AQA A-Level Computer Science Paper 2

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/446

flashcard set

Earn XP

Description and Tags

All sections of the AQA A Level specification except 4.7.4, 4.8, & 4.11. Will update as these are done in class. Good luck revising :)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

447 Terms

1
New cards

Natural Numbers (N)

Positive Integers; N = {0, 1, 2, 3, ...}

2
New cards

Integer Numbers (Z)

Whole numbers; Z = {..., -1, 0, 1, ...}

3
New cards

Rational Numbers (Q)

Numbers that can be represented as a fraction (all integers are rational)

4
New cards

Irrational Numbers

Numbers that cannot be represented as a fraction

5
New cards

Real Numbers (R)

A number that exists (so not a conceptual number like Pi)

6
New cards

Ordinal Numbers

The positions used in lists (1, 2, 3, ...)

7
New cards

Base

The number of symbols used to construct values (also referred to as a subscript)

8
New cards

Base 2 (Binary)

A number system that uses 2 symbols, 0 & 1. Numbers in base 2 are written as X(v2) such as 11(v2) representing 3.

9
New cards

Binary Representation of Numbers

Uses 2^x to represent numbers, with x increasing by one every place, starting from the rightmost place. (So 1, 2, 4, 8, 16, 32, 64, 128)

10
New cards

Base 10 (Decimal)

A number system that uses 10 symbols, 0-9. Numbers in base 10 are written as X(v10) such as 11(v10) representing 11.

11
New cards

Decimal Representation of Numbers

Uses 10^x to represent numbers, with x increasing by one every place, starting from the rightmost place. (So 1, 10, 100)

12
New cards

Base 16 (Hexadecimal)

A number system that uses 16 symbols, 0-9 & A-F. Numbers in base 16 are written as X(v16) such as 11(v16) representing 17.

13
New cards

Hexadecimal Representation of Numbers

The Hexadecimal system uses 16^x to represent numbers, with x increasing by one every place, starting from the rightmost place. (So 1, 16, 256)

14
New cards

Hexadecimal Advantages

Easier to read and than binary, and easily converted into both denary and binary.

15
New cards

Decimal to Binary Conversion

From left to right in the place value table, subtract the place value from the decimal number where possible.

16
New cards

Decimal to Hex Conversion

Divide the decimal number by 16, and add the remainder.

17
New cards

Significance of 16

16 is 2^4, meaning that base 16 numbers can be translated from 4 consecutive bits of a binary value. This makes it simple to translate binary numbers into hexadecimal values and back again.

18
New cards

Bits

Each individual digit in a binary digit is referred to as a bit, from the term binary digit

19
New cards

Bytes

A collection of 8 bits

20
New cards

Kilobyte

KB, 10^3 bytes

21
New cards

Megabyte

MB, 10^6 bytes

22
New cards

Gigabyte

GB, 10^9 bytes

23
New cards

Terabyte

TB, 10^12 bytes

24
New cards

Kibibyte

KiB, 2^10 bytes

25
New cards

Mebibyte

MiB, 2^20 bytes

26
New cards

Gibibyte

GiB, 2^30 bytes

27
New cards

Tebibytes

Tib, 2^40 bytes

28
New cards

ASCII Code

In 1963, the American Standard Code for Information Interchange, was established to encode symbols found in the English alphabet. Important ASCII values: A = 65, a = 97

29
New cards

Unicode

Introduced to standardise the encoding of characters from all languages

30
New cards

Transmission errors

When data is transmitted, it doesn't always arrive in the same format that it was sent. These errors cause bits to flip from 1s to 0s and vice versa.

31
New cards

What causes Transmission errors?

Electrical interference, power surges, synchronisation issues, broken cables and connectors

32
New cards

Parity Bits

When sending a byte of data, one bit is used as a parity bit. This bit is set to a 1 or 0 to make the total numbers of 1s or 0s in the byte odd or even depending on the machine. If the wrong number of bits are 'on', an error has occurred.

33
New cards

Majority Voting

Each bit of a message is sent three times- if a bit value is flipped erroneously, the recipient computer uses the majority rule and assumes that two bits that have not changed were therefore correct.

34
New cards

Check Digits

An additional digit at the end of a string of data, designed to check for mistakes in input or transmission. The first 12 digits make up the data, and the 13th is calculated by an algorithm based on the other digits

35
New cards

Modulus 10

Add all the numbers, find the remainder when divided by 10, subtract remainder from 10. Used in check digits

36
New cards

Check Sums

A total sum of all bytes is calculated with an algorithm and sent with the data. When received, it is recalculated and compared to determine if any transmission errors have occurred

37
New cards

Binary Addition: 0 + 0 =

0

38
New cards

Binary Addition: 0 + 1 =

1

39
New cards

Binary Addition: 1 + 1 =

10

40
New cards

Binary Addition: 1 + 1 + 1 =

11

41
New cards

Overflow Error

When the result of an operation is too large for the number of bits the computer works with

42
New cards

Underflow Error

When the result of an operation is too small for the number of bits the computer works with

43
New cards

Binary Multiplication: 0 * 0 =

0

44
New cards

Binary Multiplication: 0 * 1 =

0

45
New cards

Binary Multiplication: 1 * 1 =

1

46
New cards

Two's Complement

A way of showing negatives in binary. The MSB is always 1 when a binary number is negative (a sign bit). After writing the positive version, the complement can be written by starting at the LSB, all bits until and including the first 1 stay the same. From there to the MSB, the numbers are reversed.

