Computer Systems and CPU Architecture

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts, definitions, and terminology from the lecture on Computer Systems and CPU Architecture.

Last updated 10:21 PM on 1/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

Von Neumann Architecture

Uses a single shared memory for data and instructions, leading to the von Neumann bottleneck.

2
New cards

Harvard Architecture

Uses separate memory for data and instructions, improving performance.

3
New cards

Fetch-Decode-Execute Cycle

The process by which a CPU retrieves an instruction from memory, decodes it, and executes it.

4
New cards

Control Unit

Sends control signals and decodes instructions in the CPU.

5
New cards

ALU (Arithmetic Logic Unit)

Performs arithmetic and logic operations in the CPU.

6
New cards

Little Man Computer (LMC)

A simplified model CPU used for teaching purposes.

7
New cards

Accumulator (in LMC)

Stores intermediate results during processing in the Little Man Computer.

8
New cards

Primary Storage

Includes RAM (volatile) and cache for immediate data access.

9
New cards

Secondary Storage

Includes HDD, SSD, optical disks, and magnetic tape for long-term data retention.

10
New cards

Virtual Memory

Uses secondary storage as an extension of RAM to handle larger workloads.

11
New cards

ASCII

7-bit character encoding standard for representing text in computers.

12
New cards

Compiler

A translator that converts source code into machine code.

13
New cards

Agile Methodology

An iterative software development methodology focused on flexibility and user feedback.

14
New cards

Operating System

Manages hardware and software resources of a computer system.

15
New cards

Firewall

A security system that monitors and controls incoming and outgoing network traffic.

16
New cards

Malware

Software designed to disrupt, damage, or unauthorized access to computers.

17
New cards

Phishing

A cyber attack that attempts to acquire sensitive information by masquerading as a trustworthy entity.

18
New cards

Packet Switching

A method of data transmission where data is broken into packets and sent independently across the network.

19
New cards

Device Drivers

Software that allows the operating system to communicate with hardware devices.