paper 1

studied byStudied by 30 people
5.0(1)
Get a hint
Hint

Program Counter (PC)

1 / 360

flashcard set

Earn XP

Description and Tags

361 Terms

1

Program Counter (PC)

Holds memory address of the instruction for each cycle

New cards
2

Magnetic storage

Hard drives

ADV: fast access, stores large amounts of data, low cost

DIS: not very portable, easily be broken

New cards
3

Solid State storage

USB, flash memory, SD

ADV: fast, small, light, easily potable, quiet

DIS: more expensive, storage capacity less, limited number erase/write cycles

New cards
4

Cloud storage

Data is stored on multiple servers in a remote location

ADV: secure, can be accessed anywhere, no need to buy

DIS: needs internet, download and upload can be effected by internet connection, less control if data is held

New cards
5

Operating System

essential software that links the hardware and other software together and generally manages the computer system

New cards
6

Utility Software

maintains a computer

New cards
7

Defragmentation Software

reorganises data on the hard drive to put fragmented files back together and moves files to collect all the free space

New cards
8

two types of backup software

Full Backup - a copy is taken from every file on the system

Incremental Backup - only files created or edited since last backup are copied

New cards
9

Router

responsible for transmitting data between networks

New cards
10

Packet Switching

split data into packets to be sent across the network, each packet given a number order of data, each router reads packet header and decides which way to send it according to IP rules, packets then arrive and reassemble them in the right order.

New cards
11

TCP/IP

sets of rules for how devices connect on the network.

New cards
12

Hyper Text Transfer Protocol (HTTP)

used to access websites and communicate with web servers

New cards
13

Internet Message Access (IMAP)

used to retrieve emails, server holds until you actually delete it- only download a copy

New cards
14

Data link Layer

passing data over physical network-

New cards
15

Virtual Network

network that is entirely software based, created by partitioning of some physical network

New cards
16

Malware

malicious software - computer programs designed to infiltrate and damage computers without the users consent.

New cards
17

Trojan Horse

program which misleads users of its true intent.

New cards
18

Adware

unwanted advertisements to the user of a computer

New cards
19

Memory

component of the computer that holds data and programs that are currently in use

New cards
20

Fetch

The next instruction is retrieved by CPU from main memory

New cards
21

FDE Cycle

1. The memory address held in the program counter is copied into the MAR. then copy instruction stored in MAR to the MDR, increase PC to next instruction

2. Decoded by CU

3. Instruction is performed

New cards
22

Cache

a type of quick memory that stores copies of frequently used data, much faster than RAM, slower than registers, lower capacity - closer to CPU

New cards
23

Clock speed

How fast the computer does the FDE cycle

New cards
24

virtual memory

A memory management procedure needed when the RAM is full so a temporary section is made which acts like a part of RAM

New cards
25

Flash memory

Solid state storage, non-volatile, more reliable/durable but can only be overwritten a limited number of times

New cards
26

Optical storage

CD, DVD, Blue-ray

ADV: cheap,easy to transport

DIS: slow, less storage than hard drives, stored data degrades over time, cannot be written over

New cards
27

Command-line Interface

Text commands where user has to type in command

New cards
28

Switch

connect devices on a LAN

New cards
29

Ethernet

a set of standards for connecting computers in a LAN

New cards
30

features of a Client-server Network

client has connection to server

servers can backup and store centrally

can be expensive and difficult to maintain

<p>client has connection to server </p><p>servers can backup and store centrally </p><p> can be expensive and difficult to maintain</p>
New cards
31

Peer-to-peer Network

no central server, each computer equal in responsibility, have to work as both server and a client.

<p>no central server, each computer equal in responsibility, have to work as both server and a client.</p>
New cards
32

Star Topology

ADV: better performance, rest of network not affected in one fails, simple to add more devices

DIS: wire needed for all devices, expensive

<p>ADV: better performance, rest of network not affected in one fails, simple to add more devices</p><p>DIS: wire needed for all devices, expensive</p>
New cards
33

Mesh Topology

network is linked to one or more devices with no central point

New cards
34

MAC Address

assigned to all devices, unique to all devises and cannot be changed, permanent, identifies the actual device.

New cards
35

IP Address

assigned either manually or automatic, the location of your device on the internet

New cards
36

HTTPS

more secure - encryption

New cards
37

File Transfer Protocol (FTP)

used to access, edit and move files between devices

New cards
38

Simple Mail Transfer Protocol (SMTP)

used to send emails, used to transfer emails between servers

New cards
39

Layer

ADV: manageable pieces, self-contained can change without effecting others

New cards
40

Application Layer

turning data into websites

New cards
41

Transport Layer

controlling data flow - splitting data into packets

New cards
42

Network Layer

making connections between networks

New cards
43

what does the Domain Name Server (DNS) do

translates websites' domain name into its IP address

New cards
44

Blagging

invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information

New cards
45

Phishing

used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.

New cards
46

Shouldering

used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.

New cards
47

Virus

program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.

New cards
48

Worm

program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

New cards
49

Spyware

aims to gather information about a person or organization without their knowledge

New cards
50

Brute Force Attack

trail and error to gain information

New cards
51

Denial of Service Attack (DOS)

hacker stop users from accessing a part of a network, flooding network with useless traffic making computer very slow

New cards
52

Data Interception And Theft

The unauthorized taking or interception of computer-based information. Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.

