found = true
output Array[Counter]
end if
end loop
if Found = false
output Search, “ is not found in this array”
end if

44
Q

Binary search definition

A

used on SORTED ARRAYS
splits the array into two and checks it the middle term is higher or lower than the search term
discards the list accordingly

45
Q

Binary search pseudocode

A

Array = [11,12,15,16,112,118,123,145]
Search = 15
Min = 0
Max = Array.length -1
Found = false
Answer = 0
Mid = 0
loop while Found != true and Min <= Max
Mid = (Min + Max) div 2
if Array[Mid] = Search
Found = true
Answer = Mid
else if Search > Array[Mid]
Min = Mid + 1
else
High = Mid – 1
end if
end while
if Found = true then
output Search, “was found at”, answer
else
output Search, “was not found in this array”
end if

46
Q

web browser and function

A
  • an application software
  • used to find, receive and display content on the WWW
  • Includes texts, images and audio
47
Q
A
48
Q
A
49
Q
A
50
Q
A
51
Q
A