Computer science theory

studied byStudied by 3 people
0.0(0)
Get a hint
Hint

What happens during fetch?

1 / 215

flashcard set

Earn XP

Description and Tags

basically everything

216 Terms

1

What happens during fetch?

o The CPU places the address of the next instruction to be fetched in the program counter.
o The memory location is found via a signal sent along the address bus.
o The data at that memory location is copied via the data bus into the instruction register.
o The program counter is incremented so that it points to the next instruction.

New cards
2

Decomposition is...

breaking down a complex problem or system into smaller parts that are more manageable and easier to understand

New cards
3

Abstraction is...

the process of extracting or withdrawing something

New cards
4

Subprograms are beneficial because...

easier to debug and test as they are on their own, can be saved separately and used again in other programs, code can be repeated without having to rewrite it

New cards
5

An algorithm is...

'a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer' - an unambiguous sequence of instructions that can be used to solve a problem

New cards
6

Sequence is...

the order in which the statements in a program are executed

New cards
7

Selection is...

a programming construct where a section of code is run only if a condition is met

New cards
8

Repetition is...

when lines of code are run multiple times

New cards
9

Iteration is...

repeating an action until you achieve the correct outcome

New cards
10

Input/output is...

the communication between an information processing system, such as a computer, and the outside world, possibly a human or another information processing system

New cards
11

Processing is...

the series of actions that a computer (the CPU) takes in response to commands that a user requests

New cards
12

A pill shape on a flowchart is...

the start/end point

New cards
13

An arrow on a flowchart is...

a connector that shows relationships between the representative shapes

New cards
14

A parallelogram on a flowchart is...

an input/output

New cards
15

A rectangle on a flowchart is...

a process

New cards
16

A rhombus on a flowchart is...

a decision

New cards
17

A variable is...

a named memory address that holds a value

New cards
18

Multiplication symbol is...

*

New cards
19

Modulus symbol is...

%

New cards
20

Division symbol is...

/

New cards
21

To the power of symbol is...

^

New cards
22

Equals symbol is...

==

New cards
23

Not equal to symbol is...

!=

New cards
24

Linear search works by...

starting at the beginning of the data set and examining each item of data until a match is made. Once the item is found, the search ends. If there is no match, the algorithm must deal with it :p

New cards
25

Merge sort works by...

using a technique called divide and conquer. The list is repeatedly divided into two until all the elements are separated individually. Pairs of elements are then compared, placed into order and combined. The process is then repeated until the list is recompiled as a whole.

New cards
26

Computers store data in...

binary

New cards
27

Letters on computers are generally encoded in...

ASCII

New cards
28

To determine the maximum number of states that can be represented by n binary digits you...

use the formula 2^n

New cards
29

The first digit in signed binary represents...

the sign; 0 is positive and 1 is negative

New cards
30

The first digit in two's complement binary represents...

negative (largest number in that size binary) - the numbers smaller than it are then added on to get closer to 0

New cards
31

Shifts are known as ... operations because...

bitwise, they operate on each bit in a pattern, one at a time

New cards
32

In left logical/arithmetic shifts...

the MSB and all remaining bits are shifted left, 0s are placed in the vacated locations on the right, this has the effect of multiplying by 2

New cards
33

In right logical shifts...

the LSB is shifted right, out of the pattern, 0s are placed in the vacated locations on the left, this has the effect of dividing by 2

New cards
34

In right arithmetic shifts...

the LSB is shifted right, out of the pattern, the MSB is maintained and placed in all the vacated locations on the left, this has the effect of dividing by 2 while keeping the sign

New cards
35

Right arithmetic shifts are used with...

signed binary

New cards
36

Signed integer arithmetic shift left can create...

overflow errors when the sign changes

New cards
37

To convert from binary to denary you...

take each place value that has a 1, and add them together

New cards
38

To convert from denary to binary you...

start by subtracting the biggest place value you can from the denary number, then place a 1 in that place value column. Next, subtract the second biggest place value you can, and place a 1 in the column. Repeat this process until you reach zero

New cards
39

Overflow is...

when an arithmetic operation attempts to create a numeric value that is outside of the range

New cards
40

Hexadecimal is used because...

large numbers can be represented using fewer digits, which is easier for humans to understand

New cards
41

Hexadecimal is used for...

memory addresses, colours, MAC addresses etc.

