GCSE Computer Science - paper 1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/112

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

113 Terms

1
New cards

Central Processing Unit (CPU)

processes data and instructions by following the:

FETCH- DECODE- EXECUTE cycle

2
New cards

Control Unit (CU)

¬ executes program instructions by following FDE cycle

- controls data flow inside CPU to registers and outside CPU

- Overall control of CPU

3
New cards

Program Counter (PC)

holds memory address of the instruction for each cycle

4
New cards

cache

¬ very fast memory but slower than registers.

- Stores regularly used data to access quickly.

- low capacity but expensive

- different levels (l1 quickest but lowest capacity)

5
New cards

von neuman architecture

data and instructions stored together in memory

6
New cards

Memory Address Register (MAR)

holds the memory address about to be used by the CPU, which can point to specific data or CPU instructions

7
New cards

Memory Data Register (MDR)

holds the data or instructions fetched from memory or waiting to be written to memory

8
New cards

Arithmetic Logic Unit (ALU)

¬ carries out calculations and logical operations.

- contains accumulator which is used to store intermediate results and calculations

9
New cards

clock speed

¬ the speed which instructions are executed in cycles per second.

- measured in hertz

- 500MHz = 500 mill instructions

- 3GHz = 3 bill instructions

10
New cards

embeded systems

computers built into a larger system that perform specific tasks with one circuit board

11
New cards

accumulator

intermediate results of logic and arethmetic results are stored

12
New cards

core

¬ process data independantly

- more cores = instructions processed faster

13
New cards

Random Access Memory (RAM)

¬ main memory

- volatile (loses data when off)

- more RAM = better performance

- stores: applications, GUI, OS

14
New cards

Read Only Memory (ROM)

¬ CPU reads instructions from ROM

- non-volatile (keeps data when off)

- smaller capacity

- stores: BIOS

15
New cards

Dynamic Random Access Memory (DRAM)

used as main memory

16
New cards

Static Random Access Memory (SRAM)

¬ used for cache memory

- small capacity

- fast access

17
New cards

virtual memory

¬ memory temporarily created on storage drive

- used when RAM is full

18
New cards

Fetch-Decode-Execute cycle (fetch)

1# copy memory address from PC to MAR

2# copy instructions stored in MAR to MDR

3# increment PC to point to address for next instruction

19
New cards

Fetch-Decode-Execute cycle (decode)

4# instruction in MDR decoded by CPU

20
New cards

Fetch-Decode-Execute cycle (execute)

5#instruction performed

# load data, calculations, logic operations, hault program

21
New cards

flash memory

¬ programmed electronically

- non- volatile

- used in: SD cards, USB sticks...

- fast

- portable

- no moving parts

- more expensive

- capacity smaller than HDD

22
New cards

primary storage

¬ memory areas where CPU can access quickly

- fastest read / write speeds

- mostly volatile

- registers

- cache

- ROM

- RAM

23
New cards

secondary storage

¬ where data is stored when not in use

- non- volatile

- (HDD, SSD)

- read / write speeds much slower than primary storage

24
New cards

tertiary storage

¬ used for archives and back ups for large amounts of data

- non- volatile

- stores data long term

25
New cards

magnetic storage

- demagnetised (0)

- magnetised (1)

- moving parts to read / write disk

- LARGE capacity (3TB)

- low cost

- fast read / write time

- not very portable

- can be damaged (heat, magnetic field)

- generally reliable

26
New cards

Solid State Drive (SSD)

¬ used for internal storage

- no moving parts

- use flash memory

- back up and transport data

- much faster read/ write times than HDD

- up to 500GB

27
New cards

Hard Disk Drive (HDD)

¬ traditional internal storage for laptops / PCs

- made from stack of magnetised metal disks

- data stored magnetically in sectors within circular tracks

- heads on arms access sectors on disk

- portable HDDs back up and transport large data amounts

- long lasting (reliable)

- can be damaged by dropping

28
New cards

HDD advantages

# cheaper

# higher capacity

# longer read / write life

29
New cards

SSD advantages

# faster

# don't need defragmentation

# more shock- proof

# don't make any noise

30
New cards

optical discs

¬ data is held on a reflective disk

- laser beam shined on disk

- reflect (0)

- doesn't reflect (1)

- CD = 700MB

- DVD = 4.7GB

- Blu-Ray = 25GB

- CD-ROM = read- only

- CD-R = write- once

- CD-RW = rewritable

- cheap per GB

- portable

- robust (can easily be scratched though)

- slow transfer speed compare to SSD

31
New cards

Operating System (OS)

¬ runs and maintains a computer system

- provides a UI (GUI)

- command line interface is text based, specific commands and knowledge needed to understand

