Computer Systems Quiz - Chapter 1.1

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the key characteristic of asymmetric encryption?

  • It employs a pair of keys: public and private. (correct)
  • It is less secure than symmetric encryption.
  • It does not support secure communication.
  • It uses a single key for both encryption and decryption.

Hashing is primarily used for encrypting sensitive data.

False (B)

What is the purpose of a primary key in a database?

To uniquely identify a record.

In a __________ topology, all devices connect to a central hub.

<p>star</p> Signup and view all the answers

Match the following encryption methods with their corresponding descriptions:

<p>Asymmetric = Uses a pair of keys for encryption and decryption Symmetric = Uses a single key for both encryption and decryption Hashing = Converts data into a fixed-size hash for integrity checks Encryption = The process of converting plain text into coded text</p> Signup and view all the answers

Which of the following is NOT a type of programming language?

<p>Arithmetic (C)</p> Signup and view all the answers

Firewalls are designed to allow unauthorized access to networks.

<p>False (B)</p> Signup and view all the answers

What does SQL stand for?

<p>Structured Query Language</p> Signup and view all the answers

What is the primary function of the Control Unit within the CPU?

<p>Manages the execution of instructions (D)</p> Signup and view all the answers

RISC processors have a larger instruction set compared to CISC processors.

<p>False (B)</p> Signup and view all the answers

Name one advantage of using a Cache memory in a computer system.

<p>Reduces latency by storing frequently accessed instructions or data.</p> Signup and view all the answers

The ______ is a type of non-volatile memory that stores permanent data like the BIOS.

<p>ROM</p> Signup and view all the answers

Match the following types of storage to their characteristics:

<p>RAM = Volatile memory used during processing HDD = Slower magnetic storage SSD = Faster flash-based storage ROM = Non-volatile memory storing permanent data</p> Signup and view all the answers

Which of the following describes a key benefit of parallel processing?

<p>It enhances performance for multi-threaded applications. (A)</p> Signup and view all the answers

Secondary storage is used for temporary data storage during processing.

<p>False (B)</p> Signup and view all the answers

Which of the following is a key function performed by an operating system?

<p>All of the above (D)</p> Signup and view all the answers

Lossless compression techniques permanently discard some data to reduce file size.

<p>False (B)</p> Signup and view all the answers

What are the two primary types of encryption methods?

<p>Symmetric and Asymmetric</p> Signup and view all the answers

A [BLANK] is a specialized software program that performs maintenance tasks such as antivirus scans and disk defragmentation.

<p>utility software</p> Signup and view all the answers

Match the following software development stages with their corresponding descriptions:

<p>Analysis = Determine user requirements and constraints Design = Create flowcharts, UML diagrams, and pseudocode Implementation = Write code in a suitable programming language Testing = Execute tests to identify errors and ensure quality Maintenance = Correct bugs, adapt to new environments, and improve features</p> Signup and view all the answers

Which type of programming language focuses on specifying the desired outcome rather than the step-by-step process?

<p>Declarative language (D)</p> Signup and view all the answers

CISC processors typically have a smaller instruction set compared to RISC processors.

<p>False (B)</p> Signup and view all the answers

What is the main advantage of using pipelining in a CPU?

<p>Improved performance by processing multiple instructions concurrently</p> Signup and view all the answers

Flashcards

Primary Key

A unique identifier for each record in a database table, ensuring that each record is distinct.

Foreign Key

A field in a database table that references the primary key of another table, maintaining data integrity and relationships between tables.

Normalization

A process of organizing data in a database to reduce redundancy and improve data integrity. It involves three normal forms (1NF, 2NF, 3NF).

LAN (Local Area Network)

A network that connects devices within a limited geographical area, like an office building.

Signup and view all the flashcards

WAN (Wide Area Network)

A network that connects devices over a wide geographical area, spanning cities, countries, or even continents.

Signup and view all the flashcards

Star Topology

A network topology where all devices connect to a central hub, like spokes on a wheel.

Signup and view all the flashcards

Linked List

A data structure that allows for dynamic allocation of memory, making it efficient for inserting and deleting elements.

Signup and view all the flashcards

Recursion

A programming concept that allows a function to call itself repeatedly, breaking down a problem into smaller instances.

Signup and view all the flashcards

Operating System (OS)

A type of system software that acts as an intermediary between the computer's hardware and the software applications running on it.

Signup and view all the flashcards

Memory Management

Software that manages computer resources, such as memory, CPU, and storage, allowing multiple programs to run concurrently.

Signup and view all the flashcards

Custom Application

A type of application software designed for specific user requirements, often customized for a business or organization.

Signup and view all the flashcards

Off-the-Shelf Application

Pre-made software that is generally available for purchase and use by the public, offering a wide range of functionalities.

Signup and view all the flashcards

Agile Methodology

Software development methodology that emphasizes iterative and collaborative development, allowing flexibility to adapt to changing requirements.

Signup and view all the flashcards

Lossless Compression

A compression technique that reconstructs the original data without any loss of information, maintaining the quality of images or files.

Signup and view all the flashcards

Lossy Compression

A compression technique that reduces file size by discarding some data, resulting in a trade-off between file size and quality.

Signup and view all the flashcards

Encryption

A process of transforming data into an unreadable format using an encryption key, ensuring confidentiality and security.

Signup and view all the flashcards

Control Unit

Manages instruction execution within the CPU by coordinating data flow and operations.

Signup and view all the flashcards

Arithmetic Logic Unit (ALU)

Executes mathematical calculations (addition, subtraction) and logical operations (AND, OR).

Signup and view all the flashcards

Registers

Small, high-speed storage locations within the CPU used to hold temporary data during processing. Examples include the Program Counter and Accumulator.

Signup and view all the flashcards

Cache

High-speed storage that holds frequently used data and instructions, reducing access time.

