Cambridge IGCSE Computer Science 0478 Paper 1 Practice Flashcards

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/113

flashcard set

Earn XP

Description and Tags

Comprehensive practice vocabulary flashcards covering the Cambridge IGCSE Computer Science 0478 Paper 1 syllabus.

Last updated 4:46 PM on 5/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

114 Terms

1
New cards

Binary (Base 2)

A number system using only the digits 00 and 11. All computer data is represented in binary because transistors have two physical states — on (11) and off (00).

2
New cards

Denary (Base 10)

The standard human number system using digits 00-99. Also called decimal.

3
New cards

Hexadecimal (Base 16)

A number system using 1616 symbols: 00-99 and AA-FF. One hex digit represents exactly one nibble (44 bits). Used in MAC addresses, HTML colour codes, memory addresses, and error codes.

4
New cards

Bit

Smallest unit of data; either 00 or 11.

5
New cards

Nibble

44 bits. One hexadecimal digit.

6
New cards

Byte

88 bits. The basic unit of data storage.

7
New cards

Binary left shift

Multiplies integer by 22 per position shifted left. Bits shifted off the left end are permanently lost; zeros fill the right end.

8
New cards

Binary right shift

Divides integer by 22 (integer division) per position shifted right. Bits shifted off the right end are permanently lost; zeros fill the left.

9
New cards

Overflow error

Occurs when binary addition result exceeds the register capacity — e.g., greater than 255255 in an 88-bit register. The carry out of the MSB position signals overflow.

10
New cards

Two's complement

Method for representing positive and negative integers in binary. To negate: invert all bits, then add 11. MSB = 128-128 in 88-bit. Range: 128-128 to +127+127.

11
New cards

ASCII

American Standard Code for Information Interchange. 77-bit encoding (extended: 88-bit). Represents English letters, digits, and basic symbols. 'A' = decimal 6565.

12
New cards

Unicode

International character encoding supporting all world languages, symbols, and emoji. Uses more bits per character than ASCII (UTF-8: 883232 bits). Superset of ASCII.

13
New cards

Sample rate

Number of audio samples taken per second (HzHz). Higher rate \rightarrow more accurate reproduction \rightarrow larger file size.

14
New cards

Sample resolution

Number of bits per audio sample. Higher resolution \rightarrow greater dynamic range \rightarrow larger file size.

15
New cards

Pixel

Smallest addressable element in a digital image. Stores colour as a binary value.

16
New cards

Resolution (image)

Total number of pixels in an image (width×height\text{width} \times \text{height}). Higher resolution \rightarrow more detail \rightarrow larger file size.

17
New cards

Colour depth

Number of bits per pixel representing colour. 11 bit = 22 colours; 88 bits = 256256 colours; 2424 bits = 16.716.7 million colours.

18
New cards

Lossy compression

Reduces file size by permanently removing data. Cannot restore original quality. Examples: JPEG, MP3.

19
New cards

Lossless compression

Reduces file size without any permanent data loss. Original can be perfectly reconstructed. Example: run-length encoding (RLE). Used in PNG, FLAC, ZIP.

20
New cards

Run-length encoding (RLE)

Lossless compression: replaces consecutive repeated values with a count and the value. E.g., AAAABBB \rightarrow 4A3B.

21
New cards

Image file size formula

File size (bits)=width (px)×height (px)×colour depth (bits/px)\text{File size (bits)} = \text{width (px)} \times \text{height (px)} \times \text{colour depth (bits/px)}. Always divide by 10241024 to convert to KiB or MiB.

22
New cards

Sound file size formula

File size (bits)=sample rate (Hz)×sample resolution (bits/sample)×duration (seconds)\text{File size (bits)} = \text{sample rate (Hz)} \times \text{sample resolution (bits/sample)} \times \text{duration (seconds)}.

23
New cards

Packet

Fixed-size unit of transmitted data. Structure: header + payload + trailer.

24
New cards

Packet switching

Data broken into packets that may take different routes; routers manage routing; packets may arrive out of order; receiver reassembles using packet numbers.

25
New cards

Router

Forwards packets between networks by examining destination IP addresses and determining optimal routes.

26
New cards

Serial transmission

Bits sent one at a time along a single wire. Reliable over long distances. Used in USB.

27
New cards

Parallel transmission

Multiple bits sent simultaneously along multiple wires. Faster over short distances; synchronisation issues over long distances.

