CAIE IGCSE Computer Science Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/86

flashcard set

Earn XP

Description and Tags

Flashcards for CAIE IGCSE Computer Science - Summarized Notes On The Theory Syllabus

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Binary System

Base 2 number system with values 0 and 1, where 0 represents OFF and 1 represents ON. The most left bit is called the MSB (Most Signi cant Bit)

2
New cards

Denary System

Base 10 number system with values from 0 to 9.

3
New cards

Hexadecimal (Hex)

Base 16 number system with values from 0 to 9 followed by A to F, where A represents 10 and F represents 15.

4
New cards

MSB

Most Significant Bit; refers to the leftmost bit in a binary number.

5
New cards

Overflow (Binary Calculations)

When adding two binary values, if the solution exceeds the limit of given bits, the extra bit is called overflow, indicating insufficient memory to store the result.

6
New cards

Logical Shift

Moving a binary value to the left or right, with the emptied bit becoming 0.

7
New cards

Two’s Complement

A method used to represent negative values in binary, where the MSB is replaced from 128 to -128.

8
New cards

ASCII

A standard character set that consists of 7-bit code representing letters, numbers, and characters, along with 32 control codes.

9
New cards

Unicode

A character encoding standard that supports multiple languages and more data, using up to four bytes per character. The rst 128 values are the same as ASCII.

10
New cards

Sampling Resolution (Bit Depth)

The number of bits per sample in digital audio, affecting the accuracy and memory usage of the sound file.

11
New cards

Sampling Rate

The number of sound samples taken per second, measured in Hertz (Hz), affecting the accuracy of the sound representation.

12
New cards

Colour Depth

The number of bits representing each colour in a bitmap image.

13
New cards

Image Resolution

The number of pixels that make up an image.

14
New cards

Pixelated

When a bitmap image is ‘ blurry ‘ or ‘ zzy ’ due to having a low amount of pixels in it or when zoomed

15
New cards

IECB System

1 kibibyte (1KiB) = 2^10 = 1024 bytes;1 mebibyte (1MiB) = 2^20 = 1 048 576 bytes; 1 gibibyte (1GiB) = 2^30 = 1 073 741 824 bytes; 1 tebibyte (1TiB) = 2^40 = 1 099 511 627 776 bytes; 1 pebibyte (1PiB) = 2^50 = 1 125 899 906 842 624 bytes

16
New cards

Conventional System

1 kilobyte (1KB) = 10^3 = 1 000 bytes; 1 megabyte (1MB) = 10^6 = 1 000 000 bytes; 1 gigabyte (1GB) = 10^9 = 1 000 000 000 bytes; 1 terabyte (1TB) = 10^12 = 1 000 000 000 000 bytes; 1 petabyte (1PB) = 10^15 = 1 000 000 000 000 000 bytes

17
New cards

MIDI (Musical Instrument Digital Format)

A communications protocol that allows electronic musical instruments to interact with each other, stored as a series of commands but no actual music notes.

18
New cards

MP3

A file format that uses audio compression to reduce file size by removing sounds that the human ear cannot hear properly, using a lossy format.

19
New cards

MP4

A format that allows the storage of multimedia files, including music, videos, photos, and animations.

20
New cards

JPEG (Joint Photographic Experts Group)

A file format used to reduce photographic file sizes through compression, reducing the raw bitmap image by a factor between 5 and 15.

21
New cards

Lossless File Compression

File compression where all data bits from the original file are reconstructed after uncompression, important for files where data loss would be disastrous.

22
New cards

Run-Length Encoding (RLE)

A lossless compression technique that reduces the size of a string of adjacent, identical data by encoding it into two values: the number of identical data items and the code of the data item.

23
New cards

Lossy File Compression

A file compression algorithm that eliminates unnecessary data bits, reducing file quality and making it impossible to get the original file back after compression.

24
New cards

Data Packets

broken down data sent as multiple parts; structure usually includes a header (sender/receiver IP, sequence), payload (data), and trailer (end identifier, error-checking)

25
New cards

Packet Switching

Method of data transmission where data is broken into multiple packets, sent independently, and reassembled at the receiver's computer.

26
New cards

Simplex Data Transmission

Data transmission in one direction only.

27
New cards

Half-Duplex Data Transmission

Data transmission in both directions, but not simultaneously.

28
New cards

Full-Duplex Data Transmission

Data transmission in both directions simultaneously.

29
New cards

Serial Data Transmission

Data sent one bit at a time over a single wire.

30
New cards

Parallel Data Transmission

Data of several bits (1 byte) sent down several wires at the same time.

31
New cards

USB (Universal Serial Bus)

An asynchronous serial data transmission method using a four-wire shielded cable.

32
New cards

Parity Checks

Error detection method using the number of 1-bits in a byte (even or odd parity).

33
New cards

Parity Blocks

Used to overcome the limitations of parity bits, changes in bits would be identi ed through the rows and columns

34
New cards

Checksum

Error detection method where the sender calculates a value using a specific algorithm, and the receiver recalculates and compares it to verify data integrity.

35
New cards

Echo Check

Error detection method where the receiver sends the data back to the sender for verification.

36
New cards

Check Digits

Digits calculated from all the other digits in the data (ex-codes) used to identify mistyping errors

37
New cards

Automatic Repeat Requests (ARQs)

Error detection method using acknowledgements and timeouts to ensure data is received correctly.

38
New cards

Encryption

Process of turning data into an unreadable form to protect it from unauthorized access.

39
New cards

Plaintext

Original data before encryption.

