Computer Science A Level QUiz

?
Which special-purpose register is in the Control unit?
Current Instruction Register
1 of 246
Where do calculations get carried out?
Accumulator
2 of 246
Where is the fetched data from memory temporarily held?
Memory Data Register
3 of 246
Where is the instruction from the MDR copied to?
Current instruction register
4 of 246
Where is the CIR
Control Unit
5 of 246
Purpose of control unit
Control and coordinates the activities of the CPU
6 of 246
Does the Control unit direct the flow of data between the CPU and other devices
Yes
7 of 246
What is a bus?
Set of parallel wires connecting two or more components of a computer
8 of 246
How many busses are used to connect the Processor to memory?
3
9 of 246
When the processor uses the Address bus, what is it trying to do?
Access a certain part of memory
10 of 246
What does the data bus do
Transmit data between CPU and memory
11 of 246
Control signals are sent through what?
Control bus
12 of 246
What is the system bus
Collection of Control, Data and address buses
13 of 246
The system bus connects the CPU, memory and ___.
input/output controllers
14 of 246
The data travels in both directions in the ____ and ____ buses.
Control and Data
15 of 246
The Address bus connects
Processor and Memory
16 of 246
Why do we need the control bus?
Data and address buses are shared between all components of system. Control bus makes sure there is no conflict.
17 of 246
Purpose of control bus
Transmit command, timing and specific status information between components
18 of 246
What is NOT a control line
Bus emit
19 of 246
What is the Clock control line for?
synchronising operations
20 of 246
What are words??
A unit of memory handled by the processor
21 of 246
Do Words have memory addresses
YES!!
22 of 246
What is used to transmit the memory address of a word
The address bus
23 of 246
Are all words the same size
No
24 of 246
What is the purpose of the ALU
perform arithmetic and logical operations on data
25 of 246
What are registers?
Special, super-fast memory cells
26 of 246
What are registers used for
Arithmetic, logic, or shift operations (replace accumulator)
27 of 246
How many registers do Computers normally have?
16
28 of 246
What is the accumulator
A single general purpose register
29 of 246
what does FDE stand for
Fetch, Decode, Execute
30 of 246
What does the system clock do?
Switches between 0 and 1 several million times a second, generating signals to synchronise the CPU
31 of 246
When does each CPU operation begin?
When the clock changes from 0 to 1
32 of 246
Can CPU operations perform faster than the clock?
No
33 of 246
Can some activities take longer than 1 clock cycle?
YEs
34 of 246
What is a core?
Basically a single processor that can run the FDE cycle
35 of 246
Will 2 cores be double the speed of 1 core
No - software cannot take full advantage
36 of 246
What is Cache
Very expensive, fast memory in RAM
37 of 246
What is cache used for
Saving recently fetched instructions, in case they get needed again
38 of 246
Level 1 Cache
fastest, but smallest
39 of 246
In Level 1 Cache....
Memory is split into instruction cache and data cache, so that instructions and associated data can be fetch simultaneously
40 of 246
In Level 2/3 Cache...
it is used for prefetch, loading instructions and data from RAM
41 of 246
In Level 3 Cache....
it is used in multi-processing and shared between cores
42 of 246
What is a thread?
A series of instructions that can be run by one core
43 of 246
What is in-built redundancy
Refers to cores having duplicated components so they can run multiple threads
44 of 246
What is parrallel processing
When several cores work at the same time
45 of 246
What is multitasking?
When Programs and threads are in execution together, but are actually run in turn, to give the illusion of parallel processing
46 of 246
what is Multiprocessing?
programs run at the same time on different cores
47 of 246
What is multi threading/parallel processing
A single problem being broken down into multiple that are run at the same time on different cores
48 of 246
What is pipelining?
Technique used by processors to improve performance
49 of 246
how does pipelining work?
Tries to avoid idle components. Whilst the ALU is doing operations, the next instruction is being fetched.
50 of 246
What is the buffer in pipelining used for?
Where the fetched instructions are stored, until the ALU is finished
51 of 246
Pipelining can be divided into:
Instruction and arithmetic pipelines
52 of 246
The instruction pipeline consists of stages in which:
an instruction is moved through the processor
53 of 246
Does the width of the address bus dictate the max capacity of system memory
Yes. The size of memory is limited by the amount of addresses the bus can pass
54 of 246
Does the width of the data bus dictate the largest amount of data in a word?
Yes. It is the largest amount of data that can be transferred
55 of 246
What is the principle idea of Von Neumann Architecture
Details the use of a processor, where a shared memory and bus get used for data AND instructions
56 of 246
What is the stored program concept?
Machine code instructions are fetched from memory one at a time, decoded and executed in the processor.
57 of 246
In the Von Neumann machine, what statement is not true:
