SQA Higher Computing Science Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

flashcard set

Earn XP

Description and Tags

Terms and Definitions from the SQA Higher Computing Science course

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

Cardinality

The relationship 2 entities have between each other.

Each relationship also has a descriptor.

2
New cards

Dry run testing

Manually stepping through an algorithm without a computer.

Trace tables are an example of this.

3
New cards

Standard algorithm types

Find Max.

Find Min.

Linear Search.

Counting Occurrences.

4
New cards

Formal parameter

Information that has been passed into a function.

5
New cards

Actual Parameter

Information that is going to be passed into a module.

6
New cards

Advantages/disadvantages of using global variables

Often problematic. Errors in code can leave the value itself susceptible to accidental change.

7
New cards

Ways to manage traffic control

Adaptive traffic signals.

Intelligent routing systems.

Driverless cars.

8
New cards

Ways to manage a car management system

Intelligent smart stop systems.

Engine Control unit.

9
New cards

Breakpoint

A marker placed at a line of code in a program to halt execution at that point.

Can be placed where a programmer suspects there is a bug.

10
New cards

Disadvantages of using Bitmap Graphics

Have a very large file size as every pixel requires storage.

When scaled larger the picture will pixelate.

11
New cards

Bandwidth fault

Attacker send a large number of IP packets with the IP faked to take up all the available bandwidth.

12
New cards

Resource Starvation

Attacks aimed at taking up all of one resource (Memory, Disk Space)

13
New cards

Domain Name Service

An attack aiemd at taking down the DNS of a company.

14
New cards

Steps of the fetch execute cycle

  1. Memory address of next instruction is placed on address bus

  2. Processor activates Read Line on control bus

  3. Instruction is fetched from memory location using data bus

  4. Instruction decoded and executed

15
New cards

Factors affecting performance

Number of processors(cores)

Width of Data Bus

Clock Speed

Cache Memory

16
New cards

Main environmental impacts from computers

Heating Systems

Traffic Control

Car management system

17
New cards

Manage heating systems

Knowing when the house is empty

Smart Climate Assistant

Remote control of the heating system

Zoning areas of the house

18
New cards

_ & ?

A single character in an SQL wildcard

19
New cards

LIKE

Term in WHERE statement to enable an SQL wildcard

20
New cards

One to one relationship

Where two tables are linked together where a record in one table is only related to a single record in another table

21
New cards

One to many relationship

Most common type of relationship

A row in table A can have many matching rows in table B. But a row in table B can have only a matching row in table A.

22
New cards

Many to many relationship

Occurs when multiple records in a table are associated with multiple records in another table.

23
New cards

Entity Occurence Diagram

knowt flashcard image
24
New cards

Aggregate functions

AVG()

COUNT()

MIN()

MAX()

SUM()

25
New cards

AVG()

Returns the average value of a numeric field

26
New cards

COUNT()

Returns the number of rows that match the criterias in the WHERE clause.

27
New cards

MIN()

Returns the lowest value of a field.

28
New cards

MAX()

Returns the largest value of a field

29
New cards

SUM()

Returns the total value of a numeric field?

30
New cards

Breakpoint

A marker placed at a line of code in a program to halt execution at that point.

Can be placed where the programmer suspects a bug.

31
New cards

Watchpoint

A way of targeting a specific variable to keep track of during program execution.

32
New cards

Record/class code

class A()

…def_init_(B):

……self.X=””

…….self.Y=0

…….selfZ=0.0

33
New cards

Local variable

Variable is declared inside a function.

34
New cards

Global variable

Variable declared outside of a function.

35
New cards

Advantages/disadvantages of using local variables

Improve maintainability by allowing developers to reuse variable names without conflict.

36
New cards

Purpose of a program

What the program is required to do, usually used to gain an overview of the entire system.

37
New cards

Scope of a program

Involves which deliverables will be created by the end of development.

