GCSE Computer Science (OCR)

5.0(1)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/245

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

246 Terms

1
New cards

Arithmetic Logic Unit (ALU)

Performs operations on data e.g. Addition, subtraction

2
New cards

Control Unit (CU)

Coordinating activities of the CPU

3
New cards

Registers

Quick, small stores of data within the CPU

4
New cards

Memory Address Register (MAR)

Holds memory address for data or a instruction about to be used by the CPU

5
New cards

Memory Data Register (MDR)

Holds actual data or instruction

6
New cards

Accumulator

Stores results of calculations in the ALU

7
New cards

Program Counter (PC)

Holds memory address of the instruction for each cycle

8
New cards

Fetch

The next instruction is retrieved by CPU from main memory

9
New cards

Decode

The instruction is broken down and decided so computer can understand

10
New cards

Execute

The CPU performs what the instructions told

11
New cards

Embedded System

A computer system built within a large device e.g. Camera, washer, car

12
New cards

Volatile

Memory loses its data when power of

13
New cards

Non-volatile

Memory retains its data when power is lost

14
New cards

Random Access Memory (RAM)

Read/write - function is to load open programs and operating system data currently in use - volatile

15
New cards

Read Only Memory (ROM)

Can only be read, can't be changed, stores essential programs to be run in order to boot the computer - non-volatile

16
New cards

Cache

A type memory that stores copies of frequently used data, much faster than RAM, lower capacity - closer to CPU

17
New cards

Buses

Collection of wires that carry signals between various components of the computer system

18
New cards

Central Processing Unit (CPU)

Processes all of the data and instructions that make the system work - can be effected by clock speed, number of cores, cache size

19
New cards

Clock speed

How fast the computer does the FDE cycle

20
New cards

virtual memory

A memory management procedure needed when the RAM is full so a temporary section is made which acts like a part of RAM

21
New cards

Flash memory

Solid state storage, non-volatile, more reliable/durable but can only be overwritten a limited number of times

22
New cards

Graphics Processing Unit (GPU)

Handles graphics and image processing

23
New cards

Optical storage

CD, DVD, Blue-ray

ADV: cheap,easy to transport

DIS: slow, less storage than hard drives, stored data degrades over time, cannot be written over

24
New cards

Magnetic storage

Hard drives

ADV: fast access, stores large amounts of data, low cost

DIS: not very portable, easily be broken

25
New cards

Solid State storage

USB, flash memory, SD

ADV: fast, small, light, easily potable, quiet

DIS: more expensive, storage capacity less, limited number erase/write cycles

26
New cards

Cloud stotage

Data is stored on multiple servers in a remote location

ADV: secure, can be accessed anywhere, no need to buy

DIS: needs internet, download and upload can be effected by internet connection, less control if data is held

27
New cards

Operating System

essential software that links the hardware and other software together and generally manages the computer system

28
New cards

Command-line Interface

Text commands where user has to type in command

29
New cards

Graphical User Interface (GUI)

uses icons and other visual indicators to navigate and issue commands

30
New cards

Utility Software

maintains a computer

31
New cards

Defragmentation Software

reorganises data on the hard drive to put fragmented files back together and moves files to collect all the free space

32
New cards

Backup Software

Full Backup - a copy is taken from from every file on the system

Incremental Backup - only files created or edited since last backup are copied

33
New cards

Compression Software

reduces file size so they take up less space on hard disk

34
New cards

Encryption Software

scrambles data to stop others from accessing it

35
New cards

Open Source Software

source code is made freely available and users can modify it

ADV: free, ,made for greater good, can be adapted

DIS: small, buggy, security holes, no warranties, no customer support

36
New cards

Proprietary Software

only the compiled code is released and the source code is kept a secret

ADV: warranties, well-tested, reliable, cheaper

DIS: expensive, software may not fit user needs

37
New cards

Personal Area Network (PAN)

within the range of an individual person

38
New cards

Local Area Network (LAN)

a network that connects devices close to each other e.g. school, house

39
New cards

Wide Area Network (WAN)

a network within a large geographical area e.g. internet

40
New cards

Bandwidth

amount of data that can be transferred in a given time

41
New cards

Network Interface Card (NIC)

allow a device to connect to a network

42
New cards

Switch

connect devices on a LAN

43
New cards

Router

responsible for transmitting data between networks

44
New cards

Ethernet

a set of standards for connecting computers

45
New cards

Client-server Network

client has connection to server, servers can backup and store centrally but can be expensive and difficult to maintain

<p>client has connection to server, servers can backup and store centrally but can be expensive and difficult to maintain</p>
46
New cards

Peer-to-peer Network

no central server, each computer equal in responsibility, have to work as both server and a client.

