Component 1 - Computer Systems Flashcards

1
Q

What affects the CPU speed?

A
  • Clock Speed
  • Number of Cores
  • Cache Size
  • SSD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PC (Program Counter)

A

Holds memory address of the instruction for each cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accumulator

A

Holds answers from the ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAR

A

Holds address that’s about to be used by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MDR

A

Holds the data of the current cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FDE cycle

A
  • Instruction is taken from the Main Memory and stored in a register
  • Instruction is decoded by ALU and stored in Accumulator
  • CPU then carries out the decoded instruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Volatile Memory

A
  • Memory than needs power to stay on, RAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-Volatile Memory

A
  • Memory that keeps its contents always, ROM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ROM

A
  • ROM cannot be changed and holds Bootstrap Loader
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAM

A
  • Holds all Programs currently in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Features that you look for storage?

A
  • Robust
  • Portability
  • Durability
  • Speed
  • Price
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual Memory

A
  • Used as extra space for the RAM, located on Hard Disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tertiary Storage

A
  • Backing up large amounts of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Primary Storage

A
  • Memory with small capacity but is fast compared to secondary storage
  • Usually volatile (besides ROM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secondary Storage

A
  • Bigger but slower compared to Primary Storage

- All is Non-Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Embedded System

A
  • Computer device built into another device for a specific purpose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Features of Von Neuman Architecture

A
  • Data and Instructions stored in Main Memory

- Computer split into many components, each with a different task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are programs made up of

A
  • Instructions and Data stored in Main Memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BIOS (Basic Input Output System)

A

Built in core to start computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the ALU

A

Performs Logic Operations and Calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Control Unit

A

Manages the FDE cycle, controls flow of data in/out the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cache

A

Stores frequently used memory close to the CPU so it can accessed quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 Parts of the CPU

A
  • Cache
  • CU
  • ALU
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GPU (Graphical Processing Unit)

A

Handles graphics/image processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Optical Storage (CD, DVD’s, Blue-Ray)

A
  • Cheap, Portable
  • Small Storage, Unreliable, Slow Read/Writes
  • Comes in 3 forms: Read Only/Write Once/Rewritable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Magnetic Storage (Cassettes)

A
  • Cheap, High Storage

- Read/Write sequentially, have to find specific data by looking from start to end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Solid State Drives (SSD)

A
  • Fast Read/Writes, Durable, High Capacity, Robust
  • Expensive
  • Most SSD use Flash Memory and allows Hybrid Drivers to store the OS/Programmes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hard Disk Drives (HDD)

A
  • High Capacity, Cheaper than SSD’s

- Moving Parts, Noisy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

System Software

A

Maintains a computer’s hardware/programmes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Operating System (OS)

A
  • Manage Hardware/Software
  • Provides GUI, Multi-Tasking, Security and Account Managing
  • Deals with File/Disk Management, defragments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Device Drivers

A
  • Allows OS and Hardware to communicate

- OS may install Driver update automatically/ask for consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hardware

A

Physical Pre-Built Components on a Computer/Physical peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Software

A

Applications/Programmes that run on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Defragmentation Utility

A

Orders fragmented files (scattered files) to free space and improve read/write speeds, usually on HDD’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Compression Utility

A
  • (De)/Compresses files on computer, can be reverted

- Quicker to download/send and websites may have file size limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Utility Software

A

Maintain/Configure a Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Encryption Software

A
  • Makes data readable only for intended users
  • Stop hackers stealing data
  • Encryption key needed
38
Q

Types of Data measurements

A
Bits - Smaller Measure of Data
Nibble - 4 Bits
Byte - 2 Nibbles (8 Bytes)
Kilobytes - 1000 Bytes
Megabytes - 1000 Kilobytes
Gigabytes - 1000 Megabytes
Terabyte - 1000 Gigabytes
39
Q

Binary Shift

A

Left - n amount of shifts to left is multiplied by 2^n

Right - n amount of shifts to right is divided by 2^n

40
Q

Binary Overflow

A

If 8-bit binary exceeds 8 bits, add on n amount of 0’s on start/end depending on amount of left/right shifts

41
Q

Lossy Compression

A
  • Reduces file size greatly, but irreversible

- Lossy Formats: JPEG and GIF

42
Q

Lossless Compression

A
  • Reduces file size by a bit, can be restored
  • Removes unnoticeable data
  • Lossless Formats: BMP, PNG, RAW
43
Q

Character Sets

A

Group of Characters the computer understands based on their Binary Code

44
Q

(Extended) ASCII

A
  • English words only, ASCII is 7-bit Binary code, 2^7

- Extended ASCII is 8-bit Binary code, 2^8, so it can represent more characters

45
Q

Unicode

A
  • Covers many languages and their characters

- Needs much more Bytes than ASCII because they cover more characters

46
Q

File Size (Bits) =

A

Bits per Character x Number of Characters

47
Q

Images

A

Images are usually Bitmaps, an arrangement of Pixels, more Pixels means better Image Resolution

48
Q

Colour Depth

A
  • 2^n, greater the value of n is = more bits per Pixel

- More bits = More colours, increasing Image Quality

49
Q

Image File Size (Bits) =

A

Image Resolution (Length x Width) x Colour Depth

50
Q

Sound

A
  • Sampled digitally as an analogue signal

- Analogue Signals convert into digital data for computers to read/store, “sampling”

