OCR GCSE Computer Science 9 - 1 (Component 1)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

CPU

Central Processing Unit: The main part of the computer, consisting of the registers, ALU and control unit.

2
New cards

Von Neumann Architecture

Traditional computer architecture that forms the basis of most digital computer systems. Instructions are fetched, decoded and executed one at a time.

3
New cards

MAR

Memory Address Register: Holds the address of data ready for use by the memory data register. or the address of an instruction passed from the program counter. Step 2 of the fetch, decode, execute cycle.

4
New cards

MDR

Memory Data Register: Holds the data fetched from or to be written to the memory. Step 3 of the fetch, decode, execute cycle.

5
New cards

PC

Program Counter: Holds the address of the next instruction. Step 1 of the fetch, decode, execute cycle.

6
New cards

Accumulator

Holds the result of calculations.

7
New cards

ALU

Arithmetic Logic Unit: Performs calculations e.g. x = 2 + 3 and logical comparisons e.g. IF x > 3 in the CPU.

8
New cards

CU

Control Unit: Decodes instructions. Sends signals to control how data moves around the CPU.

9
New cards

Cache

Memory in the processor providing fast access to frequently used instructions and data.

10
New cards

F-D-E cycle

Fetch-Decode-Execute Cycle: The complete process of retrieving an instruction from store, decoding it and carrying it out. Also known as the instruction cycle.

11
New cards

Clock Speed

Measured in Hertz, the clock speed is the frequency at which the internal clock generates pulses. The higher the clock rate, the faster the computer may work. The clock is the electronic unit that synchronises related components by generating pulses at a constant rate.

12
New cards

Cache Size

A part of the main store between the central processor and the rest of the memory. It has extremely fast access, so sections of a program and its associated data are copied there to take advantage of its short fetch cycle. The larger the size of the cache the more that can be copied and stored here without having to go back to slower main memory (RAM), this has a significant impact on the speed of processing.

13
New cards

Cores

A part of a multi-core processor. A multi-core processor is a single component with two or more independent actual CPUs, which are the units responsibly for the fetch-decode-execute cycle.

14
New cards

Embedded System

A computer which has been built to solve a very specific program and is not easily changed. For example the operating system placed inside a washing machine, microwave or set of traffic lights.

15
New cards

RAM

Random Access Memory: Volatile (data lost when power is off) Read and write. Purpose: temporary store of currently executing instructions and their data. E.g. applications and the operating system in use.

16
New cards

ROM

Read Only Memory: Non-volatile (data retained when power is off) Read only. Purpose: stores instructions for starting the computer called the bootstrap.

17
New cards

Virtual Memory

Using part of the hard disk as if it were random access memory. Allows more applications to be open than physical memory could hold.

18
New cards

Flash Memory

Solid state (no moving parts). Faster than a hard disk drive. Robust. Used to store the BIOS.

19
New cards

Secondary Storage

Permanent storage of instructions and data not in use by the processor. Stores the operating system, applications and data not in use. Read/write and non-volatile.

20
New cards

Optical Storage

CD/R, CD/RW, DVD/R, DVD/RW Use: music, films and archive files. Low capacity. Slow access speed. High portability. Prone to scratches. Low cost.

21
New cards

Magnetic Storage

Hard disk drive. Use: operating system and applications. High capacity. Medium data access speed. Low portability (except for portable drives). Reliable but not durable. Medium cost.

22
New cards

Solid State Storage

Memory cards & solid state hard drive (SSD). Use: digital cameras and smartphones. Medium capacity. High portability. Reliable and durable. No moving parts. Fast data access speed. High cost.

23
New cards

Storage Capacity

The amount of data a storage device is able to store.

24
New cards

Storage Speed

The read/write access speed of a storage device.

25
New cards

Storage Portability

How easy it is to transport a given storage medium. E.g. Solid state and optical storage and designed to be highly portable, whereas more traditional magnetic storage is designed to stay in place.

26
New cards

Storage Durability

How resistant to damage and wear a tear a storage device is. Devices with low durability will wear out easily over time.

27
New cards

Storage Cost

The relative price of a storage medium on a

28
New cards

LAN

Local Area Network: Small geographic area. All the hardware for the LAN is owned by the organisation using it. Wired with UTP cable, fibre optic cable or wireless using routers and Wi-Fi access points.

29
New cards

WAN

Wide Area Network: Large geographic area. Infrastructure is hired from telecommunication companies who own and manage it. Connected with telephone lines, fibre optic cables or satellite links.

30
New cards

Client-Server Network

A client makes requests to the server for data and connections. A server controls access and security to one shared file store. A server manages access to the internet, shared printers and email services. A server runs a backup of data.

31
New cards

Peer-to-Peer Network

All computers are equal. Computers serve their own files to each other. Each computer is responsible for its own security and backup. Computers usually have their own printer.

