comp sci corrections

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

64 Terms

1
New cards

subprogram

self contained block of code that performs a specific task

2
New cards

decomposition (subprogram)

can be reused by calling

3
New cards

abstraction (subprogram)

programmer using subprogram does not have to know it works, subprograms can call other subprograms, higher and higher levels of abstraction to simplify problem solving, can use arguments/parameters so code can be used in different contexts

4
New cards

a flag

used to identify whether an identifier is true or false

5
New cards

arrays

all same data type

6
New cards

lists

used to hold multiple data items

7
New cards

%

modulus, returns remainder

8
New cards

//

floor division, rounds down

9
New cards

linear search

compares first value to target, if not correct moves to next value until end of list

10
New cards

brute force algorithm

tries every possibility until solution found or all possibilities exhausted

11
New cards

divide and conquer

where half the list is discarded each pass

12
New cards

index of median item

[index of last item] + [index of first item] // 2

13
New cards

merge sort

more efficient to solve large problem by dividing into smaller problems and solving, divide list into sublists then sort

14
New cards

binary search

data must be sorted

15
New cards

best case scenario

linear search faster, as binary search would have to split list first

16
New cards

small list

linear search may find faster?

17
New cards

arithmetic

copies MSB, logical

18
New cards

imprecise result

discards/truncates after decimal place

19
New cards

overflow

answer uses memory that does not exist in the register

20
New cards

character set

list of binary codes that soft/hardware can recognise to represent a value

21
New cards

foreign characters may not fit into 7 bit ASCII

22
New cards

sample rate

number of samples taken/second

23
New cards

file size

affected by sample rate, bit depth, length of recording and number of channels (mono/stereo)

24
New cards

computer memory is random access

can be accessed in any order

25
New cards

CU

fetches program from main memory, decodes it and controls other parts of the system to execute it

26
New cards

ALU

performs arithmetic and logical operations

27
New cards

registers

provides direct

28
New cards

registers

some specific function, some general purpose

29
New cards

FDE cycle

memory address put onto address bus, CU sends read signal down control bus, instruction at memory location placed on data bus and sent to CPU, where controls execution in other parts of system

30
New cards

components of embedded systems

microcontroller, sensors, battery

31
New cards

scheduling algorithm

used by OS to ensure that all processes get a slot of CPU time depending on priority

32
New cards

paging algorithm

used by OS to decide which processes to assign to which memory address

33
New cards

active process

currently being executed by CPU, inactive process

34
New cards

virtual memory

area of hard drive used to temporarily store processes when RAM becomes full

35
New cards

device driver

interface for OS to communicate with peripheral device

36
New cards

fragmented

no longer able to store file in one location and must be split up

37
New cards

defragmentation

fewer disc accesses needed to read data

38
New cards

antimalware

compares signatures to signature file, or uses rules to detect suspicious behaviour

39
New cards

robust software

does not crash with unexpected inputs, free from security vulnerabilities

40
New cards

drawbacks of high level languages

less efficient, use more memory because not optimised to make most of features of CPU

41
New cards

interpreted languages

quicker to test, easier to make changes (no source code)

42
New cards

IP address

used to uniquely identify each device connected to the internet

43
New cards

URL

uniform resource locator, used to identify unique resource on the internet

44
New cards

domain name

website name part of URL

45
New cards

DNS server

translates URL to IP address

46
New cards

wired

higher transder speeds, lower latency

47
New cards

NFC

radio waves used, encrypted data, devices must be in close proximity

48
New cards

enable devices on a network to communicate, define how data is formatted, transmitted and received

49
New cards

protocol stack

hierachical set of network protocols that enable devices to communicate over a network

50
New cards

more nodes on a bus network

more collisions

51
New cards

disposing electronics

landfill leaching into eco systems, burning ewaste releases carcinogens, reclaiming precious metals damaging to workers

52
New cards

responsible recycling

reduces chance of chemical leakage, recovers valueable and non

53
New cards

reducing environmental impact of digital devices

improve energy efficiency, site data centres in places where they can be fuelled by renewable power

54
New cards

IoT device ethical concern

may be given to third parties because unclear who owns data

55
New cards

AI

intelligent behaviour and actions normally associated with humans coming from computer systemsl

56
New cards

biased AI

biased training data, biases amplified by algorithms, programmers coding in prejudice

57
New cards

accountability in AI systems

designed to make autonomous decisions

58
New cards

IP

any unique creation of the human mind

59
New cards

creative commons license

allows use of product, but with certain constraints imposed

60
New cards

propriety software

source code legally protected by copyright, better tested so less bugs

61
New cards

malware

short for malicious software, desgined to cause damage or disruption, or to gain access to sensitive data

62
New cards

social engineering

exploits human behaviour and emotions to gain sensitive information or download malware

63
New cards

pretexting

pretending to be an organisation, with an invented pretext

64
New cards

social engineering more of a threat as no technical knowledge is needed