A Flashcards
(34 cards)
What are the different types of compiler?
-Single Pass, fast but limited optimisation
-Multi Pass, more complex optimisations
-Bootstrap, compiler used to develop compliers (in the same programming language)
What are virtual machines?
Software environment that emulates a computer system, good for abstraction and portability
What is hybrid implementation?
Source code is complied into intermediate code and then interpreted by a virtual machine
What are filter bubbles?
When algorithms selectively present information based on a user’s behaviour which reinforces bias and reduces critical thinking
Effects of technology on employment
-New roles
-Working from home
-Job displacement
-Skill gaps
-Gig economy
What are challenges of FOS
-Balancing with hate speech and misinformation
-Moderating content
-Government intervention
What are the different types of parallel processing?
-Bit
-Instruction
-Data
-Task
How can the fetch-execute-decode cycle be enhanced
-Pipelining, fetching next instruction whilst the current one executes
-Prefetching, predicts and loads future instructions
-Superscalar, allows multiple instructions to be f&e in parallel
What are the different levels of cache used for?
L1 - Most frequently used data
L2 - Shared / Dedicated per core, backup for L1
L3 - Shared to reduce bottlenecks
What are three types of dynamic routing algorithms
-Distance Vector (neighbours share routing table) so based off hop count
- Link State (complete routing table) so based off Dijkstra’s
-Enhanced Interior Gateway Routing Protocol uses DUAL combining both
Why is subnetting used?
-Efficient IP address usage
-Improved performance
-Enhanced security
-Simplified management
How does subnetting work?
A way of dividing up networks to which devices can be directly contacted and ones that have to go through the router
What is hybrid encryption?
Where asymmetric encryption is used to exchange a key for symmetrically encrypted data
What are two (other) forms of cyber security
-Intrusion detection
-Multi-Factor authentication
What is hash salting?
adding a random string of characters to the password before it’s hashed so rainbow tables can’t be used
What is plug and play?
technology that allows the OS to automatically detect and configure new hardware devices
How does IPC work?
allows processes to communicate and synchronise their actions when running concurrently in an OS using shared memory, message passing, pipes and sockets
What is file system integration?
how the OS manages files and directories across storage devices and ensures seamless access
How does the ISR work
Function that executes in response to an interrupt, addressed by an interrupt vector
What is interrupt masking?
temporarily disabling interrupts to ensure a critical section completes uninterrupted
Explain context switching
saving the state of one process and loading the state of another, combined with time-slicing in modern OS to allow multitasking
What are two page replacement algorithms?
-FIFO: Remove oldest page
-LRU: Remove least recently used
What is garbage collection?
Automatically reclaims memory occupied by objects no longer in use