ComSci AS level Theory

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/250

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:06 AM on 4/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

251 Terms

1
New cards

Cloud computing

accessing a service/files/software on a remote server

2
New cards

Private cloud

Dedicated/bespoke services/storage on a remote server only available to company

3
New cards

Public cloud

Computing services offered by 3rd party provider over the public Internet, open/available to anyone with the appropriate equipment/software/credentials

4
New cards

Router

hardware component that receives and sends data between two networks operating on the same protocol // a device that forwards packets to their correct destinations in a network

5
New cards

Wireless Network Interface Card (WNIC)

hardware component that allows a device to connect to a wireless network // Provides a MAC address to the device to identify it on the wireless network

6
New cards

Repeater

hardware component that restores the digital signal so it can be transmitted over greater distances

7
New cards

Wireless Access Point (WAP)

hardware component that provides radio communication from the central device to nodes on the network (and vice versa)

8
New cards

Bit streaming

continuous ordered flow of bits over a communication path

9
New cards

Static IP address

an IP address that is fixed / doesn't change each time a device re-joins a LAN / network

10
New cards

Dynamic IP address

an IP address that may be refreshed / changed each time a device re-joins a LAN / network

11
New cards

Public IP address

an IP address that is assigned to a device to allow direct access on the internet

12
New cards

Private IP address

an IP address used for internal LAN communication only

13
New cards

DNS (Domain Name Service)

a decentralized naming system that translates human-readable domain names into IP addresses, facilitating internet communication

14
New cards

Characteristics of a WAN

● Covers a large geographical area

● External/public infrastructure is used

● Non-dedicated hardware

15
New cards

Characteristics of a LAN

● Covers a small geographical area

● The infrastructure is privately owned // not controlled by external organisations

16
New cards

Differences between a WAN and a LAN

● WAN covers a large geographical area and LAN covers a small geographical area

● LAN connections between devices are usually physical, whereas the WAN connections are often virtual

● A LAN has a high data transfer rate, whereas a WAN has a low data transfer rate

● The ownership of a LAN is private; the ownership of a WAN can be private or public

● LAN is usually more secure than a WAN because protection is easier to implement

17
New cards

Benefits of connecting computers to a LAN

● Allows the sharing of files/data // Allows communication between the devices

● Allows the sharing of resources e.g. hardware / software (applications)

● Allows central management // by example, backup, security, etc.

18
New cards

Key features of a peer-to-peer network

● All computers are of equal status

● Each computer provides access to resources and data // data is distributed

● Computers can communicate and share resources

● Each computer is responsible for its own security

19
New cards

Drawbacks of peer-to-peer network

● Reduced security // no central management of security

○ ... only as secure as the weakest computer on the network

○ ... each computer is at risk from viruses from other computers

● No central management of backup

○ ... if the data from one computer is not backed up it is lost to all of them

● No central management of files/software

○ ... consistency may be difficult to maintain

○ ... each computer may have different software from the others

● Individual computers may respond slower

○ ... because they are being accessed by other computers

● In order to share files etc. all the computers involved need to be switched on

○ ... so the files etc. may not be always available

20
New cards

Common applications of client-server model

● File server

● Printer server

● Email server

● Web server

21
New cards

Role of clients and servers on the Internet

● Web pages/files are saved on servers

● Clients send requests to the web servers

● Web servers process the requests

● ...and return the results to the client

● ... client displays the results to the user

22
New cards

What is meant by a thick‑client model?

● The server performs minimal / some processing for the client

● The clients also do most of their own processing/work independently // most of the resources are installed locally

23
New cards

Role of the different computers in thin-client model

● Server performs all processes required by the task and/or data storage

● Clients only sends requests to the server and displays the returned results

24
New cards

Characteristics of thin-client

● Data is not stored on the client computer

● Client computer is reliant on access to server

● Client computer heavily reliant on network/internet connection

● Client computer requires few local resources/memory

● Client computer performs minimal functions/processes

25
New cards

How packets are transmitted between two devices in a star topology

● Sending computer transmits packets directly to switch/router/central device

● Switch/router/central device checks destination address of packet and forwards directly to that device

26
New cards

Advantage of implementing a star topology instead of a bus topology

● Star topology is more resilient to faults

○ ...because there is no single cable and leads to less disruption

● Higher performance as fewer collisions

○ ...because each device in the network is only connected to the switch

● Easier to add new nodes

○ ...because each device in the network connects directly to the switch

● Easier to fault find compared to bus topology

27
New cards

What is meant by a mesh topology?

