Higher Computing Science - Computer Systems

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:19 AM on 1/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

bit

Binary Digit 0 or 1

2
New cards

Base 2

This is a numbering system that only has two digits. Binary - 0 OFF and 1 ON

3
New cards

denary/decimal

Base 10 numbering system featuring numbers from 0-9

4
New cards

Integer

All whole numbers (both positive and negative) and zero.

5
New cards

Mantissa

Representation of the decimal portion of a floating point number

6
New cards

Exponent

A number indicating how many times the decimal point has been shifted (+ve to the left, -ve to the right)

7
New cards

Address Bus

A uni directional bus that specifies the address location in memory to be read from/written to

8
New cards

ALU

Arithmetic and Logic Unit - Performs all the arithmetical and logical operations inside the processor

9
New cards

ASCII

American Standard Code for Information Interchange - 1 byte code used to represent characters.

10
New cards

Bit depth

bit depth is the size of the binary number needed to represent the colour of an individual pixel in an image

11
New cards

Cache Memory

A small piece of fast static memory use to hold the more commonly used instructions to increase performance

12
New cards

Control Characters

non -printable characters that have an effect on screen such as the tab key, enter key etc.

13
New cards

Data Bus

The data bus is used to carry data to and from the processor/memory.

14
New cards

Dynamic RAM

the more common type of memory. The dynamic refers to the fact that it constantly requires power to refresh its contents. Is it is less complex than static RAM

15
New cards

Fetch execute Cycle

The process of retrieving and executing an instruction from memory.

16
New cards

Floating Point Representation

The method used to store real numbers using a sign bit, mantissa and exponent.

17
New cards

Two's Complement

A system to represent negative integers in binary. The positive number in binary is found, this number is then inverted and then 1 is added to the right hand side of the number.

18
New cards

Unicode

A form of representing text using 8,16 or 32 bits. The larger storage requirements allow for more characters/languages to be represented

19
New cards

Vector Graphics

A method of representing graphics using the attributes of each shape. Such as x,y co-ordinates, radius etc.

20
New cards

Processor Core

A smaller part of a processor which is capable of executing a single task at a time. Modern processors can have multiple cores.

21
New cards

Concurrency

The ability for more than one task/instruction to be executed at the same time.

22
New cards

DOS

Denial of Service attack. DOS attack is an active attack in order to stop a website/online service from providing its services.

23
New cards

Formula for range for two's complement numbers?

from -ve2^n-1 to +ve(2^n-1)-1 where n is the number of bits

24
New cards

Mnemonic: MARE

If you increase the number of bits assigned to the mantissa, the accuracy of numbers you can store increases. If you increase the number of bits assigned to the exponent the range of numbers that you can store increases.

25
New cards

Disadvantage of ASCII

You can only encode a maximum of 256 characters, therefore not all languages can be encoded using ASCII.

26
New cards

Advantages of vector graphics:

1)Smaller file size to bit mapped graphics.

2)Resolution independent - same image quality regardless of the resolution.

3)Individual objects can be easily edited.

27
New cards

Disadvantage of Vector graphics:

They cannot represent photo-realistic images.

28
New cards

Control Unit

It controls the timing of the execution of instructions, ensuring they are completed in the correct order.

29
New cards

3 types of information that can be stored in a register

Data, Instructions and Addresses

30
New cards

interrupt

An instruction that forces the CPU to halt the execution of the current operation to handle the interrupt.

31
New cards

What are the steps in the fetch execute cycle?

1)The memory address of the next instruction is placed on the address bus.

2)Read line is activated.

3)The instruction is transferred to the processor on the data bus.

4)The instruction is decoded and executed.

32
New cards

What are the steps of the memory read operation?

1)The MAR is set up with the address that is to be accessed.

2)The address location is transferred on the address bus.

3)Read line activated.

4)The instruction is placed on the data bus and taken to the processor.

5)The instruction is then placed on the MDR

6)It is decoded and executed.

33
New cards

What are the steps of the memory write operation?

