Computer science AQA

studied byStudied by 3 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

Abstraction

1 / 97

flashcard set

Earn XP

Description and Tags

Probably the only subject i like atm ^^

98 Terms

1

Abstraction

process of removing unnecessary information from a set of instructions so that it is simpler, more relevant and can speed up the program

New cards
2

Bus

Set of wires connecting components within the CPU

New cards
3

Advantages of networks

  • Sharing resources can save money

  • data is easy to back up

  • Easy collaborative working

New cards
4

Advantages of bus topology

  • cheap and easy to install

New cards
5

Advantages of star topology

  • reliable, if one device fails the whole network isn’t affected

  • High performing as no data collisions occur

  • More secure- not all devices receive data sent (unlike in bus topology)

New cards
6

Application software

Computer software that allows the user to carry out a specific task, eg browsers/ games

New cards
7

Arithmetic logic unit

In charge of all maths and logic problems within the processor

New cards
8

ASCII

7 bit character set

New cards
9

Binary search

Takes the middle of an ordered list and removes the lower/ higher half depending on wether the input is lower or higher than the middle value, continues this cycle until only the searched for item is found

New cards
10

Breakpoints

Can be added to code by a programmer, which will pause the programs execution so the programmer can observe results.

New cards
11

Bus topology

  • Devices connected via one cable

  • As more devices are added, performance decreases

  • When data is sent, all devices receive it (only the intended recipient processes it)

  • If main cable falls, the whole network will crash

New cards
12

Cache

Memory that is very fast and is easily accessed by the CPU, it allows requests to be served quicker since its quick to read/write

New cards
13

Computer system

A combination of hardware and software

New cards
14

Computer virus

  • self replicating

  • Damage or delete files on a computer

  • Can be spread computer to computer

New cards
15

Control unit

Directs and coordinates most of the operations inside the cpu

New cards
16

CPU

Processes and uses data to perform tasks

New cards
17

Register

Memory locator inside CPU, store information that ALU needs to carry out current instruction

New cards
18

Decomposition

Breaking down a problem into smaller, sub problems, each with an identifiable task

New cards
19

Definite iteration

Repeating a block of code for a finite number of times

New cards
20

Disadvantages of networks

  • expensive / may need to hire a network manager

  • Hackers / viruses can infiltrate the network more easily

New cards
21

Embedded system

A device developed for a single purpose (which has a system embedded into it in order to fulfil that purpose) , eg washing machine, microwave

New cards
22

Fetch decode execute cycle

  • fetch- instructions are fetched from memory, it is them carried to the control unit

  • Decode - control unit decodes instructions, if arithmetic or logic is needed, instructions sent to ALU

  • The instructions are then executed (may require additional data held in memory)

New cards
23

Field

A single data item within a table

New cards
24

Foreign key

A field in one table, that is a primary key in another table

New cards
25

Primary key

A unique identifier that will have a different value for each record in a table

New cards
26

Function

A name of a section of code that performs tasks and returns a value

New cards
27

General purpose system

A computer system that can change its purpose by adding more software

New cards
28

Global variables

Variables declared in the main body of the program and can be accessed anywhere in the code

New cards
29

Graphics card

Used to process the graphics portion of the processing load

New cards
30

Hard drive

Stores majority of data and houses the hard disk

New cards
31

Hardware

Physical elements of a computer system

New cards
32

Lossless compression

A form of compression where none of the original data is lost, for example Huffman coding

New cards
33

Lossy compression

A compression technique that works by discarding some of the data to reduce the amount stored. (Can result in the deterioration of quality)

New cards
34

Huffman coding

Reduced the number of bits by encoding more frequent characters with shorter bit representations and less frequent ones with longer bit representations

New cards
35

Indefinite iteration

Repeating a block of code until conditions are met, eg while loop

New cards
36

Linear search

Works by starting at the beginning of a list and moving through values until it either finds what it is searching for, or reaches the end of the list

New cards
37

Local variables

A variable declared within a function, and therefore can only be accessed within that function

New cards
38

Logic error

An error in the logic of the code that causes it t run incorrectly, but not to crash. (So the program works, but not as the programmer intended it to)

