Edexcel GCSE Computer Science Revision Flashcards

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Flashcards for Edexcel GCSE (9-1) Computer Science specification (1CP2) Topics 1, 2, 5, and 6

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

What is the benefit of using decomposition and abstraction in computational thinking?

To model aspects of the real world and analyse, understand, and solve problems.

2
New cards

Name the three forms algorithms can be written in.

Flowcharts, pseudocode, and program code.

3
New cards

Name the three types of operators used when writing algorithms.

Arithmetic, relational, and logical operators.

4
New cards

What is the purpose of a trace table?

To determine what value a variable will hold at a given point in an algorithm.

5
New cards

Name the three types of errors that can occur in programs.

Syntax, logic, and runtime errors.

6
New cards

List four standard algorithms mentioned in the notes.

Bubble sort, merge sort, linear search, and binary search.

7
New cards

What is the purpose of truth tables in computer science?

To apply logical operators (AND, OR, NOT) with up to three inputs to solve problems.

8
New cards

What numbering system do computers use to represent data and program instructions?

Binary.

9
New cards

What range of values can be represented by an 8-bit binary number?

0 to 255 (unsigned integers) or -128 to +127 (two's complement signed integers).

10
New cards

What is overflow in the context of binary numbers?

When a value exceeds the number of bits available to store it.

11
New cards

Why is hexadecimal notation used in computer science?

As a more human-friendly representation of binary numbers.

12
New cards

How do computers encode characters?

Using 7-bit ASCII.

13
New cards

Name three way to represent analogue sound in binary.

Amplitude, sample rate, bit depth, sample interval.

14
New cards

Name the binary multiples used to measure data storage.

Bit, nibble, byte, kibibyte, mebibyte, gibibyte, tebibyte

15
New cards

Why is data compression necessary?

To reduce file sizes and data capacity requirements.

16
New cards

Name two methods of compressing data mentioned in the notes.

Lossless and lossy.

17
New cards

Give an example of the environmental impact of computing.

The manufacture, use, and disposal of hardware (e-waste).

18
New cards

Name three examples of legal and ethical issues associated with computer technology.

Intellectual property, privacy, and data protection legislation (e.g., GDPR, Computer Misuse Act).

19
New cards

What are two common cybersecurity threats to digital systems and networks?

Malware and social engineering.

20
New cards

Give three methods of protecting digital systems and data.

Authentication, encryption, and firewalls.

21
New cards

What is the purpose of decomposition and abstraction in program code?

Breaking down a problem into smaller parts and focusing on essential details.

22
New cards

Name two techniques to maintain programs.

Comments and meaningful variable names.

23
New cards

Define 'selection' in the context of programming constructs.

Using IF, ELSE IF, ELSE statements to execute different code blocks based on conditions.

24
New cards

Define the function of 'repetition' in the context of programming constructs.

Count-controlled, condition-controlled, or iteration over data structures.

25
New cards

What are four primitive data types mentioned in the notes?

Integer, real, Boolean, and char.

26
New cards

Name two structured data types mentioned in the notes.

String, array, and record.

27
New cards

What type of files can programs read from and write to according to the notes?

Comma separated value text files.

28
New cards

What is the benefit of using subprograms?

Functions and procedures to create reusable code blocks.

29
New cards

Explain the difference between local and global variables.

Local variables are defined within a subprogram, while global variables are accessible throughout the program.

30
New cards

Give an example of the environmental impact of computing.

The manufacture, use, and disposal of hardware (e-waste).

31
New cards

Name three examples of legal and ethical issues associated with computer technology.

Intellectual property, privacy, and data protection legislation (e.g., GDPR, Computer Misuse Act).

32
New cards

What are two common cybersecurity threats to digital systems and networks?

Malware and social engineering.

33
New cards

Give three methods of protecting digital systems and data.

Authentication, encryption, and firewalls.

34
New cards

What is one environmental consequence of cloud computing?

Increased energy consumption and carbon footprint of data centers.

35
New cards

Name two common methods of cyberattacks that exploit human vulnerabilities.

Phishing attacks and ransomware primarily.

36
New cards

Give one preventative measure against software vulnerabilities being exploited by cyberattacks.

Regularly updating software and systems to patch security vulnerabilities.

37
New cards

What is malware distribution?

The distribution of malicious software through email, websites, or other means.

38
New cards

What are examples of social Engineering?

Using deception tactics and social manipulation to gain access to sensitive information.

39
New cards

Name other information security threats, beyond malware and social engineering.

Physical theft and insider threats

40
New cards

How can you mitigate insider threats and data leaks?

Proper data handling, access control, training, and audits.