extra extra exra Flashcards

(136 cards)

1
Q

Server side power

A

Can perfrom large calculations faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTML

A

Structure and content of a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIC

A

Built in connect to network by providing it with a unique mac adress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

overloading

A

Methods bnehave different depending on parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APPlication

A

Protocols being used in relation to the application being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pipelining

A

One instruction can be fetched while another is
being decoded…
● …and another is executed
● The output of one process/instruction is the input of
the next.
● Concurrent processing of multiple instructions //
completing multiple FDE cycles at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Importance of Acummulator

A

Holds all input/output

● Holds results of calculations (from the ALU)
● Checked for conditional branching (e.g. BRZ)
● Stores data which has come from the MDR/RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CISC

A

Physically larger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What else does record locking cvause

A

Delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Optimisatin

A

Faster and less resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some other examples of exchanging data

A

● XML
● SQL
● APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does lossy depend on bandwith

A

Compression ration adjusted depending on bandwith buffer more and slower to start when less bandwith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compilers v interpreters source code

A

Visible qith interpreter invisible with compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compiler v interpeter errro

A

Compiler lists them all interpreter stops at first one and lists it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Ai used for

A

Computer systems that are required to perform tasks that normally require human intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is machine learning

A

Where a machine improves its performance/throughput through experience and access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ai follows programming so

A

programming bias will affect it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

machine learning bias depends on

A

Data given

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

More data for machine learning means

A

Less bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Waterfall is

A

Structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Waterfall imrpovements onlyh made

A

When previos step is completed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Spiral relies on

A

frequent client feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Waterfakk relies on

A

Getting requirements correct form the start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Waterfall for big team as

