CS-theory-screen

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 11

Describe how the Operating System manages the peripheral hardware devices of the

computer.

Describe two reasons why magnetic storage is more appropriate than solid state storage for

this computer.

An interrupt is generated when a key is pressed on a computer keyboard.

Explain how the computer handles this interrupt.


Describe the difference between the security and privacy of data.

Describe other methods that a DBMS can use to improve the security of a database.
Utility software
Describe the function of a router in a network.

Explain one advantage of implementing a star topology instead of a bus topology in the new
classroom.
a) Describe the advantages of using the interpreter compared to the compiler to translate the
program.

State one reason why some high-level languages are partially compiled and partially
interpreted.
Describe the principal operation of a microphone.

Describe the benefits to Francis of joining a professional ethical body

Describe the functions of a Wireless Network Interface Card.


Explain how interrupts are handled during the F-E cycle.

Reasons why subnetting in a network is used


State three tasks performed by devices to deal with collisions when using the Carrier Sense
Multiple Access /Collision Detection (CSMA/CD) protocol in a network.

A composite primary key consists of two or more attributes that together form the primary
key.

Explain why the table FILM_ACTOR has a composite primary key


Applications of AI

Describe three differences between fibre-optic cables and copper cables.


Identify two utility programs that can be used to improve the performance of a computer and
state how they improve the performance.

You might also like