51
Q

Sample Rate

A

Amount of Samples per second (Hz)

52
Q

Sound Bit Depth

A

Number of bits of each sample, more bits mean better quality

53
Q

Sound File Size (Bits) =

A

Sample Rate (Hz) x Bit Depth x Duration of Sample (s)

54
Q

LAN

A
  • Covers a small area <10km usually on a single site
  • LAN is owned by the consumer, cheap
  • Used in Businesses, Schools
55
Q

WAN

A
  • Covers a wide area as it a web of LANs in different location and are connected by radio/satellite links
  • Telecommunications own the WAN, expensive
  • Examples are The Internet
56
Q

Factors that affecting Network Peformance

A
  • Bandwidth (amount of data transferred in a given time) which is splitted
  • Wired/Wireless Connection
  • Hardware/Topology
57
Q

NIC (Network Interface Controller)

A

Allows device to connect to a network, usually built on a motherboard

58
Q

Switches

A

Connect devices together on a LAN and carries data between the devices

59
Q

Routers

A
  • Transmit data (packets) between Networks
60
Q

Ethernet Cables

A

Cat 5/6 - Twisted Cables to reduce internal interference
Coaxial - Copper Wire with plastic layer and mesh to shield it from the outside
Fibre Optic - Transmit light as data, expensive, high peformance, no inteference

61
Q

Bluetooth

A

Short, direct connection between 2 devices and have low bandwidth

62
Q

Wi-Fi

A
  • Connect many devices to a LAN at once

- Long range, more bandwidth

63
Q

Client Server

A
  • Managed by a server, connected to clients
  • Files, passwords, users stored centerally (on server)
  • Pros: Easy to keep track of files, backups/updates are easier, reliable
  • Cons: Expensive, Clients fail if server fails
64
Q

Peer to Peer (P2P)

A
  • Devices connected to each other without a server
  • Files stored on each device
  • Pros: Easy to maintain, Devices carry on if one fails
  • Cons: Backups/Update carried out serperately, less reliable and data can be lost
65
Q

Star Topology (Wired/Wireless)

A
  • Devices Connected to Switch/Server that allows access to the server
  • Pros: If Device fails, others carry on, Good peformance
  • Cons: If wired theres too much cabling, expensive, all devices affected if switch/server has problem
66
Q

Bus Topology

A

Devices arranged in a line, data sent up/down the line therefore more data collisions

67
Q

Ring Topology

A

Devices in a circle and data moves in 1 direction therefore no collision, only one device can send data at a time

68
Q

Mesh Topology

A
  • All devices connected with each other
  • Pros: Network cant fail and data sent on fastest route
  • Cons: Expensive, lots of cables
69
Q

Network Protocols

A

A set of rules for how devices should communicate and how data is transmitted across a network

70
Q

Identifier

A

Each device has one so it can be found on a network

71
Q

Mac Address

A
  • Given to all devices on same network
  • Unchangeable and send data to correct devices on same network
  • 48/64 bit binary numbers
72
Q

IP Address

A
  • Given to devices on any network, allows devices to communicate with other devices
73
Q

Network Protocols Types

A

TCP - Rules on how devices connect on network
IP - Directs packets to correct place
HTTP(S) - Allow access to websites
FTP - Edit Files between devices on a network

74
Q

Layers of Protocols

A

Page 28, 4 layers

75
Q

URL’s

A

Addresses to access web servers

76
Q

DNS

A
  • Changes website Domain Name to its IP Address

- Easier to remember

77
Q

The Cloud (Uses internet to store files)

A
  • Pros: No physical management needed by Owner, users dont need expensive hardware, acts like a Client Server
  • Cons: Expensive for Owner, Ownership of data issues, internet connection needed
78
Q

Brute Force Attack

A
  • Hacker tries several password combinations until its guessed right
  • Handled with strong password and try limits
79
Q

(D)DoS attack

A
  • Pointless packets (sometimes from victim devices) sent to a server to overload/crash it
80
Q

Dictionary Attack

A
  • Same as Brute Force but more consistent as you can put in words that may help with the guesses
  • Handled with unique symbols and try limits
81
Q

Malware (Software to harm devices)

A
  • Hacker may threaten your cojmputers safety for money or try gain access to the computer
82
Q

Spyware

A

Hacker can monitor keystokes/actions on computer

83
Q

Viruses

A

Attach themselves to files and can infect other files

84
Q

Worms

A

Exploit weakness in network security and spread quickly

85
Q

Trojan

A

Disguised as legitimate software to trick users into installing it

86
Q

Social Engineering

A
  • Tricking someone in order to gain access to a network

- People are usually the weak points in a system

87
Q

SQL Injections

A
  • Allow hackers to access/change database on a website
88
Q

Penetration Testing

A

Paying a hacker to hack your own network to identify weaknesses

89
Q

User Access Levels

A
  • More secure as few high access users can access sensitive data
90
Q

Firewall

A

Protects a safe network from a unsafe network

91
Q

Encryption

A

Encrypts data sent over a network, packet sniffers cant use this data and only reciever can with encryption key