Theory Flashcards

1
Q

Define the term operating system. [1]

A

A set of programs through which a computer manages/controls its own resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Outline the function of the ALU. [1]

A

Part of a processor that performs arithmetic and logical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Outline the relationship between binary and hexadecimal. [2]

A

Binary is base 2, whereas hexadecimal is base 16;

Each hexadecimal digit can be represented by a group of 4 binary digits;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the characteristics of a stack. [2]

A

Data structure;
Which can only be accessed at one end/LIFO (last in first out);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify two applications of a stack in computing. [2]

A

Translations of one programming language to another;
Used in calculations;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State three advantages of using sub-programs while solving programming problems. [3]

A

A large program can be broken into smaller pieces;
A sub-program could be written independently;
Easier maintenance;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the MOD function do?

A

Basically just finds the remainder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static vs Dynamic [2]

A

Fixed size for static, and only has one data type;

Dynamic structure can change in size, and the data type isn’t fixed;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does post-order traverse?

A

Put the apple on the right of the node;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are stacks, linked lists and queues? (static or dynamic?)

A

Dynamic;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is dynamic structure good?

A

Make memory allocation more efficient, by only using as much as is necessary, while also allowing the programmer to design more flexible algorithms, where the size of a data structure is not known before runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of the MDR? [2]

A

Holds the content of the memory;
Which is to be transferred from the memory to the other CPU components;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the importance of Memory Management function? [3]

A

Allocates and deallocates memory;
Allowing more programs to run concurrently;
Provides memory protection;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define recursion [1]

A

A function/algorithm that calls itself;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the characteristics of a queue [2]

A

FIFO;
Items can only be added to one end and removed from the other end;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the benefits of Binary Search Trees (BST’s) compared to a stack when finding specific item;

A

The data in a binary search tree is ordered;
Each element in a stack has to be checked;
Which for large data sets will be ineffeicient;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain the purpose of cache memory [3]

A

Cache memory is a small-sized type of volatile computer memory;
that provides high-speed data access to a processor;
and stores frequently used computer programs, applications and data;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Applications of stacks [2]

A

Evaluating arithmetic expressions;
Parsing;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Outline the function of an OS in managing primary memory [2]

A

The operating system (OS) makes sure that each running program always has enough memory for its data;
The OS assigns memory to programs by freeing up space in the computer’s memory;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Outline the need for a translation process from high level language to machine code [2]

A

So that the computer can excecute the program;
As the computer only understands machine code;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an xor gate? (own understanding)

A

An XOR gate is the same as an or gate, just with the exception that 1 and 1 is 0, not 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identify 3 operating management techniques.

A

Multitasking;
Virtual memory;
Interrupt;
Paging;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Application of queues;

A

Playlist queue;
Super market queue;
Print queue;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a child node?

A

A child node is a node that has up to two links to other nodes and has only one parent node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the steps of traversing using post order tree traversal?

A

Start from the root node;
If the root is null, return immediately;
Traverse left subtree;
Traverse right subtree;
Visit root;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the steps of traversing using in order tree traversal?

A

Start from the root node;
If the root is null, return immediately;
Traverse the left subtree;
Visit the root node;
Traverse the right subtree;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the steps of traversing using pre-order tree traversal?

A

Start from the root node;
If the root is null, return immediately;
Visit the root node;
Traverse the left subtree;
Traverse the right subtree;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the differences between primary storage and secondary storage?

A

Primary Storage is volatile, cache memory or some other specialized hardware to store data as the computer is on;
Primary storage stores data that is currently in use;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the difference between bubble and selection sort algorithms?

A

Bubble sort swaps adjacent items;
Selection sort finds the next smallest (each time it checks);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the difference between non-binary and binary trees?

A

A node on a non-binary tree can have as many subtrees as it wants, however, a node on a binary tree can only have 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe the steps needed to calculate the sum of all numbers held in a circular linked list.

A

Initialize a variable sum 0;
Loop from beginning to the end, until all nodes get traversed;
Add current number to the total sum;
End when the end node is pointing to the header;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Compare the use of arrays and linked lists.

