y12 End of Years Flashcards

(51 cards)

1
Q

Methods of obtaining requirements from stakeholders

A

Structured + unstructured interviews
Questionaires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Structured Interviews

A

strictly standardised and prescribed
set of prepared questions
same manner and order to each stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

unstructured interviews

A

flexible
stakeholders encouraged to express thoughts and beliefs freely

but sometimes yield data too difficult to summarise, evaluation or perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is survey methodology?

A

Refers to a domain of applied statistics that focuses on taking samples from a population, as well as imporoving on the various data collection techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

restricted requetsioareis

A

yes or no
short answer question
box checking
facilitates statical analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unrestricted questionnaires

A

greater depth of responses
makes it difficult to analswtuse or interpret
makes statical analysis impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what do questionaries gurantee>

A

uniformity of questions
yield data is easier to compare
saves time
cost efficient
can reach a lot of stakeholders quickly

but stakeholders may not respond at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

direct observation of current processes

A

spending time in different departments
study where different procedures and processes could be more efficient
where possible bottlenecks may be present
makes the collection of different types of data possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a prototype?

A

working or non-working preliminary version of the final product
or a simple version of the final system used in design phase
to demonstrate how the final phase will work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does the prototype?

A

attracts the attention of the client
encourages them to use and get a feel for it
provides just enough of the concept for investors to decide if they want it or not
encourages active participation between users and developers
gives an idea of the final product
helps in the identification of problems with the efficient or the design
increases system development speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a CPU?

A

processes basic data and instructions in the process phase of input, process output

hardware component of computer system
can perform basic arithmetic and logic operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an operating system?

A

a set of software that controls a computer’s hardware and provides services for computer programs
acts as an intermediary between software and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the main services that an operating system provides?

A

peripheral communication
memory management
resource monitoring and multi-tasking
networking
disk access and data management
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

memory management

A

OS manages how memory is used in applications
ensures that one application does not interfere with memory being used by another application
if it does, it could lead to the latter to stop functioning or data being erased or overwritten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

colour representation

A

monitors use pixels to display information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a pixel

A

smallest controllable element in the display
every pixel is only one colour
each pixel stores data about its state and colour in a memory location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how is each colour represented

A

hexadecimal value of two digits
RBG hex representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a data packet?

A

portion of a message that is transmitted through a network
contains data such as check digits and destination address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what comprises a computer network?

A

two or more computer systems that are connected and are able to communicate and exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

LAN

A

connects devices over a small gerographical area
eg school, home
usually have a high data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what mode of operation is commonly used in a LAN?

A

client server
allows for a signle computer to act as a server and be responsible for supplying data to the clients in the network

22
Q

what does a LAN allow?

A

sharing of peripheral devices
eg printers + scanners
can be used by any device connected to the network
eliminates the need to buy individual peripheral devices

23
Q

WLAN

A

same as LAN but wireless
less secure
allows mobile phones and laptops to be connected so you can move around
uses wifi
radio waves

24
Q

similarities between LAN and WLAN

A

both act on local level
both allow communication
sharing of resources
connect devices

25
differences between LAN and WLAN
different transmission medium LAN is faster and safer WLAN offers greater flexibility
26
linear search
simple brute force compares every term to search item
27
binary search
an algorithm searching method used only in sorted arrays relies on a divide and conquer strategy in every search iteration, half of the elements of the array are eliminated as possible solutions very efficient for large arrays its performance makes it ideal when resorting is not required
28
steps in binary search
c ompares the search value with the value of the middle element of the array if the values match, the value is found if search value < middle element. Algorithm discards the right and repeats the action to the left of the sub-array to the left of the middle element if the search value > middle item, vice versa if the remaining array to be search is empty, then the value is not found
29
VPN
virtual private network creates 'tunnelled' network connection through internet or other private network establishes secure connections enables a device to exchange data across the internet as if it was directly connected to a private connected
30
VPN lan/wan
allows clients from remote locations to connect to the network managed through server - software application
31
VPN benefits
easier commincaiotion companies take advantage of the internet to provide secure connections decreases operational costs vs trad WANs improves overall productivity improves productivity of remote employees offers employees felxibity global networking oppurtnies teleworker support reduces environmental footprint travel time for remote workers simplifies network topologies for administrators and companies
32
concurrent processing
execution of different instructions simultaneously by different processors to achieve best performance
33
concurrent processing simplified
programs are broken down into procedures and then sub-procedures assigned to a different processing units to perform simluatenously
34
sequential processing
execution of all sub-procedures one after the other by a single processing unit
35
methods of preventing data loss
regular back up of files using hard disks or magnetic tapes
36
what can be used for fast backup and data storage
removable media used for fast data backup and storage eg DVD Blu-ray non voalite can store data permanently
37
WPA2
Wireslles protected access uses AES advanced encryption standard block cypher considered to be the best protection
38
MAC addresses
Media access control static address associated with specific device router will only accept messages saved from the database
39
authenticity
user providing identity to gain access to a computer system behind reasonable doubt requiring more than one independent factor increases the difficulty of providing false credentials
40
protocols
a set of rules that governs the transmission of data
41
TCP/IP
transmission protocols and connects to the internet communication protocols used to connect hosts on int internet
42
why are protocols required for communication?
presence of: an identified sender an identified receiver an agreed upon method of communication grammar language speed confirmation of acknolwdgemnt of requirements
43
Control unit
operation of CPU controls the retrieval of instruction from the primary memory as well as the sequence of their execution providing ALU with data that needs to be processed as well as the instructions of how the data should be processed contains registers
44
ALU
mathematical operations; logic imput/output
45
MDR
memory data register stores instruction about to be used by the CPU all saved to RAM wihcver address MAR is holding, corresponding is loaded onto MDR, then sent to all after processing, goes back to MDR data copied to memory address location in RAM, specified by MAR
46
MAR
memory address register holds address about to be used by the CPU so that the ALU can fetch the corresponding content from memory and process it accordingly may also hold the memory address of where data has been processed will need to be stored
47
address bus
connect MAR to RAM/ primary memory
48
data bys
RAM and MDR
49
fetch
CPU sends approporatie address instruction is copied onto data bus and sent to CPU
50
decode
instruction is decoded required data that needs to be loaded from RAM is fetched on address bus
51
execute
CPU calucautes result stores in memory address specific with address bus data sent with data bus checks for next instruction repeat