Mr Hylton J277 Unit 1

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 114

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

115 Terms

1

Legal Issues

The Data Protection Act 2018 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988

New cards
2

Cultural issues

The way that Computer Science can impact the way people groups do things

New cards
3

Privacy Issues

Collecting storing and disseminating information about individuals

New cards
4

Data Protection Act 2018

A law covering:

what can be collected

how long it can be kept for

steps to keep it up to date/accurate

sending and using the data

who can see that data

New cards
5

Computer Misuse Act 1990

The UK law that makes it illegal to hack into a person's computer and to disrupt deliberately someone else's computer.

New cards
6

Copyright Designs and Patents Act

Legislation concerned with the distribution of ideas, media or products. If you did not make it, you cannot sell, or share it without the creator/owners permission

New cards
7

Software Licenses

Open Source & Proprietary

New cards
8

Open source

The source code is free and accessible by all. There is no legal cover or protection. Can be better as it is maintained by an entire community. Updates and addons are created and you can personalise it

New cards
9

Proprietary

Effectively the opposite of open source. Usually not free

New cards
10

Malware

software that is intended to damage or disable computers and computer systems.

New cards
11

Brute Force attack

An attack on passwords or encryption that tries every possible password or encryption key.

New cards
12

Social engineering

People as a weak point

New cards
13

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer

New cards
14

Data interception and theft

Seizing data as it is in transit

New cards
15

SQL Injection

An attack that targets SQL servers by inserting commands to be manipulated by the database.

New cards
16

Penetration Testing

Professional hacking to access data and computing power without being granted access; hired to identify and repair vulnerabilities and only work once

New cards
17

Anti-malware

A utility that searches for and removes any malware on a computer.

New cards
18

Firewalls

software to prevent unauthorized users

New cards
19

User Access Levels

A network policy that defines which users can see which folders and files and the type of access they have to them. Eg: Read-Only or Read-Write.

New cards
20

Passwords

A method of authentication where a person must enter a secrect string of characters

New cards
21

Strong password

"8 or more characters

Contain a number

Contain a letter

Contain a upper case character

Contain a lower case character

Contain a special character"

New cards
22

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

New cards
23

Operating System (OS)

the software that allows users to interface with the computer

New cards
24

Functions of an operating system

User management

memory management/multitasking

peripheral management and drivers

file management

New cards
25

memory management / multitasking

A function of the operating system that controls the CPU and RAM so that programs run simultaneously and concurrently

New cards
26

Peripheral Management

A function of the operating system which manages the input to the CPU and the output from external devices

New cards
27

User Management

An operating system feature that allows user accounts to be created and managed

New cards
28

File Management

A function of the operating system that organises and controlling files

New cards
29

Utility Software

software that performs some sort of maintenance on the computer system

New cards
30

Encryption software

software that scrambles data into a secret code that can only be broken by complicated mathematical algorithms

New cards
31

Defragmentation

A utility that reduces the amount of fragmentation by physically moving data on the disk to store the pieces of each file contiguously

New cards
32

Data Compression

Reducing the amount of space needed to store a piece of data

New cards
33

LAN

Local Area Network; a geographic network that covers a relatively small geographic area.

New cards
34

WAN

Wide Area Network; a geographic network that covers a relatively large geographic area.

New cards
35

Factors that affect the performance of networks

Number of devices connected

Bandwidth

New cards
36

Bandwidth

The amount of data that can be send across a network per second (speed of a network)

New cards
37

client/server network

A network that uses centrally administered computers

New cards
38

peer-to-peer network

A type of network that connects client computers directly together. All computers are equal

New cards
39

The hardware needed to connect stand-alone computers into a Local Area Network

Routers

Switches

NIC (Network Interface Controller/Card)

Transmission media

Wireless access points Network Interface Card (NIC)

New cards
40

Wireless access points

Allows you to wirelessly access a network (Wifi)

New cards
41

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers / a network

New cards
42

Transmission media

Wifi\Wireless

New cards
43

DNS server

translates the domain name into its associated IP address

New cards
44

The cloud

Data and programs are stored on the internet. They can be accessed anytime from any computer with internet access.

New cards
45

Router

A device that transfers data from one network to another

New cards
46

Switch

Transfers data around a network

New cards
47

Hosting

Storing files or data on another computer (e.g webpage files) to be accessed by other

New cards
48

Layers

Divisions of functionality within a network

Application Layer

Transport Layer

Internet Layer

Network Access Layer/Data Link Layer

New cards
49

Application Layer

The 1st layer of the TCP/IP model. This layer's protocols enable software programs to negotiate formatting

New cards
50

Transport Layer

The 2nd layer of the TCP/IP model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control

New cards
51

Internet Layer

The 3rd layer of the TCP/IP model.Responsible for addressing

New cards
52

Data Link Layer

The 4th layer of the TCP/IP model. This layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.

New cards
53

Packet

Data broken down to be sent across a WAN.

New cards
54

ROM

Non volatile. Stores start up instructions

New cards
55

RAM/Main Memory

Volatile. Stores data for programs that are currently open

New cards
56

The difference between RAM and ROM

RAM is volatile ROM is not

New cards
57

Virtual memory

Using part of your secondary storage as primary storage (RAM)

New cards
58

Why would you use virtual memory?