The Computer uses different word lengths
58 of 246
What is the main concept behind Harvard architecture?
There is physically separate memories for data and instructions
59 of 246
Where is Harvard architecture mainly used?
Digital signal processing (dsp) systems. (working with audio waves etc.)
60 of 246
In Harvard arch, Can the memories have different characteristics like word size etc.
Yes
61 of 246
Why can Harvard Arch be faster?
Memories dont have to compete for the same buses
62 of 246
Contempary processor architecture is ____
The use of both Harvard and Nuemann ideas
63 of 246
In contemporary processor architecture, how is cache organised?
Divided into instruction and data cache
64 of 246
CISC stands for
Complex instruction set computers
65 of 246
CISC is ____ than RISC
older
66 of 246
In CISC,
a single assembly line equates to a large number of sub routines
67 of 246
In CISC,
Complex instructions are built into the hardware
68 of 246
In CISC the compiler has to do ____ work to translate a high level statement to machine
little
69 of 246
Because the code is short litttle ___ is required
RAM
70 of 246
In CISC, ____ instructions are left unused
many
71 of 246
RISC stands for
Reduced instruction set computer
72 of 246
In RISC each instruction is short and takes only ______
One clock cycle
73 of 246
Co-processor systems have an extra-processor to
supplement the primary processor
74 of 246
A GPU is good at rendering images, as ____
It has massively parallel architecture
75 of 246
Barcodes are useful for
Tracking objects
76 of 246
1D Barcodes refer to
Linear codes
77 of 246
2D Bar codes refer to
Quick Response Codes
78 of 246
2D barcodes store ___ data than 1D
more
79 of 246
Pen-type readers are _____
Dragged across the barcode
80 of 246
Pentype readers are ____ durable
Very
81 of 246
Laser scanners are very _____
Economical
82 of 246
What is application software?
End-user programs that perform specific tasks
83 of 246
What is systems software?
Programs that allow interaction between user, User-end programs and hardware
84 of 246
Analysis is the process of
defining a problem
85 of 246
What is black box testing also known as?
functional testing
86 of 246
What does black box testing mean?
testing the program independently of the code, focusing on its specification
87 of 246
What does white box (structural testing) refer to?
testing the code logic and program structure, rather than function
88 of 246
What is Alpha testing?
Testing carried out by in-house team, ensuring program provides functionality
89 of 246
Beta testing is...
the process of giving the product to possible users to find bugs
90 of 246
Implementation is....
The process of coding the program
91 of 246
Evaluation is..
The measurement of usability, effectiveness and maintainability
92 of 246
A critical review of a program months after release is called ___
a post-implementation review
93 of 246
The waterfall model describes a development process, where____
each development stage is completed one after another
94 of 246
Does the waterfall model allow for much user-input after the start of the process?
No
95 of 246
Spiral models solve problems in ___ steps
iterative
96 of 246
In Spiral models one whole ______ is completed for each prototype
Design cycle
97 of 246
Spiral models are used for _____ projects
large
98 of 246
Agile development allows stages to be completed in a non____ sequence
Linear
99 of 246
Agile modelling allows
Fast feedback from users
100 of 246
Extreme programming improves
productivity
101 of 246
Rapid application development is used
to avoid changing technology and demand making product useless
102 of 246
Waterfall cycle is useful in
very small projects that need supervison
103 of 246
Spiral and agile approaches are
better than waterfall in terms of feed back
104 of 246
EP and RAD are good when
you dont want to get bogged down by feedback
105 of 246
What is not an algorithm type
Developing consciousness
106 of 246
What is not an advantage of OOP?
OOP is faster to process, as data structures take up less space in cache
107 of 246
Now, Each assembly language instruction translates into ___ machine code instruction(s)
one
108 of 246
The ____ translates an assembly language program into machine code
assembler
109 of 246
What does ADD refer to?
Add the contents of the memory address to the accumulator
110 of 246
What does STA refer to?
Stores value from Accumulator in memory address
111 of 246
What does BRZ refer to
Branches if accumulator == 0
112 of 246
What does HLT refer to?
Stops execution of program
113 of 246
What is immediate addressing?
Where the operand is the actual value to be operated on
114 of 246
What is direct addressing?
Where the operand contains the memory address of the value being operated on
115 of 246
What is CD-ROM
a read only disk
116 of 246
What is CD-R?
recordable
117 of 246
What is CD-rw
Rewriteable
118 of 246
Why is compression helpful (most important reason)
Means files take less time to transfer
119 of 246
Lossy compression...
Involves removing unnecessary data
120 of 246
Lossless compression...
retains all information, but records repeating patterns in data
121 of 246
MP3 files use ____ compression
Lossy
122 of 246
WAV files use ____ compression
Lossless
123 of 246
