CompSci iGCSE theory

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/158

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

159 Terms

1
New cards

Why do programmers use hexadecimal numbers rather than binary numbers?

It is easier to say and memorise hexadecimal codes rather than binary codes as they are more simple

2
New cards

RAM

Random Access Memory
Volatile
Temporarily stores data (e.g. when apps are in use)

3
New cards

ROM

Read Only Memory
Non-Volatile

It stores firmware (BIOS,UEFI), which store instructions to boot-up the computer

4
New cards

What is an operating system?

Software which allows the user to control both hardware and software.
It hides the complexities of the hardware.

5
New cards

What is the user interface?

the part of the computer with which the user interacts with.

6
New cards

5 functions of the OS

Hardware management
File management
Memory management
Process management
Security management

7
New cards

Purpose of application software

Performs tasks related to end user

8
New cards

Define CLI

Command Line Interface
Users interact with the operating system using text commands

9
New cards

Define GUI

Graphical User Interface
Users interact with the OS with visual icons such as pointers, menus, windows

10
New cards

Advantages and Disadvantages of CLI

Advantages:
It takes up less system resources.
Useful for automated tasks
Commands are faster to type
Disadvantages:
Memorising the commands can be hard
Typing errors can occur
Less intuitive

11
New cards

Advantages and Disadvantages of GUI

Advantages:

Intuitive, user-friendly

Requires little prior knowledge of computers

Easier to understand and adaptable

Disadvantages:

Not good for repetitive tasks

Slower to find

Uses more system resources

12
New cards

Utility system software includes:

software which maintains and protects the OS(e.g. defragmenter)

13
New cards

What is cache

Cache is a device which is used between 2 devices that communicate at different speeds. It is commonly used between the CPU and RAM.
The CPU communicates at a much faster speed than RAM, so cache was made in order to increase the computer performance as CPU did not have to wait for RAM to fetch data.
It stores frequently used data.

14
New cards

What is the function of virtual memory

Used when RAM is full. The least frequently used data in RAM is swapped out into VM, and swapped back into RAM when there is space.
VM functions on an HDD

15
New cards

How many bits does ASCII use? Extended ASCII?

7 bits or 128 characters
Extended ASCII uses 8 bits

16
New cards

What is Unicode and why was it invented

Unicode is an international character code which includes all languages, made up of 2 or 4 byte (16 or 32 bit)
Unicode was invented as ASCII and extended ASCII had no standardisation because there were many different versions

17
New cards

What is the difference between logical right shift and arithmetic right shift?

In logical right shift, the empty spaces become zeros, but in arithmetic right shift, the empty spaces is one

18
New cards

Explain symmetric encryption

It uses the same pre-shared key to encode and decode data. The key is shared privately

19
New cards

Explain asymmetric encryption

A public key is shared publicly and it is used to encrypt data, but the message can only be decrypted by a private key, which is transferred to the recipient.

20
New cards

Compiler language

Translate high level language into machine code all at once
Executable format (.exe)
Independent, runs without needing translator software, easily distributable
If the code has errors or has a change, the code must be recompiled (creates more .exe files)
Needs to be compiled for specific machine architecture
Harder to debug
Fast execution speed
Memory heavy
The source code is not shown, which protects intellectual property

Creates two files to be maintained, one for editing and one for execution.

21
New cards

Interpreter language

Translates high level language into machine code one line at a time
Each line is executed after translation
If an error in the code is found, the program immediately stops
Dependent, needs translator software, not easily distributable
Cross platform
Easier to debug
Slow execution
No optimisation
Less RAM needed

Only one file is needed to be maintained

Needs to be translated everytime the program is run

Source code is made available

22
New cards

Why does the computer need to translate code before execution?

The code must be in binary or machine code in order for the processor to understand.

Computers use transistors, which has 2 states on or off. This can be represented by binary, which has 2 values, 1 or 0

23
New cards

4 ciphers and their types

Caesar cipher - shift cipher

Pigpen cipher - substitution cipher

Railfence cipher - transposition cipher

Vigenere cipher - Polyalphabetic substitution cipher

24
New cards

Bitmap graphics

Bitmap graphics contain the colour and position of millions of pixels (picture elements)
The colour is stored using hexadecimal code

25
New cards

What is colour depth

The number of bits used to encode the colour of each pixel
Standard colour depth is 24 bits (RGB)

26
New cards

High reso vs Low reso

Resolution is number of pixels per inch
High reso images have lots of small pixels
Low reso images have few big pixels

27
New cards

Vector graphics

Made up of simple shapes and lines
smaller than bitmap file
Not suitable for high quality pictures

28
New cards

Img reso formula

width*height

29
New cards

Img size formula

width x height x colour depth

30
New cards

Analogue sound

Sound which changes value constantly

31
New cards

What is sample rate and the unit

The number of times the audio amplitude is recorded
frequency
_hertz, standard is 44.1 kHz

