{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

mistakes Flashcards

(82 cards)

1
Q

Utility?

A

utility performs a specific task (1) and is usually
related to the upkeep of the system (1).
system software w one purpose
Examples of a utility include a virus checker
(1)/disk defragmenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hashing algo for files - what do we want?

A

Low chance of collision (i.e. different inputs giving
same output) (1 – AO1.2) to reduce risk of
different files being marked as the same
(1 – AO2.1).
Quick to calculate (1 – AO1.2) as lots of files need
to be hashed/needs to be quicker than a bitwise
comparison to make it worthwhile
(1 – AO2.1).
Provides a smaller output than input (1 – AO1.2)
so quicker to compare hashes than original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

array vs linked list

A

A linked list is a dynamic data structure (1)
whereas an array is static (1).
An array can have any element accessed directly
(i.e. random access) (1) whereas a linked list
needs to be traversed until the desired element is
found (1).
Contents of an array are stored contiguously in
memory (1) whereas the contents of a linked list
may not be (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CSS external not embedded?

A

Content and formatting are kept separate (1).
Changes can be made to the external style sheet
and affect the whole site (1) saving time (1) and
ensuring consistency (1). Stylesheets can be
changed for different themes, or different devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do we check email at server and client side?

A

carried out client-side/in
browser (1) meaning address can be checked and
stopped prior to reaching server (1) reducing
unnecessary load on the server (1).
JavaScript can, however, be amended and
circumvented (1) therefore address must be
checked at the server to ensure this has not
happened (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Primary key

A

A field that has a unique value/a unique identifier
(1) for every record in that table (1) - in this case
VideoID (1).

SAY FIELD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

class?

A

A template (1) defining methods and attributes (1)
used to make objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

inheritance?

A

class takes on the methods
(1) and attributes (1) of a parent class (1).
The inheriting class may override some of these
methods/attributes (1) and may have additional
extra methods and attributes of its own (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a linker? - why need it?

A

Links the main program to libraries
* ..can either include them in the final executable
code
* ..or get the executable code to point to the external
libraries

user running the program will not necessarily
have the library installed on their machine (1)
therefore the relevant code needs to be included
within the final executable (1) - it is the job of the
linker to combine this code (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

memory for portable? magnetic vs ssd

A

Device is likely to undergo lots of sudden
movement (1 – AO1.2) magnetic hard drives can
be susceptible to damage if moved quickly (1 –
AO3.3) due to the head coming into contact with
the platter (1 – AO3.3) whereas flash memory has
no moving parts and so is not affected (1 –
AO3.3).
The device is likely to be small (1 – AO1.2) - hard
drives require enough space for their moving parts
(1 – AO3.3) whereas flash memory, having no
moving parts, requires much less space (1 –
AO3.3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2sc over sign and m

A

not easily possible to carry out calculations
using sign and magnitude (1) whereas they will
work with two’s complement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

operating system func?

A

user interface
control hardware (graphics etc)
platform which software can be run - apps
control access - different users can access + own data
LINK TO CONTEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

company use open source?

A

core func there so just need to amend - save time + money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GPU over cpu?

A

CPUs are general purpose processors (1)
whereas GPUs are designed specifically for
graphics (1). And so likely to have built in
circuitry/instructions for common graphics
operations (1).

GPUs are able to perform an
instruction on multiple pieces of data at one time
(1) often we want to do this when processing
graphics (e.g. transforming points in a polygon or
shading pixels) (1) which means it can perform
transformations to onscreen graphics quicker than
a CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

why might game not work on other console?

A

Different consoles will have different processors (1
– AO1.2) each with their own instruction sets (1 –
AO2.1) and word sizes

Different consoles have different operating
systems (1 – AO1.2) and so games may be
dependent on libraries in one operating system
that don’t exist in another (1 – AO2.1) or may
make different system calls

or on different media e.g give example or DRM to protect run on other ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

packet switching?

A

Data is split into chunks called packets (1 –
AO1.1)
which have labels (1 – AO1.1) including
address being sent to (1 – AO1.1) and order (1
– AO1.1). Each packet is sent on the most
convenient/avoidable route (1- AO1.2) meaning
they may arrive in a different order to which
they were sent (1 – AO1.2). Once packets
arrive at receiver they are reordered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

non graphical use of gpu

A

Performing complex numerical calculations
* Calculations on matrices / vectors / multiple data at
the same time
* …e.g. modelling risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

explain pipelining 5

A

Concurrent processing of multiple instructions
* One instruction can be fetched while previous is
being decoded…
* And the one before is being executed.
* In case of a branch pipeline is flushed.
* Increases speed of execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

magnetic work?

