Computer Science Theory

?
How do computers store data?
Binary
1 of 163
What way to humans use numbers?
Denary
2 of 163
What is another way to present numbers other than binary and denary?
Hexidecimal
3 of 163
Why would numbers be saved in hexidecimal?
The binary number is very big; so in order to use less memory
4 of 163
How many bits is one byte?
8
5 of 163
How much memory does an integer use?
4 bytes
6 of 163
How much memory does a float use?
8 bytes
7 of 163
How much memory does a character use?
1 byte per character
8 of 163
How much memory does a boolean use?
1 byte
9 of 163
When comparing types of memory, what should you consider?
Speed of accessing files to read and/or write, price, and volatility
10 of 163
What is RAM?
Random Access Memory
11 of 163
Where is RAM used?
Main memory
12 of 163
What kind of storage is RAM
Temporary and volitile
13 of 163
Define volitile
Loses its contents when the device is turned off
14 of 163
Where does the computer get it's basic start up rountine, OS and programs?
Somewhere non-volatile such as hard disk
15 of 163
Why doesn't the processor get instructions from the disk?
Reading and writing to it is very slow
16 of 163
Without RAM, a computer would be...
...very slow
17 of 163
What software loads the OS?
Bootstrap loader
18 of 163
What is ROM?
Read Only Memory
19 of 163
Can you change read-only memory once it has been changed?
No
20 of 163
What is the volatility of ROM
Non-volatile
21 of 163
Where is every running program stored?
Main memory
22 of 163
If lots of programs are running then...
..lots of main memory is needed
23 of 163
If the computer doesn't have enough main memory...
...part of the hard disk can be onfigured to act like main memory
24 of 163
What is Virtual Memory?
The part of the hard disk that has been configured to be like main memory
25 of 163
What is faster: RAM or Virtual Memory?
RAM
26 of 163
What can be stored in Virtual Memory?
Running programs
27 of 163
What cannot be stored in Vitual Memory?
Parts of the program being executed
28 of 163
Explain how instructions from a program stored in Virtual Memory can be executed
Parts of the programs are swapped between VIrtual Memory and RAM so parts can be executed
29 of 163
Main memory is...
...Primary memory
30 of 163
What are the characteristics of Secondary memory?
Long term, non-volatile, cheap, very large, robust, reliable
31 of 163
Examples of Secondary memory
Memory sticks, floppy disks, tape, CDs
32 of 163
Does Main memory or Secondary memory have the faster access speed?
Main memory
33 of 163
When choosing a storage medium, what should you consider?
Reliability, Durability, Portability, Speed (to read and write data), capacity/storage space
34 of 163
Give examples of magnetic storage media
Tape, hard disk, floppy disk
35 of 163
How is data saved on magnetic storage media?
The actuator moves the write head to the correct place on the medium. the write head creates a magnetic field, this magnetises dots on the magnetic material in binary patterns, storing the data
36 of 163
How is data read from magnetic storage media?
The actuator moves the read head to the correct place. the head then is able to detect the magnetic field and read the binary
37 of 163
Advantages of magnetic storage media
Cheap, high capacity
38 of 163
Disadvantages of magnetic storage media
Slow to read and write to, easily wiped/damaged (due to moving parts)
39 of 163
Give examples of optical storage media
CD and DVD
40 of 163
How is data stored on optical storage media?
A laser inside the computer marks the disk's surface with dots and dashes that represent binary's 1s and 0s
41 of 163
How is data read from optical media storage?
Light is reflected of the shiny surface of the disk so it can detect the dots and dashes
42 of 163
Examples of uses of flash storage media
Memory stick, in phones, tablets, PCs and cameras
43 of 163
Advantages of flash storage media
Very fast access speed, reliable (due to no moving parts), good replacement to hard disk, robust, uses less power
44 of 163
Disadvantages of flash storage media
Can't replace main memory (access speed too slow)
45 of 163
How is data saved and read from flash storage media
The flash storage media has a chipp called an EEPROM which contains lots of tiny switches. An electrical current sets to switches to 1 or 0 which can save data. the computer reads the binary to read the data
46 of 163
Define algorithm
A set of instructions followedby a computer or program in order to carra out a particular task
47 of 163
Define pseudocode
Universal, non-language specific, code that is used to plan the code of a program
48 of 163
Give advantages of splitting a program into modules to be developed
Different parts can be code by different people at the same time, repeated parts of code can be re-used more easily, modules can be tested induvidually, the task is easier to maintain and understand
49 of 163
What is the advantage of testing modules individually?
