Computing Theory

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:58 PM on 4/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

60 Terms

1
New cards
What is the purpose of the Control Unit (CU)?
It sends signals to other components to coordinate the Fetch-Decode-Execute (FDE) cycle.
2
New cards
3
New cards
What is the role of the Arithmetic Logic Unit (ALU)?
It carries out calculations (+, -, *, /) and logical comparisons.
4
New cards
5
New cards
What are registers?
Small, fast memory cells within the CPU used for temporary storage of data and interim results.
6
New cards
7
New cards
What is the function of the Address Bus?
It carries the memory location of a piece of data or an instruction from the CPU to RAM (it is uni-directional).
8
New cards
9
New cards
What is the function of the Data Bus?
It carries a piece of data or an instruction between the CPU and memory (it is bi-directional).
10
New cards
11
New cards
What is the function of the Control Bus?
It carries read/write signals to coordinate the FDE cycle.
12
New cards
13
New cards
What happens during the 'Fetch' stage of the FDE cycle?
The memory address of the next instruction is placed on the address bus, and the instruction is moved from RAM to the CPU via the data bus.
14
New cards
15
New cards
What determines the clock speed of a CPU?
The frequency of pulses sent by the clock
16
New cards
17
New cards
How do you convert Hexadecimal to Binary?
Convert each Hex digit into its 4-bit binary equivalent (e.g., A = 1010, F = 1111).
18
New cards
19
New cards
How do you convert Binary to Hexadecimal?
Group the binary bits into sets of four (starting from the right) and convert each group into its hex equivalent.
20
New cards
21
New cards
What is a Logical Shift Left?
Moving all bits to the left and filling the empty right-hand spots with 0s
22
New cards
23
New cards
What is a Logical Shift Right?
Moving all bits to the right and filling the empty left-hand spots with 0s
24
New cards
25
New cards
What is an Arithmetic Shift Right?
Moving bits to the right while preserving the sign bit (the leftmost bit) to maintain the value of a negative number in two's complement.
26
New cards
27
New cards
What is Two's Complement used for?
A method used to represent signed (positive and negative) integers in binary.
28
New cards
29
New cards
What is secondary storage?
Long-term, non-volatile storage used for programs and data.
30
New cards
31
New cards
How does Magnetic storage work?
A drive with moving parts that uses magnetic states on a chemical coating to represent 0s and 1s.
32
New cards
33
New cards
How does Solid State (SSD) storage work?
It stores data as electric charges on NAND flash memory with no moving parts.
34
New cards
35
New cards
What is the purpose of an Operating System (OS)?
To manage hardware and software, including file management, process management (paging), and peripheral management.
36
New cards
37
New cards
What is virtual memory?
A technique where inactive processes are moved from RAM to secondary storage to free up space when RAM is full.
38
New cards
39
New cards
40
New cards
What is decomposition?
Breaking down a complex problem into smaller, more manageable subproblems.
41
New cards
42
New cards
What is abstraction?
Removing or hiding unnecessary details from a problem to focus on the core issue.
43
New cards
44
New cards
What is the difference between a function and a procedure?
A procedure completes a task
45
New cards
46
New cards
How does a Linear Search work?
It starts at the first position and compares each item with the target until a match is found or the end of the list is reached .
47
New cards
48
New cards
How does a Bubble Sort work?
It compares adjacent values and swaps them if they are in the wrong order, repeating until a full pass occurs with no swaps.
49
New cards
50
New cards
What is Phishing?
A social engineering attack where deceptive messages are used to trick victims into revealing sensitive data.
51
New cards
52
New cards
What is shoulder surfing?
Watching someone as they enter sensitive information, such as a PIN or password, to steal it.
53
New cards
54
New cards
What is the purpose of Penetration Testing?
To perform an authorised attack on a network to identify and fix security vulnerabilities.
55
New cards
56
New cards
Why is software patched?
To provide updates that fix security bugs/vulnerabilities and prevent exploitation.
57
New cards
58
New cards
What is an environmental impact of technology manufacture?
Mining for raw materials and the high energy/water consumption required for component production.
59
New cards
60
New cards
How can you reduce the environmental impact of technology?
By extending the replacement cycle (repairing, reconditioning, or donating devices) to reduce e-waste and manufacturing demand.