Podcast
Questions and Answers
What is the key characteristic of asymmetric encryption?
What is the key characteristic of asymmetric encryption?
- It employs a pair of keys: public and private. (correct)
- It is less secure than symmetric encryption.
- It does not support secure communication.
- It uses a single key for both encryption and decryption.
Hashing is primarily used for encrypting sensitive data.
Hashing is primarily used for encrypting sensitive data.
False (B)
What is the purpose of a primary key in a database?
What is the purpose of a primary key in a database?
To uniquely identify a record.
In a __________ topology, all devices connect to a central hub.
In a __________ topology, all devices connect to a central hub.
Match the following encryption methods with their corresponding descriptions:
Match the following encryption methods with their corresponding descriptions:
Which of the following is NOT a type of programming language?
Which of the following is NOT a type of programming language?
Firewalls are designed to allow unauthorized access to networks.
Firewalls are designed to allow unauthorized access to networks.
What does SQL stand for?
What does SQL stand for?
What is the primary function of the Control Unit within the CPU?
What is the primary function of the Control Unit within the CPU?
RISC processors have a larger instruction set compared to CISC processors.
RISC processors have a larger instruction set compared to CISC processors.
Name one advantage of using a Cache memory in a computer system.
Name one advantage of using a Cache memory in a computer system.
The ______ is a type of non-volatile memory that stores permanent data like the BIOS.
The ______ is a type of non-volatile memory that stores permanent data like the BIOS.
Match the following types of storage to their characteristics:
Match the following types of storage to their characteristics:
Which of the following describes a key benefit of parallel processing?
Which of the following describes a key benefit of parallel processing?
Secondary storage is used for temporary data storage during processing.
Secondary storage is used for temporary data storage during processing.
Which of the following is a key function performed by an operating system?
Which of the following is a key function performed by an operating system?
Lossless compression techniques permanently discard some data to reduce file size.
Lossless compression techniques permanently discard some data to reduce file size.
What are the two primary types of encryption methods?
What are the two primary types of encryption methods?
A [BLANK] is a specialized software program that performs maintenance tasks such as antivirus scans and disk defragmentation.
A [BLANK] is a specialized software program that performs maintenance tasks such as antivirus scans and disk defragmentation.
Match the following software development stages with their corresponding descriptions:
Match the following software development stages with their corresponding descriptions:
Which type of programming language focuses on specifying the desired outcome rather than the step-by-step process?
Which type of programming language focuses on specifying the desired outcome rather than the step-by-step process?
CISC processors typically have a smaller instruction set compared to RISC processors.
CISC processors typically have a smaller instruction set compared to RISC processors.
What is the main advantage of using pipelining in a CPU?
What is the main advantage of using pipelining in a CPU?
Flashcards
Primary Key
Primary Key
A unique identifier for each record in a database table, ensuring that each record is distinct.
Foreign Key
Foreign Key
A field in a database table that references the primary key of another table, maintaining data integrity and relationships between tables.
Normalization
Normalization
A process of organizing data in a database to reduce redundancy and improve data integrity. It involves three normal forms (1NF, 2NF, 3NF).
LAN (Local Area Network)
LAN (Local Area Network)
Signup and view all the flashcards
WAN (Wide Area Network)
WAN (Wide Area Network)
Signup and view all the flashcards
Star Topology
Star Topology
Signup and view all the flashcards
Linked List
Linked List
Signup and view all the flashcards
Recursion
Recursion
Signup and view all the flashcards
Operating System (OS)
Operating System (OS)
Signup and view all the flashcards
Memory Management
Memory Management
Signup and view all the flashcards
Custom Application
Custom Application
Signup and view all the flashcards
Off-the-Shelf Application
Off-the-Shelf Application
Signup and view all the flashcards
Agile Methodology
Agile Methodology
Signup and view all the flashcards
Lossless Compression
Lossless Compression
Signup and view all the flashcards
Lossy Compression
Lossy Compression
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Control Unit
Control Unit
Signup and view all the flashcards
Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)
Signup and view all the flashcards
Registers
Registers
Signup and view all the flashcards
Cache
Cache
Signup and view all the flashcards
Buses
Buses
Signup and view all the flashcards
Fetch-Decode-Execute Cycle
Fetch-Decode-Execute Cycle
Signup and view all the flashcards
CISC (Complex Instruction Set Computing)
CISC (Complex Instruction Set Computing)
Signup and view all the flashcards
RISC (Reduced Instruction Set Computing)
RISC (Reduced Instruction Set Computing)
Signup and view all the flashcards
Study Notes
1.1 Computer Systems
-
Processor Structure and Function: The control unit manages instruction execution, coordinating data flow. The arithmetic logic unit (ALU) performs arithmetic and logical operations. Registers are small, fast storage for intermediate data, like the program counter for instruction tracking and accumulators for results. Cache is high-speed storage for frequently accessed data, improving speed. Buses (data, address, control) coordinate actions.
