Compt Sc Flashcards

(83 cards)

1
Q

Von Neumann Bottleneck

A

CPU is a lot faster than data/instruction transfer between it and RAM, so a lot of time is wasted by CPU just waiting for data/instructions to arrive after processing.
Effect minimised by Harvard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Unit

A

Manages communication between other PC components
Manages the FDE cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arithmetic Logic Unit

A

Performs arithmetic and logical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Registers

A

Store temporary data while instructions are executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cache

A

Store frequently used instructions or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Buses

A

Transfer control signals, data or addresses between components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Serial Access

A

Data is accessed/stored in chronological order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sequential Access

A

Data is accessed/stored in some order (alphabetical, ascending…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Indexed Sequential Access

A

Records have indexes associated with them in a table, which point to their location in memory where the fields are stored sequentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Random/Hash Access

A

A hashing algorithm output for a given record/field is the address in memory where it is stored.

  • Calculation done on data in [KEY FIELD]
  • Collision are two same memory addresses calculated by alg. for diff. data.
  • Overflow areas/serial files are needed
  • May be too slow
  • Re-hashing needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sequential

A

Master file is copied field-by-field into a new file while the transaction file’s changes are appended into the new file in sequence.

Output is two master files, one backup, one new

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Direct Access

A

Transaction file is appended onto the end of the master file.

Recommended to make a backup of the old master fiel beforehand for a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backups

A

A redundant copy of recent data made frequently.

Important to make periodic backups in case data is lost and relatively recent data can be used instead.

Can be generational (grandfather-father-son, three separate backups are made periodically.) and full, differential or incremental (whole, difference from last whole, difference from last). Exists in case one is corrupted.

Can be made on magnetic tape, cloud storage. On-site or off-site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Archiving

A

Archival data, such as old software systems or out-of-data, is stored in case it becomes useful in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Procedural Programming

A

Step-by-step instructions followed.
Algorithm carries out calculations or other actions.
Each step is controlled tightly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mark-Up Programming

A

Defines the structure and formatting of text files when viewed for presentation.
HTML (used in tandem with JavaScript to create dynamic sites)
Tags used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Feasibility Study

A

Investigation made on a project before anything else to find whether it is feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Feasibility Study - Technical

A

Are enough resources available?
Are developers skilled enough?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Feasibility Study - Economical

A

Does the project fall within budget?
Will a profit be made?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Feasibility Study - Political

A

Is the project controversial?
Would integrity be compromised?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Feasibility Study - Legal

A

Does the project comply with legistlation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Feasibility Study - Operational

A

Will the project solve the problem?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Feasibility Study - Scheduling

A

Can the project be done within a reasonable time?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Design Analysis - Investigation and Analysis techniques

A

Reading documentation - Find current data flow and data structure layout

Questionnaire/Interview - Find out improvements or properties of the system from the stakeholders. (Questionnaire if distributed over large area, interview if specific people w/ lot of info)

Observing - Find out how the current system is being used by the stakeholders directly. they may not be entirely honest.

