paper 2 questions Flashcards

1
Q

Describe how an instruction is fetched from main memory during the fetch stage
of the fetch-execute cycle.

A
  • Contents of Program Counter transferred to Memory Address Register
  • Address bus used to transfer this address to main memory
  • instruction transferred using the data bus
  • Contents of addressed memory location loaded into the Memory Buffer
    Register
  • Transfer content of Memory Buffer Register to the Current Instruction
    Register
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During the decode and execute stages of the fetch-execute cycle the instruction
that is being processed is stored in the CIR. Explain why the instruction could
not be processed directly from the MBR.

A
  • To carry out the instruction other data may need to be fetched
  • Further memory fetches would overwrite the contents of the MBR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain why the Harvard architecture is sometimes used in preference to the von Neumann architecture.

A

Instruction and data can be accessed simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State two conditions that must be met for the Vernam cipher to offer perfect security

A

The key must be (truly) random
The key must not be reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the difference between a symmetric and an asymmetric cipher system

A

Symmetric: The same key is used to encrypt and decrypt
Asymmetric: Different (but related) keys are for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

calculate bit rate

A

baud rate x bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

relationship between bit rate and bandwidth

A

bit rate is directly proportional to bandwith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain why serial communication is more appropriate in this instance than parallel communication

A
  • Data skew might occur if parallel communication used
  • To avoid problems of cross-talk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the general purpose of a D-type flip-flop

A

Used to store state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

inputs other than data signal for d-type flip flop

A

Clock

Used For: State of data input is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State the purpose of the operand part of an instruction and explain how the addressing mode is related to this

A

An operand is a value that will be used by an operation
The addressing mode indicates how the value in the operand should be interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discuss the advantages and disadvantages of programming using a high-level language compared to programming using assembly language

A

Program code is easier to understand
Faster development time
Programs are (more) portable
Language is problem-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain what a higher-order function is

A

A function that takes a function as an argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

calculate storage space

A

Storage Space = (Sample Resolution) x (Sample Rate) x (Duration) x (Number of Channels) / 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The highest frequency component in the sound that is being sampled
is 14 500 Hz. The sample rate of 20 000 Hz is not high enough to enable a
faithful reproduction of the original sound from the sample.
Explain why this is the case, justifying your response

A

the sample rate must be at least twice the frequency
of the (highest frequency component in the) original signal

20 000 is less than double of 14 500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain how MIDI represents music and the advantages of using MIDI for
representing music instead of using sampled sound.

A

Music represented as sequence of MIDI (event) messages
MIDI messages are usually two or three bytes long

pros:
More compact representation
Easy to modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain the difference between a physical topology and a logical topology

A

Physical: The physical layout of the connections

Logical: How the data flows around a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain the differences between client-server and peer-to-peer networking

A

Client-server:
Resources stored on the server
Clients access resources from server

Peer-to-peer:
Resources stored on each individual computer
Computers communicate directly with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Between 2008 and 2010, a company that was gathering data for an online
mapping system, using cars fitted with cameras and WiFi equipment, collected
some information that was being transmitted on personal WiFi networks. The
company apologised for doing this and an investigation found that a small
number of software developers had been responsible for adding this functionality
to the mapping system data collection software.

In the context of this example, discuss:
* how it was possible for this data to be collected.
* what steps the owners of the networks could have taken to prevent the
data from being collected.

A

WiFi signals can travel outside of property
Any WiFi receiver in range can read the data packets
No need to physically “tap” into a WiFi connection, unlike a cabled connection
A protocol that does not encrypt the transmissions may have been used

Use a protocol that encrypts data transmissions
Disable broadcast of SSID to make network harder to identify
Limit power of transmitter so data does not travel outside premises
Use cabled network instead of WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe how a vector graphic is represented.

A

Image is represented as objects
Properties of objects are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe how a row of pixels could be represented in
compressed form by using run length encoding.

A

A run is a series of pixels of the same colour
Pairs of values would be stored which would consist of a run length and the colour of the pixels in the run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

why might a less complex image with less colours be compressed more effectively than an image with more colour

A

the image (in the second figure) contains a lot more
different colours
the additional run length data may cancel out the reduction in storage of pixel colour data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Employees at a bank use client computers to access data that is stored on a box
database server.
The database server uses software to query and modify data stored in a database on
hard disk drives. It returns the results of these queries to the clients over the bank’s
computer network.
The performance of the system is unsatisfactory: the time-delay between a client
sending a query to the server and the client receiving the results is unacceptably
long.
Explain how the performance of the system might be improved. You should consider
the following factors that might be affecting the performance:
* the hardware of the server
* the design of the computer network
* the database and software running on the server.

