IGCSE CIE COMPUTER SCIENCE TERMS

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 89

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

90 Terms

1

ISP (internet service provider)

company charging monthly fee that provides internet access

New cards
2

IP (internet protocol) address

assigned by ISP, unique to each internet session

<p>assigned by ISP, unique to each internet session</p>
New cards
3

MAC address

number which uniquely identifies a device - 1st half = manufacturer, 2nd = device itself - made up of 6 groups of hex digits

<p>number which uniquely identifies a device - 1st half = manufacturer, 2nd = device itself - made up of 6 groups of hex digits</p>
New cards
4

HTML Structure

essential parts of document including semantics and structural markup

New cards
5

HTML Presentation

how the document looks/sounds

New cards
6

CSS - Cascading Style Sheet

contains everything that controls webpage presentation

New cards
7

HTTP - hypertext transfer protocol

a set of rules which must be followed when transferring files across the internet

New cards
8

HTTPS

a SECURE set of rules which must be followed when transferring files across the internet

New cards
9

web browser

software that allows a user to display a webpage on their screen - they interpret html code and show the result

New cards
10

URL - uniform resource locator

used to find/identify a webpage on the internet

New cards
11

cookies

packet of information sent from web server to web browser - creates anonymous user profile, and used in advertising

New cards
12

actuator

The actuator is a mechanical device or motor which carries out the action or decision made by the control system.

New cards
13

loudspeaker

output device that produces sound using voltages at different levels which vibrate a cone in speaker housing

New cards
14

LED

Used for backlighting a monitor/tv - they are thin, produce a white light, and do not require much power

New cards
15

CCFL

Old technology used for backlighting - took time to warm up, and produced yellow-ish lighting + required a lot of power

New cards
16

LCD

used in projectors - high intensity light beam was passed through display, then onto screen

New cards
17

OLED

new technology used for tv/monitor screens, using a cathode and anode. Flexible, no backlighting required.

New cards
18

DLP

light projector using mirrors to produce 1024 different grey shades. A bright white light source passed through colour filter allowing 16million colours to be created.

New cards
19

RAM

a type of memory that is read-write and volatile. Used for main memory

New cards
20

ROM

memory that is hard coded at time of manufacture. Stores start-up programs and BOOTSTRAP

New cards
21

volatile

memory that loses its contents when the power is off eg. main memory

New cards
22

non-volatile

memory that doesn't lose its contents when the power is off e.g. hard disk

New cards
23

secondary memory/storage

long-term, non volatile storage media e.g. hard disk

New cards
24

off-line storage

storage that can be physically moved away from a device and stored somewhere else e.g. CD, USB stick, DVD

New cards
25

virtual memory

part of the hard disk that is programmed to work as an extension of main memory

New cards
26

optical media

secondary storage that is read using lasers e.g. CD, DVD

New cards
27

solid state/flash memory

secondary storage with no moving parts; used in memory sticks, cameras and phones

New cards
28

FAT - file allocation table

a map of where each file is and which sectors on the magnetic disk are free

New cards
29

address bus

unidirectional, carries address related signals from the memory to processor

New cards
30

control bus

unidirectional, carries control related signals throughout the computer

New cards
31

data bus

bi-directional, carries data between memory and processor, and between input/output and processor

New cards
32

operating system

software running in the background of a computer system managing basic functions, and making the computer user-friendly

New cards
33

interrupt

signal sent from device/software to processor, causing it to stop what it is doing. Allows multi-tasking

New cards
34

buffers

temporary memory areas in a computer that allow the hard drive to continue to function while something loads from memory

New cards
35

program

our way of telling a computer what to do, how to do it, and when to do it

New cards
36

high level language

portable language designed with the programmer in mind - it is easy to understand and debug, but it needs to be translated in order for a computer to understand it

<p>portable language designed with the programmer in mind - it is easy to understand and debug, but it needs to be translated in order for a computer to understand it</p>
New cards
37

low level language

language relating to specific architecture and hardware of a particular device - can refer to assembly lang or machine code

<p>language relating to specific architecture and hardware of a particular device - can refer to assembly lang or machine code</p>
New cards
38

assembly language

code that is specific to a particular hardware, but needs to be translated into machine code before it can run

New cards
39

machine code

the binary code that is specific to a machine and does not need translating in order to run

New cards
40

translator

program that changes higher level language into machine code

New cards
41

compiler

this translates HLL into machine code. Once it has done this, the program can be used multiple times without translating it again

New cards
42

interpreter

this translates HLL into machine code one line at a time.

New cards
43

assembler

this translates assembly language into machine code. Once it has done this, the machine code can be used multiple time without translating it again.

<p>this translates assembly language into machine code. Once it has done this, the machine code can be used multiple time without translating it again.</p>
New cards
44

UPS

uninterruptable power supply

New cards
45

hacking

gaining illegal access to a computer/computer system

New cards
46

cracking

editing source code with malicious intent

New cards
47

viruses

program or code that can replicate itself with intention of deleting files, corruption or malfunction. Not always malicious

New cards
48

phishing

using legitimate - looking emails to trick users and gain personal information from them

New cards
49

pharming

a piece of software leading a user to a bogus website - used to gain personal information

New cards
50

wardriving

stealing someone's WiFi

New cards
51

spyware/key logging software

hardware or software that can be used to monitor key presses and gain information.