Research - Desktop searching for similar systems in order to discover inputs/outputs, data structures used, data flow, processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Design Analysis - Design
Input/Output Data Structures & Methods of Access Processing Methods (algortihms used)
26
Design Analysis - Testing
Unit - Each unit of the software is tested individually to evaluate valid inputs and outputs. Integration - Units are connected and their interaction is tested. System - The software system as a whole is tested. Includes Alpha and Beta (end-user) testing. Acceptance - The system is evaluated for its compliance with the user's requirements.
27
Design Analysis - Testing test data
Typical, extreme, erroneous
28
Design Analysis - Changeover
Direct - The old system is immediately exchanged for the new. Parallel - The old and new systems are run in tandem until the organisation is confident to remove the old one. Pilot - The new system is introduced in only one branch and is rolled out everywhere later. Phased - Parts of the new system replace the old over time.
29
Design Analysis - Maintenance
Perfective - New features are added or performance is improved. Adaptive - Changes made to suit new user requirements. Corrective - Error patching and bugfixing.
30
Design Analysis - Documentation
User - Instructions on how to use the system for the users. Maintenance - Details on the workings of the software system for IT staff, including variable lists, algorithms, inputs and outputs, data flow, data structures.
31
Contingency Plans
Before - Risk analysis and staff training During - Staff response, contingency plan carried out After - Backups retrieved and new hardware/software issued, recovery measures.
32
Utility Software
Antivirus Backups Compression Defragmentation Firewall
33
Resource management
Storage Devices (FAT & NTFS) Input and output (devices) Main memory (virtual memory) Processing (seamless) Misc. Hardware (drivers)
34
FAT & NTFS
File Allocation Table - Uses a linked list data structure to store data on a hard drive. Better for non-windows systems. New Technology File System - Faster as it uses more complex data structures.
35
Off-the-shelf software
Cheaper Available immediately Low risk of not being functional Community support
36
Bespoke software
Tailored to your needs Flexible Competitive advantage Not tied to a vendor
37
Economic Impacts
Saving paper Communication cost cuts More efficient More accuracy and precision
38
Ethical/Moral Impacts
Invasion of privacy Data misuse Copyright breach Inappropriate content
39
Cultural Impacts
More access to information World-wide communication Digital divide
40
GDPR
General Data Protection Regulation In relation to data, indivduals have the right to: Relevant and adequate [1] Accurate and up-to-date. [1] Stored for no longer than necessary, [1] Individual can check if being held securely. [2] Processed under legistlation, [1] As well as with limited function. [1]
41
CMA
Computer Misuse Act Makes it illegal to: 1. Unauthorised access to a computer 2. Unauthorised access to a computer with intent to facilitate crime 3. Unauthorised access to a computer with intent to cause damage
42
FIA
Freedom of Information Act Makes it possible to: - Authorities must release information about certain activities to the public - The public is entitled to request information from the authorities
43
RIPA
Regulation of Investigatory Powers Act Makes it legal for organisations to obtain the right to survey and collect digital communications. Police and defense services.
44
CDPA
Copyright, Designs and Patents Act In relation to software, art, books, films, music etc, makes it illegal to: Make copies Distribute copies (sell/publish)
45
Field
An attribute of an entity
46
Record
An iteration of an entity
47
Primary Keyfield
Unique identification field of each record
48
Flat File
Data that isn't organised and has no relationships. Introduces data redundancy and inconsistency.
49
Relational Database
Data that is organised and has relationships between entities. This reduces data redundancy and data inconsistency.
50
Entity
A model of a real-life concept (abstract or physical).
51
Procedural
Is sequential Uses iteration and selection Executes instructions in the order they are written Algorithms are written using it
52
Declarative
User defines a set of rules (facts and relationships between them). User poses a task and program decides if the task can be completed and how. Wolfram
53
Mark-Up
Defines the way text is interpreted by a browser. Describes the visual formatting of the text using tags. HTML in tandem with JavaScript
54
Visual
Allows user to drag-drop simple functions. Learning tool, but unhelpful for advanced problems.
55
Event-Driven
Program sits in a 'program loop', waiting for user input. Once user input is detected the program will activate a function. Used for GUIs/games.
56
Object-Oriented
Non-linear programming that uses classes, templates of real things. An object of a class creates an instance (the variable that stores all the data about the object in memory) A class can have attributes and methods to describe it. Used for data analysis/machine learning
57
OOPs - Concepts
Encapsulation - Idea that data is grouped into classes rather than allowing it to stand individually. This improves flexibility and functionality. Inheritance - Some classes may be grouped together as 'parent' and 'child' classes. Child classes share the attributes and methods of the parent class. This reduces redundancy of code.
58
Internet
World-wide communications infrastructure.
59
IMAP
Instant Message Access Protocol Allows users to view email messages from any device, accessing a server with their messages.
60
SMTP
Simple Message Transfer Protocol Allows users to send email messages to another server over a network.
61
HTTP/S
Hyper-Text Transfer Protocol / Secure Allows users to view websites and transfer information over a network.
62
FTP
File Transfer Protocol Allows users to download/upload files of data over a network.
63
TCP/IP
Transfer Control Protocol / Internet Protocol Sets up a connection between two devices over a web of networks (TCP) Assigns a sender and destination address to packets. (IP)
64
UDP
User Datagram Protocol Sets up a faster connection between two devices over a web of networks with no error checking (packets can be lost).
