CS Full Summary.docx

0.0(0)
studied byStudied by 6 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:06 AM on 5/23/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

72 Terms

1
New cards

Binary

A base-2 numeral system used by computers to represent data and program instructions with each digit being a bit.

2
New cards

Signed Integers

Negative integers represented in binary using sign and magnitude or two’s complement, where the leftmost bit is the Most Significant Bit (MSB).

3
New cards

Shifts and overflows

Techniques in binary arithmetic including logical and arithmetic shifts, where overflow occurs when the value exceeds the maximum storable value.

4
New cards

Hexadecimal Notation

A base-16 numeral system used to store larger numbers efficiently and convert between hexadecimal and binary easily.

5
New cards

ASCII and Unicode

ASCII is a 7-bit character set encoding text data, while Unicode is a character set encoding all characters using 8-bit, 16-bit, or 32-bit encoding.

6
New cards

Bitmap images

Images represented in binary through pixels, resolution, and color depth, where the file size is determined by multiplying resolution and color depth.

7
New cards

Sound in Binary

Representation of sound in binary through analog-to-digital conversion, involving sample rate and bit depth to store analog data digitally.

8
New cards

Binary Multiples

Understanding and converting between binary and denary multiples like bits, nibbles, bytes, kilobytes, megabytes, gigabytes, and terabytes.

9
New cards

Data Compression

Techniques to reduce data size including lossy and lossless compression methods like JPEG and MP3 algorithms.

10
New cards

Data Encryption

Scrambling data to make it unreadable to unauthorized users using symmetric and asymmetric encryption methods like HTTPS connections.

11
New cards

IPO Model

Input-Process-Output model describing the structure of information processing programs with input, process, and output levels.

12
New cards

Computational Models

Range of computational models including sequential, parallel, and multi-agent models to study and describe algorithms.

13
New cards

Hardware Components

Functions of computer hardware components like CPU, main memory, secondary storage, and input/output devices and how they work together.

14
New cards

Types of Memory

Understanding different memory types like RAM, ROM, cache, and virtual memory and their functions in a computer system.

15
New cards

Virtual Memory

Increases physical memory efficiency but can lead to performance decline due to swap speed and disk thrashing.

16
New cards

Von Neumann Model

Stores programs as data and instructions in the same memory, involving the fetch-decode-execute cycle.

17
New cards

Fetch-Decode-Execute Cycle

Processor follows this cycle to process instructions, involving fetch, decode, and execute stages.

18
New cards

Control Unit

Executes instructions, generates control signals, and ensures component synchronization through clock signals.

19
New cards

Arithmetic Logic Unit (ALU)

Performs calculations and logical operations within the CPU.

20
New cards

Clock

Generates signals to synchronize CPU actions, determining the speed of the fetch-decode-execute cycle.

21
New cards

Register

Short-term memory store close to the CPU, holding various types of data.

22
New cards

Buses

Cables carrying data between different parts of the computer, including address, data, and control buses.

23
New cards

CPU Performance Factors

Include clock speed, number of processor cores, cache size, and cache type, affecting CPU efficiency.

24
New cards

Physical Storage Types

Include magnetic, optical, and solid-state storage, each with unique characteristics and advantages.

25
New cards

Cloud Storage

Involves storing data among multiple servers hosted by a company, offering cybersecurity and accessibility benefits.

26
New cards

Embedded Systems

Designed for specific tasks, these systems are cost-effective, low-power, and often interconnected by the Internet.

27
New cards

Operating System

Manages files, processes, hardware, and the user interface, providing essential functions for computer operation.

28
New cards

Utility Software

Includes tools for managing, repairing, and converting files, as well as compression, defragmentation, and security functions.

29
New cards

Simulation Software

Used to model real-world aspects for testing purposes, requiring powerful processors for accurate results.

30
New cards

System Software vs

System software enables computer operation, while application software performs specific tasks for users.

31
New cards

High-Level Languages

Offer strong abstraction and ease of understanding for programmers, requiring compilers or interpreters for execution.

32
New cards

Language Processors

Include assemblers, compilers, and interpreters, each with advantages and disadvantages in translating programming languages.

33
New cards

Networks

Connect electronic devices for communication, sharing resources, and centralized management, but can pose security risks.

