CS Full Summary.docx

studied byStudied by 0 people
0.0(0)
get a hint
hint

Binary

1 / 71

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

72 Terms

1

Binary

A base-2 numeral system used by computers to represent data and program instructions with each digit being a bit.

New cards
2

Signed Integers

Negative integers represented in binary using sign and magnitude or two’s complement, where the leftmost bit is the Most Significant Bit (MSB).

New cards
3

Shifts and overflows

Techniques in binary arithmetic including logical and arithmetic shifts, where overflow occurs when the value exceeds the maximum storable value.

New cards
4

Hexadecimal Notation

A base-16 numeral system used to store larger numbers efficiently and convert between hexadecimal and binary easily.

New cards
5

ASCII and Unicode

ASCII is a 7-bit character set encoding text data, while Unicode is a character set encoding all characters using 8-bit, 16-bit, or 32-bit encoding.

New cards
6

Bitmap images

Images represented in binary through pixels, resolution, and color depth, where the file size is determined by multiplying resolution and color depth.

New cards
7

Sound in Binary

Representation of sound in binary through analog-to-digital conversion, involving sample rate and bit depth to store analog data digitally.

New cards
8

Binary Multiples

Understanding and converting between binary and denary multiples like bits, nibbles, bytes, kilobytes, megabytes, gigabytes, and terabytes.

New cards
9

Data Compression

Techniques to reduce data size including lossy and lossless compression methods like JPEG and MP3 algorithms.

New cards
10

Data Encryption

Scrambling data to make it unreadable to unauthorized users using symmetric and asymmetric encryption methods like HTTPS connections.

New cards
11

IPO Model

Input-Process-Output model describing the structure of information processing programs with input, process, and output levels.

New cards
12

Computational Models

Range of computational models including sequential, parallel, and multi-agent models to study and describe algorithms.

New cards
13

Hardware Components

Functions of computer hardware components like CPU, main memory, secondary storage, and input/output devices and how they work together.

New cards
14

Types of Memory

Understanding different memory types like RAM, ROM, cache, and virtual memory and their functions in a computer system.

New cards
15

Virtual Memory

Increases physical memory efficiency but can lead to performance decline due to swap speed and disk thrashing.

New cards
16

Von Neumann Model

Stores programs as data and instructions in the same memory, involving the fetch-decode-execute cycle.

New cards
17

Fetch-Decode-Execute Cycle

Processor follows this cycle to process instructions, involving fetch, decode, and execute stages.

New cards
18

Control Unit

Executes instructions, generates control signals, and ensures component synchronization through clock signals.

New cards
19

Arithmetic Logic Unit (ALU)

Performs calculations and logical operations within the CPU.

New cards
20

Clock

Generates signals to synchronize CPU actions, determining the speed of the fetch-decode-execute cycle.

New cards
21

Register

Short-term memory store close to the CPU, holding various types of data.

New cards
22

Buses

Cables carrying data between different parts of the computer, including address, data, and control buses.

New cards
23

CPU Performance Factors

Include clock speed, number of processor cores, cache size, and cache type, affecting CPU efficiency.

New cards
24

Physical Storage Types

Include magnetic, optical, and solid-state storage, each with unique characteristics and advantages.

New cards
25

Cloud Storage

Involves storing data among multiple servers hosted by a company, offering cybersecurity and accessibility benefits.

New cards
26

Embedded Systems

Designed for specific tasks, these systems are cost-effective, low-power, and often interconnected by the Internet.

New cards
27

Operating System

Manages files, processes, hardware, and the user interface, providing essential functions for computer operation.

New cards
28

Utility Software

Includes tools for managing, repairing, and converting files, as well as compression, defragmentation, and security functions.

New cards
29

Simulation Software

Used to model real-world aspects for testing purposes, requiring powerful processors for accurate results.

New cards
30

System Software vs

System software enables computer operation, while application software performs specific tasks for users.

New cards
31

High-Level Languages

Offer strong abstraction and ease of understanding for programmers, requiring compilers or interpreters for execution.

New cards
32

Language Processors

Include assemblers, compilers, and interpreters, each with advantages and disadvantages in translating programming languages.

New cards
33

Networks

Connect electronic devices for communication, sharing resources, and centralized management, but can pose security risks.

New cards
34

Network Types

Include LANs, WANs, and PANs, each serving different geographical areas and usage models like client-server and peer-to-peer.

