Computer science AQA

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

flashcard set

Earn XP

Description and Tags

Probably the only subject i like atm ^^

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards
Abstraction
process of removing unnecessary information from a set of instructions so that it is simpler, more relevant and can speed up the program
2
New cards
Bus
Set of wires connecting components within the CPU
3
New cards
Advantages of networks
* Sharing resources can save money
* data is easy to back up
* Easy collaborative working
4
New cards
Advantages of bus topology
* cheap and easy to install
5
New cards
Advantages of star topology
* reliable, if one device fails the whole network isn’t affected
* High performing as no data collisions occur
* More secure- not all devices receive data sent (unlike in bus topology)
6
New cards
Application software
Computer software that allows the user to carry out a specific task, eg browsers/ games
7
New cards
Arithmetic logic unit
In charge of all maths and logic problems within the processor
8
New cards
ASCII
7 bit character set
9
New cards
Binary search
Takes the middle of an ordered list and removes the lower/ higher half depending on wether the input is lower or higher than the middle value, continues this cycle until only the searched for item is found
10
New cards
Breakpoints
Can be added to code by a programmer, which will pause the programs execution so the programmer can observe results.
11
New cards
Bus topology
* Devices connected via one cable
* As more devices are added, performance decreases
* When data is sent, all devices receive it (only the intended recipient processes it)
* If main cable falls, the whole network will crash
12
New cards
Cache
Memory that is very fast and is easily accessed by the CPU, it allows requests to be served quicker since its quick to read/write
13
New cards
Computer system
A combination of hardware and software
14
New cards
Computer virus
* self replicating
* Damage or delete files on a computer
* Can be spread computer to computer
15
New cards
Control unit
Directs and coordinates most of the operations inside the cpu
16
New cards
CPU
Processes and uses data to perform tasks
17
New cards
Register
Memory locator inside CPU, store information that ALU needs to carry out current instruction
18
New cards
Decomposition
Breaking down a problem into smaller, sub problems, each with an identifiable task
19
New cards
Definite iteration
Repeating a block of code for a finite number of times
20
New cards
Disadvantages of networks
* expensive / may need to hire a network manager
* Hackers / viruses can infiltrate the network more easily
21
New cards
Embedded system
A device developed for a single purpose (which has a system embedded into it in order to fulfil that purpose) , eg washing machine, microwave
22
New cards
Fetch decode execute cycle
* fetch- instructions are fetched from memory, it is them carried to the control unit
* Decode - control unit decodes instructions, if arithmetic or logic is needed, instructions sent to ALU
* The instructions are then executed (may require additional data held in memory)
23
New cards
Field
A single data item within a table
24
New cards
Foreign key
A field in one table, that is a primary key in another table
25
New cards
Primary key
A unique identifier that will have a different value for each record in a table
26
New cards
Function
A name of a section of code that performs tasks and returns a value
27
New cards
General purpose system
A computer system that can change its purpose by adding more software
28
New cards
Global variables
Variables declared in the main body of the program and can be accessed anywhere in the code
29
New cards
Graphics card
Used to process the graphics portion of the processing load
30
New cards
Hard drive
Stores majority of data and houses the hard disk
31
New cards
Hardware
Physical elements of a computer system
32
New cards
Lossless compression
A form of compression where none of the original data is lost, for example Huffman coding
33
New cards
Lossy compression
A compression technique that works by discarding some of the data to reduce the amount stored. (Can result in the deterioration of quality)
34
New cards
Huffman coding
Reduced the number of bits by encoding more frequent characters with shorter bit representations and less frequent ones with longer bit representations
35
New cards
Indefinite iteration
Repeating a block of code until conditions are met, eg while loop
36
New cards
Linear search
Works by starting at the beginning of a list and moving through values until it either finds what it is searching for, or reaches the end of the list
37
New cards
Local variables
A variable declared within a function, and therefore can only be accessed within that function
38
New cards
Logic error
An error in the logic of the code that causes it t run incorrectly, but not to crash. (So the program works, but not as the programmer intended it to)
39
New cards
Magnetic media
* use read write heads
* Contain electromagnets on the surface
* Split into sectors of magnetised regions
* Require movements (therefore not as robust as SSDs
* Have a spiral track
40
New cards
Optical media
* disks eg cds and dvds
* Light is shined onto them
* Have a spiral track and rotate
* Consists of a series of pits and lands each of which reflect differently when the light is shone onto it, and can either represent a 1 or 0
41
New cards
Parameters
A variable that can be passed through a subroutine
42
New cards
Phishing
Usually an email that falsely claims to be from a legitimate enterprise, in order to trick the user into sending private information
43
New cards
Blagging
The fabrication of an elaborate story in order to trick a user into sending money/ giving away personal information
44
New cards
Network Protocol
Rules for communication between two or more computers
45
New cards
Records
Complete sets of information that consist of fields.
46
New cards
Run length encoding
Works by reducing the physical size of a repeating string of characters by representing the number of times the character repeats, followed by the character. Eg AAHHH would be 2A3H
47
New cards
Sample resolution
The number of bits used to represent each sample
48
New cards
Secondary storage
Non volatile memory that is used to store data permanently, not directly accessible by the CPU
49
New cards
Solid state drive
A form of flash memory that is retained even when there is no power- more robust than magnetic and optical due to no moving parts.
50
New cards
Spyware
A computer program which is installed without permission, sometimes through a virus, it collects data and sends it back to another source
51
New cards
SQL
Structured query language, a program language that is designed to manage data within a database.
52
New cards
Syntax error
An error that occurs when the rules of the programming language is broken, results in the program crashing.
53
New cards
Trojan
A piece of software that is ‘disguised’ as another application (eg utility/ game) and performs malicious activities like releasing viruses or installing spyware whilst the user is unaware.
54
New cards
Clock
A part of the cpu that synchronises all instructions, each instruction is carries out on an electrical impulse that is controlled by the clock
55
New cards
Types of social engineering
* blagging
* Phishing
* Shouldering
56
New cards
Shouldering
Observing someone enter passwords/ personal information. Eg watching someone enter their bank pin in order to steal money later.
57
New cards
Compilers
* translates whole code into machine code before it is run
* Can store compiled code as an executable file