1)MAR set up with address location to be written to.

2)MDR set up with data to be written.

3)Address bus set up with address location, from MAR.

4)Data bus set up with data to be written, from MDR.

5)Write line is activated.

6)data on data bus is placed in memory location specified by the address bus.

34
New cards

Types of RAM

Dynamic RAM (DRAM) - typically called main memory, has to be refreshed regularly.

Static RAM (SRAM) - cache memory, very fast access time.

35
New cards

When does a cache hit occur?

When requested data or instruction is found within the cache memory, it is accessed within a couple of clock cycles.

36
New cards

When does a cache miss occur?

When requested data or instruction is not found within the cache, it will need to be accessed from memory which has a slower access time.

37
New cards

How do we optimise cache use?

1)CPU will fetch the next memory location to the one being asked for.

2)A hardware pre-fetcher can load 256 bytes after the line has been loaded.

3)This pre-fetch can be triggered when successive cache misses occur, so frequently used instructions will be cached.

38
New cards

Order memory size from smallest to largest:

Register, Cache, Memory, Backing storage

39
New cards

Order speed of access from fastest to slowest:

Register, Cache, Memory, Backing storage

40
New cards

How to increase system performance?

1)Increasing clock speed.

2)Increasing RAM

3)Adding multiple CPU cores.

4)Increasing data bus width.

5)Increasing cache memory.

41
New cards

How does increasing clock speed improve system performance?

Allows the CPU to execute more instructions per second. However cannot be increased too much since the processor will overheat.

42
New cards

How does increasing data bus width improve system performance?

It allows more data to be moved in a single operation, so less operations are required to complete tasks.

43
New cards

How does increasing cache memory improve system performance?

It allows to store more frequently used instructions and reduce the amount of memory read operations from RAM, which has a slower access time.

44
New cards

What are the 3 offences under the computer misuse act?

1)Gain unauthorised access to a computer system.

2)Gaining unauthorised access to a computer system with the intent to commit a further crime.

3)Unauthorised modification of data and files.

45
New cards

What are tracking cookies?

A small file placed on a user's computer that monitors their browsing history and habits, can be read/altered on next visits of websites. Used by marketers to create a user profile, to display ads that you are more likely to click on.

46
New cards

How does bandwidth consumption DOS attack work?

An attacker floods your server with packets of information that the server needs to respond to, consuming network bandwidth.

47
New cards

How does a Resource starvation DOS attack work?

A server has finite amount of resources such as backing storage and memory. An attack will try to exhaust these services. e.g. Continually creating new user accounts, Spamming an email server to use up all backing storage.

48
New cards

How does a DNS attack work?

A DNS server resolves the URL into an IP address. An attacker may try to cause the

DNS server to route traffic to a target server, can consume bandwidth of target server and denies user access to the website they want to visit.

49
New cards

DDOS Attack

Distributed Denial of Service Attack. Typically a virus/program/botnet installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

50
New cards

What are the costs of a DOS attack?

1)Loss of revenue due to website downtime.

2)Determining the nature of the attack.

3)Payment for labour to repair the damages of the attack.

4)Payment for labour to implement new safeguards.

51
New cards

Reasons for DOS attacks:

1)blackmail - for money

2)political - you don't agree with their views

3)Grudge - ex.employee, ex partner.

4)Against a rival company.

52
New cards

What is symmetric encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

53
New cards

What is asymmetric encryption?

An encryption method where two keys are used. A public key which is used to encrypt data and is made public. A private key which is used to decrypt messages and is kept secret.

54
New cards

What is a digital certificate?

A digital version of passport that confirms the identity of a person or organisation. This allows individuals and companies to feel secure in exchanging information as they can confirm each other's identities.

55
New cards

What is a digital signature?

A digital signature (not to be confused with a digital certificate) is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document..

56
New cards

How do you make a digital signature?

1)Obtain a message hash of the contents of the message.

2)Encrypt the hash with your private key.

3)attach it to the message.