A

Replace the processor with one which has more cores
Replace the processor with one which has more cache memory
Replace the processor with one which runs at a faster clock speed

Replace the network cable with cable that has a higher bandwidth
Replace any wireless/WiFi connections with wired ones
Use a star topology

Use a non-relational database system
Distribute the data across multiple servers
Try to reduce the amount of other software that might be running on the database server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Explain:
* the purpose of the DHCP system
* why the DHCP system is used
* what will happen during this communication

A

to allocate IP addresses to hosts
reduces the time required to configure hosts
Host sends request to discover a (DHCP) server
DHCP servers offer configuration to host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain how the External Router will have been configured so that the web server can
be accessed by computers outside the network.

A

Traffic arriving on the HTTP(S) port
Must be forwarded (by the External Router) to the IP address of the Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Describe the principles of operation of an optical disk drive that is used to read data
from an optical disk such as a CD-ROM or DVD-ROM

A

(Low power beam of) laser / light is shone at disk
Light is focussed on spot on track
light is reflected back from disk
Amount of light reflected back is measured
Disc spins at constant linear velocity

Data is stored on one/spiral track
Continuation of land/pit reflects light whereas transition between land and pit scatters light
Transition between land and pit indicates a 1 and continuation of land/pit
represents 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

USB Flash Drives (a type of SSD) are a more popular choice for transferring files such
as images and word processed documents from one computer to another than CD-Rs
(a type of optical disk).
Explain why this is the case.

A

Flash drives can have a higher (storage) capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

State two reasons why database designs, such as this one, are usually normalised

A

Minimise data duplication
Eliminate data redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Explain some of the challenges that face legislators in the digital age.

A

Information can be combined/processed/transferred in ways that were not previously possible
Technology evolves quickly (so difficult for law to keep up with changes)
Some crimes may be committed by states rather than individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe what an ordinal number is and what an ordinal number would be used for in
the context of this array.

A

Shows order
The ordinal numbers would represent the position of the values in the array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe two security measures that the family should put in place to ensure that the
wireless access point is secure and explain how these security measures will make
wireless connections to the access point more secure.

A

Use WPA (WiFi Protected Access)/WPA2 To encrypt transmission

Encrypt transmissions so that if intercepted cannot be read by someone who doesnot have the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The network uses the CSMA/CA access method with Request to Send/Clear to Send (RTS/CTS).
A computer on the network has data to send to another computer. Explain how the CSMA/CA access method with RTS/CTS will be used during this transmission

A
  • computer with data to send monitors/listens for (data signal)
  • if (data) signal present transmission in progress then continue to wait
  • when no (data) signal present computer sends a Request to Send / RTS
  • two computers could start transmitting simultaneously if they both detect there is no data signal
  • receiver responds (to RTS) with a Clear to Send signal
  • RTS/CTS signal blocks any other transmissions from nodes in range
  • when CTS received then start to transmit
  • if CTS not received continue to wait
  • receiver sends acknowledgement after (all) data received
33
Q

One characteristic of a data set that might result in it being classified as Big Data is that it contains a variety of different forms of information.
Describe two other characteristics that might result in a data set being classified as Big Data

A

There is a high volume of data (to process)

The data is must be processed at high velocity

34
Q

what is the operating system responsible for

A

resource management

35
Q

Describe two different types of resource management that an operating system is
responsible for

A

Allocate processors to processes
Allocate memory to processes

36
Q

SMTP protocole

A

To send/receive emails

37
Q

POP protocole

A

retrieve/manage emails on the server

38
Q

SSH protocle

A

provides a secure/encrypted
connection for remote management

39
Q

HTTP protocol

A

so that technicians can access web-based control panels

40
Q

Explain how the transport layer of the TCP/IP stack determines which application layer software on the server should deal with a received request.