New cards
53

Zero-day Attack

before software is released it is tested as much as possible

New cards
54

Penetration Testing

organisations employ specialists to stimulate potential attacks on their network

New cards
55

network forensics

investigation undertaken to find cause of attacks on network

New cards
56

Anti-malware Software

designed to find and stop malware from damaging a network

New cards
57

Encryption

data is translated into code which only someone with the correct key can access

New cards
58

user access levels

Controls which parts of the network different groups of users can access

New cards
59

Data Protection Act

your data should be protected and kept safe from hackers

New cards
60

Freedom of Information Act

allows members of the public to access information held by a public organisation

New cards
61

Computer Misuse Act

stop hacking and cyber crime - stop unauthorized access to private network

New cards
62

Copyright Act

protect intellectual property - anything someone has created

New cards
63

Arithmetic Logic Unit (ALU)

Performs operations on data and logic operations e.g. Addition, subtraction

New cards
64

Control Unit (CU)

Coordinating activities of the CPU

New cards
65

Registers

Quick, small stores of data within the CPU

New cards
66

Memory Address Register (MAR)

Holds memory address for data or a instruction about to be used by the CPU

New cards
67

Memory Data Register (MDR)

Holds actual data or instruction

New cards
68

Accumulator

Stores results of calculations in the ALU

New cards
69

Decode

The instruction is broken down and decided so computer can understand

New cards
70

Execute

The CPU performs what the instructions told

New cards
71

Embedded System

A computer system built within a large device e.g. Camera, washer, car

New cards
72

Volatile

Memory loses its data when power of

New cards
73

Non-volatile

Memory retains its data when power is lost

New cards
74

Random Access Memory (RAM)

Read/write - function is to load open programs and operating system data currently in use - volatile

New cards
75

Read Only Memory (ROM)

Can only be read, can't be changed, stores essential programs to be run in order to boot the computer (BIOS) - non-volatile - flash memory

New cards
76

different levels of cache memory

L1 is quicker but has lowest capacity, L2 is slower but can hold more, L3 is slowest but largest capacity

New cards
77

Central Processing Unit (CPU)

Processes all of the data and instructions that make the system work - can be effected by clock speed, number of cores, cache size

New cards
78

number of cores

Each core in a CPU can process data independently of the rest.

The more cores a CPU has, the more instructions it can carry out at once, so the faster it can process a batch of data.

New cards
79

Graphics Processing Unit (GPU)

Handles graphics and image processing

New cards
80

Graphical User Interface (GUI)

uses icons and other visual indicators to navigate and issue commands

New cards
81

Compression Software

reduces file size so they take up less space on hard disk

New cards
82

Encryption Software

scrambles data to stop others from accessing it

New cards
83

Open Source Software

source code is made freely available and users can modify it

ADV: free, ,made for greater good, can be adapted

DIS: small, buggy, security holes, no warranties, no customer support

New cards
84

Proprietary Software

only the compiled code is released and the source code is kept a secret

ADV: warranties, well-tested, reliable, cheaper

DIS: expensive, software may not fit user needs

New cards
85

Personal Area Network (PAN)

within the range of an individual person

New cards
86

Local Area Network (LAN)

a network that connects devices close to each other e.g. school, house

New cards
87

Wide Area Network (WAN)

a network within a large geographical area e.g. internet

New cards
88

Bandwidth

amount of data that can be transferred in a given time

New cards
89

Network Interface Card (NIC)

allow a device to connect to a network

New cards
90

Post Office Protocol (POP3)

used to retrieve emails from a server, holds until download - then deletes from server

New cards
91

SQL Injection

programming language used to search and query databases.

New cards
92

Program Counter (PC)

Holds memory address of the instruction for each cycle

New cards
93

Magnetic storage

Hard drives

ADV: fast access, stores large amounts of data, low cost

DIS: not very portable, easily be broken

New cards
94

Solid State storage

USB, flash memory, SD

ADV: fast, small, light, easily potable, quiet

DIS: more expensive, storage capacity less, limited number erase/write cycles

New cards
95

Cloud storage

Data is stored on multiple servers in a remote location

ADV: secure, can be accessed anywhere, no need to buy

DIS: needs internet, download and upload can be effected by internet connection, less control if data is held

New cards
96

Operating System

essential software that links the hardware and other software together and generally manages the computer system

New cards
97

Utility Software

maintains a computer

New cards
98

Defragmentation Software

reorganises data on the hard drive to put fragmented files back together and moves files to collect all the free space

New cards
99

two types of backup software

Full Backup - a copy is taken from every file on the system

Incremental Backup - only files created or edited since last backup are copied

New cards
100

Router

responsible for transmitting data between networks

New cards

Explore top notes

note Note
studied byStudied by 2220 people
... ago
4.7(3)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(2)
note Note
studied byStudied by 48 people
... ago
5.0(1)
note Note
studied byStudied by 452 people
... ago
5.0(3)
note Note
studied byStudied by 43 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
4.5(2)
note Note
studied byStudied by 23406 people
... ago
4.5(119)

Explore top flashcards

flashcards Flashcard (41)
studied byStudied by 2 people
... ago
4.0(1)
flashcards Flashcard (26)
studied byStudied by 173 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 3 people
... ago
5.0(1)
robot