1/39
Flashcards for Edexcel GCSE (9-1) Computer Science specification (1CP2) Topics 1, 2, 5, and 6
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the benefit of using decomposition and abstraction in computational thinking?
To model aspects of the real world and analyse, understand, and solve problems.
Name the three forms algorithms can be written in.
Flowcharts, pseudocode, and program code.
Name the three types of operators used when writing algorithms.
Arithmetic, relational, and logical operators.
What is the purpose of a trace table?
To determine what value a variable will hold at a given point in an algorithm.
Name the three types of errors that can occur in programs.
Syntax, logic, and runtime errors.
List four standard algorithms mentioned in the notes.
Bubble sort, merge sort, linear search, and binary search.
What is the purpose of truth tables in computer science?
To apply logical operators (AND, OR, NOT) with up to three inputs to solve problems.
What numbering system do computers use to represent data and program instructions?
Binary.
What range of values can be represented by an 8-bit binary number?
0 to 255 (unsigned integers) or -128 to +127 (two's complement signed integers).
What is overflow in the context of binary numbers?
When a value exceeds the number of bits available to store it.
Why is hexadecimal notation used in computer science?
As a more human-friendly representation of binary numbers.
How do computers encode characters?
Using 7-bit ASCII.
Name three way to represent analogue sound in binary.
Amplitude, sample rate, bit depth, sample interval.
Name the binary multiples used to measure data storage.
Bit, nibble, byte, kibibyte, mebibyte, gibibyte, tebibyte
Why is data compression necessary?
To reduce file sizes and data capacity requirements.
Name two methods of compressing data mentioned in the notes.
Lossless and lossy.
Give an example of the environmental impact of computing.
The manufacture, use, and disposal of hardware (e-waste).
Name three examples of legal and ethical issues associated with computer technology.
Intellectual property, privacy, and data protection legislation (e.g., GDPR, Computer Misuse Act).
What are two common cybersecurity threats to digital systems and networks?
Malware and social engineering.
Give three methods of protecting digital systems and data.
Authentication, encryption, and firewalls.
What is the purpose of decomposition and abstraction in program code?
Breaking down a problem into smaller parts and focusing on essential details.
Name two techniques to maintain programs.
Comments and meaningful variable names.
Define 'selection' in the context of programming constructs.
Using IF, ELSE IF, ELSE statements to execute different code blocks based on conditions.
Define the function of 'repetition' in the context of programming constructs.
Count-controlled, condition-controlled, or iteration over data structures.
What are four primitive data types mentioned in the notes?
Integer, real, Boolean, and char.
Name two structured data types mentioned in the notes.
String, array, and record.
What type of files can programs read from and write to according to the notes?
Comma separated value text files.
What is the benefit of using subprograms?
Functions and procedures to create reusable code blocks.
Explain the difference between local and global variables.
Local variables are defined within a subprogram, while global variables are accessible throughout the program.
Give an example of the environmental impact of computing.
The manufacture, use, and disposal of hardware (e-waste).
Name three examples of legal and ethical issues associated with computer technology.
Intellectual property, privacy, and data protection legislation (e.g., GDPR, Computer Misuse Act).
What are two common cybersecurity threats to digital systems and networks?
Malware and social engineering.
Give three methods of protecting digital systems and data.
Authentication, encryption, and firewalls.
What is one environmental consequence of cloud computing?
Increased energy consumption and carbon footprint of data centers.
Name two common methods of cyberattacks that exploit human vulnerabilities.
Phishing attacks and ransomware primarily.
Give one preventative measure against software vulnerabilities being exploited by cyberattacks.
Regularly updating software and systems to patch security vulnerabilities.
What is malware distribution?
The distribution of malicious software through email, websites, or other means.
What are examples of social Engineering?
Using deception tactics and social manipulation to gain access to sensitive information.
Name other information security threats, beyond malware and social engineering.
Physical theft and insider threats
How can you mitigate insider threats and data leaks?
Proper data handling, access control, training, and audits.