paper 1 systems Flashcards

(53 cards)

1
Q

describe what is meant by von neumann architcture (2)

A
  • both data and instructions share the same memory
  • has a single set of busses for instructions and data
  • has an ALU
  • has a single CU
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

one way how harvard and von neumann architecture differ (1)

A

harvard has seperate memory for data and instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 ways a processor can be upgraded

A
  • higher/ faster clock speed
  • more cores
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

define pipelining (3)

A
  • concurrent processing of multiple instructions
  • the output of one process/instruction is the input of the next
  • one instruction can be fetched while another is decoded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain one benefit of using pipelining(2)

A

*more instructions can be carried out in a set amount of time/less time
* …increasing the speed/performance/efficiency of program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describe how the accumulator is used during FDE (2)

A
  • holds all input/output
  • holds results of calculations from ALU
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe how the program counter is used during FDE (2)

A
  • hold address/location of next instruction to be fetched/executed
    *contents copied to MAR at start of FDE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

state 3 registers other then ALU,PC

A

*MAR
*MDR
*CIR
*IR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

state what is meant by the term ‘primary key’ (1)

A

field that is unique, does not repeat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

state what is meant by the term ‘foreign key’

A

a primary key in one table that links to the primary key of another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what data type would the number 4.99 be

A

float/floating point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is boolean data type

A

true/false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

decribe what is meant by a transaction being durable

A

data/transaction is not lost in case of power/system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

explain how record locking can be used to ensure that the ACID principle of isolation is achieved when carrying out multiple transactions(3)

A
  • the outcome of concurrent transactions is the same as if transactions were completed sequentially
  • record locking allows one user/process to access/ modify record level data at any one time
  • data that is used elsewhere cannot be modified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

explain how the copyright designs and patents act can apply to all videos that are streamed on a streaming platform (2)

A
  • copyright is assigned to the owner of videos automatically on creation
    • making it illegal to copy/distribute videos as your own(without permission)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

give one disadvantage of using record locking

A
  • can cause delays
  • can cause deadlock
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

explain the difference in choosing lossy vs lossless compression when streaming videos (5)

A

Lossy
* permanently removes data
* reduces quality of videos on slower connection
* file size is smaller than lossless
* video will buffer less
Lossless
* keeps original quality
* buffers more
* rewrites original data in a more efficient format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

state the purpose of a translator

A

converts high level/assembly code to low-level/machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

explain 2 differences between compiler and interpreter (4)

A

any 2:
compiler translates code all at once
interpreter translates line by line

compiler lists all errors
interpreter stops at first error

compiled programs have hidden source code
interpreter have visible source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

describe the purpose of code optimisation (2)

A
  • to make programs run faster/code more efficient
  • to make the program use fewer resources/memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

give one similarity between ASCII and unicode (1)

A
  • both use binary to represent characters
  • both are character sets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

give 2 differences between ASCII and unicode (2)

A
  • ASCII has fewer characters, unicode has more characters
  • ASCII is is 7/8 bits , unicode is 16/32 or variable
23
Q

explain why the computer’s OS uses a first come first served algorithm when sending documents to the printer (2)

A
  • for printer queue
  • all documents/users have equal priority
  • FIFO
24
Q

explain why the computer’s OS uses a round-robin algorithm for allocating processor time (3)

