GCSE computer science

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/158

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

159 Terms

1
New cards

Fetch-execute Cycle

Instructions are fetched one by one from main memory decoded and then executed by the processor

2
New cards

CPU (Central Processing Unit)

A chip which controls the operation of all parts of the computer and executes program instructions

3
New cards

ALU (Arithmetic Logic Unit)

The part of the CPU responsible for arithmetic and logical operations

4
New cards

Processor Cache

High speed memory built into the CPU Instructions are copied for quicker access and increased speed

5
New cards

Register

A small area of memory within the CPU where data is stored temporarily

6
New cards

Von Neumann Architecture

The design defining registers the fetch-execute cycle and how the CPU interacts with main memory

7
New cards

MAR (Memory Address Register)

A register that holds the address of the instruction being read from or written to main memory

8
New cards

MDR (Memory Data Register)

A register that holds the instruction just copied from main memory

9
New cards

Program Counter

A register that holds the address of the next instruction to be fetched

10
New cards

Accumulator

A register that stores the result of the last operation

11
New cards

Clock Speed

How many instruction cycles the CPU can deal with in a second Measured in MHz or GHz

12
New cards

Cache Size

Larger cache means more instructions can be stored without transferring to main memory increasing performance

13
New cards

Cores

Each core contains its own ALU and registers capable of carrying out instructions independently

14
New cards

Embedded System

Specialist hardware and software built into a device with a single specific purpose

15
New cards

Primary Storage

Also known as memory Holds the data programs and instructions currently in use

16
New cards

RAM

Random Access Memory Stores running programs Data is lost when the computer is turned off

17
New cards

ROM

Read Only Memory Data cannot be changed and is not lost when the computer is turned off

18
New cards

Volatile Memory

Data stored in volatile memory is lost when the computer is turned off

19
New cards

Non-Volatile Memory

Data stored in non-volatile memory is not lost when the computer is turned off

20
New cards

Virtual Memory

Space on the hard drive used as main memory (RAM) Virtual memory is slower than main memory

21
New cards

Optical Storage

Secondary storage on a spinning disk Data is read or written using a laser

22
New cards

Magnetic Storage

Secondary storage which uses magnetic fields to store data

23
New cards

Solid State Storage

Secondary storage using flash memory They have no moving parts and are much faster

24
New cards

HDD (Hard Disk Drive)

Magnetic storage drive that stores large amounts of data Uses internal disks and a read/write head

25
New cards

SSD (Solid State Drive)

A solid state storage drive that performs the function of a traditional HDD

26
New cards

Bit

The smallest unit of storage containing a binary 1 or 0

27
New cards

Nibble

4 bits half a byte

28
New cards

Byte

8 bits

29
New cards

Kilobyte (KB)

1000 bytes

30
New cards

Megabyte (MB)

1000 KB

31
New cards

Gigabyte (GB)

1000MB

32
New cards

Terabyte (TB)

1000GB

33
New cards

Petabyte (PB)

1000TB

34
New cards

Binary

A number system used by computers containing only two symbols 0 and 1

35
New cards

Denary

The number system most often used by people It uses digits 0 to 9

36
New cards

Positive Number

A number greater than 0

37
New cards

Negative Number

A number less than 0

38
New cards

Integer

A whole number without a decimal point or fraction

39
New cards

Overflow Error

Happens when not enough space has been allocated to store the results of a calculation

40
New cards

Hexadecimal

A number system used by computers based on 16 symbols

41
New cards

Binary Shift

A process used to perform math on binary numbers by moving all the digits to the left or right

42
New cards

Most Significant Bit

The furthest left digit in a binary number its position means it has the highest value

43
New cards

Least Significant Bit

The furthest right digit in a binary number its position means it has the lowest value

44
New cards

Character

A single symbol for example a letter number or punctuation mark

45
New cards

Character Set

A system for representing characters in binary Each character is assigned a unique binary number

46
New cards

ASCII

American Standard Code for Information Interchange A 7 bit character set

47
New cards

Unicode

A much larger character set overcoming ASCII limitations It includes different language characters

48
New cards

Pixel

Short for Picture Element Pictures are divided into a grid where each square is one pixel

49
New cards

Metadata

Additional data about a file such as when it was created or who created it

50
New cards

Colour Depth

The amount of bits available for colours in an image Higher depth means more colours