47
New cards

Two's Complement Range

127(v10) to -128(v10)

48
New cards

Binary Subtraction

Using two's complement of the second number allows for addition instead

49
New cards

Binary Fractions

Bits on the right after a notational point are fractional

50
New cards

Fixed-Point Binary

Uses a specified number of bits where the placement of the binary point is fixed

51
New cards

Floating Point Numbers

Held in the formant m x 10n where m is the mantissa, and n is the exponent. The MSB is a sign bit for the mantissa and the exponent

52
New cards

Normalisation

The process of moving the binary point of a floating-point number to provide the maximum level of precision for a given number of bits, by ensuring the first digit after a binary point is a significant digit

53
New cards

Relative Error

Calculated as percentage

54
New cards

Analogue Data

Continuous data that can be any float from 0 to 1

55
New cards

Digital Data

Discrete data that can be 0 or 1

56
New cards

Resolution

The number of pixels used the make up a bitmap (width x height)

57
New cards

Bit Depth

The amount of bits used to store information (colour, audio), calculated with 2^bits

58
New cards

Image File Size

Pixels * Bit Depth

59
New cards

Metadata

Data about data

60
New cards

Vector Images

Made up of geometric shapes rather than manipulating individual pixels. The properties of each shape are stored and retrieved in order to mathematically redraw the shape to display it.

61
New cards

Sound File Size

Sample rate * resolution * length (seconds)

62
New cards

Nyguist Theorem

Because sound is made up of many components at different frequencies, samples must be twice the highest frequency in order to replicate the original soundwave (fs > 2fmax)

63
New cards

Lossy

Non-essential data is permanently removed

64
New cards

Lossy Qualities

Reduces quality, used for images and sounds

65
New cards

Lossless Compression

Patterns in the data are spotted and summarised in a shorter format without permanently removing any information

66
New cards

Lossless Qualities

Does not reduce quality, used for text files and code

67
New cards

Run Length Encoding (RLE)

A basic method of compression that summarises consecutive patterns of the same data

68
New cards

Dictionary Compression

Spots regularly occurring data and stores it separately in a dictionary

69
New cards

Encryption

A way of making data unintelligible if the recipient doesn't have the means to decrypt it

70
New cards

Caesar Cipher

A basic an insecure form of encryption, where characters are shifted by a consistent amount

71
New cards

Vernam Cipher

An unbreakable cipher, that is truly random sequence that is equal or longer in length than the plaintext and only ever used once

72
New cards

Brute Force

Attempts to apply every possible key to decrypt ciphertext until it works

73
New cards

Algorithmic Security

Ciphers are based on computational security, with keys determined by an algorithm

74
New cards

Hardware

The physical components of the computer

75
New cards

Hardware Examples

Motherboards, hard drives, RAM

76
New cards

External Hardware

Peripherals that can be added or removed from a computer

77
New cards

External Hardware Examples

Monitors, keyboards, mice

78
New cards

Software

Programs which run on the hardware

79
New cards

System Software

Software required to run and manage the computer's hardware and application programs

80
New cards

System Software Examples

Allocates jobs to the processor, peripheral management, software installation

81
New cards

Operating System (OS)

A middleman for communication between the computer's hardware and software

82
New cards

Operating System Examples

Windows, Mac OS, Linux, Android

83
New cards

Operating System Tasks

Resource management, provision of a UI

84
New cards

Utility Software

Designed to analyse, configure, optimise, or maintain a computer system. Some perform additional common tasks needed by most or all users.

85
New cards

Utility Software Examples

Defragmentation, installation of software, virus checkers, automatic backup

86
New cards

Libraries

A collection of pre-compiled routines that can be used by other programs

87
New cards

Libraries Examples

Random, time, tkinter

88
New cards

Translators

Translates code from high level languages into machine code

89
New cards

Translator Examples

Assemblers, Compilers, Interpreters

90
New cards

Application Software

Allows the user to complete tasks

91
New cards

Application Software Examples

Word Processors, image editors, internet browsers

92
New cards

General Purpose Software

Software that can be used for a range of generic tasks

93
New cards

General Purpose Software Examples

Word processors, graphics packages, spreadsheet software

94
New cards

Special Purpose Software

Software that performs tasks for a single, specific job

95
New cards

Special Purpose Software Examples

Payroll software, Media players, Calendar programs

96
New cards

Off-the-shelf Software

Readily available software that is low cost and well tested

97
New cards

Bespoke Software

More expensive software created to fulfil exact specifications

98
New cards

Memory Management

Allocates memory to each process

99
New cards

Processor Scheduling

Controls which programs can send data to the processor, and queues instructions to create multi-tasking

100
New cards

The Schedular

Ensures that processor time is used as efficiently as possible