● All computers are connected to at least one other device

● There are multiple routes between devices

● The computers can act as relays, passing packets on towards the final destination

28
New cards

Advantages of using a mesh topology instead of a bus topology

● If one line goes down there are more routes available

● Improved security as not using one main line

● No/fewer collisions

● New nodes can be added without interruption or interfering with other nodes

● More secure because data is sent over a dedicated connection

29
New cards

Benefits of cloud computing

● Can be accessed anywhere with Internet access

● Do not need to install security // security might be better

● Do not need to perform backups

● Do not need to buy specific software/hardware

● Can easily share documents

● Can have multiple people working on the same document

30
New cards

Disadvantages of storing data on a public cloud compared to storing data on a server in a Local Area Network (LAN)

● There could be a possible loss of control unlike the LAN

○ ...because the data is stored on a remote infrastructure / someone else's infrastructure

○ ...reliance on external agency to complete tasks, e.g. backups, security

● Requires reliable internet connection

○ ...to ensure access to the remote data, more likely with LAN

● Increased recurring costs

○ ...as cloud provider charges must be paid, costs for LAN once only

31
New cards

Benefits to the company of using private cloud storage instead of public cloud storage

● Not reliant on a third party

● ... gives greater control over security/privacy

● ... gives greater control over backup

● Storage can be tailored/scalable to company requirements

● e.g. the amount of storage accessible/ facilitating the sharing of files

32
New cards

Benefits of using wired connection

● Faster connection // higher bandwidth

● .... needed when downloading/streaming large files

● ... less time waiting / less latency / fewer delays

● More reliable / stable connection

● ... is less susceptible to issues with distance/walls/interference

● More secure

33
New cards

Benefits of using wireless connection

● Freedom of movement

○ ... can move between different rooms with a mobile device and still receive/transmit data

○ ... no need of a physical connection

● Easily expanded if friends want to access the same network

● Less cabling / expertise is needed

○ ... making the initial setup less expensive

34
New cards

Transmission media that can be used to transfer data in the WAN

● Copper cable: carries data as electrical signals and can consist of twisted pair and coaxial

● Fibre optic: transmits data as pulses of light, uses (a bundle of) glass/plastic threads to transmit data

● Radio waves / microwaves: transmits electromagnetic waves on different frequencies

35
New cards

Differences between fibre-optic cables and copper cables

● Fibre optic data is transmitted using light, copper cable through electrical signals

● Fibre optic has higher bandwidth than copper cable // Fibre optic has higher transmission rates than copper cable

● Fibre optic has smaller risk of (noise) interference than copper cable

● Fibre optic can be used over longer distances than copper cable before repeaters are needed

● Fibre optic is much more difficult to hack into than copper cable

● Fibre optic is more prone to damage than copper cable

36
New cards

Advantages of transmitting data using satellites instead of copper cables

● Not fixed to a single location

● Allows access in remote / rural areas

37
New cards

Disadvantages of transmitting data using satellites instead of copper cables

● High latency / lag / slow to connect

● More expensive than wired methods, as need extra equipment

● Signal is affected by bad weather

● The transmission speed is slower than fixed line broadband

● Direct line of sight needed

38
New cards

Purpose of Switch

● To allow two or more devices to communicate with one another

● To connect individual devices to each other

● To receive transmissions and forward them to their destination

39
New cards

Purpose of Wireless Access Point (WAP)

● To allow connection of devices (to the central device) using radio signals / Wi-Fi

● To allow the central device to send / receive radio signals / Wi-Fi signals

● To allow wireless enabled devices to connect to a wired network

40
New cards

Purpose of bridge

● To connect two LANs / segments with the same protocol

● To transmit data between two networks with the same protocol

41
New cards

Functions of Wireless Network Interface Card (WNIC)

● Provide interface to wireless network

○ ... as an antenna

● Receives analogue radio waves

○ ... convert them to digital / binary

● Checks incoming transmissions for correct MAC / IP address

○ ... ignore transmissions not intended for it

● Encrypts / encodes the data // Decrypts / decodes the data

● Takes digital/binary input and converts to analogue waves

... sends the radio waves via the antenna

42
New cards

Role of routers in the transmission of data through the internet

● Receives packets from internet

● Analyses the destination IP address of each packet

● Forwards the packet towards its destination

● ... using the routing table

● Maintains/updates the routing table

● Finds the most efficient route to the destination

43
New cards

What is meant by Ethernet?

