GCSE OCR Computer Science – Master Revision Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/91

flashcard set

Earn XP

Description and Tags

A comprehensive set of question-and-answer flashcards summarising the key GCSE Computing concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

92 Terms

1
New cards

What is the primary purpose of the CPU?

To carry out the processing of data by repeatedly performing the fetch-decode-execute cycle.

2
New cards

Which three key characteristics affect CPU performance?

Clock speed, cache size, and number of cores.

3
New cards

What does the clock speed of a CPU measure?

The number of fetch-decode-execute cycles it can perform per second, measured in hertz (Hz).

4
New cards

Why does a larger CPU cache usually improve performance?

Because recently/frequently used instructions are stored closer to the CPU, reducing fetch time.

5
New cards

What is a CPU core?

An independent processor within the CPU that can execute instructions; multiple cores allow multitasking.

6
New cards

In Von Neumann architecture, where are data and instructions stored?

In the same main memory.

7
New cards

Name the four main CPU registers used in the F-D-E cycle.

Program Counter (PC), Memory Address Register (MAR), Memory Data Register (MDR), Current Instruction Register (CIR).

8
New cards

Give the steps of the fetch phase in the F-D-E cycle.

Copy PC to MAR, fetch instruction into MDR, copy MDR to CIR, increment PC.

9
New cards

Define an embedded system.

A computer system with a processor built into another device, designed for a dedicated task.

10
New cards

Give two examples of embedded systems.

Dishwasher, microwave (others: fridge, smartphone, TV).

11
New cards

State two differences between RAM and ROM.

RAM is volatile and can be changed; ROM is non-volatile and normally cannot be changed.

12
New cards

What is virtual memory?

A section of the hard drive used as an extension to RAM when RAM is full.

13
New cards

Why is flash memory useful in portable devices?

It is non-volatile, has no moving parts (fast, durable), and can be electrically re-written.

14
New cards

What is secondary storage used for?

Long-term, non-volatile storage of files and programs when not in use.

15
New cards

List the three main categories of secondary storage.

Optical, magnetic, solid-state (flash).

16
New cards

Give one advantage and one disadvantage of optical storage.

Advantage: cheap and portable; disadvantage: slow access speeds and can be damaged easily.

17
New cards

Why are HDDs (magnetic) still popular for backups?

They offer very high capacity at low cost, though access is slower than SSDs.

18
New cards

State two advantages of solid-state drives over hard disk drives.

Much faster access speeds and no moving parts (more durable).

19
New cards

Define a computer network.

Two or more computers connected together to share data, resources, or communication.

20
New cards

Differentiate between a LAN and a WAN.

LAN covers a small geographic area with hardware owned by one organisation; WAN covers large areas and uses third-party infrastructure.

21
New cards

What role does a Network Interface Card (NIC) play?

It allows a device to connect to a network and communicates using a unique MAC address.

22
New cards

Why is a switch preferred to a hub in a LAN?

Because a switch sends data only to the intended destination device, reducing collisions.

23
New cards

Name three common wired transmission media.

Twisted-pair (Cat5e/Cat6), coaxial cable, and fibre-optic cable.

24
New cards

Describe a client-server network.

Clients request services/resources from a central, powerful server which also manages security, backups, and software.

25
New cards

Give one advantage of a peer-to-peer network.

Cheap and easy to set up for small/home networks because no dedicated server is required.

26
New cards

State two factors that can slow network performance.

Limited bandwidth with too many users, or wireless interference (also: outdated hardware, topology choice).

27
New cards

How do the Internet and the World Wide Web differ?

The Internet is the global network infrastructure; the WWW is a collection of websites hosted on it.

28
New cards

Give one advantage and one disadvantage of using cloud storage.

Advantage: access files anywhere; disadvantage: requires internet connection and trust in third-party security.

29
New cards

What is the purpose of DNS?

To translate human-friendly URLs/domain names into IP addresses computers use to locate servers.

30
New cards

Define a virtual network.

A software-defined network that exists on top of physical infrastructure, allowing separate logical networks with their own security.

31
New cards

Which two frequency bands are commonly used by Wi-Fi?

2.4 GHz and 5 GHz.

32
New cards

Why does changing Wi-Fi channel sometimes improve performance?

To reduce interference when multiple devices are using overlapping channels.

33
New cards

Explain encryption in networking.

Converting data into a coded form so that it is unreadable without a decryption key.

34
New cards

How does symmetric encryption differ from asymmetric (public-key) encryption?

Symmetric uses the same key to encrypt/decrypt; asymmetric uses a public key to encrypt and a private key to decrypt.

35
New cards

Describe a star network topology.

All devices connect to a central switch or server; failure of that central device brings down the network.

36
New cards

What is a mesh topology’s main advantage?

Multiple routes between devices provide high redundancy and can reduce collisions.

37
New cards

Outline the basic idea of packet switching.

Data is split into equal-sized packets that find independent routes across a network and are reassembled at the destination.

38
New cards

Name three items in a packet header.

Destination IP address, packet number/sequence, and error-checking code (checksum).

39
New cards

What is the main function of TCP compared to IP?

TCP splits data into packets, ensures delivery, and reassembles them; IP handles addressing and routing of packets between networks.

40
New cards

Which protocol securely transfers hypertext over the Internet?

HTTPS (HTTP Secure).

41
New cards

What does SMTP stand for and do?

Simple Mail Transfer Protocol; it sends emails between servers.

42
New cards

Give two benefits of organising network protocols into four layers.

Modularity (each layer can change without affecting others) and interoperability (standardised interfaces enable compatible hardware/software).

43
New cards

Define malware.

