Theory - NotebookLM flashcards

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/131

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

132 Terms

1
New cards

What are the three main components of the Von Neumann Architecture?

A processor separate from memory, with input/output mechanisms.

2
New cards

What is an instruction set?

The complete set of all instructions in machine code that can be recognised and executed by a particular CPU.

3
New cards

What are the three main functions of the Central Processing Unit (CPU)?

It contains the operation of the memory, processor and input/output; it interprets instructions; and it sends instruction signals.

4
New cards

The component inside the CPU used to manage the flow of data and interaction between components is the _.

Control Unit

5
New cards

Which component inside the CPU executes arithmetic and logic operations?

The Arithmetic and Logic Unit (ALU).

6
New cards

What is the function of the Program Counter register in the Control Unit?

It holds the address of the next instruction to be fetched.

7
New cards

Which register holds the address of the instruction that is currently being processed?

Memory Address Register (MAR).

8
New cards

The Memory Data Register (MDR) holds the data or instruction located at the address currently held in the _.

Memory Address Register (MAR)

9
New cards

At what point in the clock signal is the next instruction fetched during the Fetch-Decode-Execute cycle?

On the rising edge of the clock signal.

10
New cards

What is a core in the context of a CPU?

A processing unit within the CPU that contains an ALU, Control Unit and registers

11
New cards

What is cloud computing?

The use of computing resources, such as storage and applications, over the internet.

12
New cards

A _ cloud model involves services provided over the internet from another company.

public

13
New cards

What is a private cloud?

Cloud services that are managed and provided in-house for a single company.

14
New cards

Which cloud model integrates private and public clouds, allowing workloads to move between them?

Hybrid cloud.

15
New cards

What is a multi-cloud infrastructure?

An infrastructure comprising multiple vendor’s public clouds, using services from two or more major providers.

16
New cards

What is a significant drawback of cloud computing related to service availability?

Downtime, where services become inaccessible if internet connectivity is lost.

17
New cards

What is 'cloud provider lock-in'?

The difficulty and cost associated with moving an organisation's entire computing setup from one cloud provider to another.

18
New cards

How does USB-C's symmetric connector improve on older USB types?

It makes the connector easier to plug in as it works both ways up.

19
New cards

What is serial communication?

The process of sending data one bit at a time, sequentially, over a communication channel.

20
New cards

In synchronised serial communication, the timing of each bit is synchronised by the _____

oscillations of a clock

21
New cards

How does asynchronous serial communication manage data transfer without a synchronised clock?

Files are broken up into many packets which are reassembled at the receiving end.

22
New cards

What is parallel communication?

A method where several bits are sent at the same time on a link with several parallel channels.

23
New cards

Why is parallel communication faster than serial communication?

Because many bits are sent over many channels at the same time.

24
New cards

What is a primary use of hexadecimal numbers in networking?

Media Access Control (MAC) addresses.

25
New cards

For what purpose are memory dumps, which often use hexadecimal, created?

For debugging or analysing computer systems.

26
New cards

How are hexadecimal numbers used in web design?

They are used for HTML Colour Codes.

27
New cards

What is a key characteristic of high-level programming languages like Python or Java?

They are closer to natural language and easier for a human to understand.

28
New cards

What is machine code?

The set of instructions, represented in binary, that a CPU understands directly.

29
New cards

Assembly language uses short abbreviations called _ which correspond to machine code instructions.

mnemonics

30
New cards

What is the key characteristic of primary memory?

It is directly accessible by the processor and has fast speed with low latency.

31
New cards

What type of information is typically stored in Read Only Memory (ROM)?

Non-volatile start-up instructions for the computer.

32
New cards

Random Access Memory (RAM) is described as _ because it loses its data when the power is turned off.

volatile

33
New cards

Why does Dynamic RAM (DRAM) need to be constantly refreshed?

To retain data, as it uses capacitors which lose their charge.

34
New cards

Static RAM (SRAM) is faster than DRAM and is often used in _ memory.

cache

35
New cards

What is the purpose of secondary storage like an HDD or SSD?

To store data and programs that are not currently in use.

