Gap Fill Flashcards
(17 cards)
Input Devices
Barcodes
Laser scanners
Interrupt examples:
Power-fail
Clock
Bytecode
Languages like python or Java are turned into Bytecode which is executed by a bytecode interpreter
Types of encryption
Caesar
Vernam
One-time-pad
Other SQL values
BOOLEAN
INTEGER
FLOAT
Serialisation
Transactions do not overlap
Physical vvs Logical Topology
Actual design
Shaepe of the data
Packet Filtering
Packets source IP is checked to see if it allowed
Viruses and Worms
Can self replicate
Viruses need host programs and worms do not
Trojans
Seeming good but is bad
Backdoor, malware
API
Rules that govern how applications interact with each other
Thin vs Thick Client
Thin - alot of server side processing
Thick - alot of client side processing
+ Secure data kept in one place
+ Easy to setup
- Server may have issues
Under and over flow
Under too small
Over too large
Abstract data type
Data created by the user
Dictionary
A key and a value
Uniform Resource Locator
Method, host, location, resource
Buses
Control:
() Bi-directional
() Clock
() Memory write / read
() Clock
Data:
() Bidirectional
() 8, 16, 32, 64 lines
Address:
Directional