Computer science AQA

studied byStudied by 4 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 97

flashcard set

Earn XP

Description and Tags

Probably the only subject i like atm ^^

98 Terms

1
Abstraction
process of removing unnecessary information from a set of instructions so that it is simpler, more relevant and can speed up the program
New cards
2
Bus
Set of wires connecting components within the CPU
New cards
3
Advantages of networks
  • Sharing resources can save money

  • data is easy to back up

  • Easy collaborative working

New cards
4
Advantages of bus topology
* cheap and easy to install
New cards
5
Advantages of star topology
  • reliable, if one device fails the whole network isn’t affected

  • High performing as no data collisions occur

  • More secure- not all devices receive data sent (unlike in bus topology)

New cards
6
Application software
Computer software that allows the user to carry out a specific task, eg browsers/ games
New cards
7
Arithmetic logic unit
In charge of all maths and logic problems within the processor
New cards
8
ASCII
7 bit character set
New cards
9
Binary search
Takes the middle of an ordered list and removes the lower/ higher half depending on wether the input is lower or higher than the middle value, continues this cycle until only the searched for item is found
New cards
10
Breakpoints
Can be added to code by a programmer, which will pause the programs execution so the programmer can observe results.
New cards
11
Bus topology
  • Devices connected via one cable

  • As more devices are added, performance decreases

  • When data is sent, all devices receive it (only the intended recipient processes it)

  • If main cable falls, the whole network will crash

New cards
12
Cache
Memory that is very fast and is easily accessed by the CPU, it allows requests to be served quicker since its quick to read/write
New cards
13
Computer system
A combination of hardware and software
New cards
14
Computer virus
  • self replicating

  • Damage or delete files on a computer

  • Can be spread computer to computer

New cards
15
Control unit
Directs and coordinates most of the operations inside the cpu
New cards
16
CPU
Processes and uses data to perform tasks
New cards
17
Register
Memory locator inside CPU, store information that ALU needs to carry out current instruction
New cards
18
Decomposition
Breaking down a problem into smaller, sub problems, each with an identifiable task
New cards
19
Definite iteration
Repeating a block of code for a finite number of times
New cards
20
Disadvantages of networks
  • expensive / may need to hire a network manager

  • Hackers / viruses can infiltrate the network more easily

New cards
21
Embedded system
A device developed for a single purpose (which has a system embedded into it in order to fulfil that purpose) , eg washing machine, microwave
New cards
22
Fetch decode execute cycle
  • fetch- instructions are fetched from memory, it is them carried to the control unit

  • Decode - control unit decodes instructions, if arithmetic or logic is needed, instructions sent to ALU

  • The instructions are then executed (may require additional data held in memory)

New cards
23
Field
A single data item within a table
New cards
24
Foreign key
A field in one table, that is a primary key in another table
New cards
25
Primary key
A unique identifier that will have a different value for each record in a table
New cards
26
Function
A name of a section of code that performs tasks and returns a value
New cards
27
General purpose system
A computer system that can change its purpose by adding more software
New cards
28
Global variables
Variables declared in the main body of the program and can be accessed anywhere in the code
New cards
29
Graphics card
Used to process the graphics portion of the processing load
New cards
30
Hard drive
Stores majority of data and houses the hard disk
New cards
31
Hardware
Physical elements of a computer system
New cards
32
Lossless compression
A form of compression where none of the original data is lost, for example Huffman coding
New cards
33
Lossy compression
A compression technique that works by discarding some of the data to reduce the amount stored. (Can result in the deterioration of quality)
New cards
34
Huffman coding
Reduced the number of bits by encoding more frequent characters with shorter bit representations and less frequent ones with longer bit representations
New cards
35
Indefinite iteration
Repeating a block of code until conditions are met, eg while loop
New cards
36
Linear search
Works by starting at the beginning of a list and moving through values until it either finds what it is searching for, or reaches the end of the list
New cards
37
Local variables
A variable declared within a function, and therefore can only be accessed within that function
New cards
38
Logic error
An error in the logic of the code that causes it t run incorrectly, but not to crash. (So the program works, but not as the programmer intended it to)
New cards
39
Magnetic media
  • use read write heads

