IGCSE CIE COMPUTER SCIENCE TERMS

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

ISP (internet service provider)

company charging monthly fee that provides internet access

2
New cards

IP (internet protocol) address

assigned by ISP, unique to each internet session

<p>assigned by ISP, unique to each internet session</p>
3
New cards

MAC address

number which uniquely identifies a device - 1st half = manufacturer, 2nd = device itself - made up of 6 groups of hex digits

<p>number which uniquely identifies a device - 1st half = manufacturer, 2nd = device itself - made up of 6 groups of hex digits</p>
4
New cards

HTML Structure

essential parts of document including semantics and structural markup

5
New cards

HTML Presentation

how the document looks/sounds

6
New cards

CSS - Cascading Style Sheet

contains everything that controls webpage presentation

7
New cards

HTTP - hypertext transfer protocol

a set of rules which must be followed when transferring files across the internet

8
New cards

HTTPS

a SECURE set of rules which must be followed when transferring files across the internet

9
New cards

web browser

software that allows a user to display a webpage on their screen - they interpret html code and show the result

10
New cards

URL - uniform resource locator

used to find/identify a webpage on the internet

11
New cards

cookies

packet of information sent from web server to web browser - creates anonymous user profile, and used in advertising

12
New cards

actuator

The actuator is a mechanical device or motor which carries out the action or decision made by the control system.

13
New cards

loudspeaker

output device that produces sound using voltages at different levels which vibrate a cone in speaker housing

14
New cards

LED

Used for backlighting a monitor/tv - they are thin, produce a white light, and do not require much power

15
New cards

CCFL

Old technology used for backlighting - took time to warm up, and produced yellow-ish lighting + required a lot of power

16
New cards

LCD

used in projectors - high intensity light beam was passed through display, then onto screen

17
New cards

OLED

new technology used for tv/monitor screens, using a cathode and anode. Flexible, no backlighting required.

18
New cards

DLP

light projector using mirrors to produce 1024 different grey shades. A bright white light source passed through colour filter allowing 16million colours to be created.

19
New cards

RAM

a type of memory that is read-write and volatile. Used for main memory

20
New cards

ROM

memory that is hard coded at time of manufacture. Stores start-up programs and BOOTSTRAP

21
New cards

volatile

memory that loses its contents when the power is off eg. main memory

22
New cards

non-volatile

memory that doesn't lose its contents when the power is off e.g. hard disk

23
New cards

secondary memory/storage

long-term, non volatile storage media e.g. hard disk

24
New cards

off-line storage

storage that can be physically moved away from a device and stored somewhere else e.g. CD, USB stick, DVD

25
New cards

virtual memory

part of the hard disk that is programmed to work as an extension of main memory

26
New cards

optical media

secondary storage that is read using lasers e.g. CD, DVD

27
New cards

solid state/flash memory

secondary storage with no moving parts; used in memory sticks, cameras and phones

28
New cards

FAT - file allocation table

a map of where each file is and which sectors on the magnetic disk are free

29
New cards

address bus

unidirectional, carries address related signals from the memory to processor

30
New cards

control bus

unidirectional, carries control related signals throughout the computer

31
New cards

data bus

bi-directional, carries data between memory and processor, and between input/output and processor

32
New cards

operating system

software running in the background of a computer system managing basic functions, and making the computer user-friendly

33
New cards

interrupt

signal sent from device/software to processor, causing it to stop what it is doing. Allows multi-tasking

34
New cards

buffers

temporary memory areas in a computer that allow the hard drive to continue to function while something loads from memory

35
New cards

program

our way of telling a computer what to do, how to do it, and when to do it

36
New cards

high level language

portable language designed with the programmer in mind - it is easy to understand and debug, but it needs to be translated in order for a computer to understand it

<p>portable language designed with the programmer in mind - it is easy to understand and debug, but it needs to be translated in order for a computer to understand it</p>
37
New cards

low level language

language relating to specific architecture and hardware of a particular device - can refer to assembly lang or machine code

<p>language relating to specific architecture and hardware of a particular device - can refer to assembly lang or machine code</p>
38
New cards

assembly language

code that is specific to a particular hardware, but needs to be translated into machine code before it can run

39
New cards

machine code

the binary code that is specific to a machine and does not need translating in order to run

40
New cards

translator

program that changes higher level language into machine code

41
New cards

compiler

this translates HLL into machine code. Once it has done this, the program can be used multiple times without translating it again

42
New cards

interpreter

this translates HLL into machine code one line at a time.

43
New cards

assembler

this translates assembly language into machine code. Once it has done this, the machine code can be used multiple time without translating it again.

<p>this translates assembly language into machine code. Once it has done this, the machine code can be used multiple time without translating it again.</p>
44
New cards

UPS

uninterruptable power supply

45
New cards

hacking

gaining illegal access to a computer/computer system

46
New cards

cracking

editing source code with malicious intent

47
New cards

viruses

program or code that can replicate itself with intention of deleting files, corruption or malfunction. Not always malicious

48
New cards

phishing

using legitimate - looking emails to trick users and gain personal information from them

49
New cards

pharming

a piece of software leading a user to a bogus website - used to gain personal information

50
New cards

wardriving

stealing someone's WiFi

51
New cards

spyware/key logging software

hardware or software that can be used to monitor key presses and gain information.

