AQA Computer Science (8525)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/135

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:37 PM on 4/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

136 Terms

1
New cards

Algorithm

A sequence of steps that can be followed to complete a task.

2
New cards

Abstraction

The process of removing unnecessary details from a problem.

3
New cards

Decomposition

Breaking a problem into a number of subproblems, so that each subproblem accomplishes an identifiable task, which might itself be further subdivided.

4
New cards

Linear search

An algorithm that sequentially checks each element in an array or list until a match is found or the end is reached.

5
New cards

Binary search

An algorithm that compares a search item to the middle item of an array or list. If they do not match, half of the array or list can be eliminated and the search continues in the other half. The array or list needs to be sorted so that a binary search can be performed.

6
New cards

Merge sort

The merge sort is a 'divide-and-conquer' algorithm. The original array or list is broken down into smaller and smaller parts until we have individual elements. The merge sort continues by building back sorted groups until we end with the full sorted result.

7
New cards

Bubble sort

A bubble sort works by making passes through the array or list. Whilst making a pass, we compare neighbours and swap them if they are out of order. After a series of passes, the array or list will be sorted.

8
New cards

Data type

Each variable has a data type. The data type determines what kind of value the variable will hold and the set of operations that can be performed on it.

9
New cards

Integer

A whole number.

10
New cards

Real/Float

Numbers that can include fractions/values after the decimal point.

11
New cards

Boolean

A data type that can represent the two values True and False.

12
New cards

Character

Stores a single character in a fixed-length format related to a specific character set (for example ASCII).

13
New cards

String

This is a sequence of characters.

14
New cards

Variable

An identifier that represents a memory location that can store a value. This value can change during execution of a program.

15
New cards

Constant

An identifier that represents a memory location that can store a value. This value cannot change during execution of a program.

16
New cards

Array

A data structure that stores a collection of elements of the same data type under a single variable name and is accessed through an index.

17
New cards

Assignment

An assignment statement sets the value of a variable/constant.

18
New cards

Iteration

Iteration is the repetition of a block of code.

19
New cards

Definite iteration

is the repetition of a block of code for a set number of times. An example structure is a FOR loop.

20
New cards

Indefinite iteration

This is the repetition of a block of code being controlled by a condition. The number of iterations to be performed is not known when entering the block of code. Example structures are WHILE and DO LOOP UNTIL.

21
New cards

Selection

This is a statement allows a block of code to be executed only when a certain condition is satisfied.

22
New cards

Nested

When an iteration statement appears inside another iteration statement it is considered nested. When a selection statement appears inside another selection statement it is considered nested.

23
New cards

Random number generation

The use of algorithms to produce sequences of numbers that appear unpredictable.

24
New cards

Subroutine

A named 'out of line' block of code that may be executed (called) by simply writing its name in a program statement. It can be reused multiple times within a program.

25
New cards

Parameters

Parameters are variables which define the data to be passed into a subroutine when the subroutine is called.

26
New cards

Local variables

These are declared within a subroutine, exist only while a subroutine is executing, and are accessible only from within the subroutine.

27
New cards

Structured approach to programming

The structured approach to programming includes modularised programming, clear well-documented interfaces (local variables, parameters) and return values.

28
New cards

Validation routine

A routine that contains code to check the validity of data. Validity of data refers to data being reasonable/plausible/acceptable. This might involve range checks, length checks and presence checks.

29
New cards

Authentication routine

A routine that contains code that verifies an identity. This might involve the entry of a username and password.

30
New cards

Testing

Testing is a process to help the programmer to remove bugs from software and to ensure that it works correctly.

31
New cards

Syntax error

A syntax error is when code does not follow the rules of the language grammar. A syntax error will prevent code from being executed.

32
New cards

Logical error

This error is a mistake in code that causes it to produce unexpected or incorrect responses. A logical error does not prevent a program from running.

33
New cards

Decimal - base 10

The decimal number system (base 10) uses 10 different numerals 0,1,2,3,4,5,6,7,8,9

34
New cards

Binary - base 2

The binary number system (base 2) uses 2 different numerals 0,1

35
New cards

Hexadecimal - base 16

Hexadecimal is a number base that uses the numerals 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

36
New cards

Bit

The fundamental unit of information (a 1 or a 0).

37
New cards

Byte

A group of 8 bits.

38
New cards

Logical binary shift

A logical binary shift involves moving the bits of a binary number to the left or right. Vacated positions are filled by zeros.

39
New cards

ASCII

ASCII is a character encoding system that uses a 7-bit notation that allows for the representation of 128 unique characters.

40
New cards

Unicode

Introduced to support a wider range of characters due to increased communication across countries. One of the latest standards defines around 155000 characters. It can be encoded in a variety of ways with up to 32 bits per character.

41
New cards

Character set

A collection of characters (letters, numbers, symbols, etc.) that a computer system can process and use to represent text, with each character assigned a unique numerical code.

42
New cards

Pixel

This term stands for picture element. It is a single point of colour in an image.

43
New cards

Bitmap

A bitmap is where images are broken down into a rectangular grid of pixels. Each pixel will have its own colour value.

44
New cards

Analogue

Continuous data - can take any value in a given range. Between any two analogue values there is another value.

45
New cards

Digital

Digital data has discrete values. There are gaps (jumps) between digital data values.

46
New cards

ADC

An analogue to digital convertor takes samples of the analogue signal at regular intervals.