Signup and view all the flashcards

Buses

A set of electronic pathways that transfer data between different components within a computer system. They include data, address and control buses.

Signup and view all the flashcards

Fetch-Decode-Execute Cycle

A set of instructions that a CPU uses to perform operations. Each instruction is broken down into three steps: fetch, decode, and execute.

Signup and view all the flashcards

CISC (Complex Instruction Set Computing)

Computer architectures that use a large set of instructions, often performing complex tasks in a single step. They are easier for programmers but can be slower due to longer instruction cycles.

Signup and view all the flashcards

RISC (Reduced Instruction Set Computing)

Computer architectures that use a simplified set of instructions, each executed in a single clock cycle. They are faster but require more instructions to perform complex tasks.

Signup and view all the flashcards

Study Notes

1.1 Computer Systems

  • Processor Structure and Function: The control unit manages instruction execution, coordinating data flow. The arithmetic logic unit (ALU) performs arithmetic and logical operations. Registers are small, fast storage for intermediate data, like the program counter for instruction tracking and accumulators for results. Cache is high-speed storage for frequently accessed data, improving speed. Buses (data, address, control) coordinate actions.

  • Fetch-Decode-Execute Cycle: The processor fetches an instruction from memory using the program counter, decodes it into control signals, then executes the instruction.

  • CISC vs. RISC Processors: Complex Instruction Set Computing (CISC) processors have a large instruction set, making programming easier, but slower. Reduced Instruction Set Computing (RISC) processors use a simplified instruction set, resulting in faster and more efficient processing, requiring more instructions.

  • Parallel Processing: Using multiple cores or processors for simultaneous tasks boosts performance in multi-threaded applications.

1.1.3 Input, Output, and Storage

  • Input Devices: Convert user input to digital signals. Examples include keyboards, microphones, and sensors.

  • Output Devices: Present processed data to users. Examples include monitors, speakers, and printers.

  • Primary Storage: RAM is volatile memory, used for temporary data storage during processing. ROM is non-volatile, holding permanent data (like the BIOS).

  • Secondary Storage: HDDs (magnetic) are cost-effective for large capacities, but slower. SSDs (Flash) are faster and more durable, but more expensive per GB. Tertiary storage is for archiving and backups (e.g., optical discs, magnetic tape).

1.2 Software Development

  • Systems Software (OS): Acts as an interface between hardware and software. Key functions include memory management, multitasking, and file system handling. Examples include Windows, macOS, and Linux.

  • Utility Software: Performs maintenance tasks (e.g., antivirus, disk defragmentation, file compression).

  • Application Software (Types): Custom software is tailored to specific user needs. Off-the-shelf software provides general solutions. Open-source software is free and modifiable. Proprietary software is licensed and not available for modification, examples including Microsoft Office, and Adobe Photoshop.

  • Software Development Stages: Initial analysis of user needs and constraints. Followed by designing a solution using diagrams and pseudocode. This is followed by implementing code using a suitable programming language. Thorough testing (white-box and black-box) evaluates internal logic and program outputs. Maintenance includes corrective actions, adapting to new environments, and enhancing features.

  • Programming Methodologies: Waterfall uses a linear sequential approach, good for small, well-defined projects. Agile is iterative and collaborative.

1.2.4 Types of Programming Languages

  • Low-Level Languages: Machine code uses binary instructions directly by the CPU. Assembly language uses readable mnemonics.

  • High-Level Languages: Python and Java are easier to code and debug, more portable across systems.

  • Declarative Languages: Focus on the desired outcome, rather than specifying steps. SQL for databases demonstrates this.

  • Imperative Languages: Specify step-by-step instructions for solving problems.

1.3 Data Representation, Encryption, and Networks

  • Compression: Lossless compression perfectly reconstructs original data, while lossy reduces file size by discarding non-essential data.

  • Encryption: Symmetric encryption uses the same key for encryption/decryption. Asymmetric uses separate keys for security. Applications include securing online transactions.

  • Hashing: Converts input data into fixed-size hashes for data integrity checks. Password storage uses this method.

  • Databases: Primary Keys uniquely identify records. Foreign keys ensure relationships between tables. Normalization reduces data redundancy. SQL is used for data manipulation and database structure definition.

1.3.3 Networks

  • Network Types: LAN connects devices in a limited area, while WAN connects devices over larger distances (internet).

  • Network Topologies: A star topology uses a central hub, and a mesh topology connects devices directly for redundancy.

  • Network Protocols: HTTP/HTTPS manage web communication. FTP handles file transfers. SMTP manages email communication.

  • Network Security: Firewalls block unauthorized access. VPNs secure remote access. MAC address filtering restricts access to authorized devices.

1.4 Computational Thinking and Programming

  • Data Types: Common data types include integers, floating-point numbers (real), Booleans, characters, and strings. Casting converts from one data type to another.

  • Data Structures: Arrays use contiguous memory locations, efficient for indexed access. Stacks are Last-In, First-Out. Records group related data. Linked Lists have dynamic memory allocation for inserting and deleting data. Queues are First-In, First-Out, useful in scheduling. Graphs and trees represent relationships between data for quick searching or sorting.

  • Programming Concepts: Variables store data. Looping (for, while) iterates over code blocks. Conditional statements (if-else) make decisions in code execution. Functions modularize code. Recursion helps solve problems through smaller instances of the overall problem.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

COMP SCIENCE REVISION PDF

More Like This

Computer Architecture Quiz
59 questions

Computer Architecture Quiz

EvocativeSurrealism avatar
EvocativeSurrealism
Computer Architecture Quiz
47 questions

Computer Architecture Quiz

EvocativeSurrealism avatar
EvocativeSurrealism
Use Quizgecko on...
Browser
Browser