Computer Science Concise Notes

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/106

flashcard set

Earn XP

Description and Tags

A comprehensive collection of vocabulary flashcards based on the lecture notes for computer science, aiding in study and retention of key concepts.

Last updated 4:52 PM on 1/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

107 Terms

1
New cards

Benefits of BCD

  • More straightforward to convert between BCD and denary

  • Less complex to encode and decode for programmers

  • Easier for digital equipment to display information

  • Can represent monetary values exactly

2
New cards

Applications of BCD

  • Used in electronic displays like calculators and digital clocks

  • Storage of date and time in BIOS

3
New cards

Applications of Hexadecimal

  • Used for MAC addresses

  • HTML color codes

  • Memory addresses in assembly language

4
New cards

ASCII Representation

  • Each character has a unique code

  • The character is replaced by its corresponding code

  • Stored in the same order as in the word

5
New cards

Character Set

  • All of the characters that the computer can represent or use
  • Each character has a corresponding unique binary number
6
New cards

Similarities between Character Sets

  • All can use 8 bits
  • ASCII is a subset of Unicode/Extended ASCII
  • Each represents characters using a unique code
7
New cards

Differences between ASCII and Unicode

  • Unicode can represent multiple languages and a wider range of characters than ASCII
  • ASCII is 7-bit
  • Extended ASCII is 8-bit
  • Unicode is 16-bit
8
New cards

Bitmap Graphic

  • Made up of pixels, each of a single color
  • Stored as a sequence of binary numbers
  • Prone to pixelation when enlarged
9
New cards

File Header

  • Stores data about the bitmap image
  • Includes color depth, image resolution, and file type
10
New cards

Image Resolution

  • Total number of pixels in an image
  • Increasing resolution means more pixels
  • Results in sharper images
11
New cards

Bit depth/Colour depth

  • Number of bits used to represent each color
  • Determining the number of colors that can be represented
12
New cards

Vector Graphic

  • Stores a set of instructions about how to draw the shape
  • Does not pixelate when scaled
  • Smaller file size
13
New cards

Drawing Object

  • Component of vector graphic created using a formula or command
14
New cards

Drawing Properties

  • Data about the shapes within a drawing
  • Defining appearance
15
New cards

Drawing List

  • The list of shapes that make up an image
  • Stores commands to draw each object
16
New cards

Sound Representation

  • Amplitude is recorded at set intervals
  • Each amplitude assigned a corresponding unique binary value
17
New cards

Sampling

  • Taking measurements at regular intervals
  • Storing the values
18
New cards

Sampling Rate

  • Number of samples taken per unit time
  • Increasing the sampling rate captures more details
19
New cards

Sampling Resolution

  • Number of bits used to store each sample
  • Higher resolution captures a wider range of amplitudes
20
New cards

Digital Waveform

  • Closer representing the original sound
  • Improved accuracy
21
New cards

Analogue Data

  • A variable data value that is constantly changing
22
New cards

Compression Reasons

  • Reduces file size for efficiency in storage and transmission
  • Helps improve download rates
23
New cards

Lossy Compression

  • Original data is lost
  • File cannot be reconstructed
  • Used where some data is not required
24
New cards

Lossless Compression

  • Original data is preserved
  • Used where full data restoration is needed
25
New cards

Run-length Encoding (RLE)

  • Groups consecutive sounds or colors to reduce data size
26
New cards

LAN (Local Area Network)

  • Allows communication and sharing of resources between devices
  • Covers a small geographical area
27
New cards

WAN (Wide Area Network)

  • Covers a large geographical area
  • Often uses virtual connections
  • Lower data transfer rates
28
New cards

Client-Server Model

  • Web pages or resources are stored on servers
  • Clients send requests and servers respond
29
New cards

Peer-to-Peer Network

  • Computers are of equal status
  • Each node provides access to data/resources
30
New cards

Thick Client

  • Client performs most processing locally
  • Minimal tasks required from the server
31
New cards

Thin Client

  • Client relies heavily on the server for processing and data storage
32
New cards

Star Topology

  • Devices connected to a central device (hub or switch)
  • Reduces collisions and improving performance
33
New cards

Mesh Topology

  • All devices connected to one another
  • Multiple routes available
  • Improving reliability
34
New cards

Cloud Computing

  • Accessing applications or files on remote servers via the internet
35
New cards

Public Cloud

  • Services available to anyone over the public internet
36
New cards

Private Cloud

  • Services offered by internal networks to specific users
37
New cards

Wired Network Advantages

  • Higher bandwidth
  • More reliable connections
  • Better security
38
New cards

Wireless Network Advantages

  • Freedom of movement
  • Easy scalability
  • Less cabling required
39
New cards

Copper Cables

  • Data transmitted through electrical signals
  • Lower transmission rate compared to fibre
40
New cards

Fibre-optic Cables

  • Data transmitted via light signals
  • Offering higher bandwidth and faster speeds
41
New cards

Radio Waves

  • Data carried wirelessly through electromagnetic waves
42
New cards

Switch

  • Allows communication between devices
  • Connects individual devices together within a network
43
New cards