- can run multiple tasks

- handles files and disk management (defrag)

- allow single-user or multi-user (i.e windows 10 = 1, bank ATMs = multiple)

32
New cards

defragmentation

¬ reorganises data on HD by putting fragmented files together

- if files are all together, read / write times much quicker and easier to find

33
New cards

full back up

¬ copy of every file on system

- use lots of storage space

- faster to restore from

- slow process

34
New cards

incremental back up

¬ files created / edited from last back up are copied

- less storage space

- much quicker to create

- full system restore slow

35
New cards

compression software

¬ reduces file size for less disk space used

- need to be extracted before use

36
New cards

encryption software

¬ scrambles data

- stop third parties from accessing

- data decrypted using special key

37
New cards

open source software

- python,

✔ source code provided with software

✔ usually free download

✔ able to edit and distribute changes

✔ social support forums

✔ good for companies with small budgets

-----------------------------------------------

✘ expert needed for debugging

✘ may need additiona support bought

✘ open to malicious code

✘ may take a while to fix

✘ no warranties

38
New cards

propietary software

- windows word

✔ free customer support

✔ professional standards

✔ tailored to market needs

✔ issues more likely to fix quicker

✔ may contain more features

--------------------------------------

✘ expensive

✘ rely on one company

✘ not personalised to customers

✘ may be limited updates

39
New cards

network

two or more computers connected together to share information and resources

40
New cards

Local Area Network (LAN)

¬ covers small geographic area

- hardware owned by organisation who use it

- can share resources

- centralised management

- network manager needed

- security issues

- used in schools and homes

41
New cards

Wide Area Network (WAN)

¬ covers large geographical areas

- cables owned by others (BT, Vodafone...)

- connects LANs

- may be town, internet, different countries

42
New cards

cloud storage

¬ stores files and programs online

- infro can be shared

- may need to pay but unlimited

- speed depends on network

- only work on internet

- backup handled by provider (google, dropbox...)

- easier to hack

- google drive, dropbox...

43
New cards

bandwidth

amount of data transferred in a given time

44
New cards

network traffic

badwidth shared so slows network

45
New cards

latency

time delay between sending and receiving

46
New cards

what affects wireless network performance

# distance from Wireless Access Point (WAP

# physical objects (walls)

# interference from other devices

# weather

47
New cards

Wireless Access Point (WAP)

allows devices to connect to WAN using WiFi

48
New cards

router

connects two networks together (LAN and WAN) transmits data between them (packets)

49
New cards

Network Interface Card (NIC)

used to connect device to network by gaining MAC address

50
New cards

ethernet

twisted pair to reduced interference

51
New cards

fibre optic

data transmitted as light , fast but expensive. Longer distance = less interference

52
New cards

switch

connects to devices by getting MAC address to send data to correct device using internal index, reducing data collisions

53
New cards

coaxial cable

single copper wire covered in plastic for insulation with metal mesh to stop interference. Connect tv for freeview

54
New cards

hotspot

location to connect to WAP

55
New cards

WiFi

¬ standard use for wireless networks

- two radio frequencies (2.4GHz / 5GHz)

- split into bands covering small frequency range

- affected by interference from networks using close channels

56
New cards

client server

¬ network managed by a server

- files stored centrally

- stores user profiles, passwords, and access information

----------------------------------------------------

1# clients send request to server

2# processes request and responds

57
New cards

peer to peer

¬ all devices equal

- devices connect directly to each other

- used at home to share files between devices or connect to printer

58
New cards

client server (advantages and disadvantages)

✔ easy to manage network security

✔ easier to track files (central)

✔ servers reliable and always on

✔ easy to update software

---------------------------------------------------

✘ need it specialist to maintain

✘ expensive to set up

✘ may become overloaded if too many clients accessing at once

✘ dependant on server (if server down, clients lose access to work)

59
New cards

peer to peer (advantages and disadvantages)

✔ easy to maintain

✔ not deoendant on server

-------------------------------------------------

✘ no central management

✘ file copies between devices = duplicates

✘ easy to lost track of what stored and which files up to date

✘ if one machine fail = data lost

✘ machines slow if other devices access

60
New cards

internet

worldwide collection of interconnected networks

61
New cards

Uniform Resource Locator (URL)

an address used to access web servers and resources

62
New cards

Domain Name Server (DNS)

a server that stores website domain names and IP addresses (like an address book for them)

63
New cards

domain name

the name of the website (google / youtube...)