-
Fetch-Decode-Execute Cycle: The processor fetches an instruction from memory using the program counter, decodes it into control signals, then executes the instruction.
-
CISC vs. RISC Processors: Complex Instruction Set Computing (CISC) processors have a large instruction set, making programming easier, but slower. Reduced Instruction Set Computing (RISC) processors use a simplified instruction set, resulting in faster and more efficient processing, requiring more instructions.
-
Parallel Processing: Using multiple cores or processors for simultaneous tasks boosts performance in multi-threaded applications.
1.1.3 Input, Output, and Storage
-
Input Devices: Convert user input to digital signals. Examples include keyboards, microphones, and sensors.
-
Output Devices: Present processed data to users. Examples include monitors, speakers, and printers.
-
Primary Storage: RAM is volatile memory, used for temporary data storage during processing. ROM is non-volatile, holding permanent data (like the BIOS).
-
Secondary Storage: HDDs (magnetic) are cost-effective for large capacities, but slower. SSDs (Flash) are faster and more durable, but more expensive per GB. Tertiary storage is for archiving and backups (e.g., optical discs, magnetic tape).
1.2 Software Development
-
Systems Software (OS): Acts as an interface between hardware and software. Key functions include memory management, multitasking, and file system handling. Examples include Windows, macOS, and Linux.
-
Utility Software: Performs maintenance tasks (e.g., antivirus, disk defragmentation, file compression).
-
Application Software (Types): Custom software is tailored to specific user needs. Off-the-shelf software provides general solutions. Open-source software is free and modifiable. Proprietary software is licensed and not available for modification, examples including Microsoft Office, and Adobe Photoshop.
-
Software Development Stages: Initial analysis of user needs and constraints. Followed by designing a solution using diagrams and pseudocode. This is followed by implementing code using a suitable programming language. Thorough testing (white-box and black-box) evaluates internal logic and program outputs. Maintenance includes corrective actions, adapting to new environments, and enhancing features.
-
Programming Methodologies: Waterfall uses a linear sequential approach, good for small, well-defined projects. Agile is iterative and collaborative.
1.2.4 Types of Programming Languages
-
Low-Level Languages: Machine code uses binary instructions directly by the CPU. Assembly language uses readable mnemonics.
-
High-Level Languages: Python and Java are easier to code and debug, more portable across systems.
-
Declarative Languages: Focus on the desired outcome, rather than specifying steps. SQL for databases demonstrates this.
-
Imperative Languages: Specify step-by-step instructions for solving problems.
1.3 Data Representation, Encryption, and Networks
-
Compression: Lossless compression perfectly reconstructs original data, while lossy reduces file size by discarding non-essential data.
-
Encryption: Symmetric encryption uses the same key for encryption/decryption. Asymmetric uses separate keys for security. Applications include securing online transactions.
-
Hashing: Converts input data into fixed-size hashes for data integrity checks. Password storage uses this method.
-
Databases: Primary Keys uniquely identify records. Foreign keys ensure relationships between tables. Normalization reduces data redundancy. SQL is used for data manipulation and database structure definition.
1.3.3 Networks
-
Network Types: LAN connects devices in a limited area, while WAN connects devices over larger distances (internet).
-
Network Topologies: A star topology uses a central hub, and a mesh topology connects devices directly for redundancy.
-
Network Protocols: HTTP/HTTPS manage web communication. FTP handles file transfers. SMTP manages email communication.
-
Network Security: Firewalls block unauthorized access. VPNs secure remote access. MAC address filtering restricts access to authorized devices.
1.4 Computational Thinking and Programming
-
Data Types: Common data types include integers, floating-point numbers (real), Booleans, characters, and strings. Casting converts from one data type to another.
-
Data Structures: Arrays use contiguous memory locations, efficient for indexed access. Stacks are Last-In, First-Out. Records group related data. Linked Lists have dynamic memory allocation for inserting and deleting data. Queues are First-In, First-Out, useful in scheduling. Graphs and trees represent relationships between data for quick searching or sorting.
-
Programming Concepts: Variables store data. Looping (for, while) iterates over code blocks. Conditional statements (if-else) make decisions in code execution. Functions modularize code. Recursion helps solve problems through smaller instances of the overall problem.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.