<p>no central server, each computer equal in responsibility, have to work as both server and a client.</p>
47
New cards

Star Topology

ADV: better performance, rest of network not affected in one fails, simple to add more devices

DIS: wire needed for all devices, expensive

<p>ADV: better performance, rest of network not affected in one fails, simple to add more devices</p><p>DIS: wire needed for all devices, expensive</p>
48
New cards

Mesh Topology

ADV: faster

DIS: expensive

49
New cards

MAC Address

assigned to all devices, unique to all devises and cannot be changed, permanent, identifies the actual device.

50
New cards

IP Adress

assigned either manually or automatic, the location of your device on the internet

51
New cards

Packet Switching

split data into packets to be sent across the network, each packet given a number order of data, each router reads packet header and decides which way to send it according to IP rules, packets then arrive and reassemble them in the right order.

52
New cards

TCP/IP

sets of rules for how devices connect on the network.

53
New cards

Hyper Text Transfer Protocol (HTTP)

used to access websites and communicate with web servers

54
New cards

HTTPS

more secure - encryption

55
New cards

File Transfer Protocol (FTP)

used to access, edit and move files between devices

56
New cards

Post Office Protocol (POP3)

used to retrieve emails from a server, holds until download - then deletes from server

57
New cards

Internet Message Access (IMAP)

used to retrieve emails, server holds until you actually delete it- only download a copy

58
New cards

Simple Mail Transfer Protocol (SMTP)

used to send emails, used to transfer emails between servers

59
New cards

Layer

ADV: manageable pieces, self-contained can change without effecting others

60
New cards

Application Layer

turning data into websites

61
New cards

Transport Layer

controlling data flow - splitting data into packets

62
New cards

Network Layer

making connections between networks

63
New cards

Data link Layer

passing data over physical network-

64
New cards

Domain Name Server (DNS)

translates websites' domain name into its IP address

65
New cards

Virtual Network

network that is entirely software based, created by partitioning of some physical network

66
New cards

Blagging

invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information

67
New cards

Phishing

used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.

68
New cards

Shouldering

used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.

69
New cards

Malware

malicious software - computer programs designed to infiltrate and damage computers without the users consent.

70
New cards

Virus

program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.

71
New cards

Worm

program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

72
New cards

Trojan Horse

program which misleads users of its true intent.

73
New cards

Spyware

aims to gather information about a person or organization without their knowledge

74
New cards

Adware

unwanted advertisements to the user of a computer

75
New cards

Brute Force Attack

trail and error to gain information

76
New cards

Denial of Service Attack (DOS)

hacker stop users from accessing a part of a network, flooding network with useless traffic making computer very slow

77
New cards

Data Interception And Theft

The unauthorized taking or interception of computer-based information. Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.

78
New cards

SQL Injection

programming language used to search and query databases.

79
New cards

Zero-day Attack

before software is released it is tested as much as possible

80
New cards

Penetration Testing

organisations employ specialists to stimulate potential attacks on their network

81
New cards

Anti-malware Software

designed to find and stop malware from damaging a network

82
New cards

Encryption

data is translated into code which only someone with the correct key can access

83
New cards

Data Protection Act

your data should be protected and kept safe from hackers

84
New cards

Freedom of Information Act

allows members of the public to access information held by a public organisation

85
New cards

Computer Misuse Act

stop hacking and cyber crime - stop unauthorized access to private network

86
New cards

Copyright Act

protect intellectual property - anything someone has created

87
New cards

alphanumeric

collective name for letters, digits, symbols

88
New cards

analogue signal

a continuous signal which can't be processed by a computer

89
New cards

argument

a value that a parameter of a subprogram actually takes

90
New cards

ALU

part of CPU that carries out arithmetic and Boolean operations

91
New cards

array

data structure where all data is stored and defined under one variable name

92
New cards

ASCII

A 7-bit character set consisting of 128 characters

93
New cards

assembler

a program that turns assembly language into machine code

94
New cards

assembly language

low-level langauge

95
New cards

authentication

a process for checking user identity

96
New cards

binary

a counting system using base-2 consisting of 0s and 1s

97
New cards

binary shift

moving the bits in a binary number left or right and filling gaps with 0s

98
New cards

BIOS

Basic Input Output System

99
New cards

bitmap image

a graphic made up of pixels

100
New cards

bit

a binary digit either 0 or 1