1/98
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
CPU
Central Processing Unit: The main part of the computer, consisting of the registers, ALU and control unit.
Von Neumann Architecture
Traditional computer architecture that forms the basis of most digital computer systems. Instructions are fetched, decoded and executed one at a time.
MAR
Memory Address Register: Holds the address of data ready for use by the memory data register. or the address of an instruction passed from the program counter. Step 2 of the fetch, decode, execute cycle.
MDR
Memory Data Register: Holds the data fetched from or to be written to the memory. Step 3 of the fetch, decode, execute cycle.
PC
Program Counter: Holds the address of the next instruction. Step 1 of the fetch, decode, execute cycle.
Accumulator
Holds the result of calculations.
ALU
Arithmetic Logic Unit: Performs calculations e.g. x = 2 + 3 and logical comparisons e.g. IF x > 3 in the CPU.
CU
Control Unit: Decodes instructions. Sends signals to control how data moves around the CPU.
Cache
Memory in the processor providing fast access to frequently used instructions and data.
F-D-E cycle
Fetch-Decode-Execute Cycle: The complete process of retrieving an instruction from store, decoding it and carrying it out. Also known as the instruction cycle.
Clock Speed
Measured in Hertz, the clock speed is the frequency at which the internal clock generates pulses. The higher the clock rate, the faster the computer may work. The clock is the electronic unit that synchronises related components by generating pulses at a constant rate.
Cache Size
A part of the main store between the central processor and the rest of the memory. It has extremely fast access, so sections of a program and its associated data are copied there to take advantage of its short fetch cycle. The larger the size of the cache the more that can be copied and stored here without having to go back to slower main memory (RAM), this has a significant impact on the speed of processing.
Cores
A part of a multi-core processor. A multi-core processor is a single component with two or more independent actual CPUs, which are the units responsibly for the fetch-decode-execute cycle.
Embedded System
A computer which has been built to solve a very specific program and is not easily changed. For example the operating system placed inside a washing machine, microwave or set of traffic lights.
RAM
Random Access Memory: Volatile (data lost when power is off) Read and write. Purpose: temporary store of currently executing instructions and their data. E.g. applications and the operating system in use.
ROM
Read Only Memory: Non-volatile (data retained when power is off) Read only. Purpose: stores instructions for starting the computer called the bootstrap.
Virtual Memory
Using part of the hard disk as if it were random access memory. Allows more applications to be open than physical memory could hold.
Flash Memory
Solid state (no moving parts). Faster than a hard disk drive. Robust. Used to store the BIOS.
Secondary Storage
Permanent storage of instructions and data not in use by the processor. Stores the operating system, applications and data not in use. Read/write and non-volatile.
Optical Storage
CD/R, CD/RW, DVD/R, DVD/RW Use: music, films and archive files. Low capacity. Slow access speed. High portability. Prone to scratches. Low cost.
Magnetic Storage
Hard disk drive. Use: operating system and applications. High capacity. Medium data access speed. Low portability (except for portable drives). Reliable but not durable. Medium cost.
Solid State Storage
Memory cards & solid state hard drive (SSD). Use: digital cameras and smartphones. Medium capacity. High portability. Reliable and durable. No moving parts. Fast data access speed. High cost.
Storage Capacity
The amount of data a storage device is able to store.
Storage Speed
The read/write access speed of a storage device.
Storage Portability
How easy it is to transport a given storage medium. E.g. Solid state and optical storage and designed to be highly portable, whereas more traditional magnetic storage is designed to stay in place.
Storage Durability
How resistant to damage and wear a tear a storage device is. Devices with low durability will wear out easily over time.
Storage Cost
The relative price of a storage medium on a
LAN
Local Area Network: Small geographic area. All the hardware for the LAN is owned by the organisation using it. Wired with UTP cable, fibre optic cable or wireless using routers and Wi-Fi access points.
WAN
Wide Area Network: Large geographic area. Infrastructure is hired from telecommunication companies who own and manage it. Connected with telephone lines, fibre optic cables or satellite links.
Client-Server Network
A client makes requests to the server for data and connections. A server controls access and security to one shared file store. A server manages access to the internet, shared printers and email services. A server runs a backup of data.