A

clearly defined responsibilities at each stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why would round robin be used
Multitasking switch between active and processes running in background Ensure OS cycles through all processes to handle interrurpt immediately
26
APPLICATION
27
Functional
Reuses functions
28
What is sql used to do
Select and manage data
29
Where does control unit send signals between
control unit sends control signals to control buses
30
Advantages of procedural programming
procedural are easy to write and interpret, rigid syntax and fault tolerance
31
What is polymorphism
objects can behave differently depending on their class. There are two categories of polymorphism: overriding and overloading
32
Javascript
Add interactivity to webpages
33
End to end encryption
Strong
34
Standards v protocols
A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it
35
Rsic space
When space is limited
36
Head tag
Metadata and link style sheets
37
Header tag
Intoduction or navigatory links
38
Consistency
Transactions follow rules
39
What is OS
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. It acts as an intermediary between users and the computer hardware.
40
CSS
CSS (Cascading Style Sheets) is a stylesheet language used in web development to control the presentation and layout of HTML (HyperText Markup Language) documents. The primary functions of CSS are:
41
Advantages of compilers
Performance (2 marks): Compiled code generally runs faster than interpreted code because it is translated into machine code that the processor can execute directly, without the need for further translation at runtime. Error Checking (1 mark): Compilation involves a thorough check of the entire code for errors before execution. This allows many syntax and semantic errors to be caught early, reducing the likelihood of runtime errors. Optimization (1 mark): Compilers can optimize the code during the compilation process to improve performance and efficiency. These optimizations can include code inlining, loop unrolling, and other techniques.
42
Disavantages of compiler
Compilation Time (1 mark): Compilation can be time-consuming, especially for large programs. This can slow down the development process as the entire program needs to be recompiled after changes. Debugging (1 mark): Debugging compiled code can be more challenging because errors are identified at compile time, and the generated machine code may not directly correspond to the original source code, making it harder to trace the cause of errors.
43
Advantages of interpreters
Development Speed (2 marks): Interpreters execute code directly, allowing for quicker testing and debugging. This is particularly useful in the development phase, where changes can be tested immediately without the need for recompilation. Platform Independence (1 mark): Interpreted code can be more portable across different platforms, as long as the interpreter is available on each platform. This means that the same source code can be run on different operating systems without modification. Memory Efficiency (1 mark): Interpreters can execute code that may not fit entirely in memory at once, as they translate and execute one statement at a time. This can be advantageous for memory-constrained environments.
44
Disadvantages of interpreters
Performance (1 mark): Interpreted code typically runs slower than compiled code because each instruction needs to be translated at runtime, which adds overhead. Runtime Errors (1 mark): Since interpreters translate code at runtime, errors are detected as the program runs. This can lead to runtime errors that may not be discovered until that part of the code is executed, potentially causing the program to crash.
45
Negatives of concurrent processing
Overhead, rquire complex programming, Multiple processes or threads competing for the same resources, such as CPU, memory, or I/O devices, can lead to contention
46
Some other methods of capturing data
Sensors, scanner importing from file
47
Not equal
!=
48
When a request is sent to the server what will it have
A thread
49
Multiple requests same time
Concurrent so two external companies can sell tickets without risk of two people buying one seat
50
In karnaugh maps what can you do
Only change the value of one bit
51
Absorption law
Absorption law A and (A or B) = A and A or (A and B) = A
52
Do not accept what for HTML
lAYOUT FORMAT
53
Assume by ref or val
Val
54
2 uses of data mining
Fraud Detection (1 mark): Data mining techniques can detect patterns and anomalies in transactions that may indicate fraudulent activity. This is particularly useful in the banking and finance sectors for identifying suspicious behavior and preventing fraud. Predictive Maintenance (1 mark): In manufacturing and other industries, data mining can be used to predict equipment failures before they occur by analyzing historical maintenance data and operational metrics. This helps in scheduling timely maintenance, reducing downtime, and saving costs.
55
What is thinking logically
Thinking logically in computer science means using clear and organized reasoning to solve problems or make decisions. It's like following a recipe step by step to cook something delicious. Here's how it works:
56
What is a word
the fundamental unit of data in a computer's memory, usually consisting of a fixed number of bits representing a piece of information such as a number or character.
57
trace v variable wath
"trace" involves step-by-step monitoring and recording of variable values during program execution, while a "variable watch" is a mechanism that allows specific variables to be monitored continuously for changes during debugging
58
Some other advantages of relational databases
Data Integrity: Relational databases enforce data integrity through constraints like primary keys, foreign keys, and referential integrity, ensuring accurate and consistent data. Flexibility: They allow complex queries using SQL (Structured Query Language) for retrieving, updating, and deleting data, offering powerful data manipulation capabilities. Scalability: Relational databases can handle large volumes of data and support scalability through techniques like indexing and partitioning. Normalization: Relational databases support data normalization, reducing redundancy and improving efficiency in data storage.
59
Disadvnatages of relational datbases
Complexity: Setting up and maintaining relational databases can be complex and require skilled database administrators. Performance Overhead: Join operations and complex queries can lead to performance overhead, especially on large datasets. Cost: Relational databases may require costly licensing fees for proprietary software, and scaling may involve additional hardware expenses. Learning Curve: Using SQL and understanding relational database concepts may have a steep learning curve for beginners.
60
Advanatges of flat file
Simplicity: Flat file databases are simple and easy to understand, making them suitable for small-scale projects or simple applications. Portability: Flat file databases are portable and can be easily transferred or shared between systems as they are stored in plain text or binary format. Speed: Flat file databases can be faster for simple read and write operations compared to relational databases, especially for small datasets. Low Overhead: Flat file databases have low overhead in terms of system resources and do not require a database server, making them lightweight
61
Disadvantages of flat file