40
New cards

Ciphertext

Text produced after encryption.

41
New cards

Symmetric Encryption

Encryption using the same key for both encryption and decryption.

42
New cards

Asymmetric Encryption

Encryption using a public key and a private key.

43
New cards

CPU (Central Processing Unit)

The central component of a computer system, containing the Arithmetic and Logic Unit (ALU) and Control Unit.

44
New cards

ALU (Arithmetic Logic Unit)

Part of the CPU that carries out logic and arithmetic calculations.

45
New cards

Registers

CIR (Current instruction register), MAR (Memory address register), MDR (Memory data register), PC (Program counter), ACC (Accumulator).

46
New cards

Instruction Set

A list of all the commands that a CPU can process.

47
New cards

Overclocking

Using a clock speed higher than the computer was designed for.

48
New cards

Cache Memory

A small, fast memory within the CPU that stores frequently used instructions and data.

49
New cards

OCR (Optical Character Recognition)

A software which converts scanned documents into a text file format.

50
New cards

CAD (Computer-Aided Design)

Used in 3D scanners or to design a working model.

51
New cards

Barcode

A series of dark and light parallel lines of varying thicknesses representing numbers 0-9.

52
New cards

QR (Quick Response) Code

Another type of barcode that is Made up of a matrix of lled-in dark squares on a light background

53
New cards

ADC (Analogue-to-Digital Converter)

Converts physical values into digital

54
New cards

Actuators

The convert electrical signals to mechanical processes.

55
New cards

DLP (Digital Light Projector)

A projector that Uses millions of micromirrors which determines the resolution of the image

56
New cards

Primary Storage

Memory that The CPU directly accesses.

57
New cards

Secondary Storage

Memory that the CPU does not directly accesses.

58
New cards

RAM (Random Access Memory)

Volatile/temporary memory which that store; data, files It can be written to or read from, and the contents of the memory can be changed

59
New cards

ROM (Read Only Memory)

Non-volatile/permanent memories (contents remain even when ROM is turned o ) Used to store start-up instructions (basic input/output systems) Data/contents of a ROM chip can only be read and cannot be changed

60
New cards

O -Line Storage:

CD/DVD Disks with laser(red) light that is used to read and write data on the surface of the disk. A thin layer of metal alloy is used to store data.

61
New cards

Cloud Storage

A method of data storage where data is stored on remote servers The same data is stored on more than one server in case of maintenance or repair, allowing clients to access data at any time.

62
New cards

Embedded System

A combination of hardware and software is designed to carry out a speci c set of tasks.

63
New cards

NIC (Network Interface Card)

A network interface card (NIC) is needed to allow a device to connect to a network (such as the Internet).

64
New cards

MAC

Media Access Control is 48 bits which are shown as six groups of hexadecimal digits indicating the device serial number

65
New cards

IP

Two types of IP addresses: static and dynamic where the network allocates IP addresses

66
New cards

Operating Systems

Systems designed to establish communication between the user and the computer

67
New cards

WIMP

Windows, Icons, Menu, and Pointing Devices.

68
New cards

BIOS (Basic Input/Output System)

It Tells the computer the location of the OS in the storage

69
New cards

High-Level Languages

Easier to read and understand as the language is closer to human language

70
New cards

Low-Level Languages

Refer to machine code; Binary instructions that the computer understands

71
New cards

Compiler

Translates a program written in a high-level language into machine code Used without compiler Executable file of machine code produced

72
New cards

Interpreter

Executes a high-language program a statement at a time No executable file of machine code produced

73
New cards

Assembler

Translates a low-level language program into machine code Executable file of machine code produced

74
New cards

IDEs (Integrated Development Environments)

An IDE would usually have these features - Code Editor Translator Debugger Error Reports Auto-Completion and Auto-Correction Auto-Documenter Pretty Printing

75
New cards

System Software

These are a set of programs which control and manage the operations of hardware. gives a platform for other software to run

76
New cards

Application Software

Allows a user to perform speci c tasks using the computer’s resources

77
New cards

Utility Software

Computer users have access to utility programs as part of system software Utility programs can be initiated by the user or run in the background without user input

78
New cards

Internet

Uses transmission protocols such as TCP and IP (Internet Protocols) Allows the user to communicate with other users via chat, email, calling and more Worldwide Collection of Interconnected Networks and Devices

79
New cards

World Wide Web (WWW)

Collection of webpages and other information on websites Uses HTTP(S) protocols that are written using Hypertext Mark-up Language (HTML) URLs (Uniform Resource Locator) are used for the location of the web pages

80
New cards

Cookies

Small files stored on the user’s computer They are used to track data about the users and auto fill forms or give suggestions accordingly

81
New cards

Blockchain Network

Network that involves several interconnected computers where the transaction data is stored Hacking isn’t possible here as transaction details would be sent to all the computers, and the data can’t be changed without the consent of all the network members

82
New cards

Malware

Stands for Malicious Software. A few examples are - Virus, Ransomware, Adware, Trojan Horse, Spyware, Worms

83
New cards

Phishing

Attackers send legitimate-looking emails to bait the user into giving out their information.

84
New cards

SSL (Secure Socket Layer)

It is Set of rules used while communicating with other users on the internet.

85
New cards

Automated Systems

Are a combination of software and hardware designed to function without human intervention.

86
New cards

Robotics

It is branch of computer science that combines robot design, construction and operation.

87
New cards

Artificial Intelligence AI

Is the branch of computer science that simulates intelligent human behaviour.