32
New cards

Bit depth // Sample resolution

the number of bits available for each sample

33
New cards

Sampling

Measuring a soundwave at regular but different intervals

34
New cards

Audio file size formula

sample rate * bit depth * length

35
New cards

What is pseudocode

A standard way to show an algorithm without the rules of a programming language

36
New cards

What is an algorithm

A series of step-by-step instructions of a procedure

37
New cards

Lossy vs Lossless compression

Lossy compression : the original data is permanently deleted
Lossless compression : original data is not lost

38
New cards

NOT gates

Inverter
Outputs the opposite of the input

39
New cards

AND gates

Multiplication
Outputs the product of inputs

40
New cards

OR gates

Addition
Outputs the sum of inputs

41
New cards

NAND gates

NOT AND
Outputs the opposite of the product of inputs

42
New cards

NOR gates

NOT OR
Outputs the opposite of the sum of inputs

43
New cards

XOR Gate

Outputs zero when inputs are the same
Outputs one when inputs are different

44
New cards

Uses of logic gates

NAND gates are used in burglar alarms or buzzers
Circuits involving processing and computations
doorbells, street lights

45
New cards

Firmware

System software which is stored in ROM.
Initialises the hardware components and starts the OS when the computer is turned on.

46
New cards

Writing to magnetic storage (HDDs)

- Contains a stack of disks called platter

- Each disk has a magnetic coating on the surface.

- The data is recorded along tracks on the disks surface, separated by sectors

North = 1

South = 0

47
New cards

Reading from magnetic storage

The arm of the platter moves to be along the selected track
The disk spins so that the required sector of the track is under the arm's head
The magnetic coating sends a signal to the head, and the disk controller translates this into binary

48
New cards

Writing to optical data storage

A laser heats the surface of the disk, creating pits and land on the surface. The pits are lower than the land surrounding them, and they are unreflective.

49
New cards

Reading from optical data storage

The disk spins in the drive to ensure that all the data is read
A tracking mechanism moves the laser to the correct place
The laser shines onto the disk, and the light is reflected onto a sensor, which translates this into binary

50
New cards

Writing to Flash Drives

Control signals identify which bit is to be written to, and applies a high voltage
This pulls electrons into pools of the transistor, recording 1s and 0s
Electrons = 0
Empty pool = 1

51
New cards

Reading from Flash drives

Control signals identify which bit is to be read from, applying a small voltage.
The 1s and 0s from the pools are recorded

52
New cards

Why are SSDs not long term?

Writing to and reading from SSDs involve applying a voltage, which breaks down the transistor over time.

53
New cards

Why is camel case used?

There is easier readability
Consistency with programming
Variable names cannot include a space

54
New cards

High level programming language (HLL)


- Uses English command words, so it is easily understandable

- Has rich instruction set (sequencing, selection, iteration)

- Supports many different datatypes (Boolean, string, ...)

- Fewer lines of code can represent complex texts e.g. loops

- A line of code generates several executable instructions

- All HLLs need translator software

- Programmers do not need to know the specific machine architecture in order to understand it.

55
New cards

Low level programming language (LLL)

- Uses mnemonics/abbreviations or binary code, which is hard to understand

- Limited instruction set

- Cannot represent complex constructs

- No datatypes

- A line of code generates only one executable instruction.

- Programmers need to know specific details of machine architecture in order to understand it.

- Only assembler needs translator, otherwise LLL do not need translator software

56
New cards

Bit pattern

a collection of binary digits
e.g. ASCII code, hexadecimal

57
New cards

Memory address

A unique location in memory where instructions or data are stored

58
New cards

Buffer

most Input/Output devices have memory between the main system as they communicate at different speeds

59
New cards

Why does adding more RAM increase the computer's performance

More RAM means there is more space in RAM
This means VM needs to be accessed less, which increases the performance as the Swap In/Swap Out process takes time

60
New cards

ALU

Arithmetic Logic Unit
performs mathematical or logical operations in CPU

61
New cards

Register

storage inside the CPU
stores an instruction, an address, etc.

62
New cards

Control Unit

organises the actions of other CPU parts

63
New cards

Clock

an electronic device inside the CPU
used to sync the actions of other CPU units

64
New cards

CIR

Current Instruction Register
stores the current instruction being decoded/executed

65
New cards

ACC

Accumulator
used to hold the data during the calculations of the ALU

66
New cards

MDR

Memory Data Register

Stores the instruction that is currently being read from or written to.

