Explain Lexical Analysis
What is a challenge faced by a parser during parsing? And how can this be solved?
A challenge is choosing which grammar rules to apply, which one to use first, and which set of leaves to apply them to. This can be solved by backing up the point where the last choice was made and trying a different choice instead.
What is recursion?
A non-terminal on the left reappears in the definition part on the right
::= blah|blah
What elements would you find in a semantic record?
What is the role of code optimisation during the compilation process?
Tries to turn code into code that will run faster and removes unnecessary instructions at machine level
What does ‘rwx’ command mean?
Read, write, execute
What is a ‘chmod’ command?
Changes the access permission of files and folders.
The first number sets permission for the user, the second number sets permission for the group and the third number sets permission for everybody else
What does ‘chmod 777’ do?
Gives everyone full access to the file
What does ‘chmod 770’ do?
The user and group members only have full access to the file
What does ‘chmod 755’ do?
The user has full access, group members and everybody else can read and execute the file, no modifications
What is a deadlock?
When two threads needs two different resources and each of them has the lock of the resource that the other need, it is a deadlock
What are the features of multi-programmed operating system?
What are the features of multi-user operating system?
- User authentication
What is cloud storage?
In a cloud system, many network drives are connected transparently across many physical locations world-wide, and a user’s data may exist in more than one location, getting synchronized to other locations if it changes in one.
What are potential problems of cloud storage?
- Privacy of data stored under different legislation
Explain geostationary satellites
Explain Medium Earth Orbit satellites (MEO)
Explain Low Earth Orbit satellites (LEO)
• No need for tracking antennas
What is phishing?
A “social engineering” approach, typically via email designed to cause you to reveal login data or allow a malicious party to install software (malware) on your machine for further malicious activity. The installation could be by persuading you to actively install the software or by clicking on a link that will perform a “drive by download’’ of the malware
What is a virus?
Executable files that will create copies of themselves in legitimate programs and wait for these to be copied to other machines.
What are worms?
Use network functionality e.g. email or faulty network applications to spread to other machines
What are trojans?
Programs that perform a seemingly useful task but also open a back door for malicious hackers, in the form of a TCP port that can be accessed by a command and control server to issue commands to the program. Gives access to someone’s computer.
What are the features of RSA?
What are the features of DES?