64
New cards

hosting

register a unique domain name and pay to place content on webserver

65
New cards

mesh network

¬ devices connected directly to each other

- send data along fastest route

- expensive, lots of cables needed

<p>¬ devices connected directly to each other</p><p>- send data along fastest route</p><p>- expensive, lots of cables needed</p>
66
New cards

star network

¬ connected to central switch or server

- device / cable failure doesn't affect rest of network

- easy to add more devices

- better performance

- problem with server affects whole network

- every device needs cable to server

<p>¬ connected to central switch or server</p><p>- device / cable failure doesn't affect rest of network</p><p>- easy to add more devices</p><p>- better performance</p><p>- problem with server affects whole network</p><p>- every device needs cable to server</p>
67
New cards

virtual network

¬ software based network

- can exist on same physical network

- Virtual Private Network (VPN) sends data securly over large network (internet)

- has own security (specific login details, firewall)

68
New cards

the cloud

✔ users can access files from any connected device

✔ easily increase storage capacity

✔ no expensive hardware

✔ IT staff not needed

✔ provides security and backups

✔ updated automatically

---------------------------------------------------

✘ need internet connection

✘ dependant on host for security and backups

✘ data vulnerable to hackers

✘ unclear ownership

✘ subscription fees may be expensive

69
New cards

protocol

set of rules how devices communicate and how data is transmitted across a network from start to end and how it should be organised

70
New cards

MAC address

a unique identifier assigned to a device that can't be changed.

- 64 bit binary number

- converted into hexadecimal

71
New cards

Transmission Control Protocol (TCP)

# how devices connect on network

# checks data sent and delivered correctly

# splits data into packets

72
New cards

Internet Protocol (IP)

#responsible for packet switching

73
New cards

Simple Mail Transfer Protocol (SMTP)

# sends emails

# transfer emails between server

74
New cards

Hyper Text Transfer Protocol (HTTP)

# communicate with web servers

# used by web browsers to access websites

75
New cards

Hyper Text Transfer Protocol Secure (HTTPS)

# secure version of HTTP

# encrypts all information sent and received

76
New cards

Post Office Protocol (POP3)

# retrieves emails

# server holds email until downloaded then is deleted

77
New cards

File Transfer Protocol (FTP)

# access, edit and move files

78
New cards

Internet Message Access Protocol (IMAP)

# access emails from server

# copy stays on server until you delete

79
New cards

Layer 1 (Data Link Layer)

# ethernet protocol

- how bits are sent as electrical signal over cables

- passes data over physical network

80
New cards

Layer 2 (Network Layer)

# IP protocol

- used by router

- makes connections between networks

- directs data packets and traffic handling

81
New cards

Layer 3 (Transport Layer)

# TCP protocol

- splitting data into packets

- controlling data flow

- check packets are sent and delivered correctly

82
New cards

Layer 4 (Application Layer)

# HTTP, FTP, SMTP protocols

- turning data into websites and other applications

83
New cards

Packet switching

1# sending device splits data in packets to send across network, each with packet number to show order of data

2# router reads packet header and decides where to direct packet according to IP rules

3# network traffic affects packet path so different routes taken, if too many sent router prioritises

4# packets arrive in wrong order from different journeys, receiving device puts in right order with packet number

5# receiving device checks all packets received, if no then time out message sent

6# receipt sent to sending device if all date there

84
New cards

SQL injection

malicious code inserted into database field on website to corrupt or steal data

85
New cards

phishing

emails or texts from well known companies with links designed to steal money and details

86
New cards

malware

deletes files, lock files, moniter actions, alter permissions, open backdoors

87
New cards

viruses

installed without user knowledge and will replicate

88
New cards

worms

like viruses but self replicate and spread quickly. find weakness in network security

89
New cards

trojans

desguised as software and users install without realising purpose

90
New cards

passive attack

someone moniters data travelling on a network and intercepts sensitive information using packet sniffers

91
New cards

active attack

an attack to a network using malware

92
New cards

insider attack

someone within an organisation exploits their network access to steal information

93
New cards

brute force attack

try to guess passwords and usernames by trial and error by using software to produce likely passwords

94
New cards

denial of service attack (DOS)

a hacker tries to stop users accessing part of a network or website by flooding a network with useless traffic and making it slow and inaccessable

95
New cards

social engeneering

# phishing, over phone

influencing people to give over sensitive information by pretending to be companies over phone

96
New cards

network policy

a set of rules and procedures the organisation follows to ensure their network is safe from attacks and unauthorised access

97
New cards

penetration testing

specialists stimulate potential attacks on their network to identify possible weaknesses

98
New cards

network forensics

investigations to find cause of attacks by having a system of capturing data packets as they enter a network

99
New cards

passwords

prevent unauthorised access by using many characters and a combination of letters numbers and symbols and changing regularly

100
New cards

user access level

which part of the network different groups of people can access, business managers likely to have high access level to access more sensitive data to help prevent insider attacks