EdExcel GCSE Computer Science

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/354

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

355 Terms

1
New cards

Abstraction

the process of removing or hiding unnecessary details so that only the most important points remain.

2
New cards

Acceptable use policy

a set of conditions or rules that a network user must agree to comply with before they are allowed to use the network

3
New cards

Access control

using some form of authentication to control who has access to a computer system or network

4
New cards

Accumulator

a special purpose register within the CPU that stores the results of operations carried out by the ALU

5
New cards

Actuator

converts the output commands from a microcontroller into a mechanical action.

6
New cards

Address bus

carries the address of the memory location that the CPU will read horn or write to.

7
New cards

Algorithm

a precise method for solving a problem. It consists of a sequence of step-by-step instructions that solve a specific problem.

8
New cards

Algorithmic bias

behaviours in computer programs that create unfair outcomes.

9
New cards

Amplitude

a measurement of the distance the wave is from the x axis at a point in time. Humans perceive this as the loudness or magnitude of an analogue signal.

10
New cards

Analogue

using signals or data represented by a quantity that is continuously changing.

11
New cards

Analogue to digital conversion (ADC)

the process of converting an analogue sound into a digital representation.

12
New cards

Anti-malware

utility software that detects and provides protection against attacks from malicious software.

13
New cards

Application software (apps)

programs designed for end users such as a web browser, an email client or a spreadsheet.

14
New cards

Arguments

the piece(s) of data provided as input to a function.

15
New cards

Arithmetic logic unit (ALU)

the part of the CPU that performs arithmetic and logic operations.

16
New cards

Arithmetic operator

used to perform a calculation on two numbers.

17
New cards

Arithmetic shift

a binary shift, either left or right. When performing a right shift, the cleared positions on the left are filled with copies of the MSB. When performing a left shift, the cleared positions on the right are replaced with only Os.

18
New cards

Array

an organised collection of related elements that share a single identifier name and are of the same data type.

19
New cards

Artificial Intelligence (AI)

the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. Intelligent beings are those that can adapt to changing circumstances.

20
New cards

Ascending order

arranging items from smallest to largest (e.g. 2. 3. 4. 5.6 or a, b. c. d. e. f).

21
New cards

ASCII

a 7-bit binary code used to represent text, with each character assigned a value between 0 and 127.

22
New cards

Assembly language

a low-level language written using mnemonics. Each instruction in assembly language is equivalent to one machine code instruction.

23
New cards

Assignment

the act of storing a value in a variable. Uses the '=' symbol. The value on the right is stored in the variable on the left.

24
New cards

Asymmetric encryption

a type of encryption where two keys are used. One key encrypts the message and the other decrypts it.

25
New cards

Audit trail

the output from processes. documentation and automated software that identifies which person changed what code and when the change was made.

26
New cards

Authentication

the process of checking the identity of an individual attempting to gain access to a network . Methods of authentication include passwords. swipe cards and biometric scans.

27
New cards

Autonomous

a system's ability to make its own decisions.

28
New cards

Back door

any method by which authorised and unauthorised users are able to get around normal security measures and gain high level user access on a computer system, network or software application.

29
New cards

Backup and recovery

the process of creating backup copies of data and storing them in a separate location to the live working environment - possibly in the cloud - so that they can be recovered in the event of data loss or damage.

30
New cards

Baiting

an attack that exploits an indrvidual's greed Or Curiosity to convince a victim to divulge sensitive information to run a malware program.

31
New cards

Bandwidth

a measure of the capacity Of a network. The maximum volume of data (measured in bits) that can be transferred per second.

32
New cards

Bare metal programming

writing firmware, usually in C. that runs directly On the hardware.

33
New cards

Bidirectional

data flows in both directions.

34
New cards

Binary

data represented by just two values (e.g. high/low, on/off, 1/0).

35
New cards

Binary prefix

multiplies a unit by a power of 2.

36
New cards

Binary shift

an operation in which all the bits of a binary pattern are shifted a number of places to either the left or the right.

37
New cards

Bit

short for binary digit, this is the smallest unit of data in a computer. A bit can have the value 1 or 0. Corresponding to on or off. All the data in a computer system is represented as patterns of bits.

38
New cards

Bit depth

the number of bits used to encode a sound sample. Increasing the number of bits used increases the accuracy of the representation.

39
New cards

Bitmap

a digital image composed of a matrix of tiny blocks of colour called picture elements (pixels).

40
New cards

Bluetooth

uses radio waves to transmit data between devices over short distances. For example, between a wireless mouse and a laptop.

41
New cards

Boundary data

data that sits on the edge of any test conditions, either above or below.

42
New cards

Breakpoint

a mechanism to mark a line of code, where execution is paused. if using a debugger.

43
New cards

Broadband

a high-capacity transmission medium capable of transmitting multiple signals and traffic types across long distances at high speeds.

44
New cards

Brute force

an algorithm design that does not include any techniques to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found.

45
New cards

Bug

an error in program code.

46
New cards

Built-in

subprograms that are provided in most high-level programming languages to perform very specific common tasks.

47
New cards

Bus

transfers data between components of a computer system.

48
New cards

Bus topology

all the nodes are connected to a single cable.

49
New cards

Bus width

the number of wires that make up a bus - this determines the range of binary patterns that can be transmitted.

50
New cards

Byte

a group of eight adjacent bits that can produce 256 different binary patterns.

51
New cards

Carbon footprint

the amount of carbon dioxide an individual or organisation produces as a result of the energy they consume.