32
New cards

Stand-Alone Computer

A single computing device not connected to any other on a network, either wired or wireless.

33
New cards

WAP

Wireless Access Point: A networking hardware device that allows a Wi-Fi device to connect to a wired network.

34
New cards

Router / Switch

In packet-switched networks such as the internet, a router is a device or, in some cases, software on a computer, that determines the best way for a packet to be forwarded to its destination.

35
New cards

NIC

Network Interface Controller: A computer hardware component that connects a computer to a computer network.

36
New cards

Transmission Media

The physical media over which data is transmitted, e.g. twisted copper cable, fibre optic etc.

37
New cards

DNS

Domain Name System:

38
New cards

Hosting

Websites stored on dedicated servers. Reasons include: Websites need to be available 24/7. Accessed by thousands of users at a time. Strong protection from hackers. They need an IP address that doesn't change.

39
New cards

The Cloud

Remote servers that store data that can be accessed over the internet. Advantages: Access anytime, anywhere from any device. Automatic backup. Collaborate on files easily.

40
New cards

Virtual Networks

A logical software based network. Advantages: + Increased security, including more secure access to the network remotely. + The network can easily be expanded with less impact on the infrastructure and cost. + Log in to work from home.

41
New cards

Star Network Topology

Computers connected to a central switch. If one computer fails no others are affected. If the switch fails all connections are affected.

42
New cards

Mesh Network Topology

Switches (LAN) or routers (WAN) connected so there is more than one route to the destination. e.g. The Internet More resilient to faults but more cable needed.

43
New cards

WiFi

Wireless connection to a network. Requires a wireless access point or router. Data is sent on a specific frequency. Each frequency is called a channel.

44
New cards

Frequency

The number of occurrences of a repeating event per unit of time. Data is set on a specific frequency over a WiFi connection.

45
New cards

Channels

Each given signal frequency on a WiFi connection is known as a channel.

46
New cards

Encryption

Encoding readable data called plaintext into unreadable data called ciphertext. Only the intended recipient can decode the data using a key. Protects communications from hackers.

47
New cards

Ethernet

A standard for networking local area networks using protocols. Frames are used to transmit data. A frame contains the source and destination address, the data and error checking bits. Uses twisted pair and fibre optic cables. A switch connects computers together.

48
New cards

IP Address

Internet Protocol Address: A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.

49
New cards

MAC Address

Media Access Control Address: A unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most network technologies, including Ethernet and Wi-Fi.

50
New cards

Protocol

A set of rules that allow two devices to communicate.

51
New cards

TCP/IP

Transmission Control Protocol / Internet Protocol: TCP provides an error free transmission between two routers. IP routes packets across a wide area network.

52
New cards

HTTP

Hypertext Transfer Protocol: A client-server method of requesting and delivering HTML web pages. Used when the information on a web page is not sensitive or personal.

53
New cards

HTTPS

Hypertext Transfer Protocol Secure: Encryption and authentication for requesting and delivering HTML web pages. Used when sensitive form or database data needs to be transferred. e.g. passwords and bank account details.

54
New cards

FTP

File Transfer Protocol: Used for sending files between computers, usually on a wide area network. Typically used for uploading web pages and associated files to a web server for hosting.

55
New cards

POP

Post Office Protocol: Used by email clients to retrieve email from an email server.

56
New cards

IMAP

Internet Message Access Protocol: Used by mail clients to manage remote mail boxes and retrieve email from a mail server.

57
New cards

SMTP

Simple Mail Transfer Protocol: Sends email to an email server.

58
New cards

Packet Switching

TCP splits data into smaller packets. Each packet takes its own route. Packets are assembled back into the correct order when they arrive at the destination. Maximises the use of the network. More secure as the full data stream is not sent in the same direction.

59
New cards

Malware

Software written to cause loss of data, encryption of data, fraud and identity theft: virus, worm, trojan, ransomware and spyware.

60
New cards

Phishing

Sending emails purporting to be from reputable companies to induce people to reveal personal information.

61
New cards

Social Engineering

Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.

62
New cards

Brute Force Attacks

A trial and error method of attempting passwords. Automated software is used to generate a large number of guesses.

63
New cards

Denial of Service Attacks

Flooding a server with so much traffic it is unable to process legitimate requests.

64
New cards

Data Interception

Stealing computer-based information.

65
New cards

SQL Injection

A hacking technique used to view or change data in a database by inserting SQL code instead of data into a text box on a form.

66
New cards

Network Policies

Rules put in place on a Local Area Network by a systems administrator. They control aspects such as what certain types of users are allowed to / what they are allowed to access etc.

67
New cards

Penetration Testing

Testing designed to check the security and vulnerabilities of a system.

68
New cards

Network Forensics

Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.

