Can you list all the binary multiples of data storage in order starting with the smallest (a bit…)
bit, nibble, byte, kibibyte, mebibyte, gibibyte, tebibyte
What is machine code?
Binary instructions, which can be directly processed by the CPU.
This utility will scramble data so that if it is intercepted, it would be unreadable
Encryption Software
Computer networks use protocols. What is the meaning of the word “protocol”?
A set of rules defining common methods of data communication.
True or False: A 'Bubble Sort' algorithm will step through the data set one more time before stopping, after the data set had been ordered on the previous stepthrough.
True
Convert the binary number 01011100, into decimal.
64 + 16 + 8 + 4 = 92
What is a compiler?
A translator which converts source code into machine code, in one go, producing an executable file, that the CPU can run without the translator needing to be present.
What is a major disadvantage of the Bus network topology?
Data travels both ways along the network cable and as such the network is susceptible to data collisions which can slow the network down.
This type of division will output the remainder of the division calculation.
% Modulus Division (MOD)
Convert the denary number 45, into hexadecimal
2D
What is meant by the term ‘embedded system’?
An embedded system is a computer which has all of its components arranged together on a single circuit board. They usually run specific tasks (are not general purpose).
Routers send packets that contain data around the internet. State the 3 other items found in a packet.
Destination Address
Source Address
Check sum
Sequence Number
Protocol
The computational method which is concerned with the removal of unnecessary detail is called...
Abstraction
What is the difference between Lossy and Lossless compression?
Lossy compression permanently removes data from a file in order to reduce its size.
Lossless compression temporarily removes data from a file in order to reduce its size.
Name three factors that affect CPU performance?
Cache Size
Clock Speed
Number of CPU Cores
What is the role of DNS (Domain Name System)?
Converts ‘human friendly’ URLs (web addresses) into ‘network friendly’ IP addresses.
Biometrics is the name given for when a device measures a person’s physical characteristics to verify their identity. Fingerprinting is one. Name 3 others…
Facial recognition (commonly used on phones)
Retinal scans (more commonly used in high security environments)
Voice recognition (now used in online banking)
What is -12710 as a signed two’s complement binary number?
1000 0001
What is virtual memory and why is it needed?
Virtual memory is when secondary storage is used as RAM when the RAM is full.
It enables multiple programs to continue to run without the computer system freezing, the system will run much slower as a result as secondary storage has slower read/write speeds.
Name the 4 layers of the TCP/IP model:
Application layer
Transport layer
Internet layer
Link layer