A

The transport layer will use the port number to determine which server should deal with the request

41
Q

Describe one function of the network layer of the TCP/IP stack

A

Adds source IP to packets

42
Q

Explain the key difference between lossless and lossy compression methods

A

The original data can be fully recovered if lossless compression has been used

43
Q

Explain how text could be compressed using a
dictionary-based method.

A

A dictionary is built that maps sequences of characters in the
text onto tokens

The (sequences of) characters in the text are then replaced by
the corresponding tokens in the dictionary

44
Q

Explain why dictionary-based compression is not very effective for compressing small amounts of text for transmission.

A

For small pieces of text there is little repetition (and so the compressed text will be similar in size to the original)

45
Q

A student has written a computer program using an imperative high-level
programming language. The program could be translated using either a compiler or an interpreter.
Describe the steps that must be completed to translate and execute the program.
Your description should include:
* why translation is necessary
* the differences between how a compiler and an interpreter would translate the
program
* how the machine code instructions that are used to carry out the program will be
fetched and executed by the processor from main memory.

A

Processor can only execute machine code instructions

Compiler analyses program as a whole
Interpreter analyses program on a line-by-line basis
Compiler produces object code
Interpreter calls subroutines within its own code to carry out commands

Contents of Program Counter transferred to Memory Address Register
Address bus used to transfer this address to main memory
The control unit decodes the instruction
If necessary, data is fetched
If necessary, data is stored in memory

46
Q

Describe an example of a problem that could occur if no system were in place to
manage concurrent access to the database

A

Two users edit a record simultaneously
One user writes the record then the other user writes the records
One user’s update is lost

47
Q

record locks

A

when a user starts to edit a record an lock is set on the record
Other users cannot edit the record until the lock is released

48
Q

timestamp ordering

A

Timestamps are generated for each transaction
Database records timestamp of last write transaction for each record

49
Q

Explain the difference between asynchronous and synchronous communication

A

Asynchronous: Receiver and transmitter are not synchronised by a common clock

Synchronous: Receiver and transmitter continuously synchronised by a common clock

50
Q

It is proposed that the communication system is modified so that:
* a majority voting system is used instead of the parity bit
* Unicode is used to encode the characters to be transmitted instead of ASCII.
Discuss the improvements that will occur in the communication system as a result of
these changes and any disadvantages that will result from them.

A

Errors can (sometimes) be corrected as well as detected
Multi-bit errors can be detected
A greater range of characters can now be transmitted

Each character will require more bits
Each bit will be sent multiple times
transmissions will take longer

51
Q

A different computer system has a wider data bus; this will speed up the execution of
programs.
Explain how the wider data bus has resulted in this effect.

A

Increase the number of bits

52
Q

Discuss the advantages and disadvantages of representing an image as a vector graphic instead of as a bitmap.
In your answer, include an example for which it would be most appropriate to use a vector graphic and an example for which it would be most appropriate to use a bitmap.

A

Individual parts of the image can be edited independently
The parts of the image can be enlarged without loss of quality
If an component is deleted, the software knows what is behind it

Can represent images with complex textures
Can represent images that are not composed of regular shapes
Images captured from nature

53
Q

Explain what it means for a cipher to be described as being computationally secure.

A

The cipher cannot be cracked in a useful amount of time

54
Q

Explain what the key exchange problem is, in relation to a symmetric cipher

A

How to pass the key to the receiver
Without it being intercepted

55
Q

A message is to be transmitted from computer A to computer B. The message will be encrypted using asymmetric encryption. To enable computer B to authenticate that the message was sent by computer A, a digital signature will also be sent with the message.

Explain how computer B will decrypt the message and verify that it was sent by computer A.
In your response you should refer to the specific keys that will be used in this process

A

private key is used to decrypt the message
The message is rehashed
public key is used to decrypt the digital signature
if both hashes match then the sender can be authenticated

56
Q

Explain the principles of operation of an ADC.

A

Amplitude of signal at each sample point measured
Measurement coded into a fixed number of bits

57
Q

Advantage of floating point

A

a floating point system can represent numbers with a greater range than a fixed point system
can represent numbers much closer to zero
can represent much larger numbers

58
Q

Advantage of fixed point

A

a fixed point system can represent (some) numbers more precisely than a floating point system
Calculations can be performed more quickly
Represents all numbers to a constant level of accuracy

59
Q

When the decimal value 28.25 is converted into binary using this floating point system, a rounding error occurs.
Explain:
* why a rounding error has occurred, and
* what the system might do when the value 28.25 is converted into binary.