28
New cards

Simplex

Data transmission in one direction only (e.g., keyboard to computer).

29
New cards

Half-duplex

Data transmission in both directions but only one at a time (e.g., walkie-talkie).

30
New cards

Full-duplex

Data transmission in both directions simultaneously (e.g., telephone call, internet connection).

31
New cards

USB (Universal Serial Bus)

Standard peripheral interface using serial transmission. Benefits: plug-and-play, hot-swappable, powers device, universal compatibility.

32
New cards

Parity check

Parity bit added to make total 11s even (even parity) or odd (odd parity). Detects single-bit errors; cannot detect double-bit errors; cannot correct errors.

33
New cards

Checksum

Value calculated from data before and after transmission; if values differ, an error occurred.

34
New cards

Echo check

Received data sent back to sender for direct comparison with the original.

35
New cards

Check digit

Digit appended to a data string; calculated using a formula; detects data entry errors. Used in ISBN-13 and EAN barcodes.

36
New cards

ARQ (Automatic Repeat Query)

Receiver sends ACK (correct) or NACK (error). If no ACK within timeout, sender retransmits. Provides error correction.

37
New cards

Symmetric encryption

One shared key for both encryption and decryption. Fast. Key distribution problem — securely sharing the key is difficult.

38
New cards

Asymmetric encryption

Public key (shared freely) encrypts; private key (never shared) decrypts. Eliminates key distribution problem. Slower than symmetric.

39
New cards

CPU (Central Processing Unit)

Main processing component. Fetches, decodes, and executes program instructions. Consists of ALU, CU, registers, and buses.

40
New cards

Microprocessor

A processor implemented as a single integrated circuit on one chip.

41
New cards

ALU (Arithmetic Logic Unit)

Performs arithmetic operations (add, subtract) and logical operations (AND, OR, NOT, compare).

42
New cards

CU (Control Unit)

Manages all CPU operations; sends control signals; coordinates the FDE cycle.

43
New cards

Program Counter (PC)

Holds the address of the NEXT instruction to be fetched. Automatically incremented after each fetch.

44
New cards

Memory Address Register (MAR)

Holds the memory address currently being accessed (read from or written to).

45
New cards

Memory Data Register (MDR)

Temporarily holds data or instruction just fetched / about to be written to memory. Acts as CPU-RAM buffer.

46
New cards

Current Instruction Register (CIR)

Holds the instruction currently being decoded and executed.

47
New cards

Accumulator (ACC)

Stores results of arithmetic and logical operations from the ALU.

48
New cards

Address bus

Unidirectional — carries memory addresses from CPU to memory and peripherals.

49
New cards

Data bus

Bidirectional — carries data and instructions between CPU, memory, and peripherals.

50
New cards

Control bus

Carries control signals from the CU to all components to coordinate operations.

51
New cards

FDE Cycle

Fetch: PC\rightarrowMAR; instruction\rightarrowMDR; MDR\rightarrowCIR; PC incremented. Decode: CU decodes CIR instruction. Execute: ALU operates; result\rightarrowACC; or data transfer.

52
New cards

Cache

Very fast memory adjacent to CPU. Stores frequently used instructions and data to reduce slow RAM accesses. L1 is fastest and smallest.

53
New cards

Clock speed

Rate of CPU cycle completion in GHzGHz. Higher speed = more instructions per second.

54
New cards

Core

Independent processing unit within one CPU chip. Multi-core enables parallel execution.

55
New cards

Embedded system

Computer with fixed, dedicated function built into a larger device. Contrast with general-purpose computer.

56
New cards

RAM

Volatile primary storage. Holds data and programs currently in use. Data lost when power is removed.

57
New cards

ROM

Non-volatile primary storage. Holds firmware/BIOS. Read-only; retains data without power.

58
New cards

Virtual memory

Section of secondary storage used as RAM extension when RAM is full. Pages swapped between RAM and secondary; significantly slower than RAM.

59
New cards

HDD

Magnetic storage: platters, tracks, sectors; read/write using electromagnets. Slow; fragile (moving parts); high capacity; cheap per GB.

60
New cards

SSD

Flash memory: NAND/NOR transistors as control and floating gates. Fast; silent; durable; no moving parts; expensive per GB.

61
New cards

Optical storage

Laser reads pits and lands on disc surfaces. Examples: CD, DVD, Blu-ray. Portable; cheap; easily scratched; slow.

