random Flashcards

(26 cards)

1
Q

Describe the process a checksum algorithm uses to determine if an error has occurred [5 marks]

A

Answer:

  • Before data is transmitted a checksum value is calculated [1]
  • The checksum value is transmitted with the data [1]
  • The receiver calculates the checksum value using the received data [1]
  • The calculated checksum is compared to the transmitted checksum [1]
  • If they are the same then there is no error otherwise an error has occurred [1]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is check digit used in a barcode

A
  • check digit is calculated from the barcode
  • using an algorithm
  • this check digit is added to the end of the value from barcode
  • when the barcode is scanned, the check digit is recalculated
  • using the same algorithm
  • if the check digit is different and error has occurred
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Program Counter

A
  • Holds the memory address of the next instructions to be executed
  • Increments by 1 as the fetch-decode-execute cycle runs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Memory Address Register

A
  • Holds the memory address of where data or instructions are to be fetched from memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Memory Data Register

A

Stores the data or instruction which has been fetched from memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Current Instruction Register

A

Stores the instruction the CPU is currently decoding or executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accumulator

A

Stores the results of any calculations that have taken place in the Arithmetic Logic Unit (ALU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain how an instruction is fetched using Von Neumann architecture

A

Answer

  • The Program Counter (PC) holds the address/location of the next instruction to be fetched [1]
  • The address held in the PC is sent to the Memory Address Register (MAR) [1]
    The memory address is sent using the address bus [1]
  • The Program Counter is incremented [1]
  • The instruction is sent from the address in memory to the Memory Data Register (MDR) [1]
  • The instruction is transferred using the data bus [1]
  • The instruction is sent to the Current Instruction Register (CIR) [1]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is software

A

program used to operate hardware/software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

why is secondary storage important

A
  • allows for permanent data to be stored
  • allows users to download apps
  • for the creation of virtual memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

explain why a computer needs RAM

A
  • To store data temporarily
  • To store data currently in use
  • To store software currently in use
  • Data can be accessed faster (than secondary storage)
  • To speed up the fetch stage (of the fetch-execute cycle)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is serial data transmission used

A
  • The network may be spread over a long distance …
  • … so it is more reliable
  • Bits will be sent/arrive in sequence
  • …so bits less likely to be skewed
  • Less crosstalk/interference
  • … so less likely to have errors
  • The data may not need to be transmitted at a fast speed // data transmission speed of serial is adequate
  • The cables in the network only use serial transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by a robot being automated

A
  • robot can perform actions without human intervention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does packet switching work

A

1) A large piece of data is broken down into packets.
2) Each packet is given a header.
3) the packets make its way to its destination
4) Routers control the routes taken by each packet
5) Once all the packets arrive, they are reordered correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how does checksums work

A
  • Checksums are calculated using an algorithm and the value is added to the transmission
  • The receiving device re-calculates the checksum and compares to the original
  • If the checksums do not match, it is assumed an error has occurred
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a NIC

A

allows for a computer to connect to a network

17
Q

What is a MAC

A

unique identifier given to devices, allowing for devices to communicate over a local area network (LAN)

18
Q

3 characteristics of a robot

A

Any three from:
- It has a mechanical structure/framework
- It has electrical components
- It is programmable
- It can move

19
Q

Explain how the firewall operates to help protect the network.

A
  • Criteria can be set (for traffic)
  • … such as a blacklist/whitelist (of IP addresses)
  • It will examine traffic coming into the network
  • It will check that the traffic meets the set criteria
  • … and will reject it if it does not meet criteria
  • Certain ports used by hackers can be blocked/closed
20
Q

Advantages of low level languages

A
  • Complete control over the system components
  • Occupy less memory and execute faster
  • Direct manipulation of hardware
21
Q

Disadvantges of low level languages

A
  • difficult to write and understand
  • machine dependent
  • more prone to errors
22
Q

what is low-level languages

A

directly translates to machine code

23
Q

what is high-level languages

A

uses English-like statements

24
Q

advantages of high-level languages

A
  • clear debugging
  • easier to read and write
  • one line of code can perform multiple commands
25
disadvantages of high-level languages
- cannot directly manipulate hardware - needs to be translated into machine code - the program may be less efficient
26
what is the use of a translator
translates program source code into machine code