  • Contain electromagnets on the surface

  • Split into sectors of magnetised regions

  • Require movements (therefore not as robust as SSDs

  • Have a spiral track

New cards
40
Optical media
  • disks eg cds and dvds

  • Light is shined onto them

  • Have a spiral track and rotate

  • Consists of a series of pits and lands each of which reflect differently when the light is shone onto it, and can either represent a 1 or 0

New cards
41
Parameters
A variable that can be passed through a subroutine
New cards
42
Phishing
Usually an email that falsely claims to be from a legitimate enterprise, in order to trick the user into sending private information
New cards
43
Blagging
The fabrication of an elaborate story in order to trick a user into sending money/ giving away personal information
New cards
44
Network Protocol
Rules for communication between two or more computers
New cards
45
Records
Complete sets of information that consist of fields.
New cards
46
Run length encoding
Works by reducing the physical size of a repeating string of characters by representing the number of times the character repeats, followed by the character. Eg AAHHH would be 2A3H
New cards
47
Sample resolution
The number of bits used to represent each sample
New cards
48
Secondary storage
Non volatile memory that is used to store data permanently, not directly accessible by the CPU
New cards
49
Solid state drive
A form of flash memory that is retained even when there is no power- more robust than magnetic and optical due to no moving parts.
New cards
50
Spyware
A computer program which is installed without permission, sometimes through a virus, it collects data and sends it back to another source
New cards
51
SQL
Structured query language, a program language that is designed to manage data within a database.
New cards
52
Syntax error
An error that occurs when the rules of the programming language is broken, results in the program crashing.
New cards
53
Trojan
A piece of software that is ‘disguised’ as another application (eg utility/ game) and performs malicious activities like releasing viruses or installing spyware whilst the user is unaware.
New cards
54
Clock
A part of the cpu that synchronises all instructions, each instruction is carries out on an electrical impulse that is controlled by the clock
New cards
55
Types of social engineering
  • blagging

  • Phishing

  • Shouldering

New cards
56
Shouldering
Observing someone enter passwords/ personal information. Eg watching someone enter their bank pin in order to steal money later.
New cards
57
Compilers
  • translates whole code into machine code before it is run

  • Can store compiled code as an executable file

New cards
58
Interpreted code
  • translate code into machine code line by line (so makes errors easier to spot)

  • Does NOT save machine code

New cards
59
Advantages of compiled code
  • makes it easier to distribute code, since the executable file can be shared rather than the source code (less risk of companies stealing machine code)

  • faster since they’re not line by line

  • code only has to be translated one instead of each time it is needed to be used

  • No installation needed.

New cards
60
Advantages of interpreted code
* convenient when developing a program (debugging is often easier)
New cards
61
TCP/IP stack
  • application

  • transport

  • Internet

  • Link

New cards
62
Application layer
  • http, https, smtp, IMAP and Ftp operate at this layer

  • This is where network applications eg browsers/ email programs operate

New cards
63
Transport layer
  • sets up communication between two hosts (computers)

  • Agrees settings eg size of packets

  • TCP and UDP operate at this layer

New cards
64
Internet Layer
  • where addresses are added to packets

  • IP operates at this layer

New cards
65
Link layer
  • where network hardware is located

  • WIFI and Ethernet operate at this layer

New cards
66
HTTPS
allows computers to send/ receive web pages
New cards
67
IP
Adds addresses to packets of data so that they arrive at the correct destination when sent over the internet
New cards
68
SMTP
Protocol to send email
New cards
69
IMAP
Used when receiving emails
New cards
70
FTP
  • Protocol used when files are transferred from one computer to another over a network

