• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/62

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

62 Cards in this Set

  • Front
  • Back

What is a computer system?

Any system of which data can be inputted, processed and outputted.

What is a special-purpose machine?

Special Purpose Machines are computing systems that are designed to do one thing.

What are binary number?

Binary numbers are numbers that are in the base 2 number system consisting of 1's and 0's, these are the numbers that computers understand.

What is overflow?

Overflow is when the answer of an addition or subtraction problem exceeds the magnitude which can be represented with the allotted number of bits.

Why 1's and 0's?

The 1 and 0 digits in binary correspond to the on and off states of a transistor.

What are denary numbers?

Denary/Decimal numbers are numbers that are part of the base 10 number system, that we use in everyday life.

What is bit depth?

The number of bits available to store something.
e.g. Images and audio files have bit depth.

Examples of bit depth. (Just turn over).

A 1-bit system uses combinations of numbers up to one place value. There are just two options: 0 or 1. There fore the bit depth is 2.


A 2-bit system uses combinations of numbers up to two place values. There are four options: 00, 01, 10 and 11.

What is the CPU?

CPU - is the 'brain' of the computer and executes instructions using the fetch-decode-execute cycle.

What is Memory?

* Memory - stores program operations and data while a program is being executed. There are several types of memory, including: registers, cache, RAM and virtual memory.

What is storage?

* Storage - stores programs and files long term, even when they are not in use. Devices such a shard drives, USB memory sticks or SD cards are used to store files such as photos, music and software applications long term.

What is the GPU?

The GPU is responsible for handling images and frees the CPU to do other tasks.

What affects CPU performance?

CPU (clock) speed, the amount of cores, the processor type, memory/cache memory size and bus speeds all affect the CPU'S performance

What is inside a core?

An ALU (Arithmetic Logic Unit).


A Control Unit.


And registers.

How do cores communicate?

Cores communicate through channels.

Examples of cores and channels communicating.

What is the type of speed that measures how fast the CPU can run and what is it's unit?

Clock speed/Clock rate and it is measured Hz.

What is cache and what does it do?

Cache is a small amount of memory which is a part of the CPU. It is used to temporarily hold instructions and data that the CPU is likely to reuse, saving the CPU from fetching the same data and instructions from RAM repeatedly.

What is Level 1 (L1) cache?

* L1 is usually part of the CPU chip itself and is both the smallest and the fastest to access. Its size is often restricted to between 8 KB and 64 KB.

Explain L2 and L3 cache.

* L2 and L3 caches are bigger than L1. They are extra caches built between the CPU and the RAM. Sometimes L2 is built into the CPU with L1. L2 and L3 caches take slightly longer to access than L1. The more L2 and L3 memory available, the faster a computer can run.

Name the two processor types?

CISC - Complex Instruction Set Computing architecture made by Intel and AMD.



RISC - Reduced Instruction Set Computing, used by smartphones and from ARM architecture.

Compare the differences in instructions, speed, size, cost, energy consumption and design of RISC and CISC.

The key differences between the two CPUs are:

* Instructions - RISC has fewer instructions than CISC. CISC generally have hundreds of instructions whereas RISC usually has a lot less. To do complex tasks, RISC CPUs must combine simple operations from their reduced instruction set. The instruction cycle in CISC is more complex than RISC, so RISC can be more efficient at performing simpler tasks.
* Physical size - in order to handle all those instructions CISC CPUs are larger and require more silicon to make.
* Speed - RISC CPUs run at a lower clock speed than CISC CPUs. They can perform simpler tasks more quickly than CISC, but more intensive tasks will be better on a CISC CPU. However, smartphones and tablets are generally not used to do intensive tasks like playing the most hi-spec advanced games.
* Energy consumption - because CISC CPUs are larger, they use more electricity. RISC CPUs are designed to use less power and they can go into 'sleep mode' when not actively processing a program.
* Design - smartphones and tablets combine their processing architecture into a system on a chip (SOC). As RISC CPUs are much smaller than CISC, more functions (including the memoryand other hardware) can be combined with the CPU in one chip. CISC CPUs are usually built into a system which has a heat sink and fan to cool them down. Smartphones or tablets do not have space for heat sinks or fans.
* Cost - RISC CPUs use less power and are cheaper to make.

What is ASCII?

ASCII (American Standard Code for Information Interchange) is the most common, standard format for text files in computers and on the Internet.

How are characters represented in ASCII files?

In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of seven 0s or 1s). 128 possible characters are defined.
However the computer interprets the character in 8 bits for ease.

What are the limitations of ASCII?

Only letters and numbers in the English language are defined leading to miscommunication in regards to foreign languages.

How can this be solved?

By using a two byte (16-bit) character set such as unicode which allows for 65, 000+ characters.

How does unicode handle different languages?

By dividing the total 'unicode space' into code pages which are sections for different languages.

What is a character set?

A defined list of characters recognized by the computer hardware and software. Each character is represented by a binary number.

What are hexadecimal numbers?

Hexadecimal numbers are numbers that are part of the base-16 number system and it is by humans to simplify how binary numbers are represented.

What numbers are part of the hexadecimal number system?

0 1 2 3 4 5 6 7 8 9 A B C D E F

When is hexadecimal used?

* colour references
* assembly language programs
* error messages

How do you convert from decimal to hex.

Convert from binary to decimal, then decimal to hexadecimal.

How do we convert from binary to hex?

Split the binary number into two nibbles, find the corresponding hex value for each nibble and 'paste' them together.

