Central Processing Unit - loads and executed a program, coordinates and manages the hardware resources
2
New cards
ALU
Arithmetic Logic Unit - where the actual arithmetic operation are done
3
New cards
CU
Control Unit - coordinates and controls all of the activities taking place within the CPU, receives control signals from the system clock
4
New cards
System Clock
Used to synchronise the operations of the processor components
5
New cards
Clock Cycle / Clock Period
Time taken between two sequential rising edges, 1 clock cycle per second = 1 Hz
6
New cards
Cache memory
When RAM canât keep up with the speed of processor, cache is used to store data and instructions frequently used
7
New cards
PC
Program Counter - holds location of the NEXT instruction/data address in main memory
8
New cards
MAR
Memory Address Register - the contents of PC copied to here, holds the address of current instruction, then the data it uses, so that it can fetched from memory
9
New cards
MDR
Memory Data Register - holds the actual instruction, and the data that has been fetched from memory
10
New cards
ACC
Accumulator - holds the result of an instruction before it is transferred to memory
11
New cards
CIR
Current Instruction Register - holds the current instruction that the processor is executing
12
New cards
Buses
Set of parallel wires connecting two or more components of the computer
13
New cards
Address Bus
Unidirectional bus carrying the address of data between processor and memory
14
New cards
Data Bus
Bidirectional bus carrying data between the processor, the memory unit and the input/output devices
15
New cards
Control Bus
Carries control signals/commands from CPU in order to control and coordinate all the activities within the computer
16
New cards
Fetch
Causes the next instruction and any data involved to be fetched from main memory
17
New cards
Decode
Decodes the instruction
18
New cards
Execute
The instruction is executed
19
New cards
Embedded System
A system that is made up of both software and hardware and all components are on a single printed circuit board and only carries out specific tasks
20
New cards
ROM
Read Only Memory - stores initial program that runs when computer is turned on (bootstrap), and tells computer where to find the operating system on hard drive, not volatile
21
New cards
BIOS
Basic Input/Output System - can run without a hard drive or other secondary storage, controls basic technical configuration of the computer (e.g. processor speed and system time), stored in the ROM
22
New cards
DNS
Domain Name Service
1. URL received by a DNS resolver server 2. Server queries a DNS root name server 3. Root server responds with the address of the top-level domain server for .com 4. Resolver then makes request to the .com TLD server 5. TLD server then responds with the IP address of the domainâs name server, google.com 6. The recursive resolver sends a query to the domainâs name server 7. IP address for google.com is then returned to the resolver from the name server 8. DNS resolver responds to the web browser with the IP address of google.com
23
New cards
IP
Internet Protocol - Routes packets between router on a WAN
24
New cards
MAC
Media Access Control - Found on the deviceâs network interface card (NIC), and routes frames between NICs on a LAN
25
New cards
The âCloudâ
Term used to refer to services that are delivered over the internet
26
New cards
Advantages of the âcloudâ
1. Data access from anywhere 2. No longer crucial to back up data 3. Everything is stored and run on a remote computer
27
New cards
Disadvantages for the âcloudâ
1. Personal data will be stored on another companyâs server 2. Requires internet connection 3. Slow internet connection = poor quality of service
28
New cards
IPv4 address
Four 8 bit IP addresses separated by a dot
29
New cards
IPv6 address
128 bit number address represented in hex
30
New cards
Penetration testing
Deliberately trying to find holes in your own system
31
New cards
Anti-malware software
Software that detects bugs and remove malware such as viruses, worms, trojans, and spyware, however some viruses can morph to avoid detection
32
New cards
Firewall
A packet filtering firewall is a network security feature that controls the flow of incoming and outgoing network data
33
New cards
User Access Levels
Users on a network are arranged in groups and each group has different access rights to software, downloads and files that they can use
34
New cards
Password Policy
Passwords are often checked as they are created to make sure that they conform to the parameters given in a required policy
35
New cards
Encryption
A way of securing data so that it cannot be read without the encryption key
36
New cards
Physical Security
CCTV cameras, locks on door or cabinets or security guards
37
New cards
Types of User Interfaces
1. GUI (Graphical User Interface) 2. Menu-driven Interface 3. CLI (Command Line Interface) 4. Voice activated 5. Real - time
38
New cards
Multi-tasking
When an operating system manages many tasks happening at the same time
39
New cards
Memory management
Data used by program is copied to main memory, OS keeps a record of where each program and its data are located, the OS will make sure not to overwrite existing programs and data
40
New cards
Interrupt
A signal emitted by a device attached to a computer or from a program within the computer
41
New cards
Peripheral management
Peripheral hardware is any hardware device that is not inside the computer main body and OS must manage getting inputs from and sending outputs to peripheral devices
42
New cards
File Management
Carried out by the OS and following features are available: