Study Guide for Computing Units 1-9

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Fetch-Decode-Execute-Store

The basic cycle of how computers process information.

2
New cards

Binary Number System

A base 2 system used by computers to represent data.

3
New cards

1 byte

Equals 8 bits.

4
New cards

Lossy Compression

A data compression method that reduces file size by removing some data.

5
New cards

Lossless Compression

A compression technique that allows the original data to be perfectly reconstructed from the compressed data.

6
New cards

CPU

the primary component of a computer that performs most of the processing.

7
New cards

HDD

a traditional storage device using spinning disks to read/write data.

8
New cards

SSD

Solid State Drive, a storage device that uses flash memory to store data.

9
New cards

Terminal

A text-based method of interacting with a computer.

10
New cards

GUI

Graphical User Interface, a visual way of interacting with a computer using windows, icons, and menus.

11
New cards

Logic Gates

Basic components of digital circuits used to perform logical operations.

12
New cards

AND Gate

A logic gate that outputs true only if all inputs are true.

13
New cards

OR Gate

A logic gate that outputs true if at least one input is true.

14
New cards

NOT Gate

A logic gate that outputs the inverse of the input.

15
New cards

Modem

A device that modulates and demodulates signals for data transmission.

16
New cards

Router

A device that routes data between networks.

17
New cards

UDP

User Datagram Protocol, a fast but unreliable data transfer method.

18
New cards

TCP

Transmission Control Protocol, a reliable but slower data transfer method.

19
New cards

Cookies

Small data files stored on the user's computer by the web browser.

20
New cards

Encryption

A method of securing data by converting it into a coded format.

21
New cards

DDoS Attack

Distributed Denial of Service, an attempt to make a machine or network resource unavailable.

22
New cards

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

23
New cards

Function

A block of code that performs a specific task and can be reused.

24
New cards

Variables

Storage locations identified by a name that hold data which can be changed during program execution.

25
New cards

Flow Chart

A diagram that represents a process or algorithm.

26
New cards

Loop

A programming construct that repeats a group of commands.

27
New cards

Function Parameters

Variables that are passed to a function to define its behavior.

28
New cards

Variable-Length Arguments

Allows a function to accept a variable number of arguments.