Topic 3 and 4 - Computers and Networks Flashcards

1
Q

Von Neumman architecture

A

Traditional computer architecture that forms the basis of most digital computer systems. Instructions are fetched, decoded and executed one at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RAM (Random Access Memory)

A

Volatile (data lost when power is off) Read and write. Purpose: temporary store of currently executing instructions and their data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPU (Central Processing Unit)

A

The main part of the computer, consisting of the registers, ALU and control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control unit

A

Decodes instructions. Sends signals to control how data moves around the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ALU (Arithmetic Logic Unit)

A

Preforms calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Register

A

Tiny, purpose-built areas of high-speed memory located in the CPU. Stores data or control information temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Clock

A

Measured in hertz, the clock speed is the frequency at which the internal clock generates pulses. The higher the clock rate, the faster the computer may work. The ‘clock’ is the electronic unit that synchronises related components by generating pulses at a constant rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Address

A

The part of the bus which carries identification about where the data is being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data bus

A

The part of the bus that carries identification about where the data is being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control bus

A

This bus carries command and control signals to and from every other component of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fetch - decode - execute cycle

A

The complete process of retrieving an instruction from store, decoding it and carrying it out. Also known as the instruction cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secondary storage

A

Permanent storage of instructions and data not in use by the processor. Stores the operating system, applications and data not in use. Read/write and non-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Magnetic storage

A

Hard disk drive. Use: operating system and applications. High capacity. Medium data access speed. Low portability (except for portable drives). Reliable, but not durable. Average cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Optical storage

A

CD/R, CD/RW, DVD/R, DVD/RW Use: music, films and archive files. Low capacity. Slow access speed. High portability. Prone to scratches. Low cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solid - state storage

A

Memory cards and solid-state hard drive (SSD). Use: digital cameras and smartphones. Medium capacity. High portability. Reliable and durable. No moving parts. Fast data access speed. High cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Embedded system

A

A computer that has been built to solve a particular program and is not easily changed. For example, the operating system placed inside a washing machine, microwave or set of traffic lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Operating System

A

Specialised software that communicates with the hardware of a computer to allow other programs to run. Often known as system software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

File management

A

Operating system provides for: Access permissions for files (read and write). Opening files in associated programs. Moving, deleting and renaming files. Presenting a folder structure to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Process management

A

The process of the operating system deciding what should be in memory at any given time. Responsible for loading data and programs into and out of memory when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Peripheral management

A

The process of your operating system dealing with requests/input/output to and from any connected peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

User management

A

Operating system provides for: Allowing different people to log into the same computer with a username and password. Remembering personal settings. Managing access rights to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Robust software

A

A program written to handle a range of unexpected inputs and situations without crashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Utility software

A

A system program that performs a specific task for the operation of the computer – for example, file backup, virus checking, file compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

File repair

A

Utility software that can attempt to correct corruptions in files and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Backup

A

Utility software that takes a copy of digital files and stores it on a backup device or remote storage location – e.g., cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data compression

A

Reduces the size of a file so it takes up less disk space and is quicker to download over the internet. Compressed files must be extracted before they can be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Disk defragmentation

A

Different-sized files saved on disk are deleted over time, creating gaps on the disk. New files fill the gaps but may need more space than the gap provides, resulting in fragments of the file being spread across the disk. Defragmentation rearranges parts of files back into a contiguous space, speeding up access

28
Q

Anti-malware

A

Anti-malware software protects against infections caused by many types of malware, including viruses, worms, trojans, rootkits, spyware, key loggers, ransomware and adware

29
Q

Low-level language

A

A language close to machine code. Related closely to the design of the machine.
A one-to-one language

30
Q

High-level language

A

A language designed to help a programmer express a computer program in a way that reflects the problem being solved rather than how the computer will produce the solution. One-to-many language

31
Q

Interpreter

A

Translates and executes a program one statement at a time

32
Q

Compiler

A

A program that translates high-level source code into a computer’s machine code

33
Q

Translator

A

A program that translates assembly language into machine code

34
Q

Machine code

A

The actual 1s and 0s execute by a specific processor architecture. This is the lowest level of code and sits below assembly code