New cards
52

firewall

this examines traffic between a user's computer and the internet by checking what is/isn't allowed and blocking traffic that does not meet certain criteria

New cards
53

proxy server

this filters web traffic, keeps the IP address secret, and, using a cache, speeds up access to websites that have been visited before

New cards
54

SSL

this is used on web browsers to allow data to be sent/received securely. It encrypts data so that only the sender and receiver can understand the information being transmitted

New cards
55

TLS - Transport Layer Security

this is a form of secure data transmission made up of 2 layers: the record protocol, and the handshaking protocol. It is very secure and fairly new, and can make use of session caching, which improves performance. It involves many complicated encryption algorithms.

New cards
56

session caching

this is used in TLS to avoid using too much computer time; TLS is able to attempt to resume an existing session, which increases speed.

New cards
57

symmetric encryption

this uses a secret key that could be a combination of characters. The same key is needed by both sender and receiver to encrypt and decrypt the message

New cards
58

asymmetric encryption

this is a type of encryption using both a public and a private key. The public key can be seen by anyone, and used to encrypt messages to the receiver. The private key is used by the receiver to decrypt the message sent to them.

New cards
59

plain text

text/data before it has gone through encryption algorithm

New cards
60

cypher text

output from encryption algorithm

New cards
61

authentication

used to verify that data comes from a reliable source; used with encryption to strengthen internet security

New cards
62

denial of service attack

attempting to prevent a user from accessing part of a network (usually the server); this is usually temporary, but may be very damaging, or a big security breach

New cards
63

computer ethics

this considers 3 factors; intellectual property rights, privacy issues, and a computer's effect on society. It is a set of principles that regulates the use of a computer

New cards
64

code of ethics

this is a set of rules set up by the ACM and IEEE to ensure that computers are used correctly, and to avoid plagiarism.

New cards
65

free software

software that is free to run, copy, change or adapt, and share with friends, family or colleagues.

New cards
66

freeware

software that a user can download for free from the internet, but they are not allowed to edit the source code

New cards
67

shareware

software that users are allowed to try out, free of charge, for a certain period of time. It often lacks certain features that can be downloaded in the full, paid version.

New cards
68

4 uses of hexidecimals

- debugging

- MAC addresses

- HTML colours

- assembly language and machine code

New cards
69

Parity Checking

used to check whether data has been changed or corrupted following transmission from one device to another

New cards
70

Automatic Repeat Request (ARQ)

method to check if data has been transmitted correctly

New cards
71

Checksum

Data is sent in blocks and an additional value sent at the end of the block

New cards
72

Echo check

When data is sent to another device, this data is sent back again to the sender, then the sender compares the two sets to check if any errors occurred

New cards
73

Lossless data compression

All the data bits from the original file are reconstructed when the file again is uncompressed

New cards
74

Lossy data compression

The file compression algorithm eliminates unnecessary bits of data like MP3 and JPEG formats

New cards
75

Serial data transmission

one bit at a time over a single wire

- longer distance

-slower

New cards
76

Parallel data transmission

1 byte of data is sent down several wires at the same time

- short distance

- faster

New cards
77

Simplex data transmission

one direction only

New cards
78

Half-duplex data transmission

both directions but not at the same time

New cards
79

Full-duplex data transmission

in both directions simultaneously

New cards
80

Stored program concept

program instructions and data are stored in main memory and instructions are fetched and executed one after another

New cards
81

capacitive touchscreens

Electrical current is sent from the four corners of the screen. When your finger (or stylus) touches the screen, the current changes. This allows the location of the touch to be calculated

New cards
82

capacitive touchscreens a/d

adv- very durable surface

- allows for multi-touch

disadv- cannot be used wearing standard gloves

- glass screen can easily break/shatter

New cards
83

resistive touchscreens

These use multiple layers of material that transmit electrical currents. When the top layer of the screen is pushed/touched into the bottom layer the electrical current changes. This allows the location of the touch to be found.

New cards
84

resistive touchscreens a/d

adv- inexpensive to manufacture

- Can use stylus, finger, gloved finger or pen to

operate

disadv- Vulnerable to scratching

- Wears through time

- Does not allow multi-touch

New cards
85

infra-red touchscreens

These use a pattern of LED infra-red beams to form an 'invisible' grid on the screen. Sensors detect where the screen has been touched by detecting a break in the infra-red beams. The position of touch is then calculated.

New cards
86

infra-red touchscreens a/d

adv- good durability

- Allows multi-touch

- Can use stylus, finger, gloved finger or pen to

operate

disadv- expensive to manufacture

- sensitive to dust and dirt

- breaks easily

New cards
87

Why do computers use binary?

To store data

New cards
88

What is a byte?

The byte is a unit of digital information that most commonly consists of eight bits.

New cards
89

advantages/dis of parallel

ad-fast

disadvantages-expensive,short distances

New cards
90

usb transmission method

asynchronised

New cards
robot