69
New cards

Anti-Malware Software

Antimalware software protects against infections caused by many types of malware, including viruses, worms, Trojan horses, rootkits, spyware, key loggers, ransomware and adware.

70
New cards

Firewalls

A computer application used in a network to prevent external users gaining unauthorised access to a computer system.

71
New cards

User Access Level

The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.

72
New cards

Password

A secret word or phrase that must be used to gain access to a computer / program / interface / system.

73
New cards

Systems Software

Collection of systems software that manages the computer. Usually supplied with the computer. Most common operating systems are Windows, Linux, Unix, MacOS, iOS.

74
New cards

User Interface

The means by which the user and a computer system interact, in particular the use of input devices and software.

75
New cards

Memory Management

The process of the operating system deciding what should be in memory at any given time. Responsible for loading data and programs into and out of memory when required.

76
New cards

Multitasking

Running more than one application at a time by giving each one a slice of processor time.

77
New cards

Peripheral Management

The process of your operating system dealing with requests / input / output to and from any connected peripheral devices such as a mouse, keyboard, webcam, speaker, scanner, printer etc.

78
New cards

Device Drivers

Translates commands from the operating system into hardware specific commands that a device understands. e.g. A printer driver tells the printer how to print a document from the operating system.

79
New cards

User Management

Operating system provides for: Allowing different people to log into the same computer with a username and password. Remembering personal settings. Managing access rights to files.

80
New cards

File Management

Operating system provides: Access permissions for files (read and write). Opening files in associated programs. Moving, deleting and renaming files. Presenting a folder structure to the user.

81
New cards

Utility System Software

A systems program that performs some specific task in the operation of the computer, for example file backup, virus checking or a compression program.

82
New cards

Encryption Software

Turns plaintext data into unreadable ciphertext data using a key. Protects data from being read by hackers.

83
New cards

Defragmentation Software

Different sized files saved on disk are deleted over time creating gaps on the disk. New files fill up the gaps, but may need more space than the gap provides resulting in fragments of the file being spread across the disk. Defragmentation rearranges parts of files back to contiguous space. Makes access quicker.

84
New cards

Data Compression

Reduces the size of a file. Takes up less disk space. Quicker to download over the internet. Compressed files must be extracted before they can be read.

85
New cards

Full Backup

Every file is copied to an alternative storage device. E.g. portable hard drive. Files can be recovered if it is deleted or corrupted. Can be slow to copy large numbers of files.

86
New cards

Incremental Backup

Only the files that have changed since the last backup are copied. Files can be recovered if it is deleted or corrupted. Much quicker than a full backup.

87
New cards

Ethical Issues

The ethical and moral issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Losing/changing jobs. Efficiency: robots work 24/7. Access to IT is not equal (digital divide). Invasion of privacy. Responsibility for content on the internet.

88
New cards

Legal Issues

The legal issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Copyright and ownership of digital content, different laws in different countries (crime may be committed in a certain country, but the people committing the crime could be physically located in another), hacking, piracy.

89
New cards

Cultural Issues

The cultural moral issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Censorship to prevent political unrest and preserve culture. Geography & economy of a country affects access to networks and power. Increased mobile technology impacts on how people communicate: cyberbullying.

90
New cards

Environmental Issues

The environmental issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Manufacturing computers uses fossil fuels. Limited number of natural resources. Data centres use 2% of global energy. Computers contain hazardous materials, often shipped to other countries for disposal.

91
New cards

Privacy Issues

The privacy issues which have come about in modern society due to the increase use of computer science and its related technologies. e.g. Increase in always on, voice activated devices in the home. Rise in CCTV. Rise in social networking and GPS tracking.

92
New cards

Stakeholder

Anyone with an interest in a business. e.g. Company owners: profits & reputation. Workers: jobs & salary. Customers: price & convenience. Suppliers: costs. Local community: environment & jobs.

93
New cards

Open Source Software

Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. Users have access to the source code. May not be fully tested.

94
New cards

Proprietary Software

Users cannot modify the software. Copyright protected. Usually paid for. Licensed per user or per computer. Support provided by developers. Users do not have access to the source code. Fully tested and supported by developers.

95
New cards

Data Protection Act

Legislation which protects individuals from unreasonable use of their store personal data.

96
New cards

Computer Misuse Act

Legislation which defines electronic vandalism, unauthorised access to computer systems and theft of information.

97
New cards

Copyright Designs and Patents Act

Legislation which gives creators of literacy, dramatic, musical and artistic works the right to control the ways in which their material may be used.

98
New cards

Creative Commons Licensing

A way to grant copyright permissions to creative work. It allows an author to retain copyright while allowing others to copy, distribute, and make some uses of their work.

99
New cards

Freedom of Information Act

Members of the public can request information from public bodies about their activities. Public authorities are obliged to publish data about their activities when asked.