Copy of IGCSE COMPUTER SCIENCE

studied byStudied by 8 people
5.0(1)
Get a hint
Hint

Personal assistant

1 / 61

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

62 Terms

1

Personal assistant

________ (vectors) is controlled by microprocessor and use cloud connectivity to connect to the internet.

New cards
2

HDD

________ have very slow data access compared to RAM.

New cards
3

Interception

________ can be carried out using a packet sniffer, which examines data packets being sent over a network.

New cards
4

HTML files

________ are sent from the website server to the computer.

New cards
5

Input devices

________, usually sensors, send data readings to the microprocessor (computer) at set intervals.

New cards
6

Email

________ and texts can be sent simply by rerouting packets.

New cards
7

Unicode

________ use either 8, 16, 32 bits per character, so it can represent characters from languages from around the world.

New cards
8

Media Access Control

________ address: unique number that identifies the device that is connected to the network or internet, usually made of 48 bits.

New cards
9

Von Neumann architecture

________ is based- on stored program concepts.

New cards
10

Thrash point

________ is achieved when most processes come to a stop because the computer is too busy dealing with virtual memory paging (moving data in and out of memory)

New cards
11

Physical servers

________ and storage are needed to store data in cloud storage and it owns by a hosting company.

New cards
12

Optical Character Recognition

________ (OCR) is a software which converts scanned documents into a text file format.

New cards
13

Bandwidth

________: the amount of data that can be transmitted in one time.

New cards
14

Actuators

________ are used to operate the steering track, brakes and throttles under control of the computer.

New cards
15

Hexadecimal

________ is easier for humans to understand than binary, as it is a shorter representation of the binary.

New cards
16

Firewall

________ can keep a list of all undesirable IP addresses.

New cards
17

illegal access

The act of gaining ________ to a computer system without the users permission.

New cards
18

electric field

When ________ is applied to electrodes, they give off light-> no forming of backlighting.

New cards
19

typical features

Rules- look for ________ which are associated with spyware, identify potential security threats.

New cards
20

laser light

Wavelength of ________ is less than CD and DVD (stores up to five times more data than DVD)

New cards
21

Serial transmission

________: bits are sent sequentially (one after the other) down the same wire (channel)

New cards
22

diodes

Light emitting ________, the display is made up of pixels that are arranged together as a matrix.

New cards
23

negative acknowledgement

A(n) ________ means that the data was received but it can not be used as it failed an error check.

New cards
24

CMOS

________ generates electric pulses to represent the reflected red light and these pulses are sent to a digital signal processor (DSP)

New cards
25

barcode

The ________ is read by a red light or laser (light emitting diode)

New cards
26

Router

________: a device that enables data packets to be moved between different networks, for example, to join a LAN to a WAN.

New cards
27

Structure diagrams

________ can be used to show top- down design in a diagrammatic form.

New cards
28

USB

________: a type of cable and connector commonly used for half- duplex or full- duplex serial data transmission between a computer and attached devices.

New cards
29

Trojan horse

A(n) ________ replaces all or part of the legitimate software with the intent of carrying out some harm to the users computer system.

New cards
30

NIC

________: a hardware component (circuit board or chip) that is required to allow a device to connect to a network, such as the internet, it contains MAC.

New cards
31

current instruction

Registers: program counter (PC), memory address register (MAR), memory data register (MDR), ________ register (CIR) and accumulator (ACC)

New cards
32

Blockchain

________ can be used in voting records, medical records, land records, smart contracts,

New cards
33

IP

________: location of devices; MAC: actual devices at location of devices.

New cards
34

DLP

The number of micro mirrors and the way they are arranged on the ________ chip determines the resolution of the image.

New cards
35

ADC

________ converts electrical charges to level of brightness, more pixels means higher quality.

New cards
36

CCFL

________ uses two fluorescent tubes behind the LCD screen which supplies the light source.

New cards
37

Satellite TV transmission

________ are encrypted to prevent users who are not subscribed to the platform.

New cards
38

Human operator

________ will carry out the tasks manually and robot knows how to carry the task.

New cards
39

Autonomous grass cutter

________ (mowers) uses proximity sensor and camera to avoid obstacle and cover the whole room quickly.

New cards
40

Scanners

________ take images at several points, x, y and z (lasers, magnetic, white light)

New cards
41

Cameras

________ catch visual data from the surroundings, while radar and ultrasonics allow the vehicle to build up a 3D image of its surrounding.

New cards
42

Autonomous vacuum

________ cleaner uses proximity sensor and camera to avoid obstacle and cover the whole room quickly.

New cards
43

Inductive reasoning

________: ability to draw reasoned conclusions based on given data /situations.

New cards
44

Drones

________ can also be used in cloud seeding where the ________ can add silver iodide crystals to a cloud forcing it to give up its rainwate.

New cards
45

Machine learning

________ is when a program has the ability to automatically adapt its own processes and /or data:

New cards
46

Encryption keys

________ are created by supplying a message or key to the hashing algorithm which turns it into a string of characters usually shown in hexadecimal.

New cards
47

Media Access Control address

unique number that identifies the device that is connected to the network or internet, usually made of 48 bits

New cards
48

Character sets

Made of letters, numbers and various symbol, that can be encoded in a computer as patterns of binary digit

New cards
49

ASCII code

7 bit codes that represent the letters, number and characters found on standard keyboards together with 32 control codes

New cards
50

Choose shortest possible paths

this may not always be the shortest path could be taken, since certain paths may be too busy or not suitable

New cards
51

Bandwidth

the amount of data that can be transmitted in one time

New cards
52

Serial transmission

bits are sent sequentially (one after the other) down the same wire (channel)

New cards
53

USB

a type of cable and connector commonly used for half-duplex or full-duplex serial data transmission between a computer and attached devices

New cards
54

parity check (odd and even), checksum and echo check

Describe the processes involved in each of the following error detection methods for detecting errors in data after transmission

New cards
55

Parity check

An extra bit (parity bit) added to a string of binary code to ensure the number of 1-bits are either even or odd, depending upon the parity check system used

New cards
56

Registers

program counter (PC), memory address register (MAR), memory data register (MDR), current instruction register (CIR) and accumulator (ACC)

New cards
57

NIC

a hardware component (circuit board or chip) that is required to allow a device to connect to a network, such as the internet, it contains MAC

New cards
58

Media Access Control address

unique number that identifies the device that is connected to the network or internet, usually made of 48 bits

New cards
59

Router

a device that enables data packets to be moved between different networks, for example, to join a LAN to a WAN

New cards
60

Managing files

a file system is created to organise files and directories, which gives programs a consistent way to store and retrieve information

New cards
61

Software interrupts

an attempt to divide by zero, 2 processes trying to access the same memory location

New cards
62

Assembly language

low-level language that is used for developing code for specialist hardware, e.g

New cards

Explore top notes

note Note
studied byStudied by 3863 people
Updated ... ago
4.7 Stars(11)
note Note
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 163 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 22 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 12 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard41 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard48 terms
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard42 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard95 terms
studied byStudied by 34 people
Updated ... ago
4.5 Stars(2)
flashcards Flashcard44 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard127 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard34 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)