New cards
39

Magnetic media

  • use read write heads

  • Contain electromagnets on the surface

  • Split into sectors of magnetised regions

  • Require movements (therefore not as robust as SSDs

  • Have a spiral track

New cards
40

Optical media

  • disks eg cds and dvds

  • Light is shined onto them

  • Have a spiral track and rotate

  • Consists of a series of pits and lands each of which reflect differently when the light is shone onto it, and can either represent a 1 or 0

New cards
41

Parameters

A variable that can be passed through a subroutine

New cards
42

Phishing

Usually an email that falsely claims to be from a legitimate enterprise, in order to trick the user into sending private information

New cards
43

Blagging

The fabrication of an elaborate story in order to trick a user into sending money/ giving away personal information

New cards
44

Network Protocol

Rules for communication between two or more computers

New cards
45

Records

Complete sets of information that consist of fields.

New cards
46

Run length encoding

Works by reducing the physical size of a repeating string of characters by representing the number of times the character repeats, followed by the character. Eg AAHHH would be 2A3H

New cards
47

Sample resolution

The number of bits used to represent each sample

New cards
48

Secondary storage

Non volatile memory that is used to store data permanently, not directly accessible by the CPU

New cards
49

Solid state drive

A form of flash memory that is retained even when there is no power- more robust than magnetic and optical due to no moving parts.

New cards
50

Spyware

A computer program which is installed without permission, sometimes through a virus, it collects data and sends it back to another source

New cards
51

SQL

Structured query language, a program language that is designed to manage data within a database.

New cards
52

Syntax error

An error that occurs when the rules of the programming language is broken, results in the program crashing.

New cards
53

Trojan

A piece of software that is ‘disguised’ as another application (eg utility/ game) and performs malicious activities like releasing viruses or installing spyware whilst the user is unaware.

New cards
54

Clock

A part of the cpu that synchronises all instructions, each instruction is carries out on an electrical impulse that is controlled by the clock

New cards
55

Types of social engineering

  • blagging

  • Phishing

  • Shouldering

New cards
56

Shouldering

Observing someone enter passwords/ personal information. Eg watching someone enter their bank pin in order to steal money later.

New cards
57

Compilers

  • translates whole code into machine code before it is run

  • Can store compiled code as an executable file

New cards
58

Interpreted code

  • translate code into machine code line by line (so makes errors easier to spot)

  • Does NOT save machine code

New cards
59

Advantages of compiled code

  • makes it easier to distribute code, since the executable file can be shared rather than the source code (less risk of companies stealing machine code)

  • faster since they’re not line by line

  • code only has to be translated one instead of each time it is needed to be used

  • No installation needed.

New cards
60

Advantages of interpreted code

  • convenient when developing a program (debugging is often easier)

New cards
61

TCP/IP stack

  • application

  • transport

  • Internet

  • Link

New cards
62

Application layer

  • http, https, smtp, IMAP and Ftp operate at this layer

  • This is where network applications eg browsers/ email programs operate

New cards
63

Transport layer

  • sets up communication between two hosts (computers)

  • Agrees settings eg size of packets

  • TCP and UDP operate at this layer

New cards
64

Internet Layer

  • where addresses are added to packets

  • IP operates at this layer

New cards
65

Link layer

  • where network hardware is located

  • WIFI and Ethernet operate at this layer

New cards
66

HTTPS

allows computers to send/ receive web pages

New cards
67

IP

Adds addresses to packets of data so that they arrive at the correct destination when sent over the internet

New cards
68

SMTP

Protocol to send email

New cards
69

IMAP

Used when receiving emails

New cards
70

FTP

  • Protocol used when files are transferred from one computer to another over a network

  • Used by web devs when uploading web pages to web server

New cards
71

Ethernet

  • Family of related protocols rather than a single protocol

  • Used by LANs

New cards
72

Wi-Fi

  • similar to Ethernet - family of related protocols

  • WLAN (used by comps in a wireless network)

New cards
73

PAN

  • personal area network

  • Group of computers connected around an individual (usually using Bluetooth)

New cards
74

WAN

  • wide area network

  • Group of computers connected over a large geographical area/ global scale

  • Collective or distributive ownership

New cards
75

LAN

  • Local area network

  • Connected over one building/ site

  • Uses Star/ bus topology

New cards
76

Benefits of standalone computer

  • less malware risks/ hacking

  • Faster speed (since networks can become slow as usage increases)