52
New cards

firewall

this examines traffic between a user's computer and the internet by checking what is/isn't allowed and blocking traffic that does not meet certain criteria

53
New cards

proxy server

this filters web traffic, keeps the IP address secret, and, using a cache, speeds up access to websites that have been visited before

54
New cards

SSL

this is used on web browsers to allow data to be sent/received securely. It encrypts data so that only the sender and receiver can understand the information being transmitted

55
New cards

TLS - Transport Layer Security

this is a form of secure data transmission made up of 2 layers: the record protocol, and the handshaking protocol. It is very secure and fairly new, and can make use of session caching, which improves performance. It involves many complicated encryption algorithms.

56
New cards

session caching

this is used in TLS to avoid using too much computer time; TLS is able to attempt to resume an existing session, which increases speed.

57
New cards

symmetric encryption

this uses a secret key that could be a combination of characters. The same key is needed by both sender and receiver to encrypt and decrypt the message

58
New cards

asymmetric encryption

this is a type of encryption using both a public and a private key. The public key can be seen by anyone, and used to encrypt messages to the receiver. The private key is used by the receiver to decrypt the message sent to them.

59
New cards

plain text

text/data before it has gone through encryption algorithm

60
New cards

cypher text

output from encryption algorithm

61
New cards

authentication

used to verify that data comes from a reliable source; used with encryption to strengthen internet security

62
New cards

denial of service attack

attempting to prevent a user from accessing part of a network (usually the server); this is usually temporary, but may be very damaging, or a big security breach

63
New cards

computer ethics

this considers 3 factors; intellectual property rights, privacy issues, and a computer's effect on society. It is a set of principles that regulates the use of a computer

64
New cards

code of ethics

this is a set of rules set up by the ACM and IEEE to ensure that computers are used correctly, and to avoid plagiarism.

65
New cards

free software

software that is free to run, copy, change or adapt, and share with friends, family or colleagues.

66
New cards

freeware

software that a user can download for free from the internet, but they are not allowed to edit the source code

67
New cards

shareware

software that users are allowed to try out, free of charge, for a certain period of time. It often lacks certain features that can be downloaded in the full, paid version.

68
New cards

4 uses of hexidecimals

- debugging

- MAC addresses

- HTML colours

- assembly language and machine code

69
New cards

Parity Checking

used to check whether data has been changed or corrupted following transmission from one device to another

70
New cards

Automatic Repeat Request (ARQ)

method to check if data has been transmitted correctly

71
New cards

Checksum

Data is sent in blocks and an additional value sent at the end of the block

72
New cards

Echo check

When data is sent to another device, this data is sent back again to the sender, then the sender compares the two sets to check if any errors occurred

73
New cards

Lossless data compression

All the data bits from the original file are reconstructed when the file again is uncompressed

74
New cards

Lossy data compression

The file compression algorithm eliminates unnecessary bits of data like MP3 and JPEG formats

75
New cards

Serial data transmission

one bit at a time over a single wire

- longer distance

-slower

76
New cards

Parallel data transmission

1 byte of data is sent down several wires at the same time

- short distance

- faster

77
New cards

Simplex data transmission

one direction only

78
New cards

Half-duplex data transmission

both directions but not at the same time

79
New cards

Full-duplex data transmission

in both directions simultaneously

80
New cards

Stored program concept

program instructions and data are stored in main memory and instructions are fetched and executed one after another

81
New cards

capacitive touchscreens

Electrical current is sent from the four corners of the screen. When your finger (or stylus) touches the screen, the current changes. This allows the location of the touch to be calculated

82
New cards

capacitive touchscreens a/d

adv- very durable surface

- allows for multi-touch

disadv- cannot be used wearing standard gloves

- glass screen can easily break/shatter

83
New cards

resistive touchscreens

These use multiple layers of material that transmit electrical currents. When the top layer of the screen is pushed/touched into the bottom layer the electrical current changes. This allows the location of the touch to be found.

84
New cards

resistive touchscreens a/d

adv- inexpensive to manufacture

- Can use stylus, finger, gloved finger or pen to

operate

disadv- Vulnerable to scratching

- Wears through time

- Does not allow multi-touch

85
New cards

infra-red touchscreens

These use a pattern of LED infra-red beams to form an 'invisible' grid on the screen. Sensors detect where the screen has been touched by detecting a break in the infra-red beams. The position of touch is then calculated.

86
New cards

infra-red touchscreens a/d

adv- good durability

- Allows multi-touch

- Can use stylus, finger, gloved finger or pen to

operate

disadv- expensive to manufacture

- sensitive to dust and dirt

- breaks easily

87
New cards

Why do computers use binary?

To store data

88
New cards

What is a byte?

The byte is a unit of digital information that most commonly consists of eight bits.

89
New cards

advantages/dis of parallel

ad-fast

disadvantages-expensive,short distances

90
New cards

usb transmission method

asynchronised