How do we convert from hexadecimal to decimal?

The first the number is in the 1's column and the second is in the 16. Times the corresponding numbers by their column headers and add them together.
e.g.

|16|1|


-----------


|3 | A |



3 x 16 = 48


A = 10, 10 x 1 = 1
48 + 10 = 58

What are networks?

A network is created when more than one device is connected together. Computers in a network can share data that are in the shared domain in the form of data packets.

What are data packets?

Data packets are files that have broken up into chunks of data to be transmitted over a network. The data is then rebuilt once it has reached the destination computer.

What are network protocols?

Protocols are a set of guidelines that govern how data is broken up into data packets and transmitted over a network.

Name some advantages of networks.
(Four Points)


Advantages

* Communication – it is easy (and often free) to communicate using email, text messages, voice calls and video calls.
* Roaming – if information is stored on a network, it means users are not fixed to one place. They can use computers anywhere in the world to access their information.
* Sharing information – it is easy to share files and information over a network. Music and video files, for instance, can be stored on one device and shared across many computers, so every computer does not need to fill the hard drive with files.
* Sharing resources – it is easy to share resources such as printers. Twenty computers in a room could share one printer over a network.
* Sharing software – it is possible to stream software using web applications. This avoids needing to download and store the whole software file.
*

Name some disadvantages of networks?


(Four Points)

Disadvantages

* Dependence – users relying on a network might be stuck without access to it.
* Hacking - criminal hackers attempt to break into networks in order to steal personal information and banking details. This wouldn't be possible on a stand-alone computer without physically getting into the room, but with a network it is easier to gain access.
* Hardware – routers, network cards and other network hardware is required to set up a network. At home, it is quite easy to set up a wireless network without much technical expertise. However, a complicated network in a school or an office would require professional expertise.
* Viruses - networks make it easier to share viruses and other malware. They can quickly spread and damage files on many computers via a network.

Name three different types of networks.

LAN, WAN, VPN, WPAN and PAN are all types of networks.

What is LAN?

A LAN (local area network) is a network of computers within the same building, such as a school, home or business. A LAN is not necessarily connected to the internet.

What is a WAN?

A WAN (wide area network) is created when LANs are connected. This requires media such as broadband cables, and can connect up organisations based in different geographical places. The internet is a WAN.

What is a VPN?

A VPN (virtual private network) is usually hosted securely on another network, such as the internet, to provide connectivity. VPNs are often used when working on secure information held by a company or school.

What is WPAN?

A WPAN (wireless personal area network) allows an individual to connect devices (such as a smartphone) to a desktop machine, or to form a Bluetooth connection with devices in a car. A wired personal network is called a PAN (personal area network).

What are the three different network topologies?

Bus, Ring and Star.

Describe the design of a bus network.

In a bus network all the workstations, servers and printers are joined to one cable - 'the bus'. At each end of the cable a terminator is fitted to stop signals reflecting back down the bus.

State the advantages to the bus topology.

Advantages


* easy to install
* cheap to install - it does not require much cabling

State the disadvantages to the bus topology.

Disadvantages


* if the main cable fails or gets damaged, the whole network will fail
* as more workstations are connected, the performance of the network will become slower because of data collisions
* every workstation on the network 'sees' all of the data on the network, which can be a security risk

Describe the design of a ring network.

In a ring network, each device (eg workstation, server, printer) is connected in a ring so each one is connected to two other devices. Each data packet on the network travels in one direction. Each device receives each packet in turn until the destination device receives it.A

State an advantage to the ring topology.

Advantages

* this type of network can transfer data quickly (even if there are a large number of devices connected) as data only flows in one direction so there won't be any data collisions

State a disadvantage to the ring topology.

Disadvantages

* if the main cable fails or any device is faulty, then the whole network will fail - a serious problem in a company where communication is vital

Describe the design of a star network.

In a star network, each device on the network has its own cable that connects to a switch or hub. This is the most popular way of setting up a LAN. You may find a star network in a small network of five or six computers where speed is a priority.

State two advantages of the star topology.

Advantages

* very reliable – if one cable or device fails, then all the others will continue to work
* high performing as no data collisions can occur

State three disadvantages of the star topology.

Disadvantages

* expensive to install as this type of network uses the most cable, and network cable is expensive
* extra hardware is required - hubs or switches - which add to the cost
* if a hub or switch fails, all the devices connected to it will have no network connection

Connections between computers on a network can be... (please complete).

Wired or wireless.

What is needed for wired connections.

Ethernet cables which connect to the Ethernet port of devices. E.g. Computers connect to wireless routers with a ethernet cable.


What is needed for wireless connections?


A computer with a network interface card and a wireless router.


State the advantages of wireless networks.

Advantages

* cheap set-up costs
* not tied down to a specific location
* can connect multiple devices without the need for extra hardware
* less disruption to the building due to no wires being installed

State the disadvantages of wireless networks.

Disadvantages

* interference can occur
* the connection is not as stable as wired networks and can 'drop off'
* it will lose quality through walls or obstructions
* more open to hacking
* slower than wired networks

What is a router?

A device which forwards data packets to their destinations via the most efficient route.

What is a repeater and why do we use it?

Signals fade as they travel from one place to another and each type of cable used for networking has a maximum useable length. Repeaters are set in places that ensure that the cables never meet/exceed their maximum length and boost their network signal back up to its' correct level.

What is a bridge?

A bridge joins one network to another so as far as data packets are concerned it is just one large network.