1/20
These flashcards cover key concepts from computer architecture, processor types, data types, and software concepts to aid in exam preparation.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The FDE cycle consists of three main stages: Fetch, , and Execute.
Decode
The holds the address of the next instruction to be executed.
Program Counter (PC)
During the Fetch stage, the address from the PC is copied into the .
Memory Address Register (MAR)
The temporarily holds the instruction that is to be executed after being fetched from memory.
Current Instruction Register (CIR)
In the CPU, the performs arithmetic and logic operations.
Arithmetic Logic Unit (ALU)
The is a small, high-speed storage location that temporarily holds data, instructions, or addresses.
Register
The interprets instructions fetched from memory to control the execution of the program.
Control Unit (CU)
The bus is unidirectional and sends memory addresses from the CPU to RAM.
Address Bus
The architecture features separate memory locations and buses for instructions and data.
Harvard
In a architecture, the same memory is used for both instructions and data, which can cause bottlenecks.
Von Neumann
Increasing the clock speed of a CPU can lead to overheating if pushed beyond .
specification
refers to the simultaneous execution of multiple instructions by different cores in a CPU.
Parallel Processing
A common characteristic of processors is that they have a large and complex instruction set.
CISC
_ memory is volatile, meaning it loses its data when power is turned off.
Random Access Memory (RAM)
is the process of reducing the file size by removing non-essential data, often irreversibly.
Lossy Compression
In a relational database, a is a unique identifier for each record.
Primary Key
is the architecture model where each node has equal status and functions both as a client and a server.
Peer-to-Peer Model
Data transmitted over a WAN can be sent using which splits it into packets for efficiency.
Packet Switching
The model allows many users to share the resources of a single powerful machine.
Multi-user Model
encryption uses both public and private keys for secure data transmission.
Asymmetric
The advantages of using include fast development and user involvement, making it suitable for dynamic projects.
Agile Development