Malicious software such as viruses, trojans, or spyware designed to damage or gain unauthorised access to systems.

44
New cards

What is phishing?

Fraudulent emails or messages that trick users into revealing personal information like passwords or bank details.

45
New cards

Describe a brute-force attack.

An attack that systematically tries every possible password combination to gain access.

46
New cards

What is a denial-of-service (DoS) attack?

Flooding a network or web server with excessive traffic to make it unavailable to legitimate users.

47
New cards

Explain SQL injection.

Inserting malicious SQL code into input fields to gain unauthorised access, modify, or delete database data.

48
New cards

What is the purpose of a network policy?

To define rules and procedures that users must follow to keep the network secure and efficient.

49
New cards

Describe penetration testing.

Simulating attacks on a system to discover and fix security vulnerabilities.

50
New cards

How does a firewall protect a network?

By monitoring and filtering incoming and outgoing traffic based on predetermined security rules.

51
New cards

What are user access levels?

Permissions that restrict users to only the data and resources necessary for their role.

52
New cards

List three characteristics of a strong password.

At least 6–8 characters long, mix of upper/lowercase letters, numbers, and symbols; not easily guessable.

53
New cards

Define an operating system.

System software that manages hardware, provides a user interface, and offers common services for applications.

54
New cards

Give three key functions of an OS.

User interface, memory management/multitasking, peripheral (device) management.

55
New cards

What does a device driver do?

Translates OS commands into signals that a specific hardware device understands.

56
New cards

State two tasks performed by file management within an OS.

Organising files in a hierarchy and handling saving, retrieval, and permissions.

57
New cards

What is the purpose of defragmentation software?

To reorganise fragmented files on a hard disk so data blocks are contiguous, improving access speed.

58
New cards

Differentiate between full and incremental backup.

Full copies every file; incremental copies only files changed since the last backup, saving time and space.

59
New cards

Give one advantage and one disadvantage of proprietary software.

Advantage: official support and regular updates; disadvantage: licensing costs and limited customisation.

60
New cards

Why might a developer choose an open-source licence?

To allow community improvement, reach a wider audience, and potentially earn from donations/ads while retaining credit.

61
New cards

What law protects personal data stored by organisations in the UK?

The Data Protection Act (1998).

62
New cards

Which act makes unauthorised access to computer material illegal?

The Computer Misuse Act (1990).

63
New cards

What law protects creative works like software code?

Copyright, Designs and Patents Act (1988).

64
New cards

How does a linear search work?

It checks each item in order until the target is found or the end of the list is reached.

65
New cards

Why is a binary search usually faster than a linear search?

Because it repeatedly halves a sorted list, reducing the number of comparisons needed.

66
New cards

Outline the bubble sort algorithm.

Repeatedly compare adjacent items and swap if out of order; continue passes until no swaps are needed.

67
New cards

What is the main advantage of a merge sort over bubble sort?

Much faster on large lists due to its divide-and-conquer approach (O(n log n) vs O(n²)).

68
New cards

Define a variable and a constant.

Variable: named memory location whose value can change; constant: named location whose value remains fixed during program execution.

69
New cards

Name the three basic programming constructs.

Sequence, selection, and iteration (loops).

70
New cards

Give two common data types and an example of each.

Integer (e.g., 42) and string (e.g., "Hello").

71
New cards

What does the MOD operator return?

The remainder after integer division.

72
New cards

Write pseudocode to read a name and display it.

name ← INPUT("What is your name?") OUTPUT("Your name is " + name)‏

73
New cards

How is the length of a string obtained in pseudocode?

stringName.length

74
New cards

What is an array?

A data structure that stores multiple items of the same data type under one identifier using indices.

75
New cards

Differentiate between a function and a procedure.

A function returns a value; a procedure performs actions but returns no value.

76
New cards

Write an SQL query to select all records from a table called Products.

SELECT * FROM Products;‏

77
New cards

Give two common input validation checks.

Range check and presence check (others: length, format, lookup, check digit).

78
New cards

What is authentication in defensive design?

Verifying the identity of a user, e.g., via username/password or multi-factor methods.

79
New cards

How do indentation and comments aid maintainability?

They make code easier to read, understand, and modify by grouping logic and explaining purpose.

80
New cards

Distinguish between a syntax error and a logic error.

Syntax error violates language rules and prevents running; logic error lets the program run but with incorrect results.

81
New cards

What is ‘valid extreme’ test data?

A value at the upper or lower boundary that should be accepted by the program.

82
New cards

What does an AND logic gate output when both inputs are 1?

1 (true).

83
New cards

Convert the 8-bit binary 01010101 to denary.

85.

84
New cards

Add binary 00001111 and 00000001.

00010000 (with no overflow).

85
New cards

Why is hexadecimal often used by programmers?

It is shorter and easier to read than binary and converts neatly (4 bits per hex digit).

86
New cards

What effect does a left binary shift of one place have?

Multiplies the binary number by 2.

87
New cards

Define pixel, colour depth, and resolution.

Pixel: smallest picture element; colour depth: bits per pixel determining colour range; resolution: number of pixels per unit area (e.g., DPI).

88
New cards

State two factors that increase sound file size and quality.

Higher sampling frequency and larger bit rate (bits per sample).

89
New cards

Differentiate between lossy and lossless compression.

Lossy removes data permanently for smaller files (quality loss); lossless compresses without data loss but with less size reduction.

90
New cards

What does an assembler do?

Translates assembly language source code into machine code.

91
New cards

Give one advantage of a compiler over an interpreter.

Compiled object code runs faster and can be distributed without source code.

92
New cards

Name two common tools found in an IDE.

Code editor with syntax highlighting and error diagnostics (others: run-time environment, translator).