A

Data stored by altering the magnetic field of a small
section of the tape or disk; one orientation represents a
binary value of 1, the opposite orientation represents a
binary value of 0. Written to using a read head.
Read head can then read the magnetic field and
retrieve the data.
These read and write heads move across the disk or
the tape moves under the heads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SS work?

A

store data using semiconductors;
drives can be based on NAND Flash or DRAM. No
moving parts are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

servers + backups?

A

Backup involves copying potentially large amounts of
data to and from storage devices at regular intervals.
Servers distribute data to client devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Problems with flat file? - customer bookings

A

Only one customer entry allowed (because of key
field)
* …so would not be able to add second entry
* Customer data already present/would be repeated
* ….resulting in redundant data/wasted space
* …resulting in inconsistencies should changes be
made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Solve issue of flat file?

A

add 2nd table and split up _ for _
primary of orig used as field in new as foreign key
create 1-many r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does html do

A

L defines the structure of a web page
* HTML defines the content of a web page
* Using tags (enclosed in <>)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does css do
defines the style / appearance * Using selectors such as classes / IDs / etc * Can be placed within HTML or externally in a file * Multiple pieces of CSS can be combined (the more local instances overriding)
26
why recalc server side?
processing done away from the user’s control/Client side processing could be altered * Browser may not support client-side language/ scripting could be turned off - disabled browser To prevent malicious code (such as an SQL injection/XSS) − To prevent a non-validated being sent to server ? * Booking fee calculation needs to be correct for all locations
27
Adv client side? customer vs compnay
No need to submit to server and wait for response * Website will work more quickly for user * Reduces load on the server * Will need to spend less on processing power/bandwidth
28
How index website?
program called Web crawler /spider visits site (or traverses web - following links) * Either be selecting it from an existing list or following a link. * Records information such as text / metatags / etc * Records the position of each word within the page * Storing them in an index - adds entry for page under word in index * Follows links to other sites * Robots.txt file can be used to instruct web crawlers
29
damping factor?
value bet 0-1 (0.85) prob that user will NOT follow link
30
Factors affect output value given by pagerank algo?
Number of links to target site * PageRank score of those sites (linking inwards)
31
How add 2 4-bit binary numbers w adders?
Logic circuit adds together 2 binary digits / half adder - S gives sum, C gives carry * Two half adders can be joined together… * …with an OR gate to form full adder * 4 full adders can be used to add two four bit numbers * Carry out on one joined to carry in on next
32
define register
Temporary storage/memory location… * …inside the CPU * Used for a single specific purpose * Faster access speed than RAM / secondary storage
33
How do we use ACC with bracnh
Eg BRP Accumulator checked to see if value held is positive or zero * If so, BRANCH carried out / jumps to specified location.
34
Describe addressing modes
Immediate addressing is where the operand holds the actual data to be used; no address referenced Direct addressing is where the operand holds the address that holds the data to be used - fetch data at operand Indirect addressing is where the operand holds an address which is where the data to be used is stored - fetch d held at operand which is address of where data fetched from Indexed addressing is where the operand holds an address which is offset using the Index Register to find the true address of the data to be used - operand added value of IR - address where fetch d from
35
Compare addressing modes
Immediate addressing allows simple access to data with no fetch required, but limited by the data size of the operand. Direct addressing allows data to be fetched from memory. Data can potentially be larger in size than immediate but address range limited by size of operand. Indirect addressing allows a larger range of addresses to be accessed as address fetched. However, multiple fetches required to access data. Indexed addressing allows the Index register to be manipulated to access data stored sequentially e.g. in an array.
36
binary t vs linked l vs hash
Binary tree more efficient than linked list * Do not need to check every value / tree removes half values each time Binary tree less efficient than hash table * Hash table can find data immediately / without checking other values.
37
define object, attribute, method
Object – instantiated from class * Method – action object performs / link to procedure/functions * Attribute – value held by object / link to variable
38
network switch
Joins computers/devices together on a LAN * Receives packets/data * Recipient’s address is given in packet header/it uses the mac address * Send packets/data * Out the correct port /to the specific computer device
39
foreign key
A field that links to a (primary) key in a second table example _ in _ table