52
New cards

Carriage return

the character generated inside the computer when a user presses the Enter key on the keyboard.

53
New cards

Central processing unit (CPU)

the hardware component that carries out the processing in a computer.

54
New cards

Channel

a two-way virtual connection between a source and destination device for data transmission across a network.

55
New cards

Character set

a defined list of numerical character codes recognised by a computer's hardware and software,

56
New cards

Checksum

an error detection technique. A mathematical formula is applied to the data and the resulting checksum is transmitted with the data. The recipient computer applies the same formula to the received data and then compares the two checksums. A mismatch indicates that the data has been corrupted in transit.

57
New cards

Cipher text

the result of encryption performed on plain text.

58
New cards

CLI

command-line interface, which enables a user to interact with the computer by typing in commands.

59
New cards

Clock

an electronic device that 'ticks' at regular intervals and is used to synchronise the actions of the other components of the CPU. Clock speed is measured in hertz. 1 hertz = 1 cycle per second. Cloud computing - the storing of software and data on remote servers accessed through the Internet.

60
New cards

Code review

code is examined to identify poor programming practices. find potential vulnerabilities and check its efficiency.

61
New cards

Code vulnerability

a flaw in a program that compromises security, enabling an attacker to gain access to a computer system and the data within it.

62
New cards

Colour depth

the number of bits used to encode the colour of each pixel in a bitmap image. The more bits used, the greater the number of tones/ colours that can be represented.

63
New cards

Comments

a way for programmers to annotate code so that their logic is clear to the reader. Comments are not executed.

64
New cards

Compiler

a translator that converts high-level language source code into machine code. The source code is translated all at once and saved as object code to be executed later.

65
New cards

Compression

reduces the size of a file by repackaging or removing some of its data. There are two types of compression - lossless and lossy.

66
New cards

Computational thinking

the thought processes involved in formulating problems and their solutions so that the solutions are represented in a form that can be effectively carried out by a computer or human.

67
New cards

Computer architecture

the design of a computer - what hardware components it has and how they are connected.

68
New cards

Confidentiality

only people authorised should be allowed to access this kind of data.

69
New cards

Concatenation

the linking together of two or more items of information.

70
New cards

Concurrent processing

several processes are executed simultaneously. In a computer with a single CPU this is achieved by giving each process a time slice.

71
New cards

Console

the place where the output from a program is displayed. This could be directly on a device or in a window of another application, such as an IDE.

72
New cards

Constants

variables whose value should not be changed in the program. The names of constants are written in all upper-case letters, numbers and underscores.

73
New cards

Construct

a component from which something is built. Letters and numbers (i.e. a to z and 0 to 9) are the constructs we use to build our language and convey meaning. Bricks and cement are the basic constructs of a building.

74
New cards

Control bus

carries control signals between the control unit and other hardware components.

75
New cards

Control character

a character that means something other than its actual value. Both '\r' and '\n' are control characters.

76
New cards

Control unit (CU)

the part of the CPU that decodes instructions received from main memory and coordinates the actions of the other parts of the CPU to execute them.

77
New cards

Copyright

this is a law protecting the rights of the person who created their work to only use it themselves.

78
New cards

Corrupt file

a file that has been damaged in some way and can no longer be opened or read.

79
New cards

Cross compiler

is capable of generating code for a computer type other than the one it is running on.

80
New cards

Cryptocurrency

a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds.

81
New cards

Cyberattack

any kind of malicious attack on a computer system or network with intent to cause damage or harm.

82
New cards

Cybersecurity

the protection of computer systems from unauthorised access, damage and being made inaccessible.

83
New cards

Data breach

a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data.

84
New cards

Data bus

holds the value being read from or written to memory.

85
New cards

Data capacity

the amount of data that can be stored on a secondary storage device or in a computer's memory.

86
New cards

Data integrity

the reliability and trustworthiness of data.

87
New cards

Data packet

a small amount of data sent over a network. A header is attached to the packet providing additional information, including the source and destination address.

88
New cards

Data structure

an organised collection of related elements. Arrays and records are two common data structures used in programming.

89
New cards

Data subject

a person whose data is being collected and processed.

90
New cards

Data transfer rate

the speed at which data is transmitted from one device to another across a network, measured in bits per second.

91
New cards

Data type

an attribute of a variable that specifies what kind of data it can hold. Common data types are integer, real. Boolean, character and string. The data type of a value determines the operations that can be performed upon it.

92
New cards

Debug

the process by which a programmer finds and corrects errors in code.

93
New cards

Declaration

the process of allocating memory to a variable. based on its data type.

94
New cards

Decomposition

breaking down into smaller parts. Both problems and solutions can be decomposed into small parts.

95
New cards

Decryption key

(1) an algorithm needed to recover the plain text from the corresponding cipher text by decryption; (2) in a ransomware attack, the key the victim has to pay a ransom for in order to be able to unlock their encrypted files.

96
New cards

Denial of service

an attack on a network that attempts to prevent legitimate users from accessing its services.

97
New cards

Descending order

arranging items from largest to smallest (e.g. 6, 5, 4. 3, 2, I or f, e. d, c, b, a).

98
New cards

Device driver

a program that relays instructions and data between the operating system and a peripheral device. Each device has its own driver.

99
New cards

Digital device

a physical unit of equipment that contains a computer or microcontroller such as a smartphone. tablet, smartwatch, laptop computer and digital assistants such as Amazon Echo and Google Home.

100
New cards

Directory

a location for storing files -sometimes called a folder.