Extra paper 1 Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of application package/software to do with databases

A

Database/DBMS
to store/query/sort data about
customers/staff/stock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Example of application package/software to do with documents

A

Word processor
to create documents / letters / invoices for
clients/staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of application package/software to do with presentations

A

Presentation software
to create presentations for clients/staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of application package/software to do with emails

A

Email software
for staff to communicate with each other or
with customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of application package/software to do with graphics

A

Graphics manipulation
to produce adverts / images for sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of application package/software to do with web

A

Web browser
to view websites to purchase materials/stock
// view competitor’s website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Drawbacks to closed source software

A

No access to source code

● Cannot modify//improve to meet business needs
● Cannot fix bugs
● (Usually) cost to purchase licences // licence
conditions to meet//ongoing fees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Avantages of LAN (remember to be specific and say printer)

A

Share hardware (e.g. printers)
● Share files
● Share Internet connection
● Centralised security
● Log on / access files from any machine on the
LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can be centralised with LAN

A

Central maintenance
● Central backup / storage
● Central installation / update of programs
● Can monitor user activity
● Can control access levels // Centralised user
admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is virtual storage well-suited for storing back ups

A

Stored away from the computer(s)/remote…
● … so in case of disaster, data is not also damaged
● All of the data (from multiple machines) can be
backed up at the same time
● Can be accessed from elsewhere / other machines
● Storage can be expanded as necessary//no limit on
size
● Speed of access is not a priority for a backup
● Can make recovery from another site easier

● No on site maintenance required
● Allows more local storage capacity for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another important advantage of storing back ups

A

No physical space needed for backup hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does multi tasking OS do

A

Multi-tasking…

● …runs multiple programs at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does multi user OS do

A

Multi-user…
● … allows multiple users at the same time (must
be clear that candidate is not discussing an OS
that simply has multiple accounts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does distributed OS do

A

allows multiple computers to work together on
a single task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does embedded OS do

A

Embedded…
● …has a dedicated/limited function
● …is read-only / cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When are interrupts checked for

A

Start/end of each fde cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens if an interrupt is raised

A

contents of registers copied to
stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do flags do in link to interrupts

A

Flags are set to determine if interrupts are enabled /
disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What happens at end of interrupt

A

After interrupt complete, previous register values
restored back from stack
● Flag is reset
● If higher priority interrupt received during servicing of
interrupt…
● …this is added to stack and new interrupt dealt with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is garbage collection

A

Removes data not needed anymore (memory management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do paging and segmentation do

A

Split up memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When is virtual memory used

A

When RAM is almost full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens if RAM is full