38
New cards

Assumptions of a program

Beliefs based on previous experience and the information available to you. (Educated guesses)

39
New cards

Boundaries of a program

The limits that help to define what is in the project and what is not. It can also clarify any assumptions made by software developers regarding the request.

40
New cards

Advantages of modularity

Less code has to be written

Allows many people to work on the same program

Code can be stored across multiple files

Functions are short, simple and easy to understand

The same code can be used in many applications

41
New cards

Entity relationship diagram

knowt flashcard image
42
New cards

AS

Word written in the SELECT statement to enable an aggregate function

43
New cards

A = [B]

Written in the WHERE statement to enable an aggregate function

44
New cards

Composite key

A primary key made up of two or more attributes.

Used when no single field is suitable for a primary key.

45
New cards

Compound key

Each attribute that makes up the key is a primary key in another table.

46
New cards

Junction table

Changes a many to many relationship to two one to many relationships instead.

47
New cards

Convert 2’s compliment to Binary

Write out number in standard Binary

Invert the digits

Add 1

48
New cards

Convert Binary to Denary

Invert the number

Add 1

Calculate denary and add a negative symbol

49
New cards

-2n^-1 to (2^n-1)-1

Formula for calculating the range of numbers

50
New cards

Range of Numbers

Do 2^ the number of bits

Divide in half = negative

Take 1 away = positive

51
New cards

Advantages and disadvantages of more bits being allocated to the Exponent

Increased Range

Decreased Accuracy/Precision

52
New cards

Advantages and disadvantages of more bits being allocated to the exponent

Increased Accuracy/Precision

Decreased Range

53
New cards

Processor’s effect on performance

More cores = higher performance because the processor execute more instructions at the same.

54
New cards

Clock speed’s effect on performance

Higher the speed, the faster the performance.

55
New cards

Software development methodologies

Iterative

Adaptive

56
New cards

Iterative development

Client is involved at the beginning and the end

Suitable for larger projects

Predictive

57
New cards

Adaptive development

Client is present at all major stages

Suitable for smaller projects

58
New cards

Effects on performance from width of the data bus

Larger the width the greater the performance as it can transfer more bits at once

59
New cards

Cache Memory’s effect on performance

Uses SRAM whereas RAM uses DRAM. If a computer has to the cache memory, from here the computer can access this instruction faster.

60
New cards

% & * in an SQL wildcard?

0, 1 or many characters.

61
New cards

Calculate the signbit and Mantissa 15 bits of a negative with a positive exponent

Sign Bit. Negative = 1 or Positive = 0

15 bits .Move number to the right of decimal points and fill the rest of the boxes with 0s

Exponent. How many moves to right? Calculate in 8 bit binary.

62
New cards

Unicode

Uses either 16/32 or 64 bits of storage meaning it can show far more characters.

63
New cards

Advantages of Bitmap Graphics

Can be edited at pixel level adding extra details to the image will not increase the file size

Can create photo realistic images

64
New cards

Tracking cookies

Records your details and transmits them back to the author

Used to gather marketing information

65
New cards

Public key

Encrypts the data

66
New cards

Private key

Decrypts the data

67
New cards

Computer Misuse Act actions

Access comptuer material without permission

Access computer material with the intent of commiting futher offences

Modify computer materials without permission

68
New cards

Symptoms and effects of DOS and DDOS attacks

Slow performance

Inability to acces

Disruption to users and business

69
New cards

Costs of DOS and DDOS attacks

Customers not being able to buy goods

Not being able to carry out the organisations business

Having to fix any faults

70
New cards

Reasons for DOS and DDOS attacks

Political

Personal

Reputation

Business

Money

71
New cards

Fetch execute cycle

A series of steps that takes place for a processor to execute an instruction.

72
New cards

Digital signature

Added to information to ensure that the information came from the coreect place.

73
New cards

Digital Certiciate information

The certificate serial number

The expiry date

The name of the holder

A copy of the public key

The digital signature of the certiciate authority.

74
New cards

% or Modulo in Python

Remainder operator

75
New cards

Advantages of modularity

76
New cards