computer_science_flashcards
Limitation of ASCII
Not enough bits to represent all characters.
Characteristics of lossy compression
Data is permanently removed so the original file cannot be reconstructed.
Why are there no collisions on a ring network?
Data packets only travel in a single direction from node to node, so there are no packet collisions.
TCP/IP layers from highest to lowest
Application, Transport, Network, Data Link
What does the Application layer handle?
Selects & uses the correct protocol to transmit data & interacts with the user.
Drawbacks of cellular phone networks
Some areas not covered by infrastructure & inconsistent connection due to interference.
Describe one function of cache
Holds data ready for use so that it speeds up the processing.
How can an RFID be used?
A hand-held receiver could be used to detect the location of a lost object.
How does technology make us a more inclusive society?
Provides access to services such as education & health for those with constraints.
What does a round rectangle represent in flowcharts?
Start/Stop
What does a parallelogram represent in flowcharts?
Input/Output
What does a rectangle represent in flowcharts?
Process
What does a rhombus represent in flowcharts?
Decision
Function of a compiler
Translates high-level programming languages & generates single executable file.
Function of an interpreter
An error in the source code is highlighted as soon as it is encountered during execution, and translates high-level programming languages.
Function of an assembler
Translates low-level programming languages. One line of source code is translated to one line of machine code.
Benefit of hacking a network
Security vulnerabilities are exposed to an ethical hacker.
Describe how data is stored on optical media
A laser beam is used to burn pits & lands on the disc which represent 0 and 1.
Disc-formatting program software type
System software
Cloud storage user responsibility
Choosing strong authentication credentials & not sharing these.
Cloud storage provider responsibility
Encryption, backup & restore procedures
DNS Input
Uniform resource locator into browser
DNS Output
IPv4 address of searched website
Layer of devices from user device to internet
Device, Switch, Router, Modem, ISP, Internet