51
New cards

Resolution

The number of pixels an image is divided into Higher resolution means clearer image

52
New cards

Sample Rate

The number of samples taken in one second Measured in hertz Hz

53
New cards

Bit Depth (Sound)

The number of bits available for each sample Higher bit depth means better quality

54
New cards

Analogue

A continuously varying signal usually represented as a curved line

55
New cards

Compression

A way of reducing the size of a file

56
New cards

Lossy Compression

Reduces file size by removing certain data The original file cannot be restored

57
New cards

Lossless Compression

Reduces file size without losing any data The original file can be restored

58
New cards

Network

Two or more computers connected together for sharing data or resources

59
New cards

LAN (Local Area Network)

A network which covers a small geographic area such as a single building

60
New cards

WAN (Wide Area Network)

A network which covers a large geographic area

61
New cards

Client - Server

A network where resources are centralized on a server and accessed by clients

62
New cards

Peer to Peer

A network where all computers have an equal status functioning as both client and server

63
New cards

Wireless Access Point

Uses a wireless radio to allow devices to connect wirelessly to an existing network

64
New cards

Router

A device which connects two or more different networks together allowing them to communicate

65
New cards

Switch

A device which provides computers and devices with a wired connection to a network

66
New cards

NIC (Network Interface Card)

A component allowing a device to connect to a network Controls sending and receiving data

67
New cards

Transmission Media

The physical connection which carries data between network devices

68
New cards

DNS (Domain Name System)

A system which links a URL or human readable name with an IP address

69
New cards

Hosting

The storing of files or other data on a server

70
New cards

The Cloud

Accessing storage or resources remotely across The Internet

71
New cards

Web Server

A server which hosts web sites and pages for users to access

72
New cards

Network Topology

The way computers and other network devices are connected together

73
New cards

Star Network

A network where all devices connect back to a single central point

74
New cards

Mesh Network

A network where all devices are connected to each other not a central point

75
New cards

Bandwidth

The amount of data which can be transferred via a network in any given time

76
New cards

The Internet

A global network connecting millions of computers and devices

77
New cards

URL

Uniform Resource Locator A human readable name given to websites

78
New cards

Client

A computer or device which accesses data from a central server

79
New cards

Ethernet

A physical copper cable used to connect devices on a network

80
New cards

Wi-Fi

A technology which uses wireless signals to connect network devices

81
New cards

Bluetooth

A short range wireless networking technology typically used for peripheral devices

82
New cards

Encryption

Converting data so it cannot be easily read or understood without first being decrypted

83
New cards

IP Address

Internet Protocol Address A unique address assigned to every computer on a network

84
New cards

IPv4

Internet Protocol Version 4 Addresses are four numbers separated by dots between 0 and 255

85
New cards

IPv6

Internet Protocol Version 6 Addresses are eight groups of hexadecimal characters

86
New cards

MAC Address

Media Access Control Address A 12 digit hexadecimal number assigned to a network interface card

87
New cards

Standard

An agreed way of doing something allowing products and services to work together

88
New cards

Protocol

An agreed set of rules for how network communications should take place

89
New cards

TCP/IP

Transfer Control Protocol / Internet Protocol A group of standards controlling how data is sent and received

90
New cards

HTTP

Hypertext Transfer Protocol A standard for transferring web pages between a client and web server

91
New cards

HTTPS

Hypertext Transfer Protocol Secure HTTP with security added Used for secure websites

92
New cards

FTP

File Transfer Protocol A standard for file transfer over networks

93
New cards

POP

Post Office Protocol A standard used by email clients to retrieve emails from an email server

94
New cards

IMAP

Internet Message Access Protocol A standard used by email clients to access emails stored on an email server

95
New cards

SMTP

Simple Message Transfer Protocol A standard used for the sending of emails over networks and The Internet

96
New cards

Malware

Software designed with malicious intent It may damage the computer monitor activity or delete data

97
New cards

Social Engineering

Gaining access to computer systems by targeting the people using the system

98
New cards

Phishing

Tricking someone into revealing information like passwords by pretending to be a trusted source

99
New cards

Brute-force attack

Attempting to guess a code or password by trying every possible solution

100
New cards

Denial of Service Attack

Attempting to send more traffic to a computer system than it can handle causing failure