Bugs can be found and fixed more easily
50 of 163
What are the types of error?
Syntax, Run-time, and Logic
51 of 163
What is a syntax error?
An error caused by an error in the code
52 of 163
What causes a syntax error?
Typos, and opening, but not clsoing brackets of speech marks
53 of 163
What is a logic error?
An error that occurs when the program successfully runs but doesn't do what is expected
54 of 163
What causes a logic error?
Missing brackets (remember BIDMAS applies), loop that haven't been iterated the correct number of times etc
55 of 163
How do you find a logic error?
Using a trace table
56 of 163
How does a trace table work?
Variables are recorded in a table as the algorithm is executed line by line
57 of 163
How do you fill in a trace table?
By writing down variable as they change. If they do not change, they are not written
58 of 163
What is a run-time error?
An error that causes the program to crash
59 of 163
What causes a run-time error?
User inputs in an unexpected data type, trying to open a file that doesn't exist, if the computer has run out of memory, and if the program tries to read from an empty file
60 of 163
What is checked during the Feasibility stage of development
Technical, economic, legal, operational, and schedule feasibility (TELOS)
61 of 163
What is technical feasibility?
Checking if the technology exists to be able to do what you want
62 of 163
What is economical feasibility?
Checking if the project if worth the money
63 of 163
What is legal feasibility?
Checking if the project would have any copyright or licensing issues
64 of 163
What is operational feasibility?
Checking if the user will be able to operate the program
65 of 163
What is schedule feasibility?
Checking if it is possible to develop the softeare in the timescale
66 of 163
What is done during the Analysis stage of development?
Data is gathered about the project through interviews and questionnaires to create a specification and user requirements
67 of 163
What is done during the Design stage of development?
Flow charts, pseudocode are produced of the main algorithms to show how data will be processed, and details of HOW the program will be tested are decided
68 of 163
What is done duting the Implementation stage of development?
The program is coded, tested and installed
69 of 163
What is done during the Evaluation stage of development?
Checking the software against the original specification and user requirements
70 of 163
What is done during the Maintainence stage of development?
The software is maintained and updated while it is in use to fix problems found by users
71 of 163
What are the three types of maintainence?
Corrective, adaptive and perfective maintainence (CAP)
72 of 163
What is corrective maintainence?
FIxing problems that were not found in testing
73 of 163
What adaptive maintainence?
Updating the software to fit changing user requirements
74 of 163
What is perfective maintainence?
Cosmetic improvements to change the way the software looks
75 of 163
Advantages of the Waterfall model
Self contained, easy to manage stages; defined output and processes per stage; good for managing large groups of developers working in parallel
76 of 163
Disadvantages of the Waterfall model
Requirement changes means going back to previous stages;changes can be costly in both time and money; lack of customer involvement means issues aren't found until evaluation
77 of 163
Advantages of the Cyclic model
Self contained, easy to manage stages; defined output and processes per stage; good for managing large groups of developers working in parallel
78 of 163
Disadvantages of the Cyclic model
Requirement changes means going back to previous stages;changes can be costly in both time and money; lack of customer involvement means issues aren't found until evaluation
79 of 163
Advantages of the Spiral model
Well defined, managable stages; prototypes highlight issue quickly; changes can happen easily
80 of 163
Disadvantages of the Spiral model
Takes a long time, and more time means more money; prototypes are expensive to create
81 of 163
Advantages of the Agile model
Well defined, managable stages; prototypes highlight issue quickly; changes can happen easily; small multitasking groups make the team flexible to changing requirements
82 of 163
Disadvantages of the Agile model
Takes a long time, and more time means more money; prototypes are expensive to create; only suitable for smaller development teams
83 of 163
What is a prototype?
An approximation of the finished piece; a model, sample
84 of 163
Advantages of prototyping
Customers can give feedback, the developer can get useful feedback before it is too late, the product can be changed during development
85 of 163
Disadvantages of prototyping
Expensive, time consuming, if the customer keeps changing what they want it takes even longer
86 of 163
What are methods of testing?
Tracing algorithms, module testing, integration testing, peer review, beta testing, and acceptive testing
