Computer Systems Flashcards

1
Q

What do computers store all data as?

A

Binary numbers (base 2, 1s and 0s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are integers stored

A

Twos complement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Range of positive integers?

A

2^n‐¹ -1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Range of negative integers

A

-2^n‐¹

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you know if binary is positive or negative?

A

Most significant bit (MSB) 0=POSITIVE 1=NEGATIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are real numbers stored?

A

Using floating point representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mattissa determines what?

A

The accuracy of the number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exponent determines what?

A

The range of the number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Increasing the number of bits for the Mantissa and decreasing the number of bits for the exponent does what?

A

Increases accuracy but decreases range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unicode advantages?

A

Represents a large variety of languages including emojis UTF-16 HAS 65 536 characters UTF-32 HAS over 4 mill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unicode disadvantage?

A

Takes up double the storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bitmap advantages

A
  1. Able to edit at pixel level
  2. Realistic images
  3. Same appearance in all systems regardless of hardware or software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bitmap disadvantage?

A
  1. Scaling causes pixelization
  2. Only the image can be edited.
  3. Difficult to convert to vector formats.
  4. File sizes can be large.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vector graphic advantages

A
  1. Individual objects can be easily edited
  2. Smaller files
  3. Can be scaled to large sizes, keeping quality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vector graphic disadvantages?

A
  1. Unable to edit on pixel level
  2. Unrealistic images
  3. Resolution dependent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bit depth

A

Number of bits used to store each pixel in a image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fetch execute cycle

A
  1. The processor sets up the address bus with the required address.
  2. The processor activates the read line on the control bus.
  3. An instruction is fetched from the memory location by the data bus and is stored in the Instruction register.
  4. The instruction in the instruction register is interpreted by the processor, decoded and carried out.
18
Q

Number of cores

A

More cores the more instructions the processor can process

19
Q

Width of the data bus

A

By increasing the data bus from 32 to 64 wires the computer can transfer twice as much info at one time

20
Q

Cache Memory

A

Small fast accessible memory. the processor checks the cache before the main memory for data or instructions

21
Q

Clock speed

A

Clock pulses are used to trigger components to take their next step. The higher clock speed, the faster the computer completes a set of instructions. but at the cost of increased power consumption and overheating

22
Q

Heating system

A

Knows when the house is empty so turns off heating, checks weather forecast.
zoning GPS data
reduces co2

23
Q

traffic control

A

transport emits 25% of co2 emissions.
Adaptive traffic signals
intelligent routing systems

24
Q

Car management

A

Start/stop system
Air to fuel ratio

25
Computer Missuse Act 1990
Unauthorised access to computer material6 months unauthorised access with intent to commit or facilitate a crime 5yr unauthorised modification of computer material 5yr
26
Tracking Cookies
A tracking cookie is a small data file created when you access a website. Tracks web browsing data about you so it can target ads at you. Can pose a risk as the TC can be sell your account details and data to a 3rd party company
27
DOS symptoms
inability to access or slow performance
28
DOS effect
29
DOS COST AND REASON
30
DOS TYPE
31
Bandwidth consumption
Bandwidth consumption is when a flood of requests fills the connection up to its limit so no other requests can get through. The effect only lasts as long as the attack is maintained.
32
Resource starvation
is when the requests take up a few other resources, like disk space until the server runs out and is no longer able to function correctly
33
DNS Dmain name service
These attack the servers that route internet traffic so it can impact multiple websites. It also can lead to congestion and consumption of bandwidth.
34
Encryption key
35
Public key
36
PRibate key
37
Sym
An encryption method in which the same key is used to encrypt and decrypt a message
38
DIgital cert
A digital version of passport that confirms the identity of a person or organisation. This allows individuals and companies to feel secure in exchanging information as they can confirm each other's identities.
39
Digital signature
Is an electronic siganture that is used to validate the identity of the person sending a message or the integrity of a document
40
digi sig
A digital signature is a method of ensuring that a message is authentic (unaltered). You obtain a message hash (A mathematical summary of the contents of the message). You can encrypt this message hash (this time with the private key as this has to be private - hence the private key). This ‘signature’ is attached to a message.