A

applications cannot be
loaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why is memory management important
If not, RAM would rapidly run out and fill up with unneeded data/instructions and so no new applications could run
26
What is a page table
A page table is used to map page location which is slower than a segmentation table
27
What type of fragmentation does paging cause
internal
28
What type of fragmentation does segmentation cause
External
29
Is virtual memory cheaper than RAM
yes
30
Advantage of paging over segmentation
Paging can be more effective because any free memory space can be used to swap data in and out whereas with segments, lots of space will sit unused until a segment the right size is available
31
When can a segmentation error occur
Segmentation errors can cause memory leakage which would cause the system to crash
32
How does memory management do security
Security issues – applications can only access memory allocated to them so (for example) a malicious application cannot access the memory allocated to a banking app. Also when applications are closed, data is removed before being reallocated so that applications cannot see historic data
33
What is a stack underflow
happens when we try to pop (remove) an item from the stack, when nothing is actually there to remove
34
What is a stack overflow
a type of buffer overflow error that occurs when a computer program tries to use more memory space in the call stack than has been allocated to that stack.
35
What difference should you NOT NOT NOT state for an array and list
Do not talk about the contiguous/non contiguous nature of them
36
Difference between array and list 1
Array is of fixed/defined size // static ● List size can be changed // no defined size // dynamic ● Array holds data of single data type ● List can hold data of multiple / different types
37
What does a tuple being immutable mean
Cannot be changed at run time
38
How are values accessed from linked lists
Go to the first position indicated by the start pointer ● From the first position, read the next pointer value... ● ...follow this pointer value and access the data item
39
Binary 0.1 or 10.
0.1
40
3 other advantages of two's complement
Calculations are more easily performed on two’s complement No additional hardware is required in two’s complement // Addition and subtraction are carried out using only an adder ● Two’s complement has only one representation for 0
41
Assembly language and processor
Assembly language is likely to be specific to the processor type used // is machine dependent ● HLL is portable // can be used for multiple processor types // programmer can pick from a number of HLLs and paradigms // is machine independent
42
Assembly language and knowledge of the processor
Assembly language requires more knowledge of the processor // allows direct control of the processor ● HLL provides more abstraction // requires less knowledge of the processor
43
Assmebly language and conversion
Assembly language is a one-to-one conversion to machine code ● HLL may produce multiple lines of machine code per line of code // one-to-many
44
Why may multi core processors not be faster
Some instructions may not be able to be run in parallel ● An instruction may be dependent / waiting for other instructions to be completed ● Other factors influence processing speed – clock speed / cache / bottlenecks / etc ● Program / OS needs to be written to specifically use multiple cores
45
Is Encryption one or two way
2 so can be reversed
46
Is hashing 2 or one way
1 so cannot be reversed
47
What does asymmetric encryption allow
Also possible to verify identity of sender / origin of data using asymmetric encryption.
48
Why is asymmetric encryption useful for passwords
Hashing is useful for information (e.g. password) that needs to be verified but does not need to be known at any point; once hashed, it is impossible to return to it.
49
Why is encryption useful for most data storage
Encryption useful for most data storage as anyone hacking into the robot will not be able to read/understand the data.
50
Why is hashing useful for passwords
Hashing is useful for data storage of password / other items that need to be verified, hash of input compared against hash stored to confirm correctness.
51
Where is hashing not useful
Hashing is not useful for data that needs to be returned to the user as impossible to return to.
52
Why is encryption useful for data transmission
Encryption useful for data transmission as data intercepted cannot be decrypted without the key.
53
Actual name of copy right act
Copyright Designs and Patents Act
54
What does copyright act do
● Gives the author (the programmers) ownership/copyright of the photographs ● ...no need to apply // this is automatic ● Others cannot use/distribute // can be prosecuted/fined for using/distributing... ● ...without permission ● Permission can be granted / bought / licenced
55
For karnaugh maps what is important
Least amount of boxes to cover all 1s, biggest boxes possible
56
Prison sentence for not handing over keys to encrypted files
2 years
57
Another issue with RIPA
with more organisations using their powers for minor offences such as detecting those lying about their address to get children into a better school or fly-tipping.
58
What is damping factor
The pageRank theory holds that an imaginary surfer who is randomly clicking on links will eventually stop clicking the probabilityat anyy step that the person will continue is a damping factor
59
How does the PageRank Formula work?
(1 - 0.85) + 0.85 x (Previous Page Rank / How many arrows going out of the page)
60
Disadvantages of virtual storage
Dont have control over how it is stored
61
What is a call stack
Data structure that stores information about the active subroutines of a computer program like local variables
62
What does agile methodoligies require
Skilled developers
63
Interrupts extra
Complete current FDE cycle, relevant ISR loaded, into program counter
64
First main point of spiral model
Analysing system requirements
65
Second main point of spiral model
Pinpointing and mitigating risks
66
Thirs point of spiral model
Development, testing and implementation
67
Final point of spiral model
Evaluating to inform next iteration
68
Why is spiral model only suited to large scale projects
If the project is too risky it is terminated, however hiring risk assessors is expensive which makes methodology suited to large
69
What does the opcode contain
Adressing mode and istrunction
70
LMC how do you store 10
TEN DAT 10
71
Branching lmc
BRP POSITIVE POSITIVE LDA TEN
72