Limited Functionality: Flat file databases lack advanced features like data integrity constraints, complex querying capabilities, and transaction support found in relational databases. Redundancy: Flat file databases may lead to data redundancy and inconsistency, as there is no built-in mechanism for enforcing data integrity or normalization. Scalability: Flat file databases may not scale well for handling large volumes of data or complex relationships between data entities. Maintenance Challenges: Updating and maintaining data consistency in flat file databases can be challenging, especially as the dataset grows or evolves over time.
62
thinking ahead
involves anticipating and addressing future challenges or requirements in software design and development during the initial planning stages.
63
Which contaions adressing mide
Opcode
64
Explain depth first
65
How to link external style sheet
66
SQL range is
Inclusive
67
Dequeue
Returns
68
Polynomial
n squared
69
What is body tag
Everything you see in web page apart from title
70
Title is in
Head
71
hash table
TO know where to store something
72
passwords
Hashing
73
Referential integrity
Whenever a foreign key must relate to a valid existing primary key and ensures rewlations between tables remains consistent
74
How to do branching in lmc
75
What is pipelining
pipelining is a technique used in CPU design where multiple instruction phases (fetch, decode, execute, etc.) are overlapped to improve instruction throughput and overall performance.
76
Embdedded system
System with dedicated functionality held in ROM FOR A SPECIAL PURPOSE DEVICE
77
What is memory management for
memory management for processes that are running
78
Modelling performance
Simulating behaviour of a system by testing it under different virtual user and system loads
79
Server side
Server-Side Processing: Used for secure, resource-intensive tasks that require server resources or database interactions.
80
Client side processing
Client-Side Processing: Used for immediate feedback and interactivity directly on the user's device.
81
Disadvantages of concurrent processing
Overhead, Potential for Data Inconsistency: If proper synchronization mechanisms (like locks, semaphores, or monitors) are not used, concurrent access to shared data can lead to inconsistencies and unpredictable behavior. This can compromise the integrity of the data and cause errors in the application's output.
82
Disadvatnages of virtual machines
A disadvantage of virtual machines is that they can have lower performance compared to physical machines due to the overhead introduced by the hypervisor and resource sharing among multiple VMs.
83
Unicode bits
16
84
Inner html
In head
85
Negative binary numbers to the left whatdo you fill
Ones
86
A in acid
Partially processed
87
When does the program counter increment
Same time as data is moved from MDR to CIR
88
What would you say for operand
determines value to be oprated on depedning oin mode of adressing
89
How to know for post order
Be above the line
90
For insert into
Insert into table name
91
so compiled code completely recompiled when change made but interpreter has to be run each time so which is quicker
Because compilers are slower than interpreter
92
2 inputs for d type flip flop
clock signal and control input or other way round
93
CSS
CSS styles webpage using selecters such as ids or classes
94
HTML
format using enclosed tags and structure and contents
95
What is not possible with cisc
Pipelining
96
Uses of risc
smartphones laptops
97
CISC
Laoptops, pcs, microcontrollers and embedded systems
98
Harcard
Embedded system, digital signal processing
99
Von neuman
Conventianal pcs and laptops
100
Router v bridge
A router operates at the network layer (Layer 3) of the OSI model and forwards data between different networks, while a bridge operates at the data link layer (Layer 2) and connects segments within the same network.
101
What do you fill to the left with neative numbers
1s
102
true or flase inner html
.checked
103
Advantages of polymorphism
Easier Code Management: Polymorphism allows you to write a general method that can work with different types of objects, making your code more organized and easier to manage. Flexibility in Code: It lets you use one method in different ways for different objects, making your code more flexible and adaptable to changes. Simplified Code: Polymorphism reduces the need for complex conditionals (like if-else or switch statements), leading to cleaner and simpler code.
104
Declaritive
where you write code that describes what you want to achieve, rather than how to achieve it. This means you focus on the desired outcome
105
When do d type flip flops store hte value of a bit
d type flip flops store the value of a bit WHEN a signal is given
106
MAC adress
mac address is 48 bits oe 12 hex bits
107
Unicode is
Variable sized bits
108
Pre emptive
OS actively starts nad stops
109
Non pre emptive
Once it started ghas to finish
110
Chanining
Linked lsit one
111
When does PC increment
Same time it is copied from MDR to CIR
112
How to brnch lmc
BRP Positive Positive LDA 10
113
10 lmc
ten dat 10
114
CISC in lmc
Mult A,B
115
IS pipelining concurrent or simultaneous
Concurrent
116
How to delete tabler
Drop table tablemane
117
Add alter
No column
118
Creating adn dropping table
When you have to say table table name as well as alter
119
What does RIPA also require for ISPS
Suitable monitoring hardware on there network
120
Some things for automated decision making
*Used to control what is shown first on social networking feeds. * May create an “echo chamber” where people are not exposed to views which challenge their own. *Used in application processes such as for mortgages or credit cards. *Relying entirely on automated decisions could mean people are unfairly treated.
121
What is artificial intelligence
* The ability of a computer system to behave in a way which replicates human intelligence, analysis and decision making. *Backed by a large knowledge base.
122
What is Ai used to do
*Used in systems designed to replicate system experts. *Used to analyse huge datasets. *Used in medicine to form diagnosis *Used in neural networks for pattern and fraud identification. *Used in voice recognition. *Raises privacy concerns.
123
Introduction of data protection act
*Applies to data stored electronically and on paper * Covers personal data, defined as data which either alone or in conjunction with other data can be used to identify a living person. *Any individual who can be identified by personal data is know as the data subject. *Superseded in 2018 by the European General Data Protection RegulationsW
124
What is big data
* Large amounts of data from different sources can be pulled together. This is known as big data. * This can identify patterns or other connections. * This data can reveal a lot about individuals and their behaviour. * It can also be used to target advertisements.
125
What do people argue about big data
Many people argue large companies should be more transparent about how they are doing this. *People argue organisations have a responsibility to share trends they find.
126
Electronic waste
* Electronic waste is sometimes shipped to countries with lower disposal standards.
127
Why is there so much waste
Technology evolves quickly and is more widely accessible than ever before. * Modern devices are not always designed to be repaired if they break. * This results in a huge number of devices being thrown away.
128
Electricity
Computers and associated servers and equipment require huge amounts of electricity to power and cool them. * This is often generated by burning greenhouse gasses.
129
Act about quality
* The Equality Act 2010 makes it illegal to discriminate against a group of people.
130
Embedded
Less resource intensive andlimited functionality
131
What is OOP good for
Useful for problems which can be broken down into distinct components
132
What is polymorphism
– allows objects to behave differently depending on their class.
133
packet switching
Breaks up into packets
134
closed source
Typically less funding so less features and updates
135
136
ponential
2 to the n