Computer Science Concise Notes

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/106

flashcard set

Earn XP

Description and Tags

A comprehensive collection of vocabulary flashcards based on the lecture notes for computer science, aiding in study and retention of key concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

107 Terms

1
New cards

Benefits of BCD

  • More straightforward to convert between BCD and denary

  • Less complex to encode and decode for programmers

  • Easier for digital equipment to display information

  • Can represent monetary values exactly

2
New cards

Applications of BCD

  • Used in electronic displays like calculators and digital clocks

  • Storage of date and time in BIOS

3
New cards

Applications of Hexadecimal

  • Used for MAC addresses

  • HTML color codes

  • Memory addresses in assembly language

4
New cards

ASCII Representation

  • Each character has a unique code

  • The character is replaced by its corresponding code

  • Stored in the same order as in the word

5
New cards

Character Set

  • All of the characters that the computer can represent or use
  • Each character has a corresponding unique binary number
6
New cards

Similarities between Character Sets

  • All can use 8 bits
  • ASCII is a subset of Unicode/Extended ASCII
  • Each represents characters using a unique code
7
New cards

Differences between ASCII and Unicode

  • Unicode can represent multiple languages and a wider range of characters than ASCII
  • ASCII is 7-bit
  • Extended ASCII is 8-bit
  • Unicode is 16-bit
8
New cards

Bitmap Graphic

  • Made up of pixels, each of a single color
  • Stored as a sequence of binary numbers
  • Prone to pixelation when enlarged
9
New cards

File Header

  • Stores data about the bitmap image
  • Includes color depth, image resolution, and file type
10
New cards

Image Resolution

  • Total number of pixels in an image
  • Increasing resolution means more pixels
  • Results in sharper images
11
New cards

Bit depth/Colour depth

  • Number of bits used to represent each color
  • Determining the number of colors that can be represented
12
New cards

Vector Graphic

  • Stores a set of instructions about how to draw the shape
  • Does not pixelate when scaled
  • Smaller file size
13
New cards

Drawing Object

  • Component of vector graphic created using a formula or command
14
New cards

Drawing Properties

  • Data about the shapes within a drawing
  • Defining appearance
15
New cards

Drawing List

  • The list of shapes that make up an image
  • Stores commands to draw each object
16
New cards

Sound Representation

  • Amplitude is recorded at set intervals
  • Each amplitude assigned a corresponding unique binary value
17
New cards

Sampling

  • Taking measurements at regular intervals
  • Storing the values
18
New cards

Sampling Rate

  • Number of samples taken per unit time
  • Increasing the sampling rate captures more details
19
New cards

Sampling Resolution

  • Number of bits used to store each sample
  • Higher resolution captures a wider range of amplitudes
20
New cards

Digital Waveform

  • Closer representing the original sound
  • Improved accuracy
21
New cards

Analogue Data

  • A variable data value that is constantly changing
22
New cards

Compression Reasons

  • Reduces file size for efficiency in storage and transmission
  • Helps improve download rates
23
New cards

Lossy Compression

  • Original data is lost
  • File cannot be reconstructed
  • Used where some data is not required
24
New cards

Lossless Compression

  • Original data is preserved
  • Used where full data restoration is needed
25
New cards

Run-length Encoding (RLE)

  • Groups consecutive sounds or colors to reduce data size
26
New cards

LAN (Local Area Network)

  • Allows communication and sharing of resources between devices
  • Covers a small geographical area
27
New cards

WAN (Wide Area Network)

  • Covers a large geographical area
  • Often uses virtual connections
  • Lower data transfer rates
28
New cards

Client-Server Model

  • Web pages or resources are stored on servers
  • Clients send requests and servers respond
29
New cards

Peer-to-Peer Network

  • Computers are of equal status
  • Each node provides access to data/resources
30
New cards

Thick Client

  • Client performs most processing locally
  • Minimal tasks required from the server
31
New cards

Thin Client

  • Client relies heavily on the server for processing and data storage
32
New cards

Star Topology

  • Devices connected to a central device (hub or switch)
  • Reduces collisions and improving performance
33
New cards

Mesh Topology

  • All devices connected to one another
  • Multiple routes available
  • Improving reliability
34
New cards

Cloud Computing

  • Accessing applications or files on remote servers via the internet
35
New cards

Public Cloud

  • Services available to anyone over the public internet
36
New cards

Private Cloud

  • Services offered by internal networks to specific users
37
New cards

Wired Network Advantages

  • Higher bandwidth
  • More reliable connections
  • Better security
38
New cards

Wireless Network Advantages

  • Freedom of movement
  • Easy scalability
  • Less cabling required
39
New cards

Copper Cables

  • Data transmitted through electrical signals
  • Lower transmission rate compared to fibre
40
New cards

Fibre-optic Cables

  • Data transmitted via light signals
  • Offering higher bandwidth and faster speeds
41
New cards

Radio Waves

  • Data carried wirelessly through electromagnetic waves
42
New cards

Switch

  • Allows communication between devices
  • Connects individual devices together within a network
43
New cards

