XTRA 1 Flashcards

(65 cards)

1
Q

What signal is sent down the control bus

A

A read signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of notation do high level languages use

A

Natural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is assembly code specific to

A

The instruction set of the given processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does assembly code allow direct control over

A

How memory is used by adressing modes and direct control of hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High level code is more

A

e intuitive and easier to read it
is easier to follow, debug and build as part of a team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is high level code portable

A

The high level code can be recompiled for different
architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

High level paradigms

A

High level languages come in a variety of paradigms so
programmers can choose according to the
problem/their preference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is assembly preffered

A

-compilers or interpreters don’t exist for the target CPU
i.e. embedded systems
-highest possible performance is critical
-memory is very limited.
For larger projects which don’t fall under the
constraints above high level languages are likely to be
preferable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What else does OS provide

A

Provide platform to run other software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Title

A

Very top so for big font just use h1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does search engine indexing actually happen

A
  • A program called a spider/crawler/bot
  • Traverses the web / following the links.
  • It takes each word in the document
  • …It adds an entry for the page (under the word) in
    the index…
  • …alongside the word’s position on the page.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does CISC require

A

More transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For what does SQL do what do you need to do

A

Provide output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secondary key for

A

Searching, index and sorting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Format of data

A
  • CSV/Comma Separated Value (file)…
  • A (text) file/format with values separated by
    commas (or some other delimiter)
  • XML/eXstensible Markup Language…
  • …A markup language that uses tags to denote
    data.
  • SQL/Structured Query Language…
  • …A language for creating/querying databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Problem with ddos attacks

A

Hard to enforce laws as often unwitting participants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What contributes to piracy

A

Fast internet speeds, peer to peer and the dark web all
contribute to making piracy more prevalent and harder
to track.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What can track piracy

A

Digital piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What makes monitoring communications harder

A

End to end encyption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples

A

EXAMPLES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advantages of encapsulations

A
  • Reduces the chance of errors/inconsistences
  • Ensures objects can only be changed in the way
    intended/ Ensuring changes are consistent with
    how the object should behave
  • Protecting data/ Can’t be changed accidentally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does ascii map

A

Values to characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ASCII

A

American standard code for information interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of encyption uses more processing

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When is symettric encryption best used
When the same person is encrpyting and decrypting like when backign up data
26
non normalised where is floating point
After first number
27
What is an embedded OS not system
System software/software used to manage the device − Which is built into the device itself − Stored in the device’s ROM/cannot be changed − Specific to the hardware/purpose
28
Multi core processors can independently process instructions
At the same time
29
High resolution vidoees take up large amounts of
RAM
30
Hashing time depends on
time to create hash
31
Extra things for utility software
A program with one purpose/piece of system software
32
Applications
Perform tasks for user not computer and are generic
33
Servers are
A device which provides a central point of control/access
34
Why is server side validation always needed
Client side processing can be modified 2 − And can sometimes be disabled on the browser − To prevent malicious code (such as an SQL injection/XSS)
35
Actual definition of interrupt
A signal to the processor indicating a device/process needs attention (1)
36
Encapsulation in bullet points
When an attribute is made private (so it can’t be directly accessed or changed from outside the class) (1) Public methods are used to read / amend the attribute’s value (1) The attribute name’s value can only be amended through the method changeName. (1)
37
Thing to say with inheritance
They can have methods and atributes of their own
38
What does pieplining allow
Pipelining would allow one instruction to be fetched as the previous one is being decoded and the one before that is being executed.(1)
39
Types of validation databases
range checks, list checks and presence checks
40
How can redundancy be provided
A raid setup or mirroring servers
41
What is ensuring accuracy of transactions down to
DBMS AND CODE ACCESSING DBMS
42
What happens without redundancy
Data can be lost
43
Public key is
Publically distributed and private one kept private
44
font colour or color
COLOR
45
What is ip
4 numbers each between 0 and 255 AND LOGICAL IDENTIFIER SO CAN CHANGFE ON PHYSICAL DEVICE
46
How many purposes do utilitie softwares hav
1
47
fetch signal
y
48
What does secondary take more of
Space in the database
49
Need for OS
To control the hardware
50
INHERITANCE
Where a class retains methods and attributes of its parent class aas well as having its own
51
What does procedural programming do
Procedural programming breaks a solution down into subroutines. These subroutines are re built and combined to form a program.
52
What does polymorphism mean
Polymorphism means that code can be written that is able to handle different objects in the same way. This reduces the volume of code the team need to produce.
53
PageRank extra
OUTGOING LINKS
54
HTML
Structure and content using tags
55
Css
CSS defines the style / appearance * Using selectors such as classes / IDs / etc * Can be placed within HTML or externally in a file * Multiple pieces of CSS can be combined (the more local instances overriding)
56
Why would it need to be done on server too
processing done away from the user’s control/Client side processing could be altered * Browser may not support client-side language/ scripting could be turned off * Booking fee calculation needs to be correct for all locations
57
Why would it be done client
No need to submit to server and wait for response * Website will work more quickly for user To the company any 2x1: * Reduces load on the server * Will need to spend less on processing power/bandwidth
58
Pagerank
Value between 0 and 1 and is probability user will not follow a link
59
How to add 2 4 bit numbers
4 full adders
60
Registers are used
For specific purposes
61
Uses of immediate adressing
Immediate addressing allows simple access to data with no fetch required, but limited by the data size of the operand.
62
Uses of direct adressing
Direct addressing allows data to be fetched from memory. Data can potentially be larger in size that with immediate addressing but address range limited by size of operand.
63
Uses of indirect adressing
Indirect addressing allows a larger range of addresses to be accessed as address fetched. However, multiple fetches required to access data.
64
Uses of indexed adressing
Indexed addressing allows the Index register to be manipulated to access data stored sequentially e.g. in an array.
65