New cards
42

Hex values go from...

Hex: 0 - F
Denary: 0 - 15
Binary: 0 - 1111

New cards
43

Lowercase ASCII characters are...

32 higher than their respective uppercase charactere

New cards
44

The IEC units of data storage are...

bit, nibble, byte, kibibyte, mebibyte, gibibyte and tebibyte

New cards
45

To go from byte → kibibyte etc. you...

× 1024

New cards
46

The symbols for ceiling function are...

⌈ and ⌉

New cards
47

In the Von Neumann stored program concept...

o Both instructions and data are stored in memory.
o The contents of memory can be changed to implement other functionality.
o This approach allows modern computers to be reprogrammed.

New cards
48

Secondary storage is needed because...

You need some way of reading and editing data and storing the data when the computer has no power.

New cards
49

Non-volatile memory is...

memory that can retain the stored data even when not powered - i.e. secondary storage

New cards
50

How does solid state technology work (flash)?

Solid state technology (flash) works by a flow of electrical current forcing pools of electrons into floating gates between two oxide layers, causing a change in the level of charge in the oxide gate, which can be measured as a 0 or a 1. This means that flash drives have no moving parts. Data is written and read from NAND chips, which contain huge amounts of transistors, with a 1TB SSD on its own containing trillions of them.

New cards
51

How does optical technology work?

A laser is shone at the media, and then the reflection is processed. With read-only drive, during writing the surface of the media is physically burned by the media creating pits and lands, which are reads as 0s and 1s (more precisely, the parts where the pits end cause the laser light to scatter, so it's not read as well, and this change in reflection is read and interpreted as 0s and 1s). It's possible to press optical discs cheaply many thousands of times. Data is read in a spiral around the drive, making them slower. With rewritable drives, the composition of the disc is changed with a reversible chemical reaction. Some examples are CDs, DVDs & Blu-Rays.

New cards
52

How does magnetic technology work?

Magnetised compounds point north or south, and these polarities are read as 0s and 1s. Hard disks have a drive head which physically moves over the surface of the disk. This drive head is a mechanical component which will fail over time, and it is also much slower than an SSD with no moving parts. Tapes were and still are used for backups, which are another type of magnetic media. However, because they can only be read and written sequentially, it limits how data can be stored on them, and they are extremely slow.

New cards
53

Advantages of solid state:

Durable & reliable (no moving parts), fast access times, capacities going up, prices going down, low power, no need for defragmentation

New cards
54

Disadvantages of solid state:

Cost (for now), limited read/writes over time

New cards
55

Advantages of optical:

Cheap, lightweight, portable, has rewritable variants

New cards
56

Disadvantages of optical:

Slow access times, prone to scratches, limited capacities, not all rewritable

New cards
57

Advantages of magnetic:

Cheap, large capacity

New cards
58

Disadvantages of magnetic:

Slow access times, fragile (especially in a laptop if dropped), has moving parts, need for defragmentation

New cards
59

The purpose of an operating system is to...

Provide a platform for other software, so that this software can interact with the computer hardware

New cards
60

Functions of an operating system include...

file management, process management, peripheral management, user management, memory management

New cards
61

Utility software...

helps maintain the system

New cards
62

Some examples of utility software include...

file repair, backup, data compression, disk defragmentation, anti-malware

New cards
63

What is the purpose of disk defragmentation?

When a file is stored on a hard disk it is actually stored not as a whole file, but as a series of segments. Sometimes, the segments can get spread across a large area of the drive, so disk defragmentation moves them closer together for faster read speeds.

New cards
64

Why is robust software important?

Software that isn't robust can contain vulnerabilities - flaws in code that introduce security issues into software.