Router

  • Routes data packets between networks
  • Manages access to resources
44
New cards

Ethernet Protocol

  • Used for data transmission over wired networks
  • Applying CSMA/CD for collision detection
45
New cards

Bit Streaming

  • Continuous data transmission
  • Often used for video or audio content
46
New cards

Real-time Streaming

  • Media is sent directly to users as it is recorded
47
New cards

On-demand Streaming

  • Users can watch pre-recorded media at their convenience
48
New cards

URL (Uniform Resource Locator)

  • Address used to access resources on the Internet
49
New cards

IPv4

  • Internet Protocol version 4
  • Using 32-bit addresses
50
New cards

IPv6

  • Internet Protocol version 6
  • Using 128-bit addresses
  • More addresses available than IPv4
51
New cards

Dynamic IP Address

  • Assigned anew each time a device connects to the network
52
New cards

Static IP Address

  • Fixed address that does not change over time
53
New cards

Subnetworking Benefits

  • Improved security by limiting data access
  • Better traffic management
54
New cards

Public IP Address

  • Visible globally
  • Allocated by an ISP
55
New cards

Private IP Address

  • Visible only within a local area network
56
New cards

Data Security

  • Protection against data loss or corruption
57
New cards

Data Privacy

  • Protection against unauthorized access to personal data
58
New cards

Data Integrity

  • Ensures accuracy and consistency
  • Information is kept up-to-date
59
New cards

Two-Factor Authentication

  • Enhances security
  • Requiring two forms of verification
60
New cards

Biometric Passwords

  • Using biological traits (like fingerprints or iris scans) for authentication
61
New cards

Firewall

  • Monitors and controls incoming and outgoing network traffic
62
New cards

Anti-malware Software

  • Scans for and removes malicious software
63
New cards

Backups

  • Creating copies of data for recovery purposes in case of loss
64
New cards

Encryption

  • Converts information into a secure format
  • Prevents unauthorized access
65
New cards

Validation

  • Checks data for reasonableness and correctness
66
New cards

Verification

  • Confirms data accuracy by comparing it with the original source
67
New cards

Parity Check

  • Ensures data integrity by sending an extra bit for error detection
68
New cards

Checksum

  • Value sent with data to verify its integrity upon receipt
69
New cards

Data Dictionary

  • Contains metadata about the database
  • Stores field names, types, and constraints
70
New cards

DBMS (Database Management System)

  • Manages data within a database
  • Enables data management tasks like creation and querying
71
New cards

Normalization

  • Organizing a database to reduce redundancy
  • Improving data integrity
72
New cards

Foreign Key

  • A field in one table that links to a primary key in another table
73
New cards

Primary Key

  • Unique attribute used for identifying a record within a table
74
New cards

Candidate Key

  • An attribute that could potentially serve as a primary key
75
New cards

Entity

  • An object which data can be stored about within a database
76
New cards

Field

  • A column in a database table
  • Representing an attribute of an entity
77
New cards

Record

  • A single row in a table
  • Contains data about one instance of an entity
78
New cards

Security in DBMS

  • Authentication
  • Backups
  • Encryption
  • Access control rights
79
New cards

DDL (Data Definition Language)

  • Defines database structures
  • Includes commands for creating and altering tables
80
New cards

SQL (Structured Query Language)

  • Language used for managing and manipulating relational databases
81
New cards

Truncate Command

  • Removes all records from a table
  • Retains the table structure
82
New cards

Software Licensing

  • Legal means to use, copy, or distribute software
83
New cards

Open Source Software

  • Software with source code available for anyone to modify or distribute
84
New cards

Shareware

  • Software offered on a trial basis
  • Requires payment for continued use
85
New cards

Commercial Software

  • Software sold for a fee
  • Not freely redistributable
86
New cards

Artificial Intelligence (AI) Applications

  • Facial recognition
  • Natural language processing
  • Self-driving technologies
87
New cards

Ethics in Computing

  • Standards guiding professional conduct
  • Integrity in computer science practice
88
New cards

Copyright

  • Legal rights to ownership and control over creative works
89
New cards

Intellectual Property Rights

  • Rights protecting creators' inventions and creations
90
New cards

Hacking

  • Unauthorized access to a system with malicious intent
91
New cards

Phishing

  • Fraudulent attempts to obtain sensitive information
  • Pretending to be a trustworthy entity
92
New cards

Malware

  • Malicious software designed to harm or exploit any programmable device
93
New cards

Spyware

  • Software that secretly monitors user activity
  • Collects personal information
94
New cards

Data Redundancy

  • Unnecessary duplication of data in a database
95
New cards

Data Consistency

  • Ensured through relational databases that handle updates uniformly
96
New cards

Referential Integrity

  • Rules to maintain consistency between related tables in a database
97
New cards

Tuple

  • A record in a database table (a row)
98
New cards

Field Name

  • The name of a column in a table
99
New cards

Data Type

  • Specifies the kind of values that can be stored in a column
100
New cards

Backup and Recovery Procedures

  • Processes to create backups
  • Restoring data after a failure