● A protocol (suite)

● For data transmission over standard / universal wired / cabled network connections

● Uses Carrier Sense Multiple Access / Collision Detection (CSMA/CD)

● Data is transmitted in frames

● ... each frame has a source and destination (IP/MAC) address

● ... and error checking data (so damaged frames can be resent)

44
New cards

Describe CSMA/CD

● A workstation / node (wishing to transmit) listens to the communication channel

● ...data is only sent when the channel is free // ... if channel is free data is sent

● Because there is more than one computer connected to the same transmission medium

● ... two workstations can start to transmit at the same time, causing a collision

● If a collision happens, the workstations send a (jamming) signal / abort transmission

● ...and each waits a random amount of time before attempting to resend

45
New cards

Tasks performed by devices to deal with collisions when using the Carrier Sense Multiple Access / Collision Detection (CSMA/CD) protocol in a network

● To monitor the communications channel

● To send data only when there is no data being transmitted / the line is quiet / idle

● To detect a collision and then stop transmissions of further data // transmit a jamming signal

● To calculate a random wait time / back-off time

● ... then retransmit the data after that random wait time

Increase random time if multiple collisions

46
New cards

Drawbacks of using CSMA/CD

● Random time increased each time so can be infinite waiting

● May be constant jamming signal so nothing ever sends

● Certain nodes cannot be prioritised

● High power consumption

● Only suitable for short distance network // limited distance

● Not scalable // more nodes means exponentially longer waiting times

47
New cards

Differences between real-time and on-demand bit streaming

● Real-time is direct from source whereas on-demand is prerecorded/downloaded to view later

● Real-time cannot be re-watched, on-demand can be paused, re-watched etc.

● Real-time plays continually, on-demand downloads sections/blocks and cannot play until next section is downloaded

48
New cards

How bit streaming is used in a real-time video conference?

● Data is compressed before transmitting

● The video and audio are transmitted continuously as a series of bits

● The video is uploaded to a media server

● On download, the media server sends the data to a buffer

● The buffer stores data from server until the receiving device can process it

● The receiving device receives the bit stream from the buffer

49
New cards

Differences btw Internet and WWW

● Internet is the infrastructure / global collection of networks

● World Wide Web is the collection of interlinked, multimedia web pages / content, webpages are written in HTML

● The World Wide Web is accessed over the Internet

● WWW uses HTTP protocol to transfer web pages, Internet uses IP protocol

50
New cards

Role of the PSTN (Public Switched Telephone Network) in the transmission of data through the internet

● The PSTN consists of many different types of communication lines

● ... therefore the digital data may need to be converted into a different form/analogue signal

● Data is transmitted in both directions at the same time // duplex data transmission

● Using a PSTN the communication passes through different switching centres/ISPs

51
New cards

Why the router has a public IP address?

To be visible to and accessible by other devices on the internet

52
New cards

Differences between an IPv4 and IPv6 address

● The numbers in an IPv4 address are separated by full stops and in an IPv6 address they are separated by colons

● IPv4 has 4 groups of digits whilst IPv6 has 8 groups

● IPv4 is usually represented in denary whilst IPv6 is usually represented in hexadecimal

● IPv4 groups are between 0 and 255 whilst IPv6 is between 0 and FFFF

● IPv4 is 32 bits whilst IPv6 is 128 bits

53
New cards

Purpose of subnetting in a network

● It allows the network to be divided into smaller networks

○ ... which reduces traffic in some parts of the network // reduces congestion

○ ... because traffic only travels through the parts necessary

○ ... which hides the complexity of network

○ ... and allows for easier maintenance of the network

● To improve the security of the LAN

○ ... so that devices do not receive unintended data

○ ... so that a compromised device does not expose the whole network

○ ... so not all devices can access all segments

● To make the network management easier

○ ... because faults can be isolated more efficiently

● To make the network easier to expand // For better control of network growth

○ ... by allowing for greater range of IP addresses to be available

● To improve network performance

54
New cards

Two parts of an IP address in a subnetwork

● IP address is made up of a network ID and a host ID

○ Each device in a subnetwork has the same network ID // Each subnetwork has a different network ID

