🟣| Computer Systems Flashcards

1
Q

What are the advantages of bitmap graphics?

3

A
  • Can edit down to individual pixel level
  • Adding extra detail does not increase file size
  • Can create photo realistic images
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the disadvantages of bitmap graphics?

2

A
  • Very large file size for individual pixel storage
  • Resolution dependant, so pixelated when scaled larger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of vector graphics?

3

A
  • Small file size as only attributes are saved
  • Resolution independent, so doesn’t pixelate when scaled larger
  • Objects can be layered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the disadvantages of vector graphics?

2

A
  • Difficult to make realistic images with just objects
  • Adding extra objects increases file size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens if the number of bits allocated to the exponent increased?

A

Increases the range of the number, but decreases the number of bits available for the mantissa so the precision of the number is decreased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if the number of bits allocated to the mantissa is increased?

A

Increases the precision of the number, but decreases the number of bits available for the exponent so the range of numbers is decreased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps of the fetch execute cycle?

4

A
  1. The processor sets up the address bus with the required address
  2. The processor activates the read line on the control bus
  3. An instruction is fetched from the memory location using the data bus and stored in the instruction register
  4. The instruction in the instruction register is then interpreted by the decoder and carried out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What factors affect system performance

4

A
  • Number of cores (processors)
  • Width of data bus
  • Cache memory
  • Clock speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the number of cores affect system performance?

2

A
  • The more cores a processor has, the more sets of instructions the processor can receive and process at the same time, which improves system performance
  • A dual core processor is not as fast as a single processor running at twice the speed as it is not always possible to share some tasks equally between the cores, which reduces efficiency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the width of the data bus affect system performance?

2

A
  • Data bus is a set of parallel wires that connects the processor with memory and other hardware devices
  • By increasing the data bus from 32 wires to 64 wires, the computer can transfer twice as much information at one time which improves the system performance of the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does cache memory affect system performance?

2

A
  • Cache memory is a small amount of fast accessible memory, usually with or close to the processor
  • The processor checks the cache for data or instructions before accessing the main memory, which is faster and can result in fewer accesses to slower main memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does clock speed affect system performance?

3

A
  • Clock pulses are used to trigger components to take their next step,
  • The clock rate is the frequency at which the clock generates pulses
  • The higher clock rate, the faster the computer may complete a series of instructions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are tracking cookies?

A

Cookies that record your details and are sent back to the author of the cookie - most are for collecting marketing data or targeting adverts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do tracking cookies become a security risk?

A
  • Tracking cookies can be set by programmers to send them usernames and personal data, which can be used in identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DoS attack?

A

A deliberate attempt to prevent legitimate users of a network from accessing the services provided by a server or connected systems by bombarding a server with network messages to keep it busy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of DoS attack faults?

3

A
  • Bandwith consumption
  • Resource starvation
  • DNS attack
17
Q

DoS Attacks:

Bandwith Consumption

A

Using all of the websites available bandwidth

18
Q

DoS Attacks:

Resource Starvation

A

An attempt to use enough server resources to make the system unresponsive

19
Q

DoS Attacks:

DNS Attack

A

Modification of DNS record settings to point to a rogue DNS server

20
Q

What are the reasons for carrying out a DoS attack?

3

A
  • Financial - bringing down a commercial website will cost that company money
  • Political - prevent access to the website of a political rival
  • Personal - the attacker may have a personal grudge against the owner of the website
21
Q

What are digital signatures?

3

A
  • Created when a message is sent using a private key.
  • The recipient can be confident that the sender is who they say they are.
  • The recipent can be confident that the message was not altered in transit
22
Q

What are digital certificates?

2

A
  • Authenticates a person, allowing them to exchange data over the Internet using a public key.
  • Issued only by trusted entities (certification authority)