Y13 Mocks Flashcards

(51 cards)

1
Q

What is a CPU?

A

Central Processing Unit

key component of a computer system
contains the necessary circuitry to interpret and execute program instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALU

A

All arithmetic and logic operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CU

A

controls operations in the ALU and directs data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MDR

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAR

A

Memory Address Register
holds the memory address of data about to be used by the ALU
so that the ALU can fetch the content from memory and process it
may also hold the address of where processed data needs to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unicode?

A
  • an international coding standard
  • for use with different languages and scripts
  • each letter, digit or symbol is assigned a unique numeric value
  • that applies across different platforms and programs
  • each character is represented in 2 bits and the whole set is represented in 16 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RAM?

A

see notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cache?

A

see notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of an array/collection?

A

to store multiple pieces of data of the same data type together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an OSI?

A

Open systems interconnection
the communications between a computing system are split into 7 abstraction layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 7 OSI layers?

A

Physical
Data Link
Network
Transport
Session
Presentation
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hardware components of 7 osi layers

A

look at OSI downloaded image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are legacy systems?

A

old method, computer, technology, application or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reasons for using legacy systems

A

old data still not recovered to new system
discontinued software
( no new releases and that business needs that sofware)
interacting with old hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of maintaining a legacy system

A

high cost
tech support
data compatibilty
security threats
There is a high cost to maintaing any legacy system. It might even be costlier than maintaining a more updated version. Staff training might be needed since staff might not be familiar with the older version of the software.
* Tech support may no longer be available.
* The data In the system might not be compatible with newer systems and conversion may not be possible.
* Legacy systems are more vulnerable to security threats due to lack of patches * Integration of new systems will be complicated as the system might be so old that the new system is using completely different technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

requirement gathering

A

see notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of new systems

A

Data migration
Parallel running
Direct changeover
Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data migration

A

process of transferring data between two different formats
Problems:
* Incompatible file formats.
* Data structure differences.
* Conflicting Validation rules.
* Incomplete data transfers.
* International conventions on dates, currencies & character sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Parallel Running

A

old and new systems run together
advantages: if the new system has problems, the old one will still wokr
disadvantages: expensive + shortage of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Direct changeover

A

old system is removed and immediately replaced by the new system
advantages - fast and cheap
disadvantages - risky because old systems can’t be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Trainings

A

self instruction, formal classes, remote classes

22
Q

self instruction classes

A
  • users read manual or watch tutorial
  • only suitable for experienced computer systems
  • as they are more confident in using a familiar system on their own
  • gives user more freedom with study schedule
23
Q

formal classes

A
  • users sit in a formal class and are taught by a teacher
  • useful in training large amounts of staff
  • cheap and fast
  • if class size is too big, might be ineffective
24
Q

remote/online training

A
  • instructor trains a single user
  • most effective
  • but v expensive
25
What is a VPN?
Virtual Private Network * Makes a ‘tunnelled’ network connection through the Internet or any other public network * Ideal for establishing a secure connection between private networks with remotes users * Enables a device to exchange data across the internet as if it was directly connected to a private connected
26
What is the technology required for a VPN?
a LAN is connected to the internet one computer outside of the LAN is also connected to the internet VPN client and server running on the lone machine and the original LAN Internet connection
27
What factors affect the speed of transmission on VPN?
see notes
28
Data compression + VPN
see notes
29
What is encryption?
* Uses complex mathematical algorithms and encryption keys to alter a message into a form that is not understand to an unauthorised person * Only the person with the correct key can decode the message and read it
30
What are two computer encryption categories?
* Symmetric key encryption * Public key encryption
31
What is symmetric key encryption?
- Single key or secret key encryption - Same key used for encryption and decryption - Each device has a secret code that is sued to encrypt a packet before it is sent over an untrusted network - Receiving device should know and use the same key to decode the packet received - A well-known symmetric algorithm developed for computer was the Data Encryption Standard (DES) - Uses a 56-bit key - 72,057594,037,927,936 possible combinations for a brute force attack btw
32
What is a public key encryption?
- Also known as asymmetric key encryption - Uses a public key for encryption and a private key for decryption - Two keys are mathematically linked This type of encryption is used on the interne t - Transport Layer Security (TLS) AND Secure Socket Layer (SSL) encryption protocols, used for secure web communication, are based on public key encryption
33
file encryption + protection
compressed data where data is scrambled and is unintelligible
34
advantages of public key
Two sides don’t need to have already shared secret key to communicate using encryption.
35
disadvatanges of public key
Messages take more time to encrypt and decrypt. Public key authenticity needs to be verified.
36
advantages of symmetric key
Encryption speed is faster and uses less resources that public-key encryption
37
disadvatanges of symetic key
Keys must be shared before they can be used. If the key becomes unknown by unauthorized individuals then a new key must be made
38
What is a firewall?
computer or software package used for a NETWORK - needs specific hardware - monitors and protects the network traffic of a computer or computer network - decides which computer gets access to the network based on a set of rules -
39
What is a software firewall?
a network security system that determines what data comes in and goes out of a network or pc - may slow down computer
40
What is a router hardware firewall?
will prevent hackers and unauthorised people on the internet from getting onto the network - but can't stop people in range from getting wifi
41
What is an array?
fixed size structure of data of the same type
42
Sequential search definition
sequential search used to find specific component in array does this by checking each component sequentially
43
Sequential search pseudocode
PSEUDOCODE: Array = [2,9,5,6,7,8] Search = 7 Found = false Counter = 0 loop Counter from 0 to Array.length – 1 if Array[Counter] = Search Found = true output Array[Counter] end if end loop if Found = false output Search, “ is not found in this array” end if
44
Binary search definition
used on SORTED ARRAYS splits the array into two and checks it the middle term is higher or lower than the search term discards the list accordingly
45
Binary search pseudocode
Array = [11,12,15,16,112,118,123,145] Search = 15 Min = 0 Max = Array.length -1 Found = false Answer = 0 Mid = 0 loop while Found != true and Min <= Max Mid = (Min + Max) div 2 if Array[Mid] = Search Found = true Answer = Mid else if Search > Array[Mid] Min = Mid + 1 else High = Mid – 1 end if end while if Found = true then output Search, “was found at”, answer else output Search, “was not found in this array” end if
46
web browser and function
- an application software - used to find, receive and display content on the WWW - Includes texts, images and audio
47
48
49
50
51