87 of 163
What is alogrithm testing?
Using a trace table to record changing variables
88 of 163
What is module testing?
Testing modules individually
89 of 163
What is integration testing?
Testing modules together
90 of 163
What is peer review?
When collegues test the software
91 of 163
What is beta testing?
Testing the software on a small group of potential users
92 of 163
What is acceptance testing?
When the developer goes through a test plan to prove to the customer that the software works
93 of 163
What is computer hardware?
The physical components of the computer
94 of 163
What is computer software?
The programs that run on a computer
95 of 163
Examples of computer input devices
Mouse, keyboard, camera, microphone, touchscreen etc
96 of 163
Example of computer output devices
Monitor, speakers etc
97 of 163
What is a peripheral device
A computer device that is not an essential part of the computer
98 of 163
Examples of peripheral devices
Printers, scanners etc
99 of 163
How do you measure reliabilty of a system?
System availability OR mean time between failure (mbtf)
100 of 163
How do you calculate system availability?
Number of hours available out of 100 as a percentage (ie. If a system was down for 1/100 hours, its reliability is 99%)
101 of 163
What is robustness?
How tolerant a system is to failure
102 of 163
What is the CPU and where is it?
The CPU is in the hardware that executes programs and manages the rest of the hardware
103 of 163
What is the fetch-execute cycle?
(After the program is loaded into main memory...) An instruction is fetched from the main memory, it is decoded, it is executed. This is repeated
104 of 163
What is the CPU made up of?
Main memory, the processor, and cache
105 of 163
How does data move between main memory and the processor?
On internal connections called system buses
106 of 163
What is the purpose of the CPU?
To fetch data and instruction from main memory, to decode and execute instructions, to perform calculations, to manage the movement of instructions and data to and from peripheral devices
107 of 163
What is clock speed?
The speed at which a processor operates measure in electrical cycles per second (Hertz)
108 of 163
How does cache memory/RAM speed up a computer?
The the less often the processor has to access the main memory, the faster it can work. Cache/RAM is small amount of much faster memory that is used to store frequently used instructions and data so the speed of the computer is improved
109 of 163
How many levels of cache are there?
3
110 of 163
Describe Level 1 cache
Built on to the processor chip, fastest type of cache, most expensive, stores most critical data and instructions
111 of 163
Where is Level 2 cache?
On the motherboard or processor chip
112 of 163
Where is Level 3 cache?
If Level 2 cache is on the processor chip, L3 cache is on the motherboard
113 of 163
What effect does having a multi-core processor have on the speed of the CPU?
More processors means the computer is faster
114 of 163
Why is a dual core processor only twice as fast IN THEORY?
It would only be faster if the computer has different programs running parallel becuase then a different core does each program
115 of 163
Where are the system buses found?
On the motehrboard
116 of 163
How many system buses are there?
3
117 of 163
What are the names of the system buses?
Address bus, Control bus and Data bus
118 of 163
Which bus is used during the "fetch" part of the fetch-execute cycle?
Address bus
119 of 163
How many directions can information travel along the address bus?
One way
120 of 163
Which bus is used to send instructions from its place in memory, to the processor?
Data bus
121 of 163
How many directions candata travel along the data bus?
Two ways: data can be sent from memory to the processor, and, in the opposite direction, data can be sent back to main memory or secondary storage
122 of 163
How many components can use the bus at once?
Only one
123 of 163
What is the purpose of the Control bus?
It carries signals that show if the data and address buses are free
124 of 163
What is a relational database?
A database that uses separate tables that are related so there is no data duplication
125 of 163
Advantages of less data duplication
Less risk of data inconsistency, easy to maintain database, makes the database smaller
126 of 163
Define table
A collection of data about a specific entity eg. Movies
127 of 163
Define record
All the information about one thing eg. Genre, Cast, Rating
128 of 163
Define primary key
The field that uniquely identifies each record in a table eg. Movie ID
129 of 163
Define field
Each data item in a record eg. The genre of film ID0023
130 of 163
What does a query do?
Search a database using a search criteria to find particular records
131 of 163
What is a LAN?
Local Area Network: A collection of computers and peripheral devices connected together within a single site (NOTE: site not building)
132 of 163
What is a WAN?