Not enough RAM\memory

New cards
59

Secondary Storage

Long term storage. Auxiliary (external) to the computer

New cards
60

Optical Storage

storage device that records data by burning microscopic holes in the surface if the disk with a laser. E.g CD DVD Blu ray.

Small capacity

Slow

Speed

Portable

Can get scratch

Cheap

New cards
61

Magnetic Storage

Type of secondary storage that users magnets to read and store data. Examples include floppy disks and hard disks.

High capacity

Average

Speed

Not portable

Moving parts-can get broken not very durable

Quite reliable

Cheap

New cards
62

Solid state

Storage that uses transistors to store data. It has no moving parts. E.g USB memory

High capacity but limited

Fast speed

Portable

No moving parts, so it is durable

It is reliable

Expensive

New cards
63

Capacity

How big your storage is.

New cards
64

Speed

How fast the storage device is

New cards
65

Portability

Whether the device can be carried around

New cards
66

Durability

How robust the device is

New cards
67

Reliability

How much you can rely on your device to work

New cards
68

Cost

How expensive the storage device is

New cards
69

Characteristic of secondary storage

Capacity, speed, portability, durability, reliability and cost

New cards
70

bit

A single binary digit: 1 or 0

New cards
71

Nibble

4 bits or half a byte

New cards
72

Byte

8 bits

New cards
73

Kilobyte

1000 bytes

New cards
74

Megabyte (MB)

1000 kilobytes or 1,000,000 bytes

New cards
75

Gigabyte (GB)

1,000 megabytes or 1,000,000,000 bytes

New cards
76

Terabyte (TB)

1,000 gigabytes or 1,000,000,000,000 bytes

New cards
77

Petabyte

1,000 terabytes or 1,000,000,000,000,000 bytes

New cards
78

ASCII

8 bit binary Character set representing keyboard characters. Can represent 255 characters

New cards
79

Unicode

A character set which can have 32 bit(varies in size). This enables more languages to be represented but each character takes up more storage.

New cards
80

Character set

A list of the characters and the codes used to represent each one

New cards
81

Binary shift

Allows you to easily multiple and divide base-2 binary numbers. A left shift multiplies by 2 and a right shift divides by 2.

New cards
82

Images

Made up of pixels. Each pixel contains binary data representing a different colour

New cards
83

Pixel

A "picture element" containing binary data representing a colour

Short for "picture element" it is the fundamental unit of a digital image

Each pixel contains binary information on its colour

New cards
84

Meta Data

a set of data that describes and gives information about the file

New cards
85

E.g name

width and height (images)

New cards
86

Colour depth

The number of bits used for each pixel

New cards
87

As it increases the quality of the image increases

so does the file size.

New cards
88

Resolution

The dimensions of the grid that forms a bitmap graphic.

New cards
89

Sample

The height of the wave length is measured at regular intervals

New cards
90

Bit rate

The amount of data sampled per second. Sample rate * bit depth

New cards
91

Sample frequency/rate

The number of samples made per second. 1 sample per second = 1 hertz

New cards
92

Bit depth

The number of bits used to record each sample.

New cards
93

Compression

Making a file smaller by removing unneeded data

New cards
94

Lossy Compression

Removing data that will not be noticed, to reduce the file size. It is irrecoverable

New cards
95

Lossless Compression

Removing data that will not be noticed, to reduce the file size. The original data can be reconstructed

New cards
96

The playback quality

As quality increases the quality of the sound and file size increases

New cards
97

Image quality

As quality increases the quality of the image and file size increases

New cards
98

CPU

The brain of the computer. Carries out instructions. It fetches

New cards
99

MAR

MDR. Program Counter (PC) and Accumulator (ACC) are all parts of the

New cards
100

Memory Address Register (MAR)

Stores the location for data to be fetched from or sent to memory

New cards

Explore top notes

note Note
studied byStudied by 1 person
74 days ago
4.0(1)
note Note
studied byStudied by 3 people
113 days ago
5.0(1)
note Note
studied byStudied by 1 person
112 days ago
5.0(1)
note Note
studied byStudied by 472 people
781 days ago
4.0(1)
note Note
studied byStudied by 4 people
148 days ago
5.0(1)
note Note
studied byStudied by 53 people
704 days ago
5.0(1)
note Note
studied byStudied by 5 people
288 days ago
5.0(1)
note Note
studied byStudied by 462 people
156 days ago
4.0(2)

Explore top flashcards

flashcards Flashcard (25)
studied byStudied by 45 people
819 days ago
4.0(1)
flashcards Flashcard (69)
studied byStudied by 111 people
344 days ago
5.0(2)
flashcards Flashcard (45)
studied byStudied by 220 people
111 days ago
5.0(1)
flashcards Flashcard (126)
studied byStudied by 4 people
686 days ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 14 people
834 days ago
5.0(2)
flashcards Flashcard (98)
studied byStudied by 237 people
370 days ago
5.0(6)
flashcards Flashcard (62)
studied byStudied by 29 people
917 days ago
4.5(2)
flashcards Flashcard (28)
studied byStudied by 4 people
30 days ago
5.0(1)
robot