Computing Flashcards

1
Q

Computer

A

An electronic, programmable data processing machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer system

A

A collection of hardware and software that work together to achieve data processing tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System

A

A collection of parts that work together for a defined purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System boundary

A

How a system is separated from the outside world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a system boundary often called?

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Importance of computer systems

A

Improve quality of manufacturing
Cheaper manufacturing
Faster access to information
New ways of doing business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of computer systems

A

General-purpose
Dedicated
Control
Embedded
Expert
Managment information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General-purpose systems

A

Personal computers that are designed to perform multiple tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dedicated systems

A

Systems that are specially produced to perform a single function or set of functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control systems

A

Computers systems that control machinery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Embedded systems

A

Computer systems that are part of a larger system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Expert systems

A

Systems designed to behave like a human expert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management information systems

A

Systems that bring together the information from all parts of an organisation so that managers can make sensible decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data integrity

A

Data being accurate and consistent throughout its life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

De facto standards

A

Standards that develop over time because of common usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

De jure standards

A

De facto standards that have become so unviersally accepted that they have to be adhered to or communication is impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Proprietary standards

A

Owned by an organisation. Ensure compatibility between the company’s products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Industry standards

A

Set by recognised non-commercial organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Open standards

A

Publicly available
Produced collaboratively
Not dominated by any one interest group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples of open standards

A

HTTP
WAP
HTML
XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ethical act

A

An act that is morally “right”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A legal act

A

An act that does not break any laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data protection

A

Laws that intend to protect the privacy of data of individuals on computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hardware