The process of recording repeating patterns in pixels of an image is ____
Run Length Encoding
124 of 246
Dictionary based compression uses dictionaries to....
Store numerical values in place of words
125 of 246
Vernam Cipher uses a key that is ______
Equal or larger in size than the plain text
126 of 246
Vernam Cipher is ____ to solve
near impossible
127 of 246
the Vernam Cipher uses ___ gates
XOR
128 of 246
In order to be impossible to crack, a Vernam Cipher key must be ___
truly random
129 of 246
Symetric encryption uses ___ ______ key to encrypt and decrypt data
the same
130 of 246
In Asymmetric encryption, plain text is encoded by the _____ public key
Recipient's
131 of 246
A hash value is calculated using _____
The message data
132 of 246
Hash functions are ____
irreversible
133 of 246
Digital signatures are created using
Hash values
134 of 246
the recipient of a message checks the signature by ____
creating a hash total of the message and comparing it to the signature
135 of 246
Digital Certificates verify
trustworthiness of sender
136 of 246
Digital Certificates operate
during the transport layer
137 of 246
A husband and wife is a...
one-to-one relationship
138 of 246
A Mother and Child is a
one-to-many relationship
139 of 246
A student and lesson is a
many-to-many relationship
140 of 246
An entity is
a category of thing where data is to be recorded
141 of 246
A flatfile database ______
Consists of one file
142 of 246
A flat file database is not good at
Storing info on more than one entity
143 of 246
Entities have different properties called....
Attributes
144 of 246
Entities are uniquely identified using ____
A primary key
145 of 246
A primary key
is unique
146 of 246
Secondary keys are used ____
To help index entities and search the database
147 of 246
In relational databases,
a separate table is created for each entity
148 of 246
A foreign key....
is the attribute that creates a link between two tables
149 of 246
A foreign key is the
primary key from an entity in another table
150 of 246
Composite keys are
Primary keys made from multiple attributes
151 of 246
Referential integrity describes
The process of ensuring a referenced foreign key still exists
152 of 246
A record is ____
One row of the table
153 of 246
An index of ______ is maintained by the database software
Primary keys
154 of 246
Normalisation is _____
The process used to design the best possible relational databse
155 of 246
1NF describes a database where....
There are no repeating attributes and attributes aren't grouped
156 of 246
A link table is used for
many-to-many relationships
157 of 246
2NF requires the table to be in 1NF and...
contains attributes full dependent on the whole key
158 of 246
A table is in 3NF
if it has no non-key attributes
159 of 246
Normalisation is important, as....
It removes data redundancy
160 of 246
Normalised tables are faster to search through, as...
They are smaller and have less fields
161 of 246
The internet is a network of _____
networks
162 of 246
The world wide web is
A collection of web pages stored on computers connected to the internet
163 of 246
Each continent is connected to the internet through ____
transcontinental leased lines
164 of 246
A uniform resource locator stores _____
the address of a resource on the internet
165 of 246
ISPs refer to
Internet Service Providers
166 of 246
Internet Registrars...
Hold records of all existing website names and allow individuals to purchase domains
167 of 246
Internet Registries...
The five global organisations with worldwide databases that hold records of all the domain names currently issued
168 of 246
Internet registries are governed by the...
ICANN
169 of 246
A _____ identifies the area of domain that a resource resides in
domain name
170 of 246
Domain names are structured in a hierarchy dictated by the rules of the
DNS
171 of 246
The domain system stops people in another country having access to redundant domain names, as....
it allows different TLD's to be split into different servers
172 of 246
Each domain name has ______ equivalent IP address(es)
one or more
173 of 246
the ___ catalogues all the domain names and IP addresses
DNS
174 of 246
When a webpage is requested using URL, the browser uses the ____ to fetch the IP from the DNS
domain name
175 of 246
A fully qualified domain name includes...
the host server name
176 of 246
An IP address is a unique address assigned to...
Network devices
177 of 246
WAN relies on
Third party carriers or connections
178 of 246
LAN...
Consists of devices on a single site or building
179 of 246
An advantage of bus topology...
inexpensive to install, as it require less hardware
180 of 246
An advantage of star topology...
if one cable fails, the rest of the network is safe
181 of 246
Physical topology describes...
its actual design layout
182 of 246
Logical topology describes...
The shape of the path the data travels in
183 of 246
WIFI is a ____ area resource technology
local
184 of 246
WIFI connects your device to the internet via a:
Wireless Network Access Point
185 of 246
To connect to a wireless network, a computer needs a...
wireless network adaptor
186 of 246
The combination of computer and interface is called...
A station
187 of 246
All stations share a single _____ that they constantly pick up transmissions from