A
  • to enable multitasking
  • to switch between active processes and those running in the background
  • to limit each process to a certain amount of time
    • to ensure the OS cycles thorugh all processes
25
describe one other scheduling algorithm (2)
one mark for name, one mark for description * shortest job first * the process which has the shortest time remaining completed first * multilevel feedback queues * jobs can be moved between queues
26
what happens at the network access layer of a TCP/IP stack (2)
* recieves (layered) data from internet layer to send * MAC addresses are added to the packet * passes (layered) data back up to internet layer when recieving
27
what happens at the application layer in a TCP/IP stack (5)
* protocol to be used is decided based on the application * e.g. HTTPS for browser based service * adds encryption * passes on to transport layer to send * decrypts message
28
a small manufacturing business uses a spreadsheet application to calculate employee’s wages. gives 1 benefit to this rather than calculating wages manually. (1)
* fewer mistakes // more accurate * faster as you can apply the same formula to multiple cells
29
give 2 types of application packages a manufacturing company could use (4) application……… example of task…………..
- database - to store/sort data about customers/staff/stock - word processor - to create documents/letters/invoices for clients/staff - email software - for staff to communicate with each other/customers - web browser - to view websites to purchase stock/ view competetor’s websites
30
describe a drawback of using closed source software rather than open source software for a small business (3)
* no access to source code * cannot fix bugs * cannot modify//improve to meet business needs * usually cost to purchase licences
31
explain why virtual storage is well-suited for storing backups (2)
* stored away remotely from the computer * so in case of disaster, data is not damaged * can be assessed remotely from other devices * no physical space needed
32
give 3 advantages to a business connecting computers together in a LAN (3)
central * security * maintenence * backup/storage * installation/update of programs share * hardware e.g. printers * internet * files * access files from any machine to the LAN
33
explain what is meant by a network protocol (2)
- a set of rules - to ensure the proper transfer of data between devices
34
give 2 protocols that may be used in a LAN (2)
- HTTP - HTTPS - TCP - IP - POP - IMAC
35
explain why protocol layering is used (3)
- to apply protocols in order / one after the other - to provide independence of layers - hide details from previous /next layers (is an abstraction) - simplifies interfacing
36
a business monitors critical safety features. all data must be processed within a predictable timescale of a fraction of a second. state the type of operating system that shouls be used by the computer (1)
real time os
37
give 3 types of operating system and state their purpose (6) type ……………………. purpose ………………
- multi-tasking - runs multiple programs at the same time - multi-user - allows multiple users **at the same time** (not just mutiple accounts) - distributed - allows multiple computers to work together on a single task - embedded - is read-only/cannot be changed
38
when a device such as a keyboard or printer requires attention from the CPU, an interrupt is raised. Explain how an OS system deals with an interrupt (3)
- interrupt checked for at start/end of each fetch-execute cycle - if the interrupt is lower priority than current process then the current process continues - flags are set to determine if interrupts are enabled/disabled
39
describe one difference between a stack and a queue (2)
- stack is LIFO/FILO - queue is FIFO/LILO - stack uses 1 pointer - queue uses 2 pointers
40
describe one difference between an array and a list (2)
- array is fixed size - list size can be changed - array holds data of a single data type - list can hold data of multiple/different types
41
state how a tuple is different to a list (1)
a tuple cannot be changed at runtime / a tuple is immutable
42
describe how the second item in a linked list would be accessed using a pointer (3)
- go to the first position indicated by the start pointer - from the first position, read the next pointer value - …follow this pointer value and access the data item
43
give 1 advantage of storing values using two’s compliment instead of sign and magnitude (1)
- calculations are more easily performed on two’s compliment - two’s compliment allows for a (negligible) larger range of numbers to be stored two’s compliment has only 1 representation for 0
44
complete each of the following sentences relating to the storage of floating point binary numbers with an appropriate word. increasing the number of bits used for the mantissa increases the _____________ of the number that can be stored increasing the number of bits used for the exponent increases the _____________ of the number that can be stored
- precision/accuracy - range/size/magnitude
45
describe 2 differences between assembly language and high-level languages (4)
- assembly language directly interacts with hardware - high-level languages uses alphanumeric language, much easier for humans to understand
46
describe one difference between packet switching and circuit switching (2)
- circuit switching: dedicated hardware resources are used for each connection - packet switching: hardware is used for multiple different connections - circuit switching: the data is sent along one route/system - packet switching: packets of data may be sent along multiple different routes/packets may not be in order
47
explain why packet switching is more suitable for a computer network than circuit switching (2)
- computer networks would involve multiple connections happening concurrently - computers pass vast amount of data which may encounter transmission errors
48
a gaming company decides to release a new video game console which will used a modified version of an operating system called linux explain 2 reasons why games designed for other companies’ consoles may not work on this machine (4)
- different consoles will have different processors - each with their own instruction sets and word sizes - games might be on a different media - e.g might be on blu-ray when console only has a dvd player
49
explain what is meant by paging (2)
- parts of a program divided into equal size parts - uses physical divisions
50
explain what is meant by segmentation (2)
- parts of a program divided into unequal sizes - uses logical divisions
51
state 2 similarities between paging and segmentation (2)
- both use virtual memory to swap parts of programs - both are ways of splitting up memory - both allow programs larger than memory to run
52
a user’s passdword is passed to a function that generated a hash and the result is stored in passwordHash describe what is meant by the term ‘hash’ (1)
a result generated by applying an algorithm/numeric process to a value
53
describe one advantage to storing a password as a hash (2)
- hash functions are one way / can’t be reversed - if comeone gains access to the database, they cannot access the user’s password