65
VOIP
Voice Over Internet Protocol Allows users to make audio calls over networks.
66
DHCP
Dynamic Host Configuration Protocol Dynamically assigns IP addresses to devices on a network.
67
SSL
Secure Socket Layer Adds an extra layer of security and authentication to internet communications.
68
TCP/IP 5 Layer Stack
Application - Provides the interface between the network and software the user is using, i.e allows software to send and receive data which it can then meaningfully present to the user. (HTTP/S, FTP, SMTP) Transport - Divides data into suitable packets and sets up a reliable connection between two devices. (TCP, UDP) Network - Assigns sender and destination addresses to packets and manages flow control. (IP) Data-Link - Converts packets into frames and relays them from the network layer to the physical layer. Physical - Manages a reliable physical connection between the two devices over a suitable medium like cables, fiber optics, radio waves etc. (Ethernet, WiFi)
69
Packet Contents
Header: Source and destination addresses Packet sequence number Total packet number Protocol Checksum Payload: The actual data
70
Masking
Masking determines the value of a bit at a specific location. (clearing, setting, inverting)
71
Serial & Parallel Transmission
Serial, transmits data one bit at a time through a single connection. USB, allows for further distance transmission & cheaper, but is slower. Parallel, transmits data a whole number of bytes at a time (8bits,16bits...) as devices are connected by numerous serial connections. VGA, is faster, but has issues like crosstalk and skew at high bitrates.
72
Compilation Process
Lexical Analysis - Whitespace and comments are removed from the code. Symbol Table - Variables, constants and identifiers are replaced with tokens. Metadata about them (data types, variable scope) is organised into a table. Syntax Analysis - Tokens are checked for proper grammar and spelling as determined by language standards. If errors are found, a suitable message is produced. Semantic Analysis - Variables are checked for proper declaration, data type and operations. Code generation - High level language is converted to machine code. Optimisation - Remove redundant code to make compiled program more efficient.
73
Compression Techniques
Compression is used to decrease the storage size of files. Lossy: Lossy compression causes some permanent data loss/decompression doesn't return original file. So not a viable choice for text files. Used for video and audio (MP3 & JPEG) Threshold truncation - A level is chosen beyond which data is truncated (removed), for example removing frequencies humans can't hear in audio. Lossless: Decompression returns original file. (PNG) Run-Length encoding - Repeated sequences of bits are stored as the bit times the number it is repeated by. (0000 = 0x4) Dictionary encoding - Frequently used sequences of bits are stored in a dictionary file along with a key which is referenced on every use of its associated bit pattern.
74
IDEs - Writing
Editor Statement completion Syntax highlighting Syntax checking Automatic formatting Optimisation Linker Loader
75
IDEs - Debugging
Debugging - Shows the exact line where an error is detected Interpreter - Translates code into machine code line by line. Compiler - Translated code into an executable file. Break points - User can choose specific points at which to pause the program. Stepping - Skip to a certain section of the code. Variable watch - Allows user to view the current value of a variable. Trace - Logs how the values of variables change as the program runs. Emulator - Provides users with ability to test programs in different environments (OSs). Memory inspector - Shows a section of RAM and details on how the program uses it.
76
Software System Uses
Weather forecasting - Take in lot of input from orbital satellites, Process a lot fo data, Analyse data and produce useful outputs (numerical data, visual data like heatmaps.), Function in real time. Robotics - Interpret stimuli accurately, perform a series of tasks repetitively, move/rotate in necessary directions, use energy conservatively. CAD - Greater accuracy and precision in drawing blueprints, 2D and 3D modelling possible, can be viewed from any angle, pre-made libraries of models available. CGI - Simulate physics, provide user with creative tools, high-quality rendering of scenes, 2D & 3D animation.
77
Multiplexing
Parallel transmissions can be 'muxed' together into one serial transmission to give it all the advantages of serial data transport. This can be done via Frequency-Division Multiplexing. It is then 'demuxed' into parallel connections again.
78
CD Burning
CDs and DVDs encode data using a laser which burns indents. The absence of a laser burn results in lands. Burnt in a spiral pattern starting from the middle.
79
Packet & Circuit Switching
Circuit switching: A constant connection is estabilished between the two devices over which they exchange data. If it is interrupted, the connection disconnects and the two devices must connect via a different path. When there is an active circuit connection, no other data can be transmitted through it, Packet switching: Dynamic path is estabilished over which data is sent in packets which are reassembled at their destination. Packets are difficult to intercept and interpret.
80
Data Representation
Integer - Short, 16 bits / Long, 32 bits Real - Single Precision, 32 bits / Double Precision, 64 bits Boolean - 1 bit Character - Depends on the character set (7 or 8, 16 or 31) String - Depends on the character set x length
81
Integer Vs Floating Point
Integer Allows for exact representation of 0. Less storage space Faster processing Flt Point Larger range More precision Can store whole and real numbers
82
OS Modes of Operation
Batch Processing - Allows for processing of repetitive operations without user interaction. Performs during off-hours, stores errors for later and doesn't pause. Real-Time Control - Allows for near-instantaneous control of functions. Used for critical operations like nuclear power plant controls or plane ticket reservations. Real-Time Transmission - Allows for near-instantaneous communication between users. Live-chat on apps like Whatsapp.
83
Expert Systems
Knowledge base Rule base Inference engine User interface