36
New cards

Why are Solid State Drives (SSDs) particularly suitable for mobile devices?

They have no moving parts, making them more robust and shock-resistant.

37
New cards

What is virtual memory?

A section of the hard drive used as temporary storage when the capacity of RAM is reached.

38
New cards

What is the function of a translator in programming?

To convert source code written in a programming language into machine code.

39
New cards

How does a compiler translate source code?

It takes the whole source code and translates it into machine code in one go, producing object code.

40
New cards

What is a major advantage of a compiled program regarding execution speed?

It runs quickly because it has already been translated into machine code before execution.

41
New cards

What is a disadvantage of compilation related to platform dependency?

Source code compiled on one platform will not run on another as the machine code is specific to the processor's architecture.

42
New cards

How does an interpreter translate source code?

It translates the source code into machine code one instruction at a time and executes it immediately.

43
New cards

What is a primary disadvantage of interpreted programs?

They run slowly as the processor must wait for each instruction to be translated before it can be executed.

44
New cards

What is the function of an assembler?

It translates assembly language, which uses mnemonics, into machine code.

45
New cards

What is the relationship between assembly instructions and machine code instructions during translation by an assembler?

An assembler creates one machine code instruction for each assembly instruction.

46
New cards

Why must analogue data from the real world be converted to digital for a computer to process it?

Computers cannot process infinite data values, so analogue signals are sampled and stored as discrete digital values (0s and 1s).

47
New cards

What do the high and low voltages in computer circuitry represent?

They are represented as the binary digits 1 and 0, respectively.

48
New cards

How is the denary value of the binary number 1001 calculated?

By summing the positional values: 2^3 + 2^0 = 8 + 1 = 9

49
New cards

Why is hexadecimal often preferred over binary for representing data?

It uses fewer digits, requires less display space, is faster to enter, and makes it easier to spot errors.

50
New cards

In HTML, what does the '#' symbol preceding a six-digit hexadecimal code indicate?

It indicates that a colour is being coded.

51
New cards

Why is hexadecimal used in low-level programming like assembly code?

It is quicker, easier, and less error-prone for programmers to type values in hex than in long binary strings.

52
New cards

What type of address, used to uniquely identify devices on a network, is composed of six pairs of hexadecimal digits?

A Media Access Control (MAC) address.

53
New cards

What is validation in the context of data entry?

An automatic check to ensure that the data entered is sensible, reasonable, and possible.

54
New cards

A _ check ensures that data entered is within a specified upper and lower limit.

range

55
New cards

What is the purpose of a presence check?

To ensure that some data has been entered into a required field.

56
New cards

A ____ check is used to ensure that data is entered in a specific pattern, such as a national insurance number having characters, integers, and a last character.

format

57
New cards

In data science, what is the purpose of pre-processing or 'cleaning' data?

To find and fix issues such as missing data values or outliers.

58
New cards

What is the difference between a microprocessor and a microcontroller?

A microprocessor is the brain of a general-purpose computer, while a microcontroller is a tiny, single-purpose computer for an embedded system.

59
New cards

Microcontrollers are often described as being 'embedded'; what does this mean?

They are placed inside another device, such as a washing machine, to control its features or actions.

60
New cards

A NOT logic gate has one input; if the input is 0, what is the output?

The output is 1.

61
New cards

For an AND gate, what is the only combination of inputs that will produce an output of 1?

Both inputs must be 1.

62
New cards

For an OR gate, when will the output be 0?

Only when both inputs are 0.

63
New cards

The _ gate produces an output of 0 only when both of its inputs are 1.

NAND

64
New cards

Which logic gate produces an output of 1 only when its inputs are different?

XOR (Exclusive OR).

65
New cards

What is simplex data transmission?

Transmission that occurs in one direction only, like from a microphone to a computer.

66
New cards

Half-duplex transmission allows data to be sent in both directions, but not _.

at the same time

67
New cards

What is full-duplex data transmission?

Transmission that allows data to be sent in both directions at the same time.

68
New cards

What is a network protocol?

A set of rules and standards for how data is transmitted and received over a network.

69
New cards

What is the purpose of a parity bit in data transmission?