A

Arrays are fixed in size, while linked lists can expand and contract their size;
Elements are stored consecutively in arrays, whereas in linked lists it is stored randomly;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Outline the role of the data bus.

A

Data bus transfers data from from-to CPU to be processed ;
Address bus carries address of memory storage to be written;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of cache memory?

A

Is used to save time in accessing RAM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Compare the uses of static and dynamic data structures [3]

A

Static data structures have a predetermined number of elements, whereas in dynamic structure the does not have to be defined in advance;
Static data structures has limited size, the amount of memory available is the only limit in dynamic structures;
In static data structure, elements can be directly accessed. Whereas in a dynamic data structure elements have to be accessed sequentially which takes longer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define the term bit [1]

A

Bit is a binary digit, and the smallest unit of data. Can be 0 or 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Outline the role of an address and data bus [2]

A

Data bus is a physical connection to transport data from-to CPU to be processed;
Address bus is a physical connection to transport an address of memory storage where data (transported in the data bus) should be read/written;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Describe how a system uses paging [3]

A

memory management method that uses secondary memory to increase the amount of
primary memory;
transfers data blocks of the same size (“pages”);
from secondary storage to main storage when they are required;
and returns them to secondary storage when they are not;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

State the part of the CPU that performs the decoding [1]

A

The CU;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Outline the function of the MAR [2]

A

Stores the address of the next instruction to be fetched;
To be written/read to RAM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe the steps involved in using the bubble sort algorithm as a way to sort an array [4]

A

Loops through array;
Comparing each pair of adjacent item;
Swaps if required (if in wrong order);
Ends until there is no more swapping required;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Describe one difference between queues and stacks [2]

A

Queue is a first-in-first-out (FIFO) data structure;
and stack is last-in-first-out (LIFO) data structure;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Why is hexadecimal used in computing? [1]

A

Hexadecimal numbers are used for shorter representation of data because a
(modern) byte can be represented exactly by two hexadecimal digits;
Hexadecimal numbers are used for shorter representation of data, because
computers store and handle binary digits, and four binary digits make one
hexadecimal digit;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Outline what is virtual memory [1]

A

Virtual memory is a memory management capability of an OS;
that (uses hardware and software to) allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the collection functions?

A

addItem( data ) = add data item to the collection
.resetNext() = start at the beginning
.hasNext() → tells whether there is another item in the list
.getNext() → retrieves a data item from the collection
.isEmpty() → check whether collection is empty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Identify three characteristics of a collection [3]

A

Collection is a container of discrete values;
Collections have a set of methods that define operations performed on an element;
Which reduces programming effort;

47
Q

Difference between LAN (Local Area Network) and WAN (Wide Area Network) [2]

A

WAN covers a much larger area (national or international)/ LAN covers a smaller area (such as a site or building);

LAN is more secure since WAN has a larger distance to cover, thus increasing the risk of something happening to the data;

48
Q

State three operating system management techniques. [3]

A

Virtual memory;
Scheduling;
Piling;
Paging;

49
Q

Outline the steps needed for a binary search [4]

A

Find/calculate the midpoint/median value between HI and LOW;

If the array value at midpoint equals the search value; then the search value

is found;

lf search value is greater than the array value at midpoint, set the midpoint as a new LOW
and repeat the process - if search value is less than the array value at midpoint, set midpoint
as anew HI;

Repeat until search value is found;

50
Q

Define an embedded system [2]

A

An embedded system is a system which performs a specific function;
For a larger system for which it is part of;

51
Q

What are characteristics of PAN (Personal Area Network)?

A

Smallest type of network;
Connected via Bluetooth/wireless;
eg. smartphone to car connection

51
Q

Outline one example of where circular linked list would be used in preference to a linear linked list [2]

A

A music playlist, that repeats or is on “loop”;
The last node points towards the first song.

52
Q

Outline the role of the memory data register in the machine excecute cycle. [2]

A

Holds a copy of the data from the memory;
To be transferred to other components of the CPU;

53
Q

Benefits of WLAN (in terms of LAN)

A

Reduces wiring - more safety
Less set up required - less cost
Allows BYOD

54
Q

How does VPN help with security?

