1/52
These flashcards cover key vocabulary associated with GCSE Computer Science topics, including system architecture, memory, storage, networks, cybersecurity, and software.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
CPU
Central Processing Unit; the part of the computer that processes instructions.
Fetch Execute Cycle
The process by which a CPU fetches an instruction from memory and executes it.
Clock Speed
The speed at which a CPU operates, measured in Hertz (Hz).
Cores
Individual processing units within a CPU; multiple cores allow for parallel processing.
Cache
A small amount of ultra-fast memory located in the CPU for storing frequently used instructions.
Control Unit (CU)
Part of the CPU that directs operations and manages the execution of instructions.
Arithmetic Logic Unit (ALU)
Part of the CPU that performs mathematical and logical calculations.
Embedded System
A computer that is integrated into the device it controls, such as appliances and machinery.
Von Neumann Architecture
A computer architecture model that describes a design where a CPU uses registers, memory, and I/O.
Program Counter (PC)
A register that holds the memory address of the next instruction to be executed.
Memory Address Register (MAR)
A register that holds the memory address of data that needs to be accessed.
Memory Data Register (MDR)
A register that holds data that is being transferred to or from memory.
Accumulator
A register that holds the results of calculations performed by the ALU.
RAM
Random Access Memory; temporary memory storage for data and programs currently in use.
Volatile Memory
Memory that loses its contents when power is turned off, like RAM.
DRAM
Dynamic Random Access Memory; slower and cheaper form of RAM that needs refreshing.
SRAM
Static Random Access Memory; faster and more expensive RAM used for cache.
ROM
Read Only Memory; non-volatile memory used to store firmware that boots up the computer.
Virtual Memory
A portion of the hard drive that acts as additional RAM when physical RAM is full.
Cache Memory
Fast memory used by CPUs to store frequently accessed instructions.
Flash Memory
A type of non-volatile storage that can be electronically erased and reprogrammed.
SSD
Solid State Drive; a storage device that uses flash memory for fast data access.
Optical Storage
Storage media that use lasers to read and write data on discs like CDs and DVDs.
Magnetic Storage
Storage media that use magnetic fields to store data, such as HDDs.
Bit
The smallest unit of data in computing, representing a binary state (0 or 1).
Byte
A group of 8 bits; a basic unit of storage in computer data.
Kilobyte
Equivalent to 1,000 bytes.
Megabyte
Equivalent to 1,000,000 bytes or 1,000 kilobytes.
Gigabyte
Equivalent to 1,000,000,000 bytes or 1,000 megabytes.
Terabyte
Equivalent to 1,000,000,000,000 bytes or 1,000 gigabytes.
Capacity
The total amount of data that a storage device can hold.
Access Speed
The time it takes for a storage device to read or write data.
Portability
The ease with which a storage device can be transported.
Durability
The degree to which a storage device can withstand physical stress.
Reliability
The likelihood that a storage device will perform correctly and without failure.
LAN
Local Area Network; a network confined to a small geographical area.
WAN
Wide Area Network; a network that spans a large geographical area.
Client-Server Model
Network architecture where a central server provides resources to multiple client devices.
Peer-to-Peer Model
Network architecture where each computer acts as both a client and a server, sharing resources directly.
Wi-Fi
Wireless technology that allows devices to connect to a local area network using radio waves.
Ethernet
A system for connecting computers in a local area network using cables.
Packet Switching
Method of breaking data into packets that are sent over a network and reassembled at the destination.
Malware
Malicious software designed to harm or exploit computers.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Denial of Service Attack
An attack that floods a network or server with requests, rendering it unable to respond to legitimate requests.
Social Engineering
Manipulation techniques aimed at tricking individuals into revealing confidential information.
Encryption
The process of converting data into a coded format to prevent unauthorized access.
Penetration Testing
Simulated cyber attack on a computer system to evaluate its security.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic.
Anti-Malware Software
Software designed to detect and remove malicious software from computers.
User Access Levels
Permissions assigned to users that define what data and resources they can access.
Data Protection Act
A law designed to protect personal data and privacy of individuals.
Copyright Law
Legal protections for creators of original works, including software and digital content.