A

The physical components of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Hardware components
Input Output Storage Processing
26
The central processing unit
Carries out the processing in a computer
27
The arithmetic and logic unit (ALU)
Carries out all of the arithmetic and logical operations
28
The control unit
Uses electrical signals to control the flow of data within the CPU
29
The fetch-execute cycle
Fetch Decode Execute Fetch
30
The boot sequence
A sequence of processes that contains all the information and instructions to start the computer
31
Boot loader
A program that starts the boot sequence when the computer is switched on
32
CPU clock speed
The speed of the fetch-execute cycle
33
Cache memory
Very expensive Contains recently used data
34
Types of memory
Virtual memory Flash memory
35
Virtual memory
Part of the hard drive Used as an extension to RAM
36
Flash memory
A type of ROM that can be rewritten Used as a portable medium for storing data
37
Example of input devices
Mouse – controls a pointer on screen that can be opened, dragged or controlled by clicking buttons on the mouse
38
Output device example
Monitor - the most common way of displaying text, images and video
39
Secondary storage
Needed to store data and programs when the power is switched off
40
Types of secondary storage
Magnetic hard disk Optical disk Flash memory
41
Magnetic hard disk properties
Reliable High capacity Low cost
42
Optical disk properties
Good capacity Low cost Lightweight Portable
43
Flash memory properties
Good capacity Used in hand held device More expensive
44
Software
The programs we run and data we use on our computers
45
Multi-purpose computers
Computers that store their software on a secondary storage medium
46
Graphical User Interface (GUI)
Uses icons to represent resources, files, programs and actions
47
Types of memory management
Virtual memory Peripheral management Fragmentation and defragmentation Device drivers Multitasking
48
Directory
A logical grouping of files, also called folders
49
File extensions
These are parts of the file name that indicate what type of file it is
50
Attributes
Files can be given different attributes, which provide extra information about the file
51
Viruses
Viruses are programs that replicate themselves. They attach themselves to legitimate programs
52
Authentication
Operating systems usually allow the authentication of users. This normally involves users having a user ID and a password
53
Privileges
The rights assigned to users and groups
54
Encryption
Files are transformed in such a way that an unauthorised person cannot understand them
55
Types of programming software
Editors Linkers Interpreters
56
Editors
They allow text to be created, saved, read and changed
57
Applications
Are the programs that people use to read-world jobs
58
Utilities
Software tools that help make maintaining the system easier
59
Custom written software
Software specially commissioned for a particular customer
60
Off the shelf software
Ready immediately Extensively tested There will be lots of forums online where users can help each other
61
Open source software
Software that has been placed in the public domain by the programmers
62
Bit
A binary digit
63
Units
8 bits = byte, 4 bits = nibble
64
Converting from denary to binary
Repeated division by 2, recording the remainder each time.
65
Hexadecimal numbers
Numbers that are easily converted from binary and easy to remember or recognize
66
Database
A persistent organised store of data on a computer system
67
Persistent (database)
It is saved on secondary storage for the future
68
Organised (database)
A structure that can be easily processed
69
The importance of databases
Accurate Up to date Available to those who need to use them Protected from those who should not have access
70
Data security
Refers to keeping data safe
71
Data integrity
Data reflects reality
72
Validation
The process of checking data when it is input
73
Validation methods
Length check Type check Range check Presence check
74
Verification
Checking that the data entered is correct
75
CRUD
Standard operations on databases are sometimes listed under the term CRUD: Create Read Update Delete
76
Data matching
Compares different databases to look fo particular relationships
77
Data mining
A process that looks in many different unrelated databases
78
Flat file database
This is just rows and columns such as would be suitable for an address book
79
Relational database
It is the most useful model and consequently most common type of database
80
DBMS
Database Management System
81
Transactions
When a change takes place in a database
82
Multi-user databases
Most commercial databases are multi-user. This can be a conflict. To avoid this, most DBMSs use record locking
83
Commons tools provided by a DBMS
Tables Linking tables Data types Forms Reports
84
LAN
Confined to one site Connected using equipment owned by the organisation Maintained by the organisation
85
WAN
It is a wide area of network. It covers a large geographical area which may be a city or even the world
86
Functions of WAN
They often connect LANs together They make use of publicly available telecoms facilities They allows a business to function from any location
87
Network hardware
Special hardware is needed to connect computers to: Network interface controller (NIC) Cables Hubs Switches
88
Types of network
Client-server network Peer-to-peer network
89
Client-server network
One or more servers provide services to many clients machines where the users work
90
Peer-to-peer network
In a peer-to-peer network, all computers are equal. Each computer serves the needs of the user as well as carrying out networking functions
91
Network topologies
The layout of the network components: the cabling and the position of the nodes
92
Protocols
A set of rules that covers data communication
93
Flowcharts
It is a diagrammatic representation of the data flow and structure for the solution. Flowcharts use a standard set of shapes to define different actions
94
Pseudocode
Structured form of English used to define the steps needed to solve a problem
95
Programming languages
Machine language Assembly language High-level language
96
Integrated development environment (IDE)
Translators usually include an IDE. Features of IDE: - source code editor - error diagnostics - run-time environment - translator - automation tools
97
Comparison operators
Used to compare two values
98
Array
A set of variables with the same name and an index number to identify the different variables
99
Syntax errors
Errors in the use of the language rules and these are often identified by the IDE
100
Logic errors
Generated by variables not taking the values expected or decisions that not allow the program to complete
101
Features of a DBMS
Applications won't damage existing data structures New applications can be written without restructuring the data Data can be more easily shared between applications
102
RAM
Volatile Contains OS Stores programs and data being used by the computer
103
ROM
Non-volatile Contains boot program Porgrammed during computer manufacture
104
Advantages of LAN
Users can communicate with each other Computer use can be easily monitored Expensive peripherals can be shared
105
Operating system
The core software that allows a computer to run as an useful device. Manages the hardware, the user interface and all other software running on the computer
106
Converting hexadecimal to binary
Split binary number into two nibbles Convert each to get hex equivalent
107
Converting binary to hexadecimal
Convert binary into denary, then denary into hex
108
Converting hexadecimal to denary
Multiply first symbol by 16 Multiply second symbol by 1 Add both symbols
109
Converting denary to hexadecimal
Divide by 16 and record remainders until result = 0
110
Compression
Reducing the size of a file
111
Types of compression
Lossy Lossless
112
Lossy compression
Removes some of the data from the file The data removed cannot be recovered
113
Lossless compression
Does not store repeated detail Allows the original file to be reconstructed exactly
114
Database Management System
An application designed to control all aspects of a database
115
DBMS functions
Creating an empty database Deleting an entire database Creating and deleting tables Inserting new records into tables Updating and deleting records