Computing Paper 1 OCR

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/132

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

133 Terms

1
New cards

Arithmetic Logic Unit (ALU)

Carries out all arithmetic calculations and logical decisions

2
New cards

Control Unit (CU)

coordinating all activities around CPU

3
New cards
Registers
Quick, small stores of data within the CPU
4
New cards

Memory Address Register (MAR)

Holds address of memory location for data to be fetched from or sent to

5
New cards

Memory Data Register (MDR)

Stores data to be fetched from memory or to be sent to memory

6
New cards
Accumulator
Stores results of calculations in the ALU
7
New cards

Program Counter (PC)

Holds address of next instruction instruction to be processed

8
New cards

Fetch( Relating to registers)

Address of next instruction copied from PC placed in MAR, now containing a memory address

CU fetches that data copying to MDR

PC incremented to next instruction to be processed

9
New cards

Decode(Relating to registers)

MDR contains either data fetched from memory/instruction. CU decoding it to see what to do next

10
New cards

Execute( Relating to registers)

May include using ALU, locating data in memory, changing pc value etc

11
New cards
Embedded System
A computer system built within a large device e.g. Camera, washer, car
12
New cards
Volatile

Memory loses its data when power off

13
New cards
Non-volatile
Memory retains its data when power is lost
14
New cards

Random Access Memory (RAM)

Read/write - function is to load open programs and operating system data currently in use - volatile requiring power

15
New cards

Read Only Memory (ROM)

Can only be read, can't be changed, stores essential programs to be run in order to boot the computer - non-volatile, doesn’t require power to maintain content

16
New cards
Cache
A type memory that stores copies of frequently used data, much faster than RAM, lower capacity - closer to CPU
17
New cards

Central Processing Unit (CPU)

Processes all of the data and instructions that make the system work

18
New cards

Clock speed

Number of cycles per second

19
New cards

virtual memory

Uses part of hard drive as extra RAM

Helps when you don’t have enough RAM

Moving less-used data from RAM to hard drive freeing RAM

When data is needed again it is moved back to RAM

20
New cards
Flash memory
Solid state storage, non-volatile, more reliable/durable but can only be overwritten a limited number of times
21
New cards
Graphics Processing Unit (GPU)
Handles graphics and image processing
22
New cards

Optical storage

Using lasers to read data

CD, DVD, Blue-ray

23
New cards

Advantages, disadvantages of optical

ADV: cheap, easy to transport

DIS: slow, less storage than hard drives, stored data degrades over time, cannot be written over

24
New cards
Magnetic storage

Rotating magnetic disks with a read/write head moves across surface

Hard drives

25
New cards

Advantages and disadvantages of magnetic

ADV: fast access, stores large amounts of data, low cost

DIS: not very portable, easily be broken, Higher power requirements

26
New cards
Solid State storage

Flash memory

USB, flash memory, SD

27
New cards

Advantages and disadvantages of Solid state

ADV: fast, small, light, robust, quiet, No moving parts, low power requirements

DIS: more expensive, storage capacity less, limited number erase/write cycles

28
New cards
Cloud stotage
Data is stored on multiple servers in a remote location
29
New cards

Advantages and disadvantages of cloud storage

DIS: needs internet, download and upload can be effected by internet connection, less control if data is held

ADV: secure, can be accessed anywhere, no need to buy

30
New cards
Operating System
essential software that links the hardware and other software together and generally manages the computer system
31
New cards
Command-line Interface
Text commands where user has to type in command
32
New cards
Graphical User Interface (GUI)
uses icons and other visual indicators to navigate and issue commands
33
New cards
Utility Software

Software that helps configure and analyse performance to ensure it’s running effectively

34
New cards
Defragmentation Software
reorganises data on the hard drive to put fragmented files back together and moves files to collect all the free space
35
New cards

Compression Software

reduces file size so they take up less space in storage

36
New cards

Encryption Software

converts data into a coded format 

cannot be understood when intercepted

Uses algorithm and key to convert plaintext into cyphertext and viceversa

37
New cards
Open Source Software
source code is made freely available and users can modify it
38
New cards

Advantages and disadvantages of open source

ADV: free, ,made for greater good, can be adapted

DIS: small, buggy, security holes, no warranties, no customer support

39
New cards
Proprietary Software
only the compiled code is released and the source code is kept a secret
40
New cards

Advantages and disadvantages of proprietary software

ADV: warranties, well-tested, reliable, cheaper

DIS: expensive, software may not fit user needs

41
New cards
Local Area Network (LAN)
a network that connects devices close to each other e.g. school, house
42
New cards
Wide Area Network (WAN)
a network within a large geographical area e.g. internet
43
New cards
Bandwidth
amount of data that can be transferred in a given time
44
New cards