67
New cards

MAR

Memory Address Register
stores the memory address of the memory currently being read/written

68
New cards

PC

Program Counter
stores the address of the next instruction

69
New cards

Fetch-Decode-Execute cycle

Fetch:

The address of the next instruction to be processed is copied onto MAR by PC

The control unit uses control bus to send read signal to read from memory

The data of the instruction’s memory address is copied onto data bus, and onto MDR

Decode:

The control unit analyses the data, and sends signals to other CPU components

Execute :

The instruction is executed by the ALU

70
New cards

The performance of the CPU

Clock Speed : The rate at which the instructions are processed by CPU. Faster clock speed, better performance

Number of processor cores: Parallel processing can be done, where the computer can multitask or perform the same task together

Size of cache : A larger cache means more frequently used data can be stored, so the CPU will not have to wait for RAM to access data, which improves bottleneck issue and speeds up processing

71
New cards

Cloud Storage

A form of secondary storage
Accessed via the Internet
Files in Cloud servers can be accessed anywhere on any device as long as there is internet

72
New cards

Virtualisation

Hiding the true physical nature of computer resources

73
New cards

Embedded device

a computer contained inside of another device that typically performs a single function.

74
New cards

Sequential computational model

follows instruction in an algorithm step by step

75
New cards

Parallel computational model

The tasks are shared equally between 2 or more processors in a computer
Needs an OS which can handle 2 or more processors
Needs software that is capable of splitting the tasks equally among the processors

76
New cards

Multi-Agent computational model

Separate algorithm are processed by different systems/agents to perform a function

Each agent acts independently, but they cooperate and communicate with one another

77
New cards

Network

an arrangement of computers and devices connected to share resources or data

78
New cards

Server

A powerful computer which provides the network with services such as storage or emails

79
New cards

Types of network connectivity

wired and wireless

80
New cards

Types of networks

PAN (personal area network) - data transmission across short distances

LAN (local area network) - a network across a small geographical area

WAN (wide area network) - network across a large geographical area

81
New cards

Network models

Client-server and peer-to-peer

82
New cards

Why are networks used?

To share access to the Internet

To share peripheral devices

To share file storage

To run software/security updates

Communication

83
New cards

How does a client-server model work?

The user uses its IP address to connect with the server’s IP. The server will authenticate the user, and the user will send a request to access its services. The server will provide its services.

84
New cards

How does a peer-to-peer model work?

There is no dedicated server ; each computer connected on a network can act as both a client or server. Simultaneously providing services to others while requesting services from others

85
New cards

Packet

In storage, data is in bits.
When data is sent over a network, it is a packet.
3 sections in packet :

- Header : Contains sender and receiver IP addresses, and the format of the packet (no. and order)

- Payload : contains the data

- Trailer : error checking e.g. checksum

86
New cards

Bus topology (Pros and Cons)

devices are connected along a single cable, with a terminator at the end to prevent data collisions.


Pros:

- Cheap to install

- easy to add more devices

Cons:

- when the cable is damaged, the entire network fails

- difficult to find a fault on the cable

- runs slower if there are more devices

- security risk

87
New cards

Ring topology (Pros and Cons)

cable connects the networked devices to each other in a loop/ring


Pros :

- adding extra devices won't affect performance

- easy to add devices

- no data collisions as the messages all travel in the same direction

Cons:

- whole network will fail when the cable fails or if a device fails

- it is a closed loop so the network must shut down for a while to add or remove a device

- hard to find fault

- expensive than bus

88
New cards

Star topology (Pros and Cons)

each network is connected to a central point ( a hub or switch)


Pros :

- when the cable is damaged, only the device connected to it fails, nott the entire network

- if a switch is used, the messages are sent to only the intended user, so it is more secure

- faults are easy to find

Cons:

- when the hub or switch fails, entire network fails

- expensive as u need to buy the switch/hub, and cables for each device

89
New cards

Mesh topology (Pros and Cons)

Devices in a mesh network will pass messages on to other devices within the network


Pros:

- not a lot of network traffic as messages can be easily rerouted

- high performance

Cons:

- difficult and expensive installation

- difficult to manage

90
New cards

Protocol definition

A set of rules which control the format of communications between devices on a network

91
New cards

What is eavesdropping

unauthorised sight of data being sent from one computer to another over a network (data interception)

92
New cards

Ways to prevent data interception

- Use a WEP or WPA encryption protocol and a firewall

- Use of wireless router by complex passwords

- Don't use public Wi-Fi connectivity

93
New cards

latency

The delay encountered by data travelling through network

94
New cards

Bandwidth

The amount of data which can be carried from 1 point to another on a network over a time

95
New cards

SMTP

Simple Mail Transfer Protocol
used when sending emails over the internet
controls the format of emails
commands email servers how to understand and respond to messages

96
New cards

POP(3)

Post Office Protocol (3)
used for retrieving email from an email server
you can download messages and then delete them from the server
there are storage limitations on the server, as well as privacy issues
more CPU time is used when a large number of emails are being downloaded

97
New cards

IMAP

Internet Message Access Protocol
allows emails to be accessed using multiple email clients
leaves messages on the server until deleted
changes are synced with the mail server in real time

98
New cards

Ethernet

A collection of family of protocols that is used for physical network connections in LAN

99
New cards

Wi-Fi

Wireless Fidelity

digital communications protocol which sets out how data is transmitted on wireless LANS

100
New cards

TCP

Transmission Control Protocol
provides a reliable connection between computers, checking whether the data is sent correctly
used when accessing web pages or email servers