IGCSE computer science

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Denary

Base ten number system made up of ten digits (0-9) and is the number system that humans understand.

2
New cards

Binary

Base two number system made up of two digits (0 and 1) and is what computers use.

3
New cards

10011 in denary

19

4
New cards

25 in binary

11001

5
New cards

Hexadecimal

Base sixteen number system that is made up of 16 digits (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F)

6
New cards

Benefits of hexadecimal:

  • It is easier for humans to read

  • It is a shorter way of representing binary values on screen

7
New cards

A6 in binary

1010 0110

8
New cards

1001 1110 in hexadecimal

9E

9
New cards

Bit hierarchy:

  • Bit (1 or 0)

  • Byte (8 bits)

  • Kibibyte

  • Mebibyte

  • Gibibyte

  • Tebibyte

  • Pebibyte

  • Exibyte

10
New cards

Analogue data

The type of data humans process.

11
New cards

Mono

1 channel

12
New cards

Stereo

2 channels

13
New cards

Bit rate formula:

Bit rate = frequency * bit depth * channels

14
New cards

Frequency formula:

Frequency = number of samples per second.

15
New cards

Sound file size calculation:

file size = bit rate * length of audio

16
New cards

Color depth:

The number of bits used to represent the color in each pixel.

17
New cards

File size of an image formula.

file size - number of pixels (w * h) * bit/color depth

18
New cards

Compress BBBBWWWBBWWW

B4 W3 B2 W3

19
New cards

How does asymmetric encryption work?

  • An algorithm is used to generate a matching set if keys (public and private)

  • The public key is accessible to whoever wants to send a message to the person

  • The public key is used to encrypt the message

  • The encrypted message is sent to the person

  • Only the person with the private key and decipher the encrypted message

  • The public and private keys are linked but cannot be derived from each other.

20
New cards

Compiler:

Translates high-level language programs into machine code.

21
New cards

Interpreter:

Translates high-level languages and executes the code line by line

22
New cards

Assembler:

Translates assembly language into machine code.

23
New cards

IDE functions:

  • editor for writing code

  • Error diagnostics for debugging

  • Auto-completion