A

Data that passes through a VPN can be encrypted - so any unauthorized access won’t understand the data.
Multiple exit nodes - Making it difficult to see where the data started from.

55
Q

Outline the function of a web browser. [2]

A

Web browser allows users to access information on the WWW;

The web browser fetches the content required from a web server and acts as an interface between the client and the server.

56
Q

Outline applications of queues in computing [2].

A

Print queue (serving requests on a shared printer);
Handling of interrupts;
CPU task handling;
Buffer for devices like keyboard;

57
Q

Outline one reason for using Unicode to represent data in a computer system. [2]

A

Because Unicode is a standard for data representation for all languages and characters;
So data can be used through many different systems.

58
Q

Define the term interrupt. [1]

A

(Hardware) Interrupt is a signal created by some action taken by a hardware device and sent to the CPU to stop its current activity;

59
Q

What is a collection? [2]

A

A collection is a grouping of a variable number of data items into a single unit;
That needs to be operated upon together;

60
Q

Distinguish between RAM and ROM [2]

A

RAM is a volatile memory, while ROM is a non-volatile memory;
Data stored in the RAM can be altered whilst the data stored in the ROM can only be read;

61
Q

Outline one advantage of the use of virtual memory [1]

A

Use of virtual memory allows better CPU and RAM utilization;
Virtual memory can be free;
It uses the potion of a hard drive that the users already have;

62
Q

State two technologies that are required to provide a Virtual Private Network (VPN) [2]

A

(VPN aware) router (and firewall);
VPN client software;
(VPN) tunnelling (server);
Encryption (Protocol);

63
Q

Identify two factors that may affect the speed of data transmission [2]

A

Physical distance/Number of devices to be crossed;
Number of network users;
Quality of network equipment;

64
Q

Explain why data compression would be used when data is transmitted [3]

A

Because compression reduces the size of a file;
Which reduces transmission time;
And can result in significant cost savings;

65
Q

Describe the role of a firewall [2]

A

A firewall monitors incoming and outgoing traffic;
And filters/blocks traffic coming from unsecured or blacklisted apps;

66
Q

Outline how encryption is used to protect data [2]

A

Encryption scrambles readable text;
So it is only read by the person who has the decryption key;

67
Q

What is the role of a feedback in a control system? [2]

A

The output value is continuously compared to the desired value to produce an error value;
The error value is fed to the input;

68
Q

Describe one function of an operating system [2]

A

Processor management;
The OS decides how much processing time each process has;

69
Q

What is a dedicated operating system?

A

(not ms answer, but for concept): A dedicated operating system, in the context of computing, refers to an operating system designed and optimized for a specific purpose or type of device. Unlike general-purpose operating systems like Windows, Linux, or macOS, which are designed to run a wide variety of applications on various hardware configurations, a dedicated operating system is tailored to meet the specific requirements of a particular application or device.

70
Q

Characteristics of centralised control system

A
  • Easier to use - it allows control at a central point;
  • Controlled by a single processor;
  • Centralized systems is easy to physically secure;
  • In case of a local failiure, the whole system stops working;
  • more cost-efficient for small systems;
71
Q

Characteristics of distributed control system

A

Controlled by a collection of independent processors;
Easier to modify/upgrade without disturbing other processes;
In case of failure, all other processes continue to work;
Difficult to know which node failed;

72
Q

Outline two disadvantages of recursive methods.

A

Recursion can be slow;
If too many recursive calls occur;

73
Q

Outline the need for a translation process from a higher level language to a lower level language [2]

A

A human-readable form of the program should be translated into machine language code;
Which is the only language computer hardware can understand;

74
Q

Define the term variable [1]

A

Variables define areas in memory in which values (data) are stored;

75
Q

Explain how increasing the size of the CPU cache improves performance of computer [3]

A

Commonly used instructions from a program are stored in cache memory to be accessed by the processor (faster access than from RAM)
Increasing the size of the cache memory means that more instructions can be quickly found by the processor;
Thus, program execution is faster.