Router

  • Routes data packets between networks
  • Manages access to resources
44
New cards

Ethernet Protocol

  • Used for data transmission over wired networks
  • Applying CSMA/CD for collision detection
45
New cards

Bit Streaming

  • Continuous data transmission
  • Often used for video or audio content
46
New cards

Real-time Streaming

  • Media is sent directly to users as it is recorded
47
New cards

On-demand Streaming

  • Users can watch pre-recorded media at their convenience
48
New cards

URL (Uniform Resource Locator)

  • Address used to access resources on the Internet
49
New cards

IPv4

  • Internet Protocol version 4
  • Using 32-bit addresses
50
New cards

IPv6

  • Internet Protocol version 6
  • Using 128-bit addresses
  • More addresses available than IPv4
51
New cards

Dynamic IP Address

  • Assigned anew each time a device connects to the network
52
New cards

Static IP Address

  • Fixed address that does not change over time
53
New cards

Subnetworking Benefits

  • Improved security by limiting data access
  • Better traffic management
54
New cards

Public IP Address

  • Visible globally
  • Allocated by an ISP
55
New cards

Private IP Address

  • Visible only within a local area network
56
New cards

Data Security

  • Protection against data loss or corruption
57
New cards

Data Privacy

  • Protection against unauthorized access to personal data
58
New cards

Data Integrity

  • Ensures accuracy and consistency
  • Information is kept up-to-date
59
New cards

Two-Factor Authentication

  • Enhances security
  • Requiring two forms of verification
60
New cards

Biometric Passwords

  • Using biological traits (like fingerprints or iris scans) for authentication
61
New cards

Firewall

  • Monitors and controls incoming and outgoing network traffic
62
New cards

Anti-malware Software

  • Scans for and removes malicious software
63
New cards

Backups

  • Creating copies of data for recovery purposes in case of loss
64
New cards

Encryption

  • Converts information into a secure format
  • Prevents unauthorized access
65
New cards

Validation

  • Checks data for reasonableness and correctness
66
New cards

Verification

  • Confirms data accuracy by comparing it with the original source
67
New cards

Parity Check

  • Ensures data integrity by sending an extra bit for error detection
68
New cards

Checksum

  • Value sent with data to verify its integrity upon receipt
69
New cards

Data Dictionary

  • Contains metadata about the database
  • Stores field names, types, and constraints
70
New cards

DBMS (Database Management System)

  • Manages data within a database
  • Enables data management tasks like creation and querying
71
New cards

Normalization

  • Organizing a database to reduce redundancy
  • Improving data integrity
72
New cards

Foreign Key

  • A field in one table that links to a primary key in another table
73
New cards

Primary Key

  • Unique attribute used for identifying a record within a table
74
New cards

Candidate Key

  • An attribute that could potentially serve as a primary key
75
New cards

Entity

  • An object which data can be stored about within a database
76
New cards

Field

  • A column in a database table
  • Representing an attribute of an entity
77
New cards

Record

  • A single row in a table
  • Contains data about one instance of an entity
78
New cards

Security in DBMS

  • Authentication
  • Backups
  • Encryption
  • Access control rights
79
New cards

DDL (Data Definition Language)

  • Defines database structures
  • Includes commands for creating and altering tables
80
New cards

SQL (Structured Query Language)

  • Language used for managing and manipulating relational databases
81
New cards

Truncate Command

  • Removes all records from a table
  • Retains the table structure
82
New cards

Software Licensing

  • Legal means to use, copy, or distribute software
83
New cards

Open Source Software

  • Software with source code available for anyone to modify or distribute
84
New cards

Shareware

  • Software offered on a trial basis
  • Requires payment for continued use
85
New cards

Commercial Software

  • Software sold for a fee
  • Not freely redistributable
86
New cards

Artificial Intelligence (AI) Applications

  • Facial recognition
  • Natural language processing
  • Self-driving technologies
87
New cards

Ethics in Computing

  • Standards guiding professional conduct
  • Integrity in computer science practice
88
New cards

Copyright

  • Legal rights to ownership and control over creative works
89
New cards

Intellectual Property Rights

  • Rights protecting creators' inventions and creations
90
New cards

Hacking

  • Unauthorized access to a system with malicious intent
91
New cards

Phishing

  • Fraudulent attempts to obtain sensitive information
  • Pretending to be a trustworthy entity
92
New cards

Malware

  • Malicious software designed to harm or exploit any programmable device
93
New cards

Spyware

  • Software that secretly monitors user activity
  • Collects personal information
94
New cards

Data Redundancy

  • Unnecessary duplication of data in a database
95
New cards

Data Consistency

  • Ensured through relational databases that handle updates uniformly
96
New cards

Referential Integrity

  • Rules to maintain consistency between related tables in a database
97
New cards

Tuple

  • A record in a database table (a row)
98
New cards

Field Name

  • The name of a column in a table
99
New cards

Data Type

  • Specifies the kind of values that can be stored in a column
100
New cards

Backup and Recovery Procedures

  • Processes to create backups
  • Restoring data after a failure