radio frequency communication channel
188 of 246
Mesh networks describe a system where...
each node has a connection to every other node
189 of 246
Circuit switching describes a process, where
a direct link is created between devices for the duration of communication
190 of 246
Packet switching describes a process where
data is communicated along a network, on which other devices are also using to communicate
191 of 246
Data packets are...
manageable chunks of data that make up a larger data item being communicated
192 of 246
Every data packet contains a ____ and _____
header and payload
193 of 246
Packets are sent
individually
194 of 246
Routers....
act as a traversal point for packets
195 of 246
Routers read the ____ of the recipient, so they can choose the fastest route to send the packet
Ip address
196 of 246
In order to for a packet to use a router for hopping, the networks must...
Share the same protocol
197 of 246
_____ are used to transfer packets between Networks using different protocols
Gateways
198 of 246
Gateways work by replacing the ___ data of the packet
Header
199 of 246
Every device capable of being on a network must have a ___
NIC
200 of 246
Each NIC has a unique ____
MAC
201 of 246
A protocol is ______
a set of rules defining methods of data communication
202 of 246
HTTP and TCP/IP are forms of ______
protocol
203 of 246
TCP/IP stack is a set of protocols that work as ___ layers
4
204 of 246
Which is not a layer in the TCP/IP stack?
Control
205 of 246
As a packet moves down the TCP/IP stack, protocols _____ the data
wrap/encapsulate
206 of 246
As a packet moves back up the four TCP/IP layers, the data gets _____
unwrapped
207 of 246
Application layer ....
Sits at the top of the stack ad uses protocols relating to the application being used (browser etc.)
208 of 246
Transport layer
establishes an end-to-end connection with the recipient
209 of 246
The Transport layer...
splits data into packets, labelled with packet number, num of packets and target port.
210 of 246
The Network layer...
adds the source and destination IP addresses
211 of 246
A socket is made of....
an IP and port number
212 of 246
a socket specifies
which device the packet must be sent to and the application being used
213 of 246
The link layer
adds the MAC addresses of the sender's and recipient's NIC
214 of 246
When the packet arrives at a destination the TCP/IP layer ...
is reversed
215 of 246
_______ act as a virtual post office for incoming and outgoing emails
a mail server
216 of 246
POP3 is responsible for
retrieving emails from a mail server
217 of 246
In POP3, when the mail has been transferred to your computer, the server___
deletes the mail
218 of 246
IMAP ______
keeps all mail on the server
219 of 246
Simple mail transfer protocol is used to ___
transfer emails from one server to another
220 of 246
search engines
are systems that locate resources on the internet
221 of 246
Web crawlers are used to _____
build an index of web pages on the internet
222 of 246
on the www, ____ are used to rank pages in a lsit of relevance
indexes
223 of 246
Key words and phrases in web pages are used by search engines to
match with a user's search terms
224 of 246
_____ are a list of keywords/phrases built into web pages
meta tags
225 of 246
Google's algorithm ranks pages
based on the amount of visits and the rank of the site they were visiting from
226 of 246
integers are ______ data structures
elementary
227 of 246
strings are ________ data structures
structured
228 of 246
queues are _________ data structures
abstract
229 of 246
Queues are
FIFO
230 of 246
Dynamic memory....
can grow/shrink in size
231 of 246
dynamic memory is stored in memory in a portion called...
the heap
232 of 246
dynamic memory can cause a _______ if it gets too big
overflow error
233 of 246
static structures ____ change their size in memory
dont
234 of 246
static structures must have their ____ determined in advance
size
235 of 246
In linked list, each item contains two elements: one for the data, and one ______
pointing to the next item in the list
236 of 246
Stacks are
LIFO
237 of 246
stacks and queues can be ______
static and dynamic
238 of 246
attempting to take an item out an empty stack will cause ____
underflow errors
239 of 246
one use of a stack is for holding data on active subroutines. This is called ____
the call stack
240 of 246
what is the call stack not responsible for?
holding data from the last call stack
241 of 246
hash tables are used to ____
create indexes of where data is stored
242 of 246
hash tables ____
use algorithms to turn key fields into addresses
243 of 246
a collision is where....
a hash gives the same address twice
244 of 246
a hash table is a____
way of storing items so they can be quickly found
245 of 246
to help collisions is hashing, you can ____
make table larger/ non-divisible by skip
246 of 246

Other cards in this set

Card 2

Front

Where do calculations get carried out?

Back

Accumulator

Card 3

Front

Where is the fetched data from memory temporarily held?

Back

Preview of the front of card 3

Card 4

Front

Where is the instruction from the MDR copied to?

Back

Preview of the front of card 4

Card 5

Front

Where is the CIR

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all All topics resources »