Peer-to-Peer Network
All computers are equal. Computers serve their own files to each other. Each computer is responsible for its own security and backup. Computers usually have their own printer.
Stand-Alone Computer
A single computing device not connected to any other on a network, either wired or wireless.
WAP
Wireless Access Point: A networking hardware device that allows a Wi-Fi device to connect to a wired network.
Router / Switch
In packet-switched networks such as the internet, a router is a device or, in some cases, software on a computer, that determines the best way for a packet to be forwarded to its destination.
NIC
Network Interface Controller: A computer hardware component that connects a computer to a computer network.
Transmission Media
The physical media over which data is transmitted, e.g. twisted copper cable, fibre optic etc.
DNS
Domain Name System:
Hosting
Websites stored on dedicated servers. Reasons include: Websites need to be available 24/7. Accessed by thousands of users at a time. Strong protection from hackers. They need an IP address that doesn't change.
The Cloud
Remote servers that store data that can be accessed over the internet. Advantages: Access anytime, anywhere from any device. Automatic backup. Collaborate on files easily.
Virtual Networks
A logical software based network. Advantages: + Increased security, including more secure access to the network remotely. + The network can easily be expanded with less impact on the infrastructure and cost. + Log in to work from home.
Star Network Topology
Computers connected to a central switch. If one computer fails no others are affected. If the switch fails all connections are affected.
Mesh Network Topology
Switches (LAN) or routers (WAN) connected so there is more than one route to the destination. e.g. The Internet More resilient to faults but more cable needed.
WiFi
Wireless connection to a network. Requires a wireless access point or router. Data is sent on a specific frequency. Each frequency is called a channel.
Frequency
The number of occurrences of a repeating event per unit of time. Data is set on a specific frequency over a WiFi connection.
Channels
Each given signal frequency on a WiFi connection is known as a channel.
Encryption
Encoding readable data called plaintext into unreadable data called ciphertext. Only the intended recipient can decode the data using a key. Protects communications from hackers.
Ethernet
A standard for networking local area networks using protocols. Frames are used to transmit data. A frame contains the source and destination address, the data and error checking bits. Uses twisted pair and fibre optic cables. A switch connects computers together.
IP Address
Internet Protocol Address: A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
MAC Address
Media Access Control Address: A unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most network technologies, including Ethernet and Wi-Fi.
Protocol
A set of rules that allow two devices to communicate.
TCP/IP
Transmission Control Protocol / Internet Protocol: TCP provides an error free transmission between two routers. IP routes packets across a wide area network.
HTTP
Hypertext Transfer Protocol: A client-server method of requesting and delivering HTML web pages. Used when the information on a web page is not sensitive or personal.
HTTPS
Hypertext Transfer Protocol Secure: Encryption and authentication for requesting and delivering HTML web pages. Used when sensitive form or database data needs to be transferred. e.g. passwords and bank account details.
FTP
File Transfer Protocol: Used for sending files between computers, usually on a wide area network. Typically used for uploading web pages and associated files to a web server for hosting.
POP
Post Office Protocol: Used by email clients to retrieve email from an email server.
IMAP
Internet Message Access Protocol: Used by mail clients to manage remote mail boxes and retrieve email from a mail server.
SMTP
Simple Mail Transfer Protocol: Sends email to an email server.
Packet Switching
TCP splits data into smaller packets. Each packet takes its own route. Packets are assembled back into the correct order when they arrive at the destination. Maximises the use of the network. More secure as the full data stream is not sent in the same direction.
Malware
Software written to cause loss of data, encryption of data, fraud and identity theft: virus, worm, trojan, ransomware and spyware.
Phishing
Sending emails purporting to be from reputable companies to induce people to reveal personal information.
Social Engineering
Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.
Brute Force Attacks
A trial and error method of attempting passwords. Automated software is used to generate a large number of guesses.
Denial of Service Attacks
Flooding a server with so much traffic it is unable to process legitimate requests.
Data Interception
Stealing computer-based information.
SQL Injection
A hacking technique used to view or change data in a database by inserting SQL code instead of data into a text box on a form.
Network Policies
Rules put in place on a Local Area Network by a systems administrator. They control aspects such as what certain types of users are allowed to / what they are allowed to access etc.
Penetration Testing
Testing designed to check the security and vulnerabilities of a system.
