IGCSE Computer Science Theory Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

A set of flashcards covering key concepts from the IGCSE Computer Science Theory notes, including data representation, communication technologies, security, and file types.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

What is the binary system based on?

The binary system is based on the number 2.

2
New cards

What does a byte consist of?

A byte is made up of 8 bits.

3
New cards

What is the denary value of 1 kilobyte (1 KB)?

1 kilobyte (1 KB) is equivalent to 1024 bytes.

4
New cards

What is the hexadecimal value of the denary number 10?

The hexadecimal value of the denary number 10 is A.

5
New cards

What is parity checking used for?

Parity checking is used to check whether data has been changed or corrupted following transmission.

6
New cards

What is the purpose of MIDI?

MIDI is used for the storage of music files and communication between electronic musical instruments.

7
New cards

What is the principle of a checksum?

Checksum is used to see if data has been transmitted correctly by comparing data blocks with an additional value.

8
New cards

Define lossy file compression.

Lossy file compression eliminates unnecessary bits of data and results in loss of original file quality.

9
New cards

What does HTTPS indicate?

HTTPS indicates that a secure connection is established using SSL encryption.

10
New cards

What is a MAC address?

A MAC address uniquely identifies a device on the internet and is part of the network interface card.

11
New cards

What type of data transmission is USB classified as?

USB is classified as asynchronous serial data transmission.

12
New cards

What is the difference between hacking and cracking?

Hacking is unauthorized access to a system to steal data; cracking involves modifying program code maliciously.

13
New cards

What does SSL stand for?

SSL stands for Secure Sockets Layer.

14
New cards

What are cookies used for in web browsing?

Cookies are used to track user preferences and behavior when visiting websites.

15
New cards

What is the function of a firewall?

A firewall filters information in and out of the computer to prevent unauthorized access.

16
New cards

What is the purpose of a proxy server?

A proxy server acts as an intermediary to filter internet traffic and keep the user's IP address private.

17
New cards

What is ASCII?

ASCII stands for American Standard Code for Information Interchange and represents characters as numeric values.

18
New cards

What is the main characteristic of RAM?

RAM is volatile memory that loses its contents when power is turned off.

19
New cards

How is data typically stored on a hard disk drive (HDD)?

Data is stored in a digital format on the magnetic surface of the disks (platters).

20
New cards

What is the role of an interpreter in programming?

An interpreter executes a high-level program statement by statement and does not produce an executable file.

21
New cards

Define phishing in terms of cybersecurity.

Phishing involves sending deceptive emails to trick users into providing personal data, like passwords or bank details.

22
New cards

What does the term 'digital signature' refer to?

A digital signature is a form of electronic authentication that ensures an electronic document is authentic.

23
New cards

What is transpiration?

Transpiration is the process by which plants release water vapor into the air from their leaves.

24
New cards

How does the sun influence the water cycle?

The sun provides the energy needed for evaporation and drives the water cycle.