A

There are not enough bits in the mantissa
It could be rounded to the nearest representable value

60
Q

Avoid/reduce bottleneck of single data/address bus(es)

A

reduces delays waiting for memory fetches
Avoids possibility of data being executed as code

61
Q

describe the fetch part of the fetch execute cycle

A

copy the contents of the program counter into the memory address register
increment the value into the program counter
fetch the instruction from the main memory and store in the memory buffer register
copy the contents of the memory buffer register into the current instruction register

62
Q

Describe the role of interrupts

A

Allows the currently executing process to be suspended

So that a device that needs the attention of the processor can be dealt with

63
Q

Explain why the volatile environment (the contents of registers) must be saved before an interrupt is serviced.

A

So that the currently running process can be returned to

As the interrupt will change register values

64
Q

Explain the relationship between hardware and software

A

Software executes on the hardware

65
Q

CRUD

A

Create, Retrieve, Update, Delete

66
Q

REST

A

allows JavaScript to communicate with the server using the HTTP
protocol

The database is connected to the web browser using REST

67
Q

example of what XML looks like

A

<Properties>
<Property>
<PropertyID>8026</PropertyID>
<HouseNum>12</HouseNum>
<Street>Chester Drive</Street>
<Bedrooms>4</Bedrooms>
</Property>
<Property>
<PropertyID>9034</PropertyID>
<HouseNum>23a</HouseNum>
<Street>Castle Street</Street>
<Bedrooms>5</Bedrooms>
</Property>
</Properties>

68
Q

State two reasons why it could be argued that JSON is better than XML

A

More compact
Quicker to parse

69
Q

State one advantage of using the DHCP system

A

Reduces the need for expert knowledge when configuring a host

Reduces the time required to configure hosts

70
Q

Explain how two or more computers connected to the Internet can have the same IP address and still communicate with each other

A

The computers have private IP addresses

as data passes onto Internet, private IP address replaced with public IP address of router

71
Q

Explain four different ways that a firewall can protect computers on a LAN

A

Block/allow specific ports
Block/allow (traffic from) specific IP addresses
Act as a proxy server
Identify unusual behaviour from a host

72
Q

Explain how:
* Computer A will use a subnet mask to determine whether or not it can send the packet directly to Computer B across the LAN or if the packet must be sent via the Internet
* the packet will be routed across the Internet
* the checksum can be used to determine if the received packet has been changed during the transmission

A

Determining if on LAN:

AND operation of subnet mask with Computer A’s IP address
AND operation of subnet mask with Computer B’s IP address
result (of each AND operation) is the network/subnet ID
network/subnet IDs compared
as they are different, then packet must be sent via router

Router:

path to take selected by each router
route may change as a result of eg congestion
route determined using the IP address

checksum:

checksum produced when packet transmitted
checksum calculated from packet contents
checksum transmitted with packet

73
Q

Explain why the warehouse owners might prefer the individual products to be identified using RFID tags

A

the RFID tags could be read without removing products from their pallet;
RFID tags can be read from a distance (than barcodes)

74
Q

Explain why the product manufacturers or supermarket owners might prefer the individual products to be identified using barcode labels

A

Barcodes are cheaper than RFID tags
Higher cost of RFID tags would be added on to prices

75
Q

Describe how an RFID reader would read the ProductID and ItemID values from RFID tags as pallets are delivered and explain how this data could be used to update the database table that stores details of the products that the warehouse has in stock

A

RFID scanner sends signal;
Signal induces current in RFID transponder
RFID transponder sends data by radio

RFID signals processed into a format suitable for querying the database
query used to check if there is already a record for the product in the database

76
Q

Explain what is meant by immediate addressing

A

The operand is the value that the instruction should use

77
Q

Explain what a higher-order function is

A

A function that takes a function as an argument
and/or returns a function as a result

78
Q

laser printer

A

bitmap of image built in memory from page description
charge applied to drum
laser beam directed at drum
mirror is used to direct laser beams
where laser strikes drum charge is discharged
charge applied to toner
toner sticks onto where the laser struck
paper passed over drum and toner transfers to it
positively charged transfer roller assists transfer of toner to paper
heat fuses onto paper
four drums are are required for colour printing