\
58
New cards
Interpreted code
* translate code into machine code line by line (so makes errors easier to spot)
* Does NOT save machine code

\
59
New cards
Advantages of compiled code
* makes it easier to distribute code, since the executable file can be shared rather than the source code (less risk of companies stealing machine code)
* faster since they’re not line by line
* code only has to be translated one instead of each time it is needed to be used
* No installation needed.
60
New cards
Advantages of interpreted code
* convenient when developing a program (debugging is often easier)
61
New cards
TCP/IP stack
* application
* transport
* Internet
* Link
62
New cards
Application layer
* http, https, smtp, IMAP and Ftp operate at this layer
* This is where network applications eg browsers/ email programs operate
63
New cards
Transport layer
* sets up communication between two hosts (computers)
* Agrees settings eg size of packets
* TCP and UDP operate at this layer

\
64
New cards
Internet Layer
* where addresses are added to packets
* IP operates at this layer
65
New cards
Link layer
* where network hardware is located
* WIFI and Ethernet operate at this layer
66
New cards
HTTPS
allows computers to send/ receive web pages
67
New cards
IP
Adds addresses to packets of data so that they arrive at the correct destination when sent over the internet
68
New cards
SMTP
Protocol to send email
69
New cards
IMAP
Used when receiving emails
70
New cards
FTP
* Protocol used when files are transferred from one computer to another over a network
* Used by web devs when uploading web pages to web server
71
New cards
Ethernet
* Family of related protocols rather than a single protocol
* Used by LANs
72
New cards
Wi-Fi
* similar to Ethernet - family of related protocols
* WLAN (used by comps in a wireless network)
73
New cards
PAN
* personal area network
* Group of computers connected around an individual (usually using Bluetooth)
74
New cards
WAN
* wide area network
* Group of computers connected over a large geographical area/ global scale
* Collective or distributive ownership

\
75
New cards
LAN
* Local area network
* Connected over one building/ site
* Uses Star/ bus topology
76
New cards
Benefits of standalone computer
* less malware risks/ hacking
* Faster speed (since networks can become slow as usage increases)
* No need to employ network manager (so cheaper)
77
New cards
Benefits of networks
* hardware devices can be charged (eg printers) - so cheaper
* Data/ files can be shared easily, so collaborative working is easier
* Central management can handle backups
* Work can be accessed from any computer on the network
* Computer usage can be monitored by employers
78
New cards
Advantages of wireless networks
* usage anywhere in range
* Not limited by cables
* No cable cost
* No trip hazards
* Very easy to add new computers to network
79
New cards
Diss advantage of wireless networks
* slower network speed than wired
* Not as secure
* Signals can be affected by other electrical devices
80
New cards
How is CPU performance affected
* by clock speed - higher clock speed = more executes per second
* Increase num of cores = more executes at same time
* Increase cache memory - more data/ instructions can be fetched from fast memory
81
New cards
Embedded system
computer system inside another device usually designed for a specific purpose
82
New cards
Converting a sound to digital format
* Analogue sound is converted to an electronic signal
* Strength of signal is measured at regular intervals (samples)
* Each sample is rounded to nearest lvl and represented as a bit pattern
83
New cards
Misconfigured access rights
access rights that have been set up incorrectly, giving the wrong people access to things they shouldn’t have access to
84
New cards
Pharming
A cyber attack where traffic for a website is redirected to a fake website
85
New cards
Removable media
* devices used to store data that can be moved from one machine to another
* Not very safe - could get lost/ carry sensitive data
86
New cards
White box penetration testing
* done by someone who has some access rights/ knowledge of system, but not all
* Used to simulate an internal attack (eg rouge employee)
87
New cards
Black box penetration testing
* done by a person who has no knowledge of system/ no access rights
* Used to cumulate external attack
88
New cards
Biometric measures
* Examples include fingerprint scans, face recognition, retina cans
* Used to biologically identify an individual
89
New cards
Automatic software updates
* improve security - allow programs to be patched
* Does not rely on person remembering to update
90
New cards
Captcha
* Completely automated public Turing test to tell computers and humans apart
91
New cards
Inserting using SQL
INSERT INTO (specifies tables)

VALUES (states new data value)
92
New cards
Deleting data with SQL
DELETE FROM (specify tables)

WHERE (conditions)
93
New cards
Using SQL to edit data
UPDATE (specifies tables)

SET (specify fields)

WHERE (conditions)
94
New cards
Cloud storage
Uses magnetic/ SS in a remote location

Can be accessed from any computer with internet connection
95
New cards
Storing data on optical media
Surface has pits and lands that reflect light differently each represents a 0 or 1. Light sensors detect this and it is converted to binary and processed by cpu
96
New cards
Storing data on a hard disk
Surface of each disk is divided into concentric circles called tracks. Intersection of track and sector is called a block. Block =magnetised region. The magnetism represents a 0 or 1, this is detected by a read write head, converted to binary and processed by cpu.
97
New cards
Comparison of all storage types
* SS is faster than magnetic, is also smaller, lighter and generates less heat, more robust
* Magnetic is cheaper per byte and has large capacity
* Optical is very cheap but low capacity and slow access time
98
New cards