76
Q

Identify one hardware component in a wireless LAN [1]

A

(Wireless) Router;
Across points;
(Wireless) Controller;

76
Q

Distinguish between a wired network and a wireless network in terms of reliability of transmission

A

The reliability of wireless depends on the strength of the wireless signal;
Depends on distance from router,

depends on the topology/shape of the surroundings:

a wireless LAN has slower data transfer;

whilst

Ethernet is more reliable as the strength of the signal does not depend on the
distance from the router/ wired LAN support longer distances;

wired is immune to interference;

there is no issue with the topology/shape of the surrounding;

but the Ethernet cable may be cut/broken, affecting reliability;

76
Q

Explain how data is transmitted by packet switching [4]

A

Data is organized in specifically formatted units;

All packets contain; data, address of sender, address of the receiver size of the packet, sequence number, control codes, etc.;
Which are routed from source to destination using network switches and routers;
data packets are reassembled at the destination;

77
Q

How does bubble sort algorithms work?

A

Looping through the array;
Comparing each pair adjacent elements in the array;
Swapping if the one after is less than the before;
Repeating till no swaps left;

77
Q

Identify the components of a node in a binary tree [3]

A

Two data fields;
Pointer to the left child;
Pointer to the right child;

77
Q

State one technology which is necessary for a VPN [1]

A

TLS;
SSL 3.0;
IPsec with encryption;

78
Q

What does concurrently mean? (concept)

A

“concurrently” means doing multiple things at the same time. It’s like juggling or multitasking, where different tasks are happening together, not one after the other. So, if you are working on homework while your friend is playing a game, you are both doing things concurrently. It’s a way of saying “simultaneously” or “at the same time.”

79
Q

What are the purpose of protocols? [2]

A

Protocols are sets of rules for transmitting data correctly;
To ensure that data is sent from a customer’s and received by the receiving computer;
To create a secure transmission of data from the client to the server through the use of the HTTPS;

80
Q

Identify two reasons why consistent grammar and syntax should be essential features of higher level programming language. [2]

A

Easy to use;
There will be no compilation errors;
There will be no logical errors;
Future development is possible by other programmers;

81
Q

State one method of providing user documentation [1]

A

Help files;
Online support;

82
Q

Identify two features of a user interface that till allow application programmers to interact more easily with the programming language [2]

A

GUI;
Toolbars;
Menus;
Predicted text so that typing a class name followed by a full stop will bring up a list of methods;

83
Q

Outline the need for an interpreter or a compiler [2]

A

Must be translated from a higher level language understandable by humans;
Must be translated into machine code;
For the CPU to execute it;

84
Q

Outline the need for predefined sub-programs and collections [2]

A

Reusability;
Modularity;
Reliability;

85
Q

Define the term analogue data [2]

A

Data represented by a continuous variable;

86
Q

Control process (greenhouse example) [5]

A

Sensor: Converts an inputted physical quantity (temperature, light) into an electrical signal;
Processor: Executes a set of instructions which control the whole process
Transducer: Converts electrical signals into other forms of energy;
Feedback: Input signals is monitored;
And fed back to the processor where they can be used to make decisions whether to change/modify the climate in the greenhouses or not;

87
Q

How to determine the number of names in a circular linked list? [4]

A

Use a variable (counter) to keep track of nodes;
Use a temporary pointer;
Follow the pointers from the beginning of the list;
Until the pointer to the end of the list is encountered;

88
Q

What is slower accessing? Static or dynamic structures? [1]

A

In static data structure elements, they can be directly accessed;
In dynamic data structure, access is sequential;

89
Q

Describe one way off-site storage can be used to prevent data loss [2]

A

Internet backup service could automatically back up (all important) data files;
To a remote server that could be accessed/controlled over the internet;

Copies of all important data files (backup) could be placed on two separate hardware devices;
Which are placed in two different physical locations;

A remote file server could be set up;
For uploading all important data files;

90
Q

Explain the purpose of cache memory [3]

A

Cache memory is a small-sized type of volatile computer memory;
That provides high speed data access to a processor;
And stores frequently used computer programs, applications and data;

