1/73
Flashcards for OCR GCSE Computer Science Paper 1 review.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The ___ is our central processing unit, with the job of carrying out program instructions using data.
CPU
The ____ inside our CPU carries out the math and logic needed to execute instructions.
ALU (Arithmetic Logic Unit)
The _____ coordinates the fetch-execute cycle and decodes instructions.
Control Unit
_____ is a small, fast type of memory that holds frequently accessed items.
Cache
___ are ultra-small and ultra-fast memory locations used for the CPU's workings.
Registers
The ______ register stores the address of where we're fetching something from or writing something to in memory.
Memory Address (MAR)
The ____ stores the actual instruction or data that the MAR is pointing towards.
MDR (Memory Data Register)
The ____ is an address register that holds the address of the next instruction to be fetched from memory.
Program Counter
The ___ register holds the results of ALU calculations.
Accumulator
The ____ architecture is built on the components and structure of a CPU to carry out a fetch-execute cycle.
Von Neumann
During the ___ stage of the fetch-execute cycle, the instruction is retrieved from primary memory.
Fetch
During the ___ stage of the fetch-execute cycle, the control unit interprets the instruction.
Decode
During the ___ stage of the fetch-execute cycle, the instruction is carried out, usually by the ALU.
Execute
The clock speed of a CPU is the rate at which the ___ cycle is carried out.
fetch-execute
Multiple ___ in a CPU allow instructions to be executed at the same time, improving performance.
cores
___ systems are computers held inside other devices, typically with one specific purpose.
Embedded
___ storage (RAM and ROM) is directly connected to the CPU.
Primary
___ storage is non-volatile and stores programs and data long-term.
Secondary
___ is volatile, meaning its contents are deleted when the power is turned off.
RAM
___ is non-volatile memory that contains the program run when the computer is first turned on.
ROM
Hard disk drives (HDDs) are examples of ____ storage.
magnetic
DVDs are an example of ____ storage.
optical
Solid state drives (SSDs) are examples of ____ storage.
solid state
A ___ is a zero or a one.
bit
A ____ is four bits.
nibble
A ___ is eight bits, containing two nibbles.
byte
A ___ is a thousand bytes.
kilobyte
A ____ shift will double the number.
left
A _____ shift will halve the number.
right
An ____ error occurs when the result of an operation requires more storage space than is available.
overflow
____ sets are groups of codes representing characters in binary.
Character
____ is a character set with an 8-bit character code, allowing for 256 characters.
ASCII
____ is a character set that uses at least 16 bits per character, supporting thousands of characters.
Unicode
Images are represented as a series of ____.
pixels
The ____ of an image is the number of pixels it contains.
resolution
____ is data about data and includes essential information to recreate an image.
Metadata
The ____ rate is the number of samples taken per second when converting analog sound to digital sound.
sample
_____ reduces file size by deleting parts of the file, resulting in a loss of quality.
Lossy compression
____ rearranges the file to be more efficient without deleting any data.
Lossless compression
A ____ is a local area network, typically covering a small area like a building.
LAN
A ____ is a wide area network, spanning a larger area with infrastructure owned by multiple entities.
WAN
A ____ server network has devices taking on the roles of clients or servers.
client
In a ___ to network, devices can act as both clients and servers.
peer to peer
A ____ topology has a central node through which every other device must communicate.
star
A ___ topology has connections from every device to every other device.
mesh
A ____ or wireless access point, provides a wireless signal.
WAP
A ___ forwards packets between networks to the correct destination.
router
A ____ interface card enables devices to connect to a network.
network
A ____ address is a unique hardware address that enables devices to be pinpointed within a network.
MAC
____ is the maximum amount of data that can be transferred over a network at a given time.
Bandwidth
An ____ address roughly indicates the geographic location of a device.
IP
A ____ is a split set of data sent over networks, containing a header with the destination IP address
data packet
The ____ Name System (DNS) looks up the IP address corresponding to a URL.
Domain
The ___ involves hosting resources or files on remote servers accessible through the Internet.
cloud
____ are a set of rules enabling devices to communicate.
Protocols
TCP splits data ____ into and handles errors during transmission.
packets
WiFi , Ethernet, POP, IMAP and SMTP are examples of ___ .
protocols
POP and IMAP are alternatives for emails being ___
received
SMTP is for emails being ___ .
sent
___ injection is a cyber attack that involves inserting SQL code into user input forms.
SQL
___ force attacks involve trying every combination of a password.
Brute
A ____ of Service (DoS) attack floods a device with network traffic to cause it to crash.
Denial
___ engineering attacks target humans to gain information or money.
Social
____ is malicious software that can damage a computer system or extract information.
Malware
____ testing is a simulated attack to find vulnerabilities in a system.
Penetration
____ are either hardware or software that check network traffic based on predefined rules.
Firewalls
____ access levels control who can read or write to prevent unauthorised changes.
User
____ scrambles data so that only those with a key can decrypt and understand it.
Encryption
The ___ System is software which manages hardware and other programs on the computer
Operating
A ___ User Interface is a graphical user interface
GUI
____ is about keeping things running nice and smoothly.
Utilitiy Software
The ___ Protection Act protects personal data and requires organizations to keep it secure with consent from the individuals
Data
The ____ Misuse Act makes hacking and malware illegal.
Computer
The ___ Designs and Patents Act protects intellectual property rights.
Copyright