40
hashing used?
Hashing for security * …e.g. hash passwords in database * …to make sure they cannot be read if they are stolen * Hashing for direct access * …e.g. Customer/Room/Booking records can be quickly accessed * …by using hash of index as address
41
referential integrity
Database/relationships are consistent // each foreign key links to an existing/valid primary key * Suitable example of being broken (e.g. if primary key is deleted/updated, foreign keys are no longer valid / changes should be cascaded) Ensuring that changes are consistent across a database − if a record is removed all references to it are removed − A foreign key value must have a corresponding Primary key value in another table.
42
d-type flip flop
Delay / store a value…of 1 bit * When a signal is given Data input, Clock input Q output When clock input goes high Q changes to D * NOT Q is reverse of Q
43
Memory management to user adv
Security * …does not let programs access memory reserved for other programs. * Multitasking * ...allows multiple programs to run at once
44
virtual m - work?
(Currently unneeded) pages moved from memory to secondary storage * …to create room in memory * pages moved back to memory when required
45
device driver
Software/program * …that allows the operating system to communicate with hardware device Examples: * Printer driver * Webcam driver * Sound card driver * Graphics card driver etc.
46
utility s examples
Encryption * …scrambles meaning of data files with a key * Defragmentation * …organises file segments on secondary storage * Compression * … reduces size of files * Backup * …makes regular copies of files in case of loss
47
open s ?
Source code / program code is freely available * …to edit/amend recompile.
48
open s benefits of an ide?
Can modify code and adapt IDE to her needs * Is likely to be financially free of cost. * Can recompile to work on different systems * Has the benefit of a community potentially improving the system * Can learn from others * Can ensure no backdoors / malware
49
what is library
Sections of code / program file * Written by other authors / already written * Containing useful routines * Suitable example (e.g. GUI routines, database access routine, encryption, graphics)
50
dis of library
increase size of compiled file… * …as library contains many routines that aren‘t being used. * Not written by the programmer * …so introduces uncertainty / require further testing / programmer needs to spend time familiarising themselves with it
51
embedded os
System software/software used to manage the device − Which is built into the device itself − Stored in the device’s ROM/cannot be changed − Specific to the hardware/purpose
52
multicore processor
more than one processing unit in a (single) processor − …which can independently process instructions at the same time.
53
optical media, adv
read/written to, using a laser − read/written onto a reflective surface − data is stored using pits and lands Cheap to produce/buy − Capacity big enough to hold film − Robust enough to be used over long periods/ moved around − Portable − Does not need an internet connection
54
stream media vs optical
Can access film (and indeed entire library) from anywhere with an internet connection − No physical storage needed − No risk of films being stolen/damaged/lost − Optical/disk player hardware not required to play film Disadvantage − Reliant on having an (fast enough) internet connection. − Need enough storage for download − Reliant on servers of the company providing the connection. − People like having a physical copy − If the company providing the stream goes out of business, copy is lost.
55
why compress videos?
High resolution videos take up large amounts of memory/RAM − Due to the large number of pixels that need to be represented − When streaming, the data being sent is time sensitive/ sufficient data (i.e. the next chunk of video) needs to be received and processed within a given amount of time − Otherwise there will be pauses/buffering. − Compression reduces the amount of data that needs to be sent/bandwidth needed − Compression reduces the cost/data usage for those with download limits
56
solve collision?
Linear probing could be used − Move through the structure one space at a time − …to find the next free space − Chaining could be used − Each location points (to the start of) a linked list. − The new item is added to the end of the linked list/free.
57
What determines how good hashing is?
Searching of a hash table requires the key to be hashed and correct location accessed. The time this takes is largely dependent on the time to create the hash. BUT list grows collisions become more likely. Linear probing and chaining means that once a location has been found the time taken grows linearly with the number of collisions that have occurred for that location so want create hash quick + low collision rate
57
What determines how good hashing is?
Searching of a hash table requires the key to be hashed and correct location accessed. The time this takes is largely dependent on the time to create the hash. BUT list grows collisions become more likely. Linear probing and chaining means that once a location has been found the time taken grows linearly with the number of collisions that have occurred for that location
58
application vs utility
app performs tasks for user rather than for comp - generic rather than specific tasks
59
What is extreme p