47
New cards

Sampling rate

A measure of the number of samples taken per second from an analogue signal to create a digital signal.

48
New cards

Sample resolution

A measure of how many bits are used to represent each sample.

49
New cards

Data compression

The process of reducing the storage space required for data by encoding the data using fewer bits than the original representation.

50
New cards

Huffman coding

A lossless method of data compression that produces variable-length codes where the length of the code depends on the frequency with which a symbol appears in the original data.

51
New cards

Run-length encoding (RLE)

A lossless method of data compression where sequences of identical data values are replaced with a single data value and the count of its repetitions.

52
New cards

Hardware

The physical/electronic components of the computer system.

53
New cards

Software

Program/code/instructions executed by the hardware.

54
New cards

Truth table

A representation of the output of a logical expression or circuit for all possible combinations of input variables.

55
New cards

Logic gate

An electronic component that takes one or more binary inputs and performs a basic logical operation (such as AND, OR and NOT) to produce a single binary output.

56
New cards

System software

Software that manages the computer system resources and acts as a platform to run application software.

57
New cards

Application software

Software that performs end-user tasks. Tasks that the user may wish to complete even without a computer (e.g. write a letter).

58
New cards

Utility software

Software that can help maintain a system.

59
New cards

Operating system (OS)

The role this system is to hide the complexities of the hardware from the user.

60
New cards

Low-level language

A low level language is one that is closer to the hardware and the computer's instruction set.

61
New cards

Machine code

The actual binary instructions that can be executed by a processor and is specific to a processor or family of processors.

62
New cards

Assembly language

Uses mnemonics that represent machine code instructions.

63
New cards

High-level language

A type of language that is more abstracted from the hardware of the computer and in which instructions are more powerful than in a low-level language.

64
New cards

Program translator

Anything other than machine code (assembly language, HLL code) needs to be translated first into machine code before it can be run.

65
New cards

Interpreter

An interpreter analyses the source code line by line.

66
New cards

Compiler

A _______ produces object code from the source code and translates the whole source code at once.

67
New cards

Assembler

An assembler translates assembly language into machine code.

68
New cards

Central Processing Unit (CPU)

The primary component responsible for processing data and executing instructions.

69
New cards

Arithmetic logic unit

A part of the processor where arithmetic and logical operations are performed.

70
New cards

Control unit

A part of the processor which decodes instructions, coordinates/directs the execution of instructions, and sends control signals to other components.

71
New cards

Clock

Synchronises operations of the computer by sending regular timing signals to the processor.

72
New cards

Register

A memory location on a processor that can be accessed quickly.

73
New cards

Bus

A series of lines (wires) that transfers data, instructions or memory addresses between components inside a computer.

74
New cards

Clock speed

The frequency of pulses sent to coordinate the components of the computer, measured in hertz.

75
New cards

Core

A processing unit within a processor where each core can fetch, decode and execute instructions independently of the other cores.

76
New cards

Cache

A small area of fast memory built into a modern processor that holds frequently used instructions and data that the processor is likely to reuse.

77
New cards

Volatile storage

A storage device that does not retain data contents when power is removed.

78
New cards

Non-volatile storage

A storage device that will retain data contents even when power is removed.

79
New cards

RAM (Random Access Memory)

Volatile main memory used to hold currently running programs and associated data.

80
New cards

ROM (Read Only Memory)

Non-volatile main memory used to hold instructions that are needed for the computer to run especially when the computer is turned on.

81
New cards

Secondary storage

Any non-volatile storage mechanism not directly accessible by the CPU.

82
New cards

Solid state

Devices that use non-volatile memory to store data, have fast data access and write speeds, and are durable as they do not have any moving parts.

83
New cards

Magnetic

Devices such as hard-disk drives that have a spinning disk and use magnetic fields to represent 0s and 1s.

84
New cards

Cloud storage

Storing data at a remote location, using magnetic and/or solid state storage, and allowing online access via the Internet.

85
New cards

Embedded system

A computer system built into a larger device.

86
New cards

Computer network

A group of devices connected together so that they can communicate.

87
New cards

PAN (Personal Area Network)

Devices connected and communicating over a small distance around one person.

88
New cards

LAN (Local Area Network)

Devices connected and communicating over a small geographical area.

89
New cards

WAN (Wide Area Network)

Devices connected and communicating over a large geographical area.

90
New cards

Network protocol

A set of rules that allow devices/networks to communicate/transfer data.

91
New cards

TCP - Transmission Control Protocol

TCP is a transport layer protocol. It is used to establish communication between two end points and ensure that this is error free.

92
New cards

IP - Internet Protocol

IP is an internet layer protocol. IP is responsible for routing.

93
New cards

HTTP/HTTPS

An application layer protocol concerned with sending and receiving web pages between a webserver and a client (browser). This adds encryption to the protocol allowing for secure data movement.

94
New cards

SMTP

An application layer protocol. To send emails to another email server/client.

95
New cards

IMAP

Internet Message Access Protocol. An application layer protocol. To receive emails from an email server. To allow management of emails on the server.

96
New cards

Authentication

Authentication is the process of confirming someone is who they say they are.

97
New cards

Encryption

Using an algorithm to convert a message into a form that is not understandable without the key to decrypt it.

98
New cards

MAC address (Media Access Control address)

A unique identifier assigned to a network device.

99
New cards

Firewall

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

100
New cards

MAC address filtering

MAC address filtering allows devices to access, or be blocked from accessing, a network based on the physical address embedded within the device's network adapter.