iGCSE Computer Science Chapter 2

studied byStudied by 42 people
0.0(0)
Get a hint
Hint

bandwidth

1 / 32

33 Terms

1

bandwidth

The maximum amount of data transmitted over an internet connection in a given amount of time.

New cards
2

full-duplex

a transmission method where data is transmitted in both directions at the same time.

New cards
3

half-duplex

a transmission method where is transmitted in both directions, but only one direction at a time.

New cards
4

internet

a very large global network that allows users to access the world wide web.

New cards
5

latency

Latency is the time it takes for data to be transferred between its original source and its destination, measured in milliseconds. Internet latency and network latency affect satellite internet connections, cable internet connections, as well as some WiFi connections.

New cards
6

packet header

a section of a packet of data that contains information about the contents of the packet and its destination.

New cards
7

packet switching

a method of transmitting data packets across a network. Each data packet is able to take an individual pathway across the network.

New cards
8

packet

a small unit of data.

New cards
9

simplex

a transmission method where data is transmitted in a single direction only.

New cards
10

USB cable

a type of transmission media that uses the USB method to transmit data.

New cards
11

USB connection

a collective name for using a USB cable plugged into a USB port to transfer data from one device to another.

New cards
12

USB device

the name of a device that plugs into a USB port on a computer.

New cards
13

USB port

a socket that is a part of a device or computer that enables you to insert a USB cable.

New cards
14

USB

an industry standard that is used to transmit data.

New cards
15

automatic repeat request (ARQ)

a type of error detection method that uses acknowledgement and timeout to see if data has arrived correctly after transmission.

New cards
16

check digit

a type of error detection method that is used for data entry. A calculation is performed on the data entered to create a value. Check digit values are compared to see if the data entered is correct.

New cards
17

checksum

a type of error detection method that performs a calculation on the data to create a checksum value. Checksum values arc compared after transmission to see if they match.

New cards
18

echo check

a type of error detection method that sends a copy of the transmitted data back to the sender to be compared with the original data sent.

New cards
19

parity check

a type of error detection method that adds an additional bit to each byte to create an odd or even sum.

New cards
20

asymmetric

a type of encryption that uses two different keys to encrypt and decrypt data.

New cards
21

cipher text

the name given to data after transmission.

New cards
22

encryption

a method of securing data for storage or transmission that scrambles it and makes it meaningless, encryption key

New cards
23

plain text

the name given to data before encryption.

New cards
24

symmetric

a type of encryption that uses the same key to encrypt and decrypt data.

New cards
25

payload

the actual data that the user is sending to the receiver.

New cards
26

trailer

a section of a packet of data that contains information about any error checking methods that may be used.

New cards
27

ethernet

a system for connecting a number of devices to form a local area network. (Using cables)

New cards
28

router

a network component that examines a data packet to obtain its destination address and then forwards the packet to this address.

New cards
29

network

computers and devices that are joined together using cables or wireless technology.

New cards
30

internet protocol (IP) address

the unique address that is given to a device when it is connected to a network.

New cards
31

skew

Skew is a disadvantage of parallel transmission. Skew is caused by the fact that each wire in a parallel transmission setup will have slightly different properties. This will mean that each signal will travel at a slightly different speed therefore arriving at their destination at different times.

New cards
32

Public Key

It is part of asymmetric cryptography. This is the key that is shared. If you encode with the public key only the private key can decode. If someone encodes with a private key anybody with the public key can decode.

New cards
33

private key

This is the key that you should share with no one. If you encode with a private key anybody with the public key can decode. Your private key can be used to decode something encoded with your public key. (Part of asymmetric cryptography)

New cards

Explore top notes

note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
4.0(1)
note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 31 people
... ago
5.0(1)
note Note
studied byStudied by 357 people
... ago
5.0(5)

Explore top flashcards

flashcards Flashcard (24)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 28 people
... ago
4.0(1)
flashcards Flashcard (198)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (61)
studied byStudied by 379 people
... ago
4.6(28)
flashcards Flashcard (116)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (65)
studied byStudied by 2352 people
... ago
4.6(14)
robot