91
Q

Why are hexadecimals used frequently in computing? [2]

A

Hexadecimal numbers are used for shorter representation of data because a byte can be represented exactly by two hexadecimal digits;

Hexadecimal numbers are used for shorter representation of data, because computers store and handle binary digits, and four binary digits make one hexadecimal digit;

92
Q

Explain why abstraction is required in the design of algorithms? [3]

A

Abstraction allows us to create a general idea of what the problem is and how to solve it;

Through the process of abstraction, a programmer hides all but the relevant data about an object in order to reduce complexity and increase efficiency;

In OOP, abstraction is one of the three central principles (along with encapsulation and inheritance)

93
Q

Outline what is meant by virtual memory? [2]

A

Virtual memory is a memory management capability of an OS;

That uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from the RAM to disk storage;

94
Q

Outline two advantages of a school using a computer network [4]

A

Communication;
Students/teachers can communicate with people around the world via the internet;

Improved network security;
If the school has its own network, it can monitor network traffic;

95
Q

What is a router? [2]

A

Router acts a processing unit for information packets;
It duplicates information packets for use during transmission from one network to another;

96
Q

What is NIC (network interface card) [2]

A

Interface cards determine the infrastructure of a local area network (LAN);
And allow all of the computers to connect to the network;

97
Q

Evaluate the use of trusted media access control (MAC) addresses as one method of network security [4]

A

Each adapter has a unique label called a MAC address;

Routers uses these addresses to identify computers and can whitelist or black list based on the MAC address;

The disadvantage is that the whitelist should be amended any time a new device is purchased;

The method is useless against hackers who intercept data passing through the network;

98
Q

Explain the role of the operating system in terms of managing the hardware resources [4]

A

OS controls all the activities of the computer system and acts as an interface between user and hardware;

Thus, the role of OS is

To keep track of who is using which resource;
To grant resource requests;
To allocate time to different programs;
To allocate space for different users, each gets a part of the resource;

99
Q

Explain the steps of the sensors, microprocessors and output transducers (random question, however useful info and structure) [6]

A

Sensors detect measure (whatever it is);
Sensors continuously take readings and send these readings to the processor;

The processor determines what actions the machine should take next;
Processor controls sensors, valves, and actuators responsible for (whatever it is);

Output transducers are used for turning on and off devices that control the rest of the machine;
such as (whatever it is)

100
Q

State two differences between primary storage and secondary storage [2]

A

Primary storage holds currently running programs, secondary storage does not;

Primary storage is accessed by a computer’s central processing unit (CPU) and secondary storage is not accessed directly by the CPU;

Primary storage has lower access time than secondary storage;

101
Q

Outline what is meant by a sorting algorithm [2]

A

A sorting algorithm is a method for reorganizing a number of items;
Into a specific order;

102
Q

Outline one difference between a bubble sort algorithm and a selection sort algorithm [2]

A

Bubble sort swaps adjacent items;
Selection sort finds the next smallest;

Bubble sort can exit easily if the list is sorted.
Selection sort will need to go through the procedure every time.

103
Q

Outline how the last node of a circular list is identified [2]

A

The last node is identified by its next pointer;

Which is equal to the pointer “head”;

104
Q

Describe the steps required to calculate the sum of all the numbers held in a circular linked list;

A

Initialize (a temporary pointer with the head and) a variable sum with 0 (zero);
Loop from the beginning to the end of the circular linked list / until all the nodes get
traversed);

Add the value (of the data field) (of the current node) to the sum;

Change the temporary pointer so it points the next node of circular linked list;

105
Q

What is the function of the ALU?

A

Part of the CPU that does all the arithmetic (+/-) and logical
(AND/OR) calculations

106
Q

Functions of the control unit

A

It handles the loading of new commands into
the CPU and the decoding of these commands.
Also, it directs the data flow and the operation
of the ALU.

107
Q

The three important buses

A
  • Data bus (links RAM to CPU via MDR)
  • Control bus (links RAM to CPU via CU)
  • Memory bus (links RAM to CPU via MAR)
108
Q
A