Network Interface Card (NIC)

component allow a device to connect to a network

45
New cards

Switch

Allows data to be passed between devices in network

46
New cards
Router
responsible for transmitting data between networks
47
New cards

Ethernet

Protocol for connecting devices on wired WAN

48
New cards

Client-server Network

client has connection to server and request resources, servers can backup and store centrally but can be expensive and difficult to maintain

49
New cards
Peer-to-peer Network
no central server, each computer equal in responsibility, have to work as both server and a client.
50
New cards
Star Topology

ADV: better performance, rest of network not affected in one fails, simple to add more devices

DIS: wire needed for all devices, expensive

51
New cards
Mesh Topology

ADV: faster

DIS: expensive

52
New cards

MAC Address

assigned to all devices, unique to all devises and cannot be changed, permanent, identifies the actual device.48 bits/6 groups of 2 hexadecimal digits

e.g. 1A:5B:6C:98:78:35

53
New cards

IP Address

assigned either manually or automatic, the location of your device on the internet

54
New cards
Packet Switching
split data into packets to be sent across the network, each packet given a number order of data, each router reads packet header and decides which way to send it according to IP rules, packets then arrive and reassemble them in the right order.
55
New cards
TCP/IP
sets of rules for how devices connect on the network.
56
New cards
Hyper Text Transfer Protocol (HTTP)
used to access websites and communicate with web servers
57
New cards
HTTPS
more secure - encryption
58
New cards
File Transfer Protocol (FTP)
used to access, edit and move files between devices
59
New cards
Post Office Protocol (POP3)
used to retrieve emails from a server, holds until download - then deletes from server
60
New cards
Internet Message Access (IMAP)
used to retrieve emails, server holds until you actually delete it- only download a copy
61
New cards
Simple Mail Transfer Protocol (SMTP)
used to send emails, used to transfer emails between servers
62
New cards

Layer advantages

ADV: manageable pieces, self-contained can change without effecting others

63
New cards
Domain Name Server (DNS)
translates websites' domain name into its IP address
64
New cards
Phishing
used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.
65
New cards
Shouldering
used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
66
New cards
Malware
malicious software - computer programs designed to infiltrate and damage computers without the users consent.
67
New cards
Virus
program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
68
New cards
Worm
program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
69
New cards
Trojan Horse
program which misleads users of its true intent.
70
New cards
Brute Force Attack
trail and error to gain information
71
New cards
Denial of Service Attack (DOS)
hacker stop users from accessing a part of a network, flooding network with useless traffic making computer very slow
72
New cards
Data Interception And Theft
The unauthorized taking or interception of computer-based information. Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
73
New cards
SQL Injection
programming language used to search and query databases.
74
New cards
Penetration Testing
organisations employ specialists to stimulate potential attacks on their network
75
New cards
Anti-malware Software
designed to find and stop malware from damaging a network
76
New cards
Encryption
data is translated into code which only someone with the correct key can access
77
New cards

Data Protection Act

Data must be processed lawfully/fairly

Used for declared purposes only

secure

not kept longer than necessary

78
New cards

Computer Misuse Act

Cannot have unauthorised access with intent to

commit further offences

intent to modify computer material

79
New cards

Copyright Act

protect intellectual property

Cannot give copy to friend

No selling

No renting without permission

80
New cards

Advantages and disadvantages of more clock speed

ADV: Faster the clock speed more instructions can be completed per second

DIS: If CPU can’t keep up data can be corrupted. can overheat

81
New cards

Number of cores

Can process instructions simutaneously splitting work among cores 

Can only work with software that was designed to be used with multiple cores

82
New cards

Primary Storage

Storage for data CPU needs to access quickly

83
New cards

Secondary storage

Non-volatile storage

84
New cards

ASCII

7 bit code representing alphabet, numbers, some symbols

85
New cards

Unicode

16 bit code which can represent many characters with wide range of symbols

86
New cards

Pixels

Smallest element of an image

Stored as binary code

87
New cards

How to find colours that can be stored in a pixel

2 to the power of bits

88
New cards

Resolution

Amount of pixels per unit of measurement

89
New cards

Higher colour depth

better looking image

larger file size

90
New cards

Higher resolution

Made larger without losing resolution

91
New cards

Fetch

Instruction in the form of data retrieved from main memory

92
New cards

Decode

Instruction converted to readable format

93
New cards

Execute

CPU performs action according to instruction

94
New cards

Von Neumann Architecture

Data and instructions stored in the same memory

95
New cards

Examples of metadata

Image resolution

colour depth

Image width

Image height

File type

Date created

Sample rate

96
New cards

Why we use binary

Computers use switches which can only be either on/off

Binary can represent on/off using digits 1/0

97
New cards

Why is hexadecimal used

Preferred when working with large values

Shorthand binary calculations

Takes fewer digits to represent values than in binary

Helpful as more bits harder to read, prone to errors

98
New cards

Overflow error

Occurs when number becomes to large to store the number of bits available

99
New cards

Text file size formula

Number of characters*bits per character

100
New cards

Image file size formula

Colour depth*Image height*Image width