35
Q

Network

A

A collection of computers and devices that can communicate with each other

36
Q

LAN

A

Small geographic area. All the hardware for the LAN is owned by the organisation using it. Wired with UTP cable, fibre optic cable or wireless using routers and Wi-Fi access points

37
Q

WAN

A

Large geographic area. Infrastructure is hired from telecommunication companies who own and manage it. Connected with telephone lines, fibre optic cables or satellite links

38
Q

The internet

A

A worldwide collection of interconnected computer networks.
An example of a WAN – albeit the largest one that exists

39
Q

IP address

A

A unique string of numbers separated by full stops that identify each computer using the Internet Protocol to communicate over a network

40
Q

Router

A

A router sends data between networks. It is needed to connect a local area network to a wide area network. It uses the IP address on a device to route traffic to other routers

41
Q

Wired network

A

Any computer network that predominantly connects its hardware via the use of physical cables – e.g., copper, fibre optic etc

42
Q

Wireless network

A

Any computer network that predominantly connects its hardware via Wi-Fi, eliminating much of the need for physical cabling

43
Q

Connectivity performance: Speed

A

The number of bits per second that can be transmitted along a digital network

44
Q

Connectivity performance: Range

A

The distance a signal can travel before it starts to degrade and becomes corrupted

45
Q

Connectivity performance: Latency

A

The delay before a transfer of data begins following an instruction for its transfer

46
Q

Connectivity performance: Bandwidth

A

A range of frequencies within a given band, in particular that used for transmitting a signal

47
Q

Network speed

A

The number of bits per second that can be transmitted along a digital network

48
Q

Protocol

A

A set of rules that allow two devices to communicate

49
Q

Ethernet

A

A standard for networking local area networks using protocols. Frames are used to transmit data. A frame contains the source and destination address, the data and error checking bits. Uses twisted-pair and fibre optic cables. A switch connects computers together

50
Q

Wi-Fi

A

Wireless connection to a network. Requires a wireless access point or router. Data is sent on a specific frequency. Each frequency is called a channel

51
Q

TCP/IP

A

Transmission Control Protocol: “TCP provides an error-free transmission between two routers. Along with IP, it makes up the TCP/IP protocol stack.
”Internet Protocol: “IP routes packets across a wide area network. Along with TCP, it makes up the TCP/IP protocol stack.”

52
Q

HTTP

A

A client-server method of requesting and delivering HTML web pages. Used when the information on a web page is not sensitive or personal

53
Q

HTTPS

A

Encryption and authentication for requesting and delivering HTML web pages. Used when sensitive form or database data needs to be transferred

54
Q

FTP

A

Used for sending files between computers, usually on a wide area network

55
Q

POP3

A

Used by email clients to retrieve email from an email server

56
Q

SMTP

A

Sends email to an email server

57
Q

IMAP

A

Used by mail clients to manage remote mailboxes and retrieve email from a mail server

58
Q

TCP/IP: Application layer

A

This is where network applications such as web browsers or email programs operate

59
Q

TCP/IP: Transport layer

A

This layer sets up the communication between the two hosts and they agree settings such as language and size of packets

60
Q

TCP/IP: Internet layer

A

Addresses and packages data for transmission. Routes the packets across the network

61
Q

TCP/IP: Link layer

A

This is where the network hardware such as the NIC (network interface card) is located. OS device drivers also sit here

62
Q

Network topology

A

The arrangement of the elements of a communication network

63
Q

Bus network topology

A

An arrangement within a local area network in which each node (a workstation or other device) is connected to a main cable or link called the bus

64
Q

Star network topology

A

Computers connected to a central switch. If one computer fails, no others are affected. If the switch fails, all connections are affected

65
Q

Mesh network topology

A

Switches (LAN) or routers (WAN) connected so there is more than one route to the destination – e.g., the internet. More resilient to faults but more cable needed

66
Q
A