New cards
35

Wired and Wireless Connections

Differ in transmission methods, speed, security, and installation requirements, offering unique advantages and disadvantages.

New cards
36

Network Protocols

Define communication rules between devices, including HTTP, HTTPS, TCP/IP, Ethernet, Wi-Fi, FTP, and email protocols.

New cards
37

File Transfer Protocol (FTP)

Used in the application layer for transferring files over TCP/IP stacks, typically unencrypted.

New cards
38

IMAP, POP3, and SMTP

Email application protocols in the application layer for storing, downloading, and sending emails.

New cards
39

Transmission Control Protocol (TCP)

Transport layer protocol that breaks down data into packets, assigns sequence numbers, and ensures data integrity.

New cards
40

Internet Protocol (IP)

Network layer protocol assigning source/destination IP addresses and moving packets between network nodes.

New cards
41

Ethernet

Link layer protocol for wired LANs, standardizing physical and data link layers.

New cards
42

Wi-Fi

Link layer protocol for WLANs, standardizing wireless data transmission.

New cards
43

4-Layer TCP/IP Model

Describes the layered protocol stacks including application, transport, network, and data link layers.

New cards
44

Bus Topology

Network topology where devices are connected by a single cable, managing collisions with CSMA/CD.

New cards
45

Ring Topology

Network topology with devices in a closed loop, allowing easy addition of devices but prone to failures.

New cards
46

Star Topology

Network topology where devices connect to a central point, ensuring no data collisions.

New cards
47

Mesh Topology

Network topology where devices are connected to many others, offering high performance but difficult to manage.

New cards
48

Mobile Networks (3G, 4G, 5G)

Generations of mobile technology offering wireless access to the Internet with varying speeds and encryption levels.

New cards
49

Network Security

Importance of securing networks through validation, authentication, access control, physical security, and firewalls.

New cards
50

Cyber Attacks

Different forms of attacks like phishing, shoulder surfing, unpatched software, USB devices, and eavesdropping.

New cards
51

Vulnerability Detection

Methods like penetration testing, ethical hacking, commercial tools, and policy reviews to identify weaknesses.

New cards
52

Cyberprotection

Techniques to protect software systems from attacks, including audit trails, secure coding, and effective network security.

New cards
53

Internet

Global network structured with IP addressing and domain name systems for identifying devices and translating domain names.

New cards
54

World Wide Web (WWW)

Collection of web pages accessed through web browsers, ISPs, and protocols like HTTP/S and HTML.

New cards
55

IPv4 and IPv6

IP addressing standards with IPv4 using 4 bytes and IPv6 using 16 bytes for addresses.

New cards
56

Internet Access Components

Modems, routers, switches, and wireless access points combine to provide internet connectivity.

New cards
57

Encryption

Technique that prevents unauthorized access to data by converting it into a code

New cards
58

Cookie cleaners

Software designed to detect and remove small data files that track browsing history

New cards
59

Anti-spyware program

Software that protects against spyware, which gathers information without consent

New cards
60

Identity management service

Third-party entity providing identifiers for secure transactions without revealing personal information

New cards
61

Digital Inclusion

Ensuring affordable access to technology for all individuals

New cards
62

Digital divide

Disparity in access to technology due to bans, affordability, or lack of resources

New cards
63

Professionalism

Ethical behavior adhering to the British Computer Society's code of conduct

New cards
64

Intellectual property

Unique creative products with commercial value protected by copyrights

New cards
65

Licensing

Terms specifying the use of software copies to prevent unauthorized distribution

New cards
66

Open software

Freely available software that can be modified and built upon by users

New cards
67

Proprietary software

Protected software that cannot be modified or redistributed without permission

New cards
68

Computer Misuse Act

Legislation preventing unauthorized access to computer systems

New cards
69

AI

Machines capable of performing tasks at the level of intellectual beings like humans

New cards
70

DNA Computing

Storing data using DNA's properties for faster and more efficient processing

New cards
71

Nanotechnology

Technology reducing the size of transistors for various applications like self-cleaning glass and medicine

New cards
72

Quantum computing

Utilizing qubits to perform calculations faster and more efficiently than traditional computers

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 57 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 47 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard32 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard69 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard27 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard25 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard80 terms
studied byStudied by 36 people
Updated ... ago
5.0 Stars(1)