Computing Flashcards

1
Q

Explain how a bitmap graphic is stored.

A

Bitmaps are stored as number 2D array of pixels. Each pixel is represented by a binary number representing its colour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What role does the registers play in a CPU

A

A register is a storage location on the processor. Data/instructions/addresses that are needed during the fetch/execute cycle are held within registers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the address bus

A

The address bus is uni-directional

It passes an address from the CPU to the RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of the data bus

A

The data bus is bi-directional.

It can carry data to main memory from the processor and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Control Unit

A

The control unit is the term used to describe the part of the processor containing decoding circuitry and a series of independent lines that need to be used to signal the current state of the processor and fetch/execute cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by fetch execute cycle

A

Processor sets up the address bus and the address location that is required.

Processor activates the read line on the control bus

The instruction is fetched from the memory using the data bus

The instruction is interpreted in the memory location using a decoder and is carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is another name for a proccessing unit and what does this contain?

A

A core. Each core contains an ALU, control unit and registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cache memory

A

Cache is a small amount of memory which is a part of the CPU. It is used to temporarily hold instructions and data that the CPU is likely to reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by clock speed?

A

The clock speed - also known as clock rate - indicates how fast the CPU can run. This is measured in megahertz (MHz) or gigahertz (gHz) and corresponds with how many instruction cycles the CPU can deal with in a second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by clock speed?

A

The clock speed indicates how fast the CPU can run. This is measured in megahertz (MHz) or gigahertz (gHz) and corresponds with how many instruction cycles the CPU can deal with in a second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do computers have a negative effect on our environment?

A

Computer systems require energy. While one individual system may not need much energy to operate, two billion systems require vast amounts of electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do computers have a positive effect on our environment?

A

they can be used to create intelligent systems that control and limit the energy use of other devices. Intelligent systems include:
Heating systems
Traffic control
Car management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One way heating systems work

A

Activity sensors

Some smart systems use activity sensors to learn the temperatures that you prefer in certain rooms and at what times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List 3 offences under the computer misuse act of 1990

A

Unauthorised access to computer material
Unauthorised access with intent to commit or facilitate a crime
Unauthorised modification of computer material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a tracking cookie

A

A cookie is a small data file created when you access a website. These can be used to store your personal preferences or log in details so you don’t need to re-enter these details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a DoS and a DDoS attack?

A

DoS attacks can range in duration and may target more than one site or system at a time. A DDoS attack is when it comes from multiple computers instead of just one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a digital Certificate

A

A certificate is used to verify that a user sending a message is who they claim to be and to bind their public key to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a digital signature

A

A digital signature is a way to ensure that an electronic message or document is authentic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a cache ‘hit’

A

When the processor finds the data or an instruction before accessing the main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a cache ‘miss’

A

If the processor doesn’t find the data or instruction before accessing the main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Width of data bus

What is the difference between a 32 bit data bus and a 64 bit data bus

A

It can transport twice as much data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What 1 do you go to when finding the exponent/