  • Used by web devs when uploading web pages to web server

New cards
71
Ethernet
  • Family of related protocols rather than a single protocol

  • Used by LANs

New cards
72
Wi-Fi
  • similar to Ethernet - family of related protocols

  • WLAN (used by comps in a wireless network)

New cards
73
PAN
  • personal area network

  • Group of computers connected around an individual (usually using Bluetooth)

New cards
74
WAN
  • wide area network

  • Group of computers connected over a large geographical area/ global scale

  • Collective or distributive ownership

New cards
75
LAN
  • Local area network

  • Connected over one building/ site

  • Uses Star/ bus topology

New cards
76
Benefits of standalone computer
  • less malware risks/ hacking

  • Faster speed (since networks can become slow as usage increases)

  • No need to employ network manager (so cheaper)

New cards
77
Benefits of networks
  • hardware devices can be charged (eg printers) - so cheaper

  • Data/ files can be shared easily, so collaborative working is easier

  • Central management can handle backups

  • Work can be accessed from any computer on the network

  • Computer usage can be monitored by employers

New cards
78
Advantages of wireless networks
  • usage anywhere in range

  • Not limited by cables

  • No cable cost

  • No trip hazards

  • Very easy to add new computers to network

New cards
79
Diss advantage of wireless networks
  • slower network speed than wired

  • Not as secure

  • Signals can be affected by other electrical devices

New cards
80
How is CPU performance affected
  • by clock speed - higher clock speed = more executes per second

  • Increase num of cores = more executes at same time

  • Increase cache memory - more data/ instructions can be fetched from fast memory

New cards
81
Embedded system
computer system inside another device usually designed for a specific purpose
New cards
82
Converting a sound to digital format
  • Analogue sound is converted to an electronic signal

  • Strength of signal is measured at regular intervals (samples)

  • Each sample is rounded to nearest lvl and represented as a bit pattern

New cards
83
Misconfigured access rights
access rights that have been set up incorrectly, giving the wrong people access to things they shouldn’t have access to
New cards
84
Pharming
A cyber attack where traffic for a website is redirected to a fake website
New cards
85
Removable media
  • devices used to store data that can be moved from one machine to another

  • Not very safe - could get lost/ carry sensitive data

New cards
86
White box penetration testing
  • done by someone who has some access rights/ knowledge of system, but not all

  • Used to simulate an internal attack (eg rouge employee)

New cards
87
Black box penetration testing
  • done by a person who has no knowledge of system/ no access rights

  • Used to cumulate external attack

New cards
88
Biometric measures
  • Examples include fingerprint scans, face recognition, retina cans

  • Used to biologically identify an individual

New cards
89
Automatic software updates
  • improve security - allow programs to be patched

  • Does not rely on person remembering to update

New cards
90
Captcha
* Completely automated public Turing test to tell computers and humans apart
New cards
91
Inserting using SQL
INSERT INTO (specifies tables)

VALUES (states new data value)
New cards
92
Deleting data with SQL
DELETE FROM (specify tables)

WHERE (conditions)
New cards
93
Using SQL to edit data
UPDATE (specifies tables)

SET (specify fields)

WHERE (conditions)
New cards
94
Cloud storage
Uses magnetic/ SS in a remote location

Can be accessed from any computer with internet connection
New cards
95
Storing data on optical media
Surface has pits and lands that reflect light differently each represents a 0 or 1. Light sensors detect this and it is converted to binary and processed by cpu
New cards
96
Storing data on a hard disk
Surface of each disk is divided into concentric circles called tracks. Intersection of track and sector is called a block. Block =magnetised region. The magnetism represents a 0 or 1, this is detected by a read write head, converted to binary and processed by cpu.
New cards
97
Comparison of all storage types
  • SS is faster than magnetic, is also smaller, lighter and generates less heat, more robust

  • Magnetic is cheaper per byte and has large capacity

  • Optical is very cheap but low capacity and slow access time

New cards
98
New cards
robot