computing

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

How does cache memory improve performance

Faster access time than main memory

Slows frequently used instructions/data

2
New cards

How does increasing mantissa bits affect representation

Increases accuracy

3
New cards

What is breakpoint

Stops execution at specific line to inspect variables

4
New cards

What is watchpoint

Stops execution when a variable changes to inspect variables

5
New cards

Random number between 1-10

Number = [random.ranint(1,10

6
New cards

How does increasing exponent bits affect representation

Increases range

7
New cards

Benefit of comprehensive test plan

All functional requirements are tested

8
New cards
<p>Rewrite the following </p>

Rewrite the following

if N % divisor== 0 :

9
New cards
<p>Rewrite highlighted</p>

Rewrite highlighted

isPrime = checkPrime(inputNum)

10
New cards
<p>Answer the following</p>

Answer the following

All recipe =[recipe() for x in range(750)]

11
New cards

Why is condition loop efficient

Exits array when value is found

12
New cards

What is an actual parameter

A parameter which is in the main program

13
New cards

What is a formal parameter

A parameter in the subprogram

14
New cards

Steps of fetch execute cycle

  1. Address bus is set up with address

  2. The processor activates the read line on the control bus

  3. Data buss brings instruction from memory to register

  4. It is then decoded and executed

15
New cards

How does identifying data flow assist programmer

Identifies parameters

16
New cards

Ways computer misuse can be breached

Unauthorised access

Intent to commit further offence

Unauthorised modification

17
New cards

Code for array of records

Class name

Def__init__(self):

Self.variable=“”

18
New cards

Design for array of records

RECORD array {

Variable AS TYPE STRING

variable AS TYPE REAL

variable AS TYPE BOOLEAN

19
New cards

Bandwidth consumption denial of service attack

Using all of websites available bandwidth

20
New cards

Resource starvation denial of service attack

An attempt to use enough server resources that the system becomes unresponsive

21
New cards

DNS denial of service attack

Modification of DNS record settings to point to a rogue DNS server

22
New cards

What is a Denial of service attack?

When someone tries to prevent legitimate users from accessing an online service via excessive network messages.

23
New cards

Types of test data

Normal, extreme and exceptional

24
New cards

Difference between extreme and exceptional

Exceptional is not within the range

25
New cards

What does increasing the cores on a processor do

Increases the number of instructions the processor can process at the same time

26
New cards

Why is a single processor running at twice the speed faster than a dual core processor

Not always able to share tasks equally between cores

27
New cards

What is a multi core processor

A processor that has multiple CPU’s on one chip

28
New cards

What does increasing the data bus width do

Increases the amount of data/info the bus can transfer at one time

29
New cards

What is cache memory

Small fast accessible memory usually on same chip as processor

30
New cards

What is clock rate

The frequency the clock generates pulses

31
New cards

How do intelligent transport systems improve traffic

Navigation systems avoid traffic

Use of cameras and sensors to move more

32
New cards

Car environmental impact

Start stop systems shut down cars engine when it’s not moving

33
New cards

Heating systems

Using sensors turn of heating when no one is home

Sensors can adjust heating if there is unusual activity

34
New cards

Compatibility testing is

Testing that website works on different browsers and devices

35
New cards

Symptoms of denial is service attacks

Slow performance

Inability to access data

36
New cards

Costs of Denial of service attacks

Lost revenue

Labour in fixing fault

37
New cards

Digital signature

created When message is sent with private key

Verifies sender and verifies message hasn’t been altered

38
New cards

Digital certificate

Authenticates a person, allowing the to exchange data over the internet over the internet using a public key

39
New cards

How is modular programming efficient and maintainable

Efficient: functions can be reused

Maintainable: Modules can be tested individually

40
New cards

Syntax error

Missing/wrong character or letter

41
New cards

Logic error

Error in logic of code, program can still execute but produces Unexpected results

42
New cards

execution error

Program is asked to do something it cannot do

43
New cards

Dry run

Programmer reads code and follows variable to check it is used/updated as expected

44
New cards

Bit mapped vs vector

Bitmapped resolution is set at creation and cannot be changed

Vector is resolution independent and can make use of highest resolution

Bitmapped is suited for photorealism and vector is not

45
New cards

vector more suitable

Object can be edited independently and can be layered