Wide Area Network: A collection of computers, peripheral devices, and networks connected over a geographically remote area (NOTE: Geographically remote doesn't mean the networks are miles apart, it's about what separates the sites such as a road)
133 of 163
What kind of network is the internet?
WAN
134 of 163
Advantages of networking computers
Sharing resources, communication between computers, and centralised management
135 of 163
What resources can be shared over a network?
Files, peripheral devices, an internet connection
136 of 163
How can computers communicate over a network?
Emails, a messaging system, and by transfering files between computers
137 of 163
How does a network use centralised management?
User profiles and security are managed centrally; softeware can be distributed across the network rather than to each individual PC, and users are able to access their files from any PC on the network
138 of 163
What is a network topology?
The different layouts for which computers in a network can be connected
139 of 163
How does the ring network work?
Computers are connected to those next to them in a ring. Each computer takes turns to transmit, controlled by passing around a tocken. Only the computer with the token can transmit. Used in LANs
140 of 163
Advantages of the ring network
Not dependant on a central computer, token passing protocol is simple and therefore reliable, consistent performance even with high traffic
141 of 163
Disadvantages of the ring network
One link failure could disrupt the whole network, not secure because all connections are shared, all data goes around the network so it's slow
142 of 163
How does a bus network work?
All computers are connected to a single backbone cable that computers use to transmit; only one computer can transmit at a time. Used in LANs only
143 of 163
Advantages of the bus network
Easy and inexpensive to install, easy to add new computers, transmitting onto a bus is quicker than sending data around the network
144 of 163
Disadvantage of the bus network
If the main cable fails, the whole network goes down; cable failure are hard to isolate as they affect the attached computers; not secure; slow when there is traffic
145 of 163
How does a star network work?
Each computer is connected to a central hub which controls the network. this is usually a server where all files are saved. Used for LANs and WANs
146 of 163
Advantages of the star network
One failure will only affect one computer, consistant performance, easy to add new computers, more sercure becuase links aren't shared
147 of 163
Disadvantages of the star network
Can be costly becuase there is lots of cabling, dependance on central switch so if it goes down the whole system does
148 of 163
How does a client-server network architechture work?
Every user's files are saved on the central server so they can be access from every PC in the network. Used in a WAN
149 of 163
How does the peer-to-peer network architechture work?
The user's files and documents are saved on the individual PC but are configured to share them with the other PCs on the network if access has been granted. All computers have equal status. Used over a small LAN
150 of 163
Which network architechture has computers all of equal status?
Peer-to-peer
151 of 163
Which network architechture has computers with specialised roles?
Client-server
152 of 163
Which network architechture is easy to set up and maintain?
Peer-to-peer
153 of 163
Which network architechture needs a network manage to run the network?
Client-server
154 of 163
Which network architechture has no centralised management?
Peer-to-peer
155 of 163
Which network architechture has centralised management?
Client-server
156 of 163
Which network architechture has no dependancy on a server?
Peer-to-peer
157 of 163
Which network architechture has dependancy on a server?
Client-server
158 of 163
Which network architechture is only used in LANs?
Peer-to-peer
159 of 163
Which network architechture is used in WANs and LANs?
Client-server
160 of 163
Which network architechture is used for a small group of computers (10 or less)?
Peer-to-peer
161 of 163
Which network architechture can be used for hundreds of computers?
Client-server
162 of 163
What is between the client and server?
Their internet connection
163 of 163

Other cards in this set

Card 2

Front

What way to humans use numbers?

Back

Denary

Card 3

Front

What is another way to present numbers other than binary and denary?

Back

Preview of the front of card 3

Card 4

Front

Why would numbers be saved in hexidecimal?

Back

Preview of the front of card 4

Card 5

Front

How many bits is one byte?

Back

Preview of the front of card 5
View more cards

Comments

nerdwow

Report

Wow this really good

swifty017

Report

Very good enjoy revising from this

Basital

Report

Thank you. This is very useful for revision!

Similar Computing resources:

See all Computing resources »See all Computer systems resources »