A Flashcards

(34 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of compiler?

A

-Single Pass, fast but limited optimisation
-Multi Pass, more complex optimisations
-Bootstrap, compiler used to develop compliers (in the same programming language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are virtual machines?

A

Software environment that emulates a computer system, good for abstraction and portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is hybrid implementation?

A

Source code is complied into intermediate code and then interpreted by a virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are filter bubbles?

A

When algorithms selectively present information based on a user’s behaviour which reinforces bias and reduces critical thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Effects of technology on employment

A

-New roles
-Working from home
-Job displacement
-Skill gaps
-Gig economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are challenges of FOS

A

-Balancing with hate speech and misinformation
-Moderating content
-Government intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the different types of parallel processing?

A

-Bit
-Instruction
-Data
-Task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can the fetch-execute-decode cycle be enhanced

A

-Pipelining, fetching next instruction whilst the current one executes
-Prefetching, predicts and loads future instructions
-Superscalar, allows multiple instructions to be f&e in parallel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different levels of cache used for?

A

L1 - Most frequently used data
L2 - Shared / Dedicated per core, backup for L1
L3 - Shared to reduce bottlenecks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three types of dynamic routing algorithms

A

-Distance Vector (neighbours share routing table) so based off hop count
- Link State (complete routing table) so based off Dijkstra’s
-Enhanced Interior Gateway Routing Protocol uses DUAL combining both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is subnetting used?

A

-Efficient IP address usage
-Improved performance
-Enhanced security
-Simplified management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does subnetting work?

A

A way of dividing up networks to which devices can be directly contacted and ones that have to go through the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is hybrid encryption?

A

Where asymmetric encryption is used to exchange a key for symmetrically encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two (other) forms of cyber security

A

-Intrusion detection
-Multi-Factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is hash salting?

A

adding a random string of characters to the password before it’s hashed so rainbow tables can’t be used

17
Q

What is plug and play?

A

technology that allows the OS to automatically detect and configure new hardware devices

18
Q

How does IPC work?

A

allows processes to communicate and synchronise their actions when running concurrently in an OS using shared memory, message passing, pipes and sockets

19
Q

What is file system integration?

A

how the OS manages files and directories across storage devices and ensures seamless access

20
Q

How does the ISR work

A

Function that executes in response to an interrupt, addressed by an interrupt vector

21
Q

What is interrupt masking?

A

temporarily disabling interrupts to ensure a critical section completes uninterrupted

22
Q

Explain context switching

A

saving the state of one process and loading the state of another, combined with time-slicing in modern OS to allow multitasking

23
Q

What are two page replacement algorithms?

A

-FIFO: Remove oldest page
-LRU: Remove least recently used

24
Q

What is garbage collection?

A

Automatically reclaims memory occupied by objects no longer in use

25
What are circular buffers
A circular buffer is a fixed-size buffer that wraps around when it reaches the end. Often used in real-time systems and streaming.
26
Differences between polling and Interrupt handling
Polling - CPU repeatedly checks device status, simple Interrupts - Device notifies CPU, efficient
27
What is threading?
Breaking down programs into tasks that can be run simultaneously to utilise CPU however can be harder to program as order of thread execution is random
28
What is paged segmentation?
Segments are divided into pages, its more complex however more efficient and logical
29
What is considered for a Human Robot Interface
-Safety -Communication -Trust -Usability
30
What can motion capture be used for?
Animation, games and biomechanics
31
Advantage and Disadvantage of Simulation / Stress testing
-Can reveal bottle necks and prepare for peak loads -Doesn't always predict rare issues
32
Pros / Cons of remote working
+Flexibility +Globalisation -Isolation -Security Risks
33
What are the different types of E-Commerce
B2B, B2C, C2C
34
List 4 (other) things to consider with the internet
-Cultural homogenisation / Coreification -Digital Divide / Continuous learning -Social Media / Online communities -Job Creation / Transformation