software development methodology. − Focus is on good quality code − It is an agile paradigm − it is designed to allow development to respond to changing user requirements. − Involves paired programming − Program is regularly reviewed/iterative process.
60
Why use VM?
run _ on different os/systems wout need of physical machines test but protect physical machine as VM quickly reset to original state
61
Why FCFS not good always?
jobs completed in order arrive _ may never run - take long time to start running or contininously run - other p wait or temporarily stalls
62
What happens if BIOS overwritten?
Comp cant boot os or set up initial config/hardware checks comp unusable
63
server
device = provides central point of control/access
64
Atomic?
transaction only fully or not complete - cant be partially complete
65
adv + dis of unicode over ascii
more char so foreign alphabets + emojis BUT more storage - 4 times more?
66
Lexical analysis
The comments whitespaceare removed. − Variable names/identifiers like ‘count’ are added to a symbol table. − Reserved words/statement components are tokenized. For example ‘WHILE’
67
Von Neumann
(Single) Control Unit - (Single) Arithmetic Logic Unit - (Special) registers within CPU - Instructions and Data stored in same area of memory - Instructions and Data stored in same format - A single set of buses / same bus for instructions & data (to connect CPU to Memory and I/O)
68
Improve performance of contemporary processors?
Two separate areas of memory… …one for instructions & one for data./instructions and data can be accessed concurrently. Different (sets of) buses… … one for instructions & one for data./ instructions and data can be accessed concurrently. Pipelining… …whilst an instruction is being executed the next can be decoded and the subsequent one fetched. Use of Cache… …A small amount of high performance memory is (next to the CPU) / which stores frequently used data/instructions Virtual cores/Hyper-threadingTM … …Treating a physical core as two virtual cores. Multiple Cores… …Each core acts as a separate processing unit. Onboard Graphics… …Built in circuitry for graphics processing
69
OS jobs?
Provide a (user) interface - Manage hardware/peripherals - Manage CPU usage / handles interrupts - Provide security - Provide platform to run other software - Provide utilities for system maintenance
70
first n form?
-No Repeating fields/data -Data is atomic -Has a primary Key
71
export data format?
- CSV/Comma Separated Value (file)… - A (text) file/format with values separated by commas - XML/eXstensible Markup Language… - …A markup language that uses tags to denote data. - SQL/Structured Query Language… - …A language for creating/querying databases JSON/JavaScript Object Notation… - …text format that can easily be changed to and from JavaScript Objects.
72
why protocols?
Allowing them to communicate - By ensuring all devices follow the same rules/standards - So they interpret data/signals in the same way
73
evidence of encapsulation in code? why use it
private attribute updated w method - Reduces the chance of errors/inconsistences - Ensures objects can only be changed in the way intended/ Ensuring changes are consistent with how the object should behave - Protecting data/ Can’t be changed accidentally
74
adv vs dis of self driving
- safer than a human driver (due to quicker reaction speeds etc.). - cheaper as no wage to cover. - less likely to make mistakes with route. - May not be able to understand natural speech. - May be limited in terms of the roads on which it can operate. - Vulnerable to hacking. - Only as good as the program running it – a bug in the code could cause catastrophic accidents. - May prioritise safety of pedestrians over that of the passenger. (e.g. may take actions that may put the passenger at risk to save lives of numerous people outside car.) - No discussion possible with the driver / no "human presence" to reassure nervous customers.
75
ASCII?
American Standard Code for Information Interchange - A character set - Maps values to characters - Uses 7-bits/ 8-bits per character
76
Multitasking
allows the user to run more than one program at the same time.
77
firewall
A hardware device/piece of software that monitors (and filters/blocks) traffic/packets going to and from a network Prevent unauthorised access to a network. (1) To restrict applications that are used internally that have internet access. (1) To restrict websites that can be accessed from within the company. (1) To protect the company’s data/intellectual property. (1)
78
linked list
dynamic/data structure (1) Each node/item consists of data and pointer (1) Pointer gives location of next node.
79
RLE vs dictionary
Run length encoding relies on consecutive pieces of data/characters being same. Each set of consecutive symbols can be represented by the symbol and its number of occurrences good for simple images not natural lang In dictionary encoding frequently occurring pieces of data/groups of characters are replaced by symbols/tokens/smaller groups of characters/indexes. A dictionary is then used to say which symbols etc match which groups of characters. When decompressed the dictionary is used to replace the tokens with the original text. good for text
80
hash
A result generated by applying an algorithm/numeric process to a value. hash func one way! - cant be reversed
81
RAD
- Prototype is created (1) - (Evaluated and) feedback used to inform next iteration (1) - Any changes are made (1) - Process repeated until…(1) … prototype becomes final product. (1)