  • No need to employ network manager (so cheaper)

New cards
77

Benefits of networks

  • hardware devices can be charged (eg printers) - so cheaper

  • Data/ files can be shared easily, so collaborative working is easier

  • Central management can handle backups

  • Work can be accessed from any computer on the network

  • Computer usage can be monitored by employers

New cards
78

Advantages of wireless networks

  • usage anywhere in range

  • Not limited by cables

  • No cable cost

  • No trip hazards

  • Very easy to add new computers to network

New cards
79

Diss advantage of wireless networks

  • slower network speed than wired

  • Not as secure

  • Signals can be affected by other electrical devices

New cards
80

How is CPU performance affected

  • by clock speed - higher clock speed = more executes per second

  • Increase num of cores = more executes at same time

  • Increase cache memory - more data/ instructions can be fetched from fast memory

New cards
81

Embedded system

computer system inside another device usually designed for a specific purpose

New cards
82

Converting a sound to digital format

  • Analogue sound is converted to an electronic signal

  • Strength of signal is measured at regular intervals (samples)

  • Each sample is rounded to nearest lvl and represented as a bit pattern

New cards
83

Misconfigured access rights

access rights that have been set up incorrectly, giving the wrong people access to things they shouldn’t have access to

New cards
84

Pharming

A cyber attack where traffic for a website is redirected to a fake website

New cards
85

Removable media

  • devices used to store data that can be moved from one machine to another

  • Not very safe - could get lost/ carry sensitive data

New cards
86

White box penetration testing

  • done by someone who has some access rights/ knowledge of system, but not all

  • Used to simulate an internal attack (eg rouge employee)

New cards
87

Black box penetration testing

  • done by a person who has no knowledge of system/ no access rights

  • Used to cumulate external attack

New cards
88

Biometric measures

  • Examples include fingerprint scans, face recognition, retina cans

  • Used to biologically identify an individual

New cards
89

Automatic software updates

  • improve security - allow programs to be patched

  • Does not rely on person remembering to update

New cards
90

Captcha

  • Completely automated public Turing test to tell computers and humans apart

New cards
91

Inserting using SQL

INSERT INTO (specifies tables)

VALUES (states new data value)

New cards
92

Deleting data with SQL

DELETE FROM (specify tables)

WHERE (conditions)

New cards
93

Using SQL to edit data

UPDATE (specifies tables)

SET (specify fields)

WHERE (conditions)

New cards
94

Cloud storage

Uses magnetic/ SS in a remote location

Can be accessed from any computer with internet connection

New cards
95

Storing data on optical media

Surface has pits and lands that reflect light differently each represents a 0 or 1. Light sensors detect this and it is converted to binary and processed by cpu

New cards
96

Storing data on a hard disk

Surface of each disk is divided into concentric circles called tracks. Intersection of track and sector is called a block. Block =magnetised region. The magnetism represents a 0 or 1, this is detected by a read write head, converted to binary and processed by cpu.

New cards
97

Comparison of all storage types

  • SS is faster than magnetic, is also smaller, lighter and generates less heat, more robust

  • Magnetic is cheaper per byte and has large capacity

  • Optical is very cheap but low capacity and slow access time

New cards
98
New cards

Explore top notes

note Note
studied byStudied by 47 people
762 days ago
4.0(1)
note Note
studied byStudied by 15 people
83 days ago
5.0(1)
note Note
studied byStudied by 10 people
623 days ago
5.0(1)
note Note
studied byStudied by 9 people
699 days ago
5.0(2)
note Note
studied byStudied by 2 people
911 days ago
5.0(1)
note Note
studied byStudied by 10 people
890 days ago
5.0(1)
note Note
studied byStudied by 49 people
616 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (106)
studied byStudied by 38 people
658 days ago
5.0(3)
flashcards Flashcard (36)
studied byStudied by 17 people
392 days ago
5.0(1)
flashcards Flashcard (75)
studied byStudied by 15 people
310 days ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 7 people
620 days ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 1 person
629 days ago
5.0(1)
flashcards Flashcard (78)
studied byStudied by 279 people
401 days ago
5.0(2)
flashcards Flashcard (25)
studied byStudied by 414 people
785 days ago
5.0(6)
flashcards Flashcard (98)
studied byStudied by 27 people
12 days ago
5.0(2)
robot