Mr Hylton J277 Unit 1

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

Legal Issues

The Data Protection Act 2018 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988

2
New cards

Cultural issues

The way that Computer Science can impact the way people groups do things

3
New cards

Privacy Issues

Collecting storing and disseminating information about individuals

4
New cards

Data Protection Act 2018

A law covering:

what can be collected

how long it can be kept for

steps to keep it up to date/accurate

sending and using the data

who can see that data

5
New cards

Computer Misuse Act 1990

The UK law that makes it illegal to hack into a person's computer and to disrupt deliberately someone else's computer.

6
New cards

Copyright Designs and Patents Act

Legislation concerned with the distribution of ideas, media or products. If you did not make it, you cannot sell, or share it without the creator/owners permission

7
New cards

Software Licenses

Open Source & Proprietary

8
New cards

Open source

The source code is free and accessible by all. There is no legal cover or protection. Can be better as it is maintained by an entire community. Updates and addons are created and you can personalise it

9
New cards

Proprietary

Effectively the opposite of open source. Usually not free

10
New cards

Malware

software that is intended to damage or disable computers and computer systems.

11
New cards

Brute Force attack

An attack on passwords or encryption that tries every possible password or encryption key.

12
New cards

Social engineering

People as a weak point

13
New cards

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer

14
New cards

Data interception and theft

Seizing data as it is in transit

15
New cards

SQL Injection

An attack that targets SQL servers by inserting commands to be manipulated by the database.

16
New cards

Penetration Testing

Professional hacking to access data and computing power without being granted access; hired to identify and repair vulnerabilities and only work once

17
New cards

Anti-malware

A utility that searches for and removes any malware on a computer.

18
New cards

Firewalls

software to prevent unauthorized users

19
New cards

User Access Levels

A network policy that defines which users can see which folders and files and the type of access they have to them. Eg: Read-Only or Read-Write.

20
New cards

Passwords

A method of authentication where a person must enter a secrect string of characters

21
New cards

Strong password

"8 or more characters

Contain a number

Contain a letter

Contain a upper case character

Contain a lower case character

Contain a special character"

22
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

23
New cards

Operating System (OS)

the software that allows users to interface with the computer

24
New cards

Functions of an operating system

User management

memory management/multitasking

peripheral management and drivers

file management

25
New cards

memory management / multitasking

A function of the operating system that controls the CPU and RAM so that programs run simultaneously and concurrently

26
New cards

Peripheral Management

A function of the operating system which manages the input to the CPU and the output from external devices

27
New cards

User Management

An operating system feature that allows user accounts to be created and managed

28
New cards

File Management

A function of the operating system that organises and controlling files

29
New cards

Utility Software

software that performs some sort of maintenance on the computer system

30
New cards

Encryption software

software that scrambles data into a secret code that can only be broken by complicated mathematical algorithms

31
New cards

Defragmentation

A utility that reduces the amount of fragmentation by physically moving data on the disk to store the pieces of each file contiguously

32
New cards

Data Compression

Reducing the amount of space needed to store a piece of data

33
New cards

LAN

Local Area Network; a geographic network that covers a relatively small geographic area.

34
New cards

WAN

Wide Area Network; a geographic network that covers a relatively large geographic area.

35
New cards

Factors that affect the performance of networks

Number of devices connected

Bandwidth

36
New cards

Bandwidth

The amount of data that can be send across a network per second (speed of a network)

37
New cards

client/server network

A network that uses centrally administered computers

38
New cards

peer-to-peer network

A type of network that connects client computers directly together. All computers are equal

39
New cards

The hardware needed to connect stand-alone computers into a Local Area Network

Routers

Switches

NIC (Network Interface Controller/Card)

Transmission media

Wireless access points Network Interface Card (NIC)

40
New cards

Wireless access points

Allows you to wirelessly access a network (Wifi)

41
New cards

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers / a network

42
New cards

Transmission media

Wifi\Wireless

43
New cards

DNS server

translates the domain name into its associated IP address

44
New cards

The cloud

Data and programs are stored on the internet. They can be accessed anytime from any computer with internet access.

45
New cards

Router

A device that transfers data from one network to another

46
New cards

Switch

Transfers data around a network

47
New cards

Hosting

Storing files or data on another computer (e.g webpage files) to be accessed by other

48
New cards

Layers

Divisions of functionality within a network

Application Layer

Transport Layer

Internet Layer

Network Access Layer/Data Link Layer

49
New cards

Application Layer

The 1st layer of the TCP/IP model. This layer's protocols enable software programs to negotiate formatting

50
New cards

Transport Layer

The 2nd layer of the TCP/IP model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control

51
New cards

Internet Layer

The 3rd layer of the TCP/IP model.Responsible for addressing

52
New cards

Data Link Layer

The 4th layer of the TCP/IP model. This layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.

