Copy of IGCSE COMPUTER SCIENCE

5.0(1)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards
Personal assistant
________ (vectors) is controlled by microprocessor and use cloud connectivity to connect to the internet.
2
New cards
HDD
________ have very slow data access compared to RAM.
3
New cards
Interception
________ can be carried out using a packet sniffer, which examines data packets being sent over a network.
4
New cards
HTML files
________ are sent from the website server to the computer.
5
New cards
Input devices
________, usually sensors, send data readings to the microprocessor (computer) at set intervals.
6
New cards
Email
________ and texts can be sent simply by rerouting packets.
7
New cards
Unicode
________ use either 8, 16, 32 bits per character, so it can represent characters from languages from around the world.
8
New cards
Media Access Control
________ address: unique number that identifies the device that is connected to the network or internet, usually made of 48 bits.
9
New cards
Von Neumann architecture
________ is based- on stored program concepts.
10
New cards
Thrash point
________ is achieved when most processes come to a stop because the computer is too busy dealing with virtual memory paging (moving data in and out of memory)
11
New cards
Physical servers
________ and storage are needed to store data in cloud storage and it owns by a hosting company.
12
New cards
Optical Character Recognition
________ (OCR) is a software which converts scanned documents into a text file format.
13
New cards
Bandwidth
________: the amount of data that can be transmitted in one time.
14
New cards
Actuators
________ are used to operate the steering track, brakes and throttles under control of the computer.
15
New cards
Hexadecimal
________ is easier for humans to understand than binary, as it is a shorter representation of the binary.
16
New cards
Firewall
________ can keep a list of all undesirable IP addresses.
17
New cards
illegal access
The act of gaining ________ to a computer system without the users permission.
18
New cards
electric field
When ________ is applied to electrodes, they give off light-> no forming of backlighting.
19
New cards
typical features
Rules- look for ________ which are associated with spyware, identify potential security threats.
20
New cards
laser light
Wavelength of ________ is less than CD and DVD (stores up to five times more data than DVD)
21
New cards
Serial transmission
________: bits are sent sequentially (one after the other) down the same wire (channel)
22
New cards
diodes
Light emitting ________, the display is made up of pixels that are arranged together as a matrix.
23
New cards
negative acknowledgement
A(n) ________ means that the data was received but it can not be used as it failed an error check.
24
New cards
CMOS
________ generates electric pulses to represent the reflected red light and these pulses are sent to a digital signal processor (DSP)
25
New cards
barcode
The ________ is read by a red light or laser (light emitting diode)
26
New cards
Router
________: a device that enables data packets to be moved between different networks, for example, to join a LAN to a WAN.
27
New cards
Structure diagrams
________ can be used to show top- down design in a diagrammatic form.
28
New cards
USB
________: a type of cable and connector commonly used for half- duplex or full- duplex serial data transmission between a computer and attached devices.
29
New cards
Trojan horse
A(n) ________ replaces all or part of the legitimate software with the intent of carrying out some harm to the users computer system.
30
New cards
NIC
________: a hardware component (circuit board or chip) that is required to allow a device to connect to a network, such as the internet, it contains MAC.
31
New cards
current instruction
Registers: program counter (PC), memory address register (MAR), memory data register (MDR), ________ register (CIR) and accumulator (ACC)
32
New cards
Blockchain
________ can be used in voting records, medical records, land records, smart contracts,
33
New cards
IP
________: location of devices; MAC: actual devices at location of devices.
34
New cards
DLP
The number of micro mirrors and the way they are arranged on the ________ chip determines the resolution of the image.
35
New cards
ADC
________ converts electrical charges to level of brightness, more pixels means higher quality.
36
New cards
CCFL
________ uses two fluorescent tubes behind the LCD screen which supplies the light source.
37
New cards
Satellite TV transmission
________ are encrypted to prevent users who are not subscribed to the platform.
38
New cards
Human operator
________ will carry out the tasks manually and robot knows how to carry the task.
39
New cards
Autonomous grass cutter
________ (mowers) uses proximity sensor and camera to avoid obstacle and cover the whole room quickly.
40
New cards
Scanners
________ take images at several points, x, y and z (lasers, magnetic, white light)
41
New cards
Cameras
________ catch visual data from the surroundings, while radar and ultrasonics allow the vehicle to build up a 3D image of its surrounding.
42
New cards
Autonomous vacuum
________ cleaner uses proximity sensor and camera to avoid obstacle and cover the whole room quickly.
43
New cards
Inductive reasoning
________: ability to draw reasoned conclusions based on given data /situations.
44
New cards
Drones
________ can also be used in cloud seeding where the ________ can add silver iodide crystals to a cloud forcing it to give up its rainwate.
45
New cards
Machine learning
________ is when a program has the ability to automatically adapt its own processes and /or data:
46
New cards
Encryption keys
________ are created by supplying a message or key to the hashing algorithm which turns it into a string of characters usually shown in hexadecimal.
47
New cards
Media Access Control address
unique number that identifies the device that is connected to the network or internet, usually made of 48 bits
48
New cards
Character sets
Made of letters, numbers and various symbol, that can be encoded in a computer as patterns of binary digit
49
New cards
ASCII code
7 bit codes that represent the letters, number and characters found on standard keyboards together with 32 control codes
50
New cards
Choose shortest possible paths
this may not always be the shortest path could be taken, since certain paths may be too busy or not suitable
51
New cards
Bandwidth
the amount of data that can be transmitted in one time
52
New cards
Serial transmission
bits are sent sequentially (one after the other) down the same wire (channel)
53
New cards
USB
a type of cable and connector commonly used for half-duplex or full-duplex serial data transmission between a computer and attached devices
54
New cards
parity check (odd and even), checksum and echo check
Describe the processes involved in each of the following error detection methods for detecting errors in data after transmission
55
New cards
Parity check
An extra bit (parity bit) added to a string of binary code to ensure the number of 1-bits are either even or odd, depending upon the parity check system used
56
New cards
Registers
program counter (PC), memory address register (MAR), memory data register (MDR), current instruction register (CIR) and accumulator (ACC)
57
New cards
NIC
a hardware component (circuit board or chip) that is required to allow a device to connect to a network, such as the internet, it contains MAC
58
New cards
Media Access Control address
unique number that identifies the device that is connected to the network or internet, usually made of 48 bits
59
New cards
Router
a device that enables data packets to be moved between different networks, for example, to join a LAN to a WAN
60
New cards
Managing files
a file system is created to organise files and directories, which gives programs a consistent way to store and retrieve information
61
New cards
Software interrupts
an attempt to divide by zero, 2 processes trying to access the same memory location
62
New cards
Assembly language
low-level language that is used for developing code for specialist hardware, e.g