It is a simple form of error checking to ensure the total number of 1s in a byte matches an agreed-upon parity (odd or even).

70
New cards

What is a key limitation of parity checking for error detection?

It cannot detect when an even number of errors has occurred in a byte.

71
New cards

What is the purpose of the Time to Live (TTL) value in a data packet?

It acts as a hop limit to prevent a packet from circulating indefinitely on a network.

72
New cards

The _ is the printed circuit board on which the main components of a computer are connected.

motherboard

73
New cards

What is the function of the address bus?

It carries memory addresses from the processor to other components.

74
New cards

The _ bus carries data between the processor, memory, and input/output devices.

data

75
New cards

What is the role of the control bus?

It sends control signals and receives response signals to coordinate all processing by the CPU.

76
New cards

What is overclocking?

Increasing a CPU's clock speed beyond its factory-set limit to improve performance.

77
New cards

How can a Graphics Processing Unit (GPU) improve computer performance?

It handles the processing of images and graphics, freeing up the CPU to perform other tasks.

78
New cards

How many bytes are in a Kibibyte (KiB)?

1024 bytes.

79
New cards

What is the primary function of an operating system (OS)?

It is software that runs in the background to manage a computer's basic functions, hardware, and software.

80
New cards

What is an interrupt?

A signal sent to the CPU from hardware or software, requesting processor time.

81
New cards

What does a Graphical User Interface (GUI) use to allow user interaction?

It uses windows, icons, menus, and pointers (WIMP).

82
New cards

What is multi-tasking in the context of an OS?

The ability to have many programs appear to run simultaneously, often using time slicing and interrupts.

83
New cards

In a star network topology, what is the function of the central switch?

It manages all the traffic on the network, acting as a central connection point for all devices.

84
New cards

What is the difference between a MAC address and an IP address?

A MAC address is a unique, permanent hardware identifier, whereas an IP address is a logical address that identifies a device's location on a network.

85
New cards

What is the role of the Transport Layer (Layer 4) in the OSI model?

It is where data is broken down into packets and protocols like TCP ensure reliable, error-free connections.

86
New cards

What is Layer 5 of the OSI (open systems interconnection) model?

The application layer

87
New cards

What is a transducer?

Any device that converts a quantity from one form to another, such as a real-world signal to an electrical signal or vice versa.

88
New cards

An input device that converts a real-world signal like light or temperature into an electronic signal is a _.

sensor

89
New cards

What is an actuator?

An output transducer responsible for moving or controlling a mechanism, converting an electrical signal into physical movement.

90
New cards

What is the function of an Analogue to Digital Converter (ADC)?

It takes samples of a continuous analogue signal and encodes them into a discrete binary code.

91
New cards

What is the difference between additive and subtractive manufacturing?

Additive manufacturing builds an object layer by layer (e.g., 3D printing), while subtractive manufacturing cuts away from a solid block (e.g., laser cutting).

92
New cards

What is hacking?

The illegal access to a computer system to steal personal data without the owner’s consent or knowledge.

93
New cards

What is a computer virus?

A program or piece of code that can replicate itself with the aim of deleting or corrupting files or causing computer malfunction.

94
New cards

What is phishing?

The use of legitimate-looking emails to trick a user into clicking a link to a fake website to steal personal or financial details.

95
New cards

How does pharming differ from phishing?

Pharming involves installing malicious code that redirects a user to a fake website automatically, without the user needing to click a link in an email.

96
New cards

_ software gathers information by recording key presses on a user's keyboard.

Spyware/keylogging

97
New cards

What is a Denial of Service (DoS) attack?

An attack that disrupts a service by overwhelming a web server with an excessive number of requests, making it unavailable to legitimate users.

98
New cards

What is the primary function of a firewall?

To filter information going in and out of a computer or network to protect it from unauthorised access.

99
New cards

How does a proxy server enhance security?

It acts as an intermediary, preventing direct access to a web server and can filter traffic, mask IP addresses, and absorb attacks.

100
New cards

What does the 's' in 'https' signify?

It signifies that the connection is secure, typically using SSL or TLS encryption.