62
New cards

Cloud storage

Remote storage on servers accessed via internet. Any-location access; scalable; requires internet; third-party security risk.

63
New cards

MAC address

Unique 4848-bit hardware identifier assigned at manufacture to a NIC. Written in hexadecimal. Structure: manufacturer code (2424 bits) + serial code (2424 bits).

64
New cards

IP address

Logical network address; assigned by network; static or dynamic. Used for internet routing.

65
New cards

IPv4

3232-bit logical network address.

66
New cards

IPv6

128128-bit logical network address.

67
New cards

System software

Software providing the services required by the computer hardware — includes OS and utility software.

68
New cards

Application software

Software providing services the user requires to complete specific tasks.

69
New cards

Operating system

System software managing hardware resources and providing a platform for applications. Performs 88 functions including file, memory, and multitasking management.

70
New cards

Interrupt

Signal to CPU requesting immediate attention. Handled by an Interrupt Service Routine (ISR).

71
New cards

High-level language

Human-readable, machine-independent language (e.g., Python, Java). Easy to read/write/debug; portable; must be translated.

72
New cards

Low-level language

Language close to machine code: assembly or machine code. Machine-specific; direct hardware control; efficient; hard to read.

73
New cards

Machine code

Binary instructions executed directly by CPU without translation.

74
New cards

Assembly language

Low-level language using mnemonics (ADD, MOV). Assembler translates to machine code. One-to-one instruction correspondence.

75
New cards

Compiler

Translates whole high-level program before execution; produces executable file; reports all errors at end; faster execution.

76
New cards

Interpreter

Translates and executes line by line; stops at first error; no executable produced; slower; used during development.

77
New cards

IDE

Integrated Development Environment. Features: code editor, translator, error diagnostics, auto-completion, auto-correction, prettyprint.

78
New cards

Internet

Global physical infrastructure of interconnected networks — cables, routers, servers. The infrastructure layer.

79
New cards

World Wide Web (WWW)

Collection of websites and web pages accessed using the internet via browsers. NOT the same as the internet.

80
New cards

URL

Text-based address for a web page. Components: protocol (https://), domain name, optional file path.

81
New cards

HTTP

HyperText Transfer Protocol. Transmits web pages unencrypted. Not for sensitive data.

82
New cards

HTTPS

HTTP + SSL/TLS encryption. Used for login pages, banking, e-commerce — any sensitive data transmission.

83
New cards

DNS (Domain Name Server)

Translates domain names to IP addresses. Required because internet routing uses IP addresses, not domain names.

84
New cards

Cookie

Small data file stored on user's device. Uses: login state, preferences, shopping cart.

85
New cards

Digital currency

Currency existing only electronically (e.g., Bitcoin). Decentralised; recorded using blockchain.

86
New cards

Blockchain

Distributed digital ledger: immutable, time-stamped chain of records. Each block cryptographically linked to the previous.

87
New cards

Brute-force attack

Automated systematic trial of all possible passwords or keys until correct one is found.

88
New cards

Phishing

Fraudulent communications appearing to come from a trusted source. Designed to steal credentials or install malware.

89
New cards

Pharming

Corrupts DNS records or hosts file to silently redirect users from legitimate to fraudulent sites.

90
New cards

DDoS attack

Botnet sends mass simultaneous requests to target server, overwhelming it and denying service to legitimate users.

91
New cards

Virus

Malware attaching to files; spreads when files are shared; executes when host file is opened.

92
New cards

Worm

Self-replicating malware spreading autonomously across networks; no host file needed.

93
New cards

Trojan horse

Malware disguised as legitimate software; installed willingly; creates backdoors or steals data.

94
New cards

Ransomware

Encrypts victim's files with key held only by attacker; demands payment for decryption key.

95
New cards

Social engineering

Psychological manipulation to reveal confidential information or grant access. Exploits trust, not technical vulnerabilities.

96
New cards

Firewall

Hardware or software filtering network traffic based on security rules. Blocks unauthorised connections.

97
New cards

SSL

Secure Socket Layer. Encryption protocol securing client-server data transmission. Used in HTTPS.

98
New cards

Two-step verification

Authentication requiring two factors: knowledge (password) + possession (phone/token) or biometric.

99
New cards

Proxy server

Intermediary server processing requests between client and internet. Provides anonymity and content filtering.

100
New cards

Automated system

System operating without direct human intervention using sensors (input), microprocessor (processing), and actuators (output).