Cypher’s O Level/IGCSE Computer Science Notes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

A set of flashcards based on key concepts from Cypher’s O Level/IGCSE Computer Science notes.

Last updated 4:43 PM on 4/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

Binary

Base 2 system using only 0s and 1s, where all data must be converted before being utilized by a computer.

2
New cards

Hexadecimal

Base 16 system that is easier to read and takes less space, using digits 0-9 and letters A-F.

3
New cards

Denary

Base 10 system that is easy for humans to read but has less range than hexadecimal.

4
New cards

Overflow Error

Occurs when a number larger than a register can store is generated.

5
New cards

Logical Shifts

Operations that shift bits left or right, losing the most or least significant bits.

6
New cards

Character Set

A tool used to convert text to binary, such as ASCII and Unicode.

7
New cards

Image Resolution

The size or number of pixels in an image.

8
New cards

Color Depth

The number of bits used to represent each color in an image.

9
New cards

Lossy Compression

Reduces file size by permanently removing unnecessary data, often used for images and sounds.

10
New cards

Lossless Compression

Uses algorithms to reduce file size without losing any data, such as RLE.

11
New cards

Packet

A small unit of data that includes a header, payload, and trailer for transmission.

12
New cards

Packet Switching

Method where data is broken into packets that can take separate pathways to their destination.

13
New cards

Serial Transmission

Data sent down a single wire, one bit at a time.

14
New cards

Parallel Transmission

Data sent down multiple wires simultaneously.

15
New cards

Error Detection

Methods like Parity Check and Checksum, which verify data integrity during transmission.

16
New cards

Symmetric Encryption

Uses the same key for both encryption and decryption but is less secure.

17
New cards

Asymmetric Encryption

Uses a public key to encrypt and a private key to decrypt, providing higher security.

18
New cards

Input Device

Hardware used to input data into a computer, such as a keyboard or barcode scanner.

19
New cards

Output Device

Hardware used to output data from a computer, such as printers or speakers.

20
New cards

CPU

Central processing unit responsible for processing instructions and data in a computer.

21
New cards

Secondary Storage

Non-volatile storage that retains data even when power is turned off, such as HDD or SSD.

22
New cards

Static IP Address

An IP address that does not change every time a device connects to a network.

23
New cards

Dynamic IP Address

An IP address that changes every time a device connects to a network.

24
New cards

Phishing

A method of trying to gather personal information using deceptive emails and websites.

25
New cards

Robotics

The design, construction, operation, and use of robots to perform tasks.

26
New cards

AI (Artificial Intelligence)

A branch of computer science that simulates intelligent behavior in computers.

27
New cards

Inference Engine

A component of an expert system that applies rules to a knowledge base to reach conclusions.