OCR GCSE Computer Science Paper 1 Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/73

flashcard set

Earn XP

Description and Tags

Flashcards for OCR GCSE Computer Science Paper 1 review.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

74 Terms

1
New cards

The ___ is our central processing unit, with the job of carrying out program instructions using data.

CPU

2
New cards

The ____ inside our CPU carries out the math and logic needed to execute instructions.

ALU (Arithmetic Logic Unit)

3
New cards

The _____ coordinates the fetch-execute cycle and decodes instructions.

Control Unit

4
New cards

_____ is a small, fast type of memory that holds frequently accessed items.

Cache

5
New cards

___ are ultra-small and ultra-fast memory locations used for the CPU's workings.

Registers

6
New cards

The ______ register stores the address of where we're fetching something from or writing something to in memory.

Memory Address (MAR)

7
New cards

The ____ stores the actual instruction or data that the MAR is pointing towards.

MDR (Memory Data Register)

8
New cards

The ____ is an address register that holds the address of the next instruction to be fetched from memory.

Program Counter

9
New cards

The ___ register holds the results of ALU calculations.

Accumulator

10
New cards

The ____ architecture is built on the components and structure of a CPU to carry out a fetch-execute cycle.

Von Neumann

11
New cards

During the ___ stage of the fetch-execute cycle, the instruction is retrieved from primary memory.

Fetch

12
New cards

During the ___ stage of the fetch-execute cycle, the control unit interprets the instruction.

Decode

13
New cards

During the ___ stage of the fetch-execute cycle, the instruction is carried out, usually by the ALU.

Execute

14
New cards

The clock speed of a CPU is the rate at which the ___ cycle is carried out.

fetch-execute

15
New cards

Multiple ___ in a CPU allow instructions to be executed at the same time, improving performance.

cores

16
New cards

___ systems are computers held inside other devices, typically with one specific purpose.

Embedded

17
New cards

___ storage (RAM and ROM) is directly connected to the CPU.

Primary

18
New cards

___ storage is non-volatile and stores programs and data long-term.

Secondary

19
New cards

___ is volatile, meaning its contents are deleted when the power is turned off.

RAM

20
New cards

___ is non-volatile memory that contains the program run when the computer is first turned on.

ROM

21
New cards

Hard disk drives (HDDs) are examples of ____ storage.

magnetic

22
New cards

DVDs are an example of ____ storage.

optical

23
New cards

Solid state drives (SSDs) are examples of ____ storage.

solid state

24
New cards

A ___ is a zero or a one.

bit

25
New cards

A ____ is four bits.

nibble

26
New cards

A ___ is eight bits, containing two nibbles.

byte

27
New cards

A ___ is a thousand bytes.

kilobyte

28
New cards

A ____ shift will double the number.

left

29
New cards

A _____ shift will halve the number.

right

30
New cards

An ____ error occurs when the result of an operation requires more storage space than is available.

overflow

31
New cards

____ sets are groups of codes representing characters in binary.

Character

32
New cards

____ is a character set with an 8-bit character code, allowing for 256 characters.

ASCII

33
New cards

____ is a character set that uses at least 16 bits per character, supporting thousands of characters.

Unicode

34
New cards

Images are represented as a series of ____.

pixels

35
New cards

The ____ of an image is the number of pixels it contains.

resolution

36
New cards

____ is data about data and includes essential information to recreate an image.

Metadata

37
New cards

The ____ rate is the number of samples taken per second when converting analog sound to digital sound.

sample

38
New cards

_____ reduces file size by deleting parts of the file, resulting in a loss of quality.

Lossy compression

39
New cards

____ rearranges the file to be more efficient without deleting any data.

Lossless compression

40
New cards

A ____ is a local area network, typically covering a small area like a building.

LAN

41
New cards

A ____ is a wide area network, spanning a larger area with infrastructure owned by multiple entities.

WAN

42
New cards

A ____ server network has devices taking on the roles of clients or servers.

client

43
New cards

In a ___ to network, devices can act as both clients and servers.

peer to peer

44
New cards

A ____ topology has a central node through which every other device must communicate.

star

45
New cards

A ___ topology has connections from every device to every other device.

mesh

46
New cards

A ____ or wireless access point, provides a wireless signal.

WAP

47
New cards

A ___ forwards packets between networks to the correct destination.

router

48
New cards

A ____ interface card enables devices to connect to a network.

network

49
New cards

A ____ address is a unique hardware address that enables devices to be pinpointed within a network.

MAC

50
New cards

____ is the maximum amount of data that can be transferred over a network at a given time.

Bandwidth

51
New cards

An ____ address roughly indicates the geographic location of a device.

IP

52
New cards

A ____ is a split set of data sent over networks, containing a header with the destination IP address

data packet

53
New cards

The ____ Name System (DNS) looks up the IP address corresponding to a URL.

Domain

54
New cards

The ___ involves hosting resources or files on remote servers accessible through the Internet.

cloud

55
New cards

____ are a set of rules enabling devices to communicate.

Protocols

56
New cards

TCP splits data ____ into and handles errors during transmission.

packets

57
New cards

WiFi , Ethernet, POP, IMAP and SMTP are examples of ___ .

protocols

58
New cards

POP and IMAP are alternatives for emails being ___

received

59
New cards

SMTP is for emails being ___ .

sent

60
New cards

___ injection is a cyber attack that involves inserting SQL code into user input forms.

SQL

61
New cards

___ force attacks involve trying every combination of a password.

Brute

62
New cards

A ____ of Service (DoS) attack floods a device with network traffic to cause it to crash.

Denial

63
New cards

___ engineering attacks target humans to gain information or money.

Social

64
New cards

____ is malicious software that can damage a computer system or extract information.

Malware

65
New cards

____ testing is a simulated attack to find vulnerabilities in a system.

Penetration

66
New cards

____ are either hardware or software that check network traffic based on predefined rules.

Firewalls

67
New cards

____ access levels control who can read or write to prevent unauthorised changes.

User

68
New cards

____ scrambles data so that only those with a key can decrypt and understand it.

Encryption

69
New cards

The ___ System is software which manages hardware and other programs on the computer

Operating

70
New cards

A ___ User Interface is a graphical user interface

GUI

71
New cards

____ is about keeping things running nice and smoothly.

Utilitiy Software

72
New cards

The ___ Protection Act protects personal data and requires organizations to keep it secure with consent from the individuals

Data

73
New cards

The ____ Misuse Act makes hacking and malware illegal.

Computer

74
New cards

The ___ Designs and Patents Act protects intellectual property rights.

Copyright