34
New cards

Network Types

Include LANs, WANs, and PANs, each serving different geographical areas and usage models like client-server and peer-to-peer.

35
New cards

Wired and Wireless Connections

Differ in transmission methods, speed, security, and installation requirements, offering unique advantages and disadvantages.

36
New cards

Network Protocols

Define communication rules between devices, including HTTP, HTTPS, TCP/IP, Ethernet, Wi-Fi, FTP, and email protocols.

37
New cards

File Transfer Protocol (FTP)

Used in the application layer for transferring files over TCP/IP stacks, typically unencrypted.

38
New cards

IMAP, POP3, and SMTP

Email application protocols in the application layer for storing, downloading, and sending emails.

39
New cards

Transmission Control Protocol (TCP)

Transport layer protocol that breaks down data into packets, assigns sequence numbers, and ensures data integrity.

40
New cards

Internet Protocol (IP)

Network layer protocol assigning source/destination IP addresses and moving packets between network nodes.

41
New cards

Ethernet

Link layer protocol for wired LANs, standardizing physical and data link layers.

42
New cards

Wi-Fi

Link layer protocol for WLANs, standardizing wireless data transmission.

43
New cards

4-Layer TCP/IP Model

Describes the layered protocol stacks including application, transport, network, and data link layers.

44
New cards

Bus Topology

Network topology where devices are connected by a single cable, managing collisions with CSMA/CD.

45
New cards

Ring Topology

Network topology with devices in a closed loop, allowing easy addition of devices but prone to failures.

46
New cards

Star Topology

Network topology where devices connect to a central point, ensuring no data collisions.

47
New cards

Mesh Topology

Network topology where devices are connected to many others, offering high performance but difficult to manage.

48
New cards

Mobile Networks (3G, 4G, 5G)

Generations of mobile technology offering wireless access to the Internet with varying speeds and encryption levels.

49
New cards

Network Security

Importance of securing networks through validation, authentication, access control, physical security, and firewalls.

50
New cards

Cyber Attacks

Different forms of attacks like phishing, shoulder surfing, unpatched software, USB devices, and eavesdropping.

51
New cards

Vulnerability Detection

Methods like penetration testing, ethical hacking, commercial tools, and policy reviews to identify weaknesses.

52
New cards

Cyberprotection

Techniques to protect software systems from attacks, including audit trails, secure coding, and effective network security.

53
New cards

Internet

Global network structured with IP addressing and domain name systems for identifying devices and translating domain names.

54
New cards

World Wide Web (WWW)

Collection of web pages accessed through web browsers, ISPs, and protocols like HTTP/S and HTML.

55
New cards

IPv4 and IPv6

IP addressing standards with IPv4 using 4 bytes and IPv6 using 16 bytes for addresses.

56
New cards

Internet Access Components

Modems, routers, switches, and wireless access points combine to provide internet connectivity.

57
New cards

Encryption

Technique that prevents unauthorized access to data by converting it into a code

58
New cards

Cookie cleaners

Software designed to detect and remove small data files that track browsing history

59
New cards

Anti-spyware program

Software that protects against spyware, which gathers information without consent

60
New cards

Identity management service

Third-party entity providing identifiers for secure transactions without revealing personal information

61
New cards

Digital Inclusion

Ensuring affordable access to technology for all individuals

62
New cards

Digital divide

Disparity in access to technology due to bans, affordability, or lack of resources

63
New cards

Professionalism

Ethical behavior adhering to the British Computer Society's code of conduct

64
New cards

Intellectual property

Unique creative products with commercial value protected by copyrights

65
New cards

Licensing

Terms specifying the use of software copies to prevent unauthorized distribution

66
New cards

Open software

Freely available software that can be modified and built upon by users

67
New cards

Proprietary software

Protected software that cannot be modified or redistributed without permission

68
New cards

Computer Misuse Act

Legislation preventing unauthorized access to computer systems

69
New cards

AI

Machines capable of performing tasks at the level of intellectual beings like humans

70
New cards

DNA Computing

Storing data using DNA's properties for faster and more efficient processing

71
New cards

Nanotechnology

Technology reducing the size of transistors for various applications like self-cleaning glass and medicine

72
New cards

Quantum computing

Utilizing qubits to perform calculations faster and more efficiently than traditional computers