Network Forensics
Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.
Anti-Malware Software
Antimalware software protects against infections caused by many types of malware, including viruses, worms, Trojan horses, rootkits, spyware, key loggers, ransomware and adware.
Firewalls
A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
User Access Level
The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.
Password
A secret word or phrase that must be used to gain access to a computer / program / interface / system.
Systems Software
Collection of systems software that manages the computer. Usually supplied with the computer. Most common operating systems are Windows, Linux, Unix, MacOS, iOS.
User Interface
The means by which the user and a computer system interact, in particular the use of input devices and software.
Memory Management
The process of the operating system deciding what should be in memory at any given time. Responsible for loading data and programs into and out of memory when required.
Multitasking
Running more than one application at a time by giving each one a slice of processor time.
Peripheral Management
The process of your operating system dealing with requests / input / output to and from any connected peripheral devices such as a mouse, keyboard, webcam, speaker, scanner, printer etc.
Device Drivers
Translates commands from the operating system into hardware specific commands that a device understands. e.g. A printer driver tells the printer how to print a document from the operating system.
User Management
Operating system provides for: Allowing different people to log into the same computer with a username and password. Remembering personal settings. Managing access rights to files.
File Management
Operating system provides: Access permissions for files (read and write). Opening files in associated programs. Moving, deleting and renaming files. Presenting a folder structure to the user.
Utility System Software
A systems program that performs some specific task in the operation of the computer, for example file backup, virus checking or a compression program.
Encryption Software
Turns plaintext data into unreadable ciphertext data using a key. Protects data from being read by hackers.
Defragmentation Software
Different sized files saved on disk are deleted over time creating gaps on the disk. New files fill up the gaps, but may need more space than the gap provides resulting in fragments of the file being spread across the disk. Defragmentation rearranges parts of files back to contiguous space. Makes access quicker.
Data Compression
Reduces the size of a file. Takes up less disk space. Quicker to download over the internet. Compressed files must be extracted before they can be read.
Full Backup
Every file is copied to an alternative storage device. E.g. portable hard drive. Files can be recovered if it is deleted or corrupted. Can be slow to copy large numbers of files.
Incremental Backup
Only the files that have changed since the last backup are copied. Files can be recovered if it is deleted or corrupted. Much quicker than a full backup.
Ethical Issues
The ethical and moral issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Losing/changing jobs. Efficiency: robots work 24/7. Access to IT is not equal (digital divide). Invasion of privacy. Responsibility for content on the internet.
Legal Issues
The legal issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Copyright and ownership of digital content, different laws in different countries (crime may be committed in a certain country, but the people committing the crime could be physically located in another), hacking, piracy.
Cultural Issues
The cultural moral issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Censorship to prevent political unrest and preserve culture. Geography & economy of a country affects access to networks and power. Increased mobile technology impacts on how people communicate: cyberbullying.
Environmental Issues
The environmental issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Manufacturing computers uses fossil fuels. Limited number of natural resources. Data centres use 2% of global energy. Computers contain hazardous materials, often shipped to other countries for disposal.
Privacy Issues
The privacy issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Increase in always on, voice activated devices in the home. Rise in CCTV. Rise in social networking and GPS tracking.
Stakeholder
Anyone with an interest in a business. e.g. Company owners: profits & reputation. Workers: jobs & salary. Customers: price & convenience. Suppliers: costs. Local community: environment & jobs.
Open Source Software
Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. Users have access to the source code. May not be fully tested.
Proprietary Software
Users cannot modify the software. Copyright protected. Usually paid for. Licensed per user or per computer. Support provided by developers. Users do not have access to the source code. Fully tested and supported by developers.
Data Protection Act
Legislation which protects individuals from unreasonable use of their store personal data.
Computer Misuse Act
Legislation which defines electronic vandalism, unauthorised access to computer systems and theft of information.
Copyright Designs and Patents Act
Legislation which gives creators of literacy, dramatic, musical and artistic works the right to control the ways in which their material may be used.
Creative Commons Licensing
A way to grant copyright permissions to creative work. It allows an author to retain copyright while allowing others to copy, distribute, and make some uses of their work.
Freedom of Information Act
Members of the public can request information from public bodies about their activities. Public authorities are obliged to publish data about their activities when asked.