A

You go to the left of the furthest left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If the number is positive what is the sign, 1 or 0?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If the number is negative what is the sign, 1 or 0?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When adding 1 during two's complement when do you stop?
You stop once you have a remainder
26
Two's Complement main steps:
Flip it and Add 1 to it
27
Describe the role of the client when developing software using agile methodologies
The client:  Details requirements  Outlines scope and boundaries  Evaluates prototype/suggest changes
28
A compound key is an example of a primary key. | Describe what is meant by a compound key in a relational database
A key comprising two or more attributes which are foreign/primary keys from other tables
29
This linear search algorithm is inefficient. | Describe how the algorithm could be made more efficient.
Use a conditional loop | With termination
30
Describe how encryption is used to ensure the secure transmission of data.
Public key encrypts the data | Private key decrypts the data
31
Explain what is meant by the scope of a variable.
Local or Global
32
State the effect on customers of a DOS attack.
Slow performance | Inability to access
33
What is a formal parameter
A parameter that doesn't have a value
34
What is an actual parameter
A parameter that does return a value
35
When Evaluating a program, what are the four main steps?
``` Fitness for purpose Efficient use of coding constructs Usability Maintainability Robustness ```
36
What is the precision of a number
The number of digits quoted in the mantissa indicates the precision
37
***What is the range of a number
the | number of digits in the exponent is a measure of the range of numbers that can be stored
38
What is an entity
An entity is a person, place, thing. | E.g. in a school, possible entities might be Student, Teacher, Class and Subject.
39
What is an entity occurence
A specific example of an entity is called an instance or entity occurrence. For example: John Smith, Mary McLeod and Omar Shaheed are all entity occurrences found in the Studententity
40
What is an attribute
An entity is described by its attributes. Each attribute is a characteristic of the entity. ``` For example, attributes of the Student entity would include: studentID firstname surname dateOfBirth. ```
41
What is a primary key
A combination of attributes that uniquely identifies one, and only one, entity occurrence .
42
What is a foreign key
An attribute in one table that uniquely identifies a row of another table.
43
What is a relationship in databases?
A relationship is a natural association between one or more entities.
44
What is cardinality in terms of databases
The cardinality of a relationship defines the number of participants in the relationship. E.g. one to one, many-to-one etc
45
Define an entity occurence diagram
An entity-occurrence diagram illustrates the relationships between the entity occurrences of one entity.
46
What is Breakpoint
A breakpoint forces executing code to pause at given points, allowing the current values of variables to be examined.
47
What is Watchpoint
A watchpoint stops the program executing when a condition is met
48
Describe two ways that the use of Rapid Application Development (RAD) reduces the time taken to create a working program.
uses minimal planning/reduced analysis involves the creation of prototypes/working
49
State two benefits of using parameter passing rather than global variables.
Reduces clashes between variable names Aids modularity
50
What is meant by a function
Returns a single value (used in | assignment)
51
How is car management systems used
Start stop systems automatcially shut down the car when it is not moving
52
List 3 validation methods in access
presence check — restricted choice — field length
53
How is traffic control used
Attempts to keep traffic moving so less emissions
54
What is a trace table
Used to allow programmers to trace the value of variables as each line of code is executed. Assist in identifying potential errors
55
What is a dry run
the process of a programmer manually working through their code to trace the value of variables. There is no software involved in this process.
56
what is the function required to turn a character into number
Ord ( )
57
What is the function required to turn an ASCII Number into a character?
chr( )
58
What is features an iterative development process
follows a set of steps in a specific order | allows iteration
59
What is surrogate Key
A key added to an entity to act as a primary/unique key
60
Attributes of Unicode
Includes all languages | Occupies more space and is more demading on memory than ASCII
61
Adv of ASCII
less space than unicode | one language
62
How many bits does Ext Ascii contain
8 bits
63
How many bits does ASCII contain?
7 bits
64
What is a dry run?
A dry run is the process of a programmer manually working through their code to trace the value of variables.
65
What is meant by a function
Returns a single value (used in | assignment)
66
State two benefits of using parameter passing rather than global variables.
Reduces clashes between variable names | Aids modularity
67
Describe two ways that the use of Rapid Application Development (RAD) reduces the time taken to create a working program.
uses minimal planning/reduced analysis involves the creation of prototypes/working
68
What is Breakpoint
A breakpoint forces executing code to pause at given points, allowing the current values of variables to be examined
69
What is cardinality in terms of databases
defines the number of participants in the relationship. E.g. one to one, many-to-one etc.
70
What is the range of a number?
The number of digits in the exponent is a measure of the range of numbers that can be stored
71
What is the precision of a number?
The number of digits quoted in the mantissa indicates the precision
72
When evaluating a program, what are the four main steps?
``` Fitness for purpose Efficient use of coding constructs Usability Maintainability Robustness ```
73
Describe the role of the client when developing software using agile Methodologies The client:
The client: • Details requirements • Outlines scope and boundaries • Evaluates prototype/suggest changes
74
What is the difference between a DoS and a DDoS attack?
DoS attacks range in duration and may target more than one site or system at a time. DDoS attack comes from multiple computers instead of just one.
75
What is a tracking cookie
A cookie is a small data file created when you access a website. These can be used to store your personal preferences or log in details so you don’t need to re-enter these details.
76
List 3 offences under the computer misuse act of 1990
Unauthorised access to computer material Unauthorised access with intent to commit or facilitate a crime Unauthorised modification of computer material.
77
What is cache memory
Cache is a small amount of memory which is a part of the CPU. It is used to temporarily hold instructions and data that the CPU is likely to reuse.
78
What is meant by fetch execute cycle
Processor sets up the address bus and the address location that is required. Processor activates the read line on the control bus The instruction is fetched from the memory using the data bus The instruction is interpreted in the memory location using a decoder and is carried out.
79
What is the role of the data bus.
The data bus is bi-directional. | It can carry data to main memory from the processor and vice versa.
80
What is the role of the address bus
The address bus is uni-directional | It passes addresses one way, from the CPU to RAM.
81
linear search algorithm is inefficient. | Describe how the algorithm could be made more efficient.
Use a conditional loop | With Termination
82
What is Watchpoint
To track events within a program, testers often add watchpoints. A watchpoint stops the program executing when a condition is met
83
Describe how object-oriented languages are used to create software.
Uses classes/sub-classes Subclasses need only define additional attributes and methods
84
Name a function of the operating system and describe one task it will perform when creating the external file.
``` File management Updates/checks file directory Resource allocation Input/Output ```
85
) Describe two ways that intelligent heating systems such as HiDoe can be used to reduce the carbon footprint of homes.
``` Remote access to control heating when not at home  Use of geolocation can automatically turn heating off when no one is home ```
86
explain what is | meant by a formal parameter.
can be a copy of the actual parameter | A formal parameter can control the flow of data
87
For floating point representaton, if the decimal point is moved to the left, will the exponent be positive or negative
positive
88
For floating point representaton, if the decimal point is moved to the right, will the exponent be positive or negative
negative