53
New cards

Packet

Data broken down to be sent across a WAN.

54
New cards

ROM

Non volatile. Stores start up instructions

55
New cards

RAM/Main Memory

Volatile. Stores data for programs that are currently open

56
New cards

The difference between RAM and ROM

RAM is volatile ROM is not

57
New cards

Virtual memory

Using part of your secondary storage as primary storage (RAM)

58
New cards

Why would you use virtual memory?

Not enough RAM\memory

59
New cards

Secondary Storage

Long term storage. Auxiliary (external) to the computer

60
New cards

Optical Storage

storage device that records data by burning microscopic holes in the surface if the disk with a laser. E.g CD DVD Blu ray.

Small capacity

Slow

Speed

Portable

Can get scratch

Cheap

61
New cards

Magnetic Storage

Type of secondary storage that users magnets to read and store data. Examples include floppy disks and hard disks.

High capacity

Average

Speed

Not portable

Moving parts-can get broken not very durable

Quite reliable

Cheap

62
New cards

Solid state

Storage that uses transistors to store data. It has no moving parts. E.g USB memory

High capacity but limited

Fast speed

Portable

No moving parts, so it is durable

It is reliable

Expensive

63
New cards

Capacity

How big your storage is.

64
New cards

Speed

How fast the storage device is

65
New cards

Portability

Whether the device can be carried around

66
New cards

Durability

How robust the device is

67
New cards

Reliability

How much you can rely on your device to work

68
New cards

Cost

How expensive the storage device is

69
New cards

Characteristic of secondary storage

Capacity, speed, portability, durability, reliability and cost

70
New cards

bit

A single binary digit: 1 or 0

71
New cards

Nibble

4 bits or half a byte

72
New cards

Byte

8 bits

73
New cards

Kilobyte

1000 bytes

74
New cards

Megabyte (MB)

1000 kilobytes or 1,000,000 bytes

75
New cards

Gigabyte (GB)

1,000 megabytes or 1,000,000,000 bytes

76
New cards

Terabyte (TB)

1,000 gigabytes or 1,000,000,000,000 bytes

77
New cards

Petabyte

1,000 terabytes or 1,000,000,000,000,000 bytes

78
New cards

ASCII

8 bit binary Character set representing keyboard characters. Can represent 255 characters

79
New cards

Unicode

A character set which can have 32 bit(varies in size). This enables more languages to be represented but each character takes up more storage.

80
New cards

Character set

A list of the characters and the codes used to represent each one

81
New cards

Binary shift

Allows you to easily multiple and divide base-2 binary numbers. A left shift multiplies by 2 and a right shift divides by 2.

82
New cards

Images

Made up of pixels. Each pixel contains binary data representing a different colour

83
New cards

Pixel

A "picture element" containing binary data representing a colour

Short for "picture element" it is the fundamental unit of a digital image

Each pixel contains binary information on its colour

84
New cards

Meta Data

a set of data that describes and gives information about the file

85
New cards

E.g name

width and height (images)

86
New cards

Colour depth

The number of bits used for each pixel

87
New cards

As it increases the quality of the image increases

so does the file size.

88
New cards

Resolution

The dimensions of the grid that forms a bitmap graphic.

89
New cards

Sample

The height of the wave length is measured at regular intervals

90
New cards

Bit rate

The amount of data sampled per second. Sample rate * bit depth

91
New cards

Sample frequency/rate

The number of samples made per second. 1 sample per second = 1 hertz

92
New cards

Bit depth

The number of bits used to record each sample.

93
New cards

Compression

Making a file smaller by removing unneeded data

94
New cards

Lossy Compression

Removing data that will not be noticed, to reduce the file size. It is irrecoverable

95
New cards

Lossless Compression

Removing data that will not be noticed, to reduce the file size. The original data can be reconstructed

96
New cards

The playback quality

As quality increases the quality of the sound and file size increases

97
New cards

Image quality

As quality increases the quality of the image and file size increases

98
New cards

CPU

The brain of the computer. Carries out instructions. It fetches

99
New cards

MAR

MDR. Program Counter (PC) and Accumulator (ACC) are all parts of the

100
New cards

Memory Address Register (MAR)

Stores the location for data to be fetched from or sent to memory