New cards
65

Some examples of bad coding practices are...

o Poorly planned design
o Quick fixes for problems
o Not using industry coding standards
o Poorly structured code
o Insufficient testing

New cards
66

An audit trail is...

a record of what has been done, and who or what did it - it can be used to check what happened and return the system to a previous state if needed

New cards
67

An code review is...

a check of source code by other experienced programmers to check it is well written and that no security issues have been created

New cards
68

What happens during decode?

o The data now in the instruction register is split into two parts - the instruction and the data.
o The control unit decodes the instruction and gets things ready for the next step.

New cards
69

What happens during execute?

o The execute stage is the point at which data processing happens.
o Instructions are carried out on the data. Some instructions are carried out by the arithmetic logic unit.

New cards
70

Malware is...

malicious software - software which is hostile, malicious or intrusive

New cards
71

A virus is...

malware which spreads between computers while multiplying

New cards
72

A worm is...

a virus which can travel without a host program

New cards
73

A trojan is...

malware which disguises itself as a legitimate program

New cards
74

Ransomware is...

malware which prevents you from accessing programs/files, usually by encrypting them. To decrypt them, the attacker will demand a ransom

New cards
75

Key loggers are...

a kind of spyware which records what is typed on your keyboard - including usernames, passwords, bank details etc.

New cards
76

Some vulnerabilities that can be exploited by hackers include...

unpatched software, out-of-date anti-malware

New cards
77

Social engineering is...

when hackers (social engineers) exploit human behaviour, fallibility, and goodwill to gain confidential information

New cards
78

Some kinds of social engineering include...

phishing, pretexting (blagging), baiting, quid pro quo

New cards
79

Signature databases work by...

comparing the unique file signature of a program to a database of known viruses - if they match then the program is deemed to be a virus. However, this can only catch known viruses, not zero-days.

New cards
80

Statistic heuristic analysis works by...

comparing code in the program to known malicious code

New cards
81

Dynamic heuristic analysis works by...

running the program in a virtual environment and checking for any suspicious activity

New cards
82

An AUP is...

an Acceptable Use Policy - a collection of rules and procedures that employees are required to follow in order to protect their organisation's systems and networks

New cards
83

An embedded system is...

usually a simple computer, often on a single printed circuit board, which is built into a larger device in order to control it

New cards
84

Some characteristics of an embedded system include...

task-specific (single purpose), low power consumption, small physical size, low maintenance, low cost, often real-time or responsive to surroundings

New cards
85

Pixel

'picture element' - a tiny square in a large grid of squares on a computer screen

New cards
86

Bitmap

a method for storing images using pixels - it is a map of where the bits of information are stored (stored as a sequence of numbers for each pixel's colour)

New cards
87

Resolution

how tightly packed the pixels are; affects image quality - a higher resolution means the image has more pixels closer together, which results in a larger file size (pixels per inch)

New cards
88

Colour depth

the number of bits used for each pixel to define a colour - the larger colour depth, the larger the file size

New cards
89

Metadata

additional data about the file itself e.g. file type, data created, author, height/width, resolution, colour depth

New cards
90

Image size =

width x height (number of pixels)

New cards
91

Width (in pixels) =

width (inches) x resolution (pixels per inch)

New cards
92

File size =

width (pixels) x height (pixels) x colour depth (bits) + metadata

New cards
93

Amplitude

the value of the wave (y-axis) at a given point in time (x-axis)

New cards
94

Bit depth

the number of bits needed to represent the range of values on the y-axis

New cards
95

X-axis

time values

New cards
96

Y-axis

binary values

New cards
97

Sampling

taking a snapshot of the analogue signal at one single point in time

New cards
98

Quantisation

mapping that snapshot to a binary value

New cards
99

Sample interval

the time between samples (seconds)

New cards
100

Sample rate

the number of sound samples taken per second (Hz)

New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(1)
note Note
studied byStudied by 23 people
... ago
5.0(1)
note Note
studied byStudied by 52 people
... ago
4.7(3)
note Note
studied byStudied by 2 people
... ago
4.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 35 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 448 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (68)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (182)
studied byStudied by 28 people
... ago
5.0(3)
flashcards Flashcard (22)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 1 person
... ago
5.0(1)
robot