○ Every device in each subnetwork has a different host ID but the same network ID // the host ID uniquely identifies the device within the subnetwork

55
New cards

Differences btw Public and Private IP address

● Private IP is only known within the LAN, public IP is known outside of the LAN/ on Internet

● Public is allocated by ISP, private is allocated by the router

● Public addresses are unique throughout the Internet, private addresses are unique only within the LAN

● Private IP addresses are more secure than public IP addresses

● NAT (Network Address Translation) is necessary for a private IP address to access the Internet directly.

● 0.0.0.1 to 10.255.255.254 and 172.16.0.1 to 172.31.255.254 and 192.168.0.1.to 192.168.255.254 form the private address space // IP addresses from the private address space are never assigned as public.

56
New cards

Use of modems when data are transmitted over the Internet [1 mark]

  • Convert digital data into analogue (or vice versa) for transmission down phone lines

57
New cards

Use of dedicated lines when data are transmitted via the Internet [1 mark]

Used to provide a direct/ private connection which therefore provides faster transmission

58
New cards

AND gate description

A logic gate that has two inputs. If both inputs are '1' it will output '1', otherwise it will output '0'.

59
New cards

OR gate description

A logic gate that has two inputs. If either or both of the two inputs is '1', its output is '1'

60
New cards

NOT gate description

A logic gate that has one input. If the input is '0', its output is '1'. If the input is '1', its output is '0'

Also called an INVERTER gate.

61
New cards

NAND gate description

Combination of a NOT and an AND gate. If an AND gate gives an output of 0, then this gate gives an output of 1

62
New cards

NOR gate description

Logic circuit that operates like an OR gate followed by an INVERTER. The output of this gate is LOW (logic level 0) when any or all inputs are HIGH (logic level 1).

63
New cards

XOR gate description

A logic gate that outputs HIGH (logic level 1) when only one of its inputs is HIGH (logic level 1)

64
New cards

NAND gate symbol

knowt flashcard image
65
New cards

AND gate symbol

knowt flashcard image
66
New cards

NOT gate symbol

knowt flashcard image
67
New cards

OR gate symbol

knowt flashcard image
68
New cards

NOR gate symbol

knowt flashcard image
69
New cards

AND truth table

knowt flashcard image
70
New cards

NAND truth table

knowt flashcard image
71
New cards

OR truth table

knowt flashcard image
72
New cards

NOT truth table

knowt flashcard image
73
New cards

NOR truth table

knowt flashcard image
74
New cards

XOR truth table

knowt flashcard image
75
New cards

Digital signal description

A system of discrete states: high or low, on or off, 1 or O.

76
New cards

Analogue signal

knowt flashcard image
77
New cards

Digital signal

knowt flashcard image
78
New cards

Analogue signal

A system where the data varies continuously with time and can have any value between two limits.

79
New cards

XOR gate symbol

knowt flashcard image
80
New cards

Entity

a real-life object that is represented as a table // an object that data is stored about

81
New cards

Attribute

an item of data about an entity

82
New cards

Field

A column/attribute in a table

83
New cards

Record

a row in a table in a database

84
New cards

Tuple

A row of data in a table about one instance of an object

85
New cards

Primary key

the unique attribute / combination of attributes used to identify the record / tuple

86
New cards

Candidate key

a field that could be a primary key but is not // an attribute or smallest set of attributes in a table where no tuple has the same value

87
New cards

Secondary key

an additional/alternative key used as well as the primary key to locate specific data // a candidate key that has not been chosen as a primary key

88
New cards

Foreign key

a field in one table that is linked to a Primary Key in another table

89
New cards

Data dictionary

stores metadata for a database, identifies the characteristics of the data that will be stored

90
New cards

Query processor

software that allows the user to enter criteria, then finds and returns the appropriate result // software that processes and executes queries written in SQL

91
New cards

Developer interface

a software tool that allows the user to create items such as tables, forms and reports

92
New cards

Benefits of using a relational database instead of a file-based approach

● There is reduced data redundancy // less repeated data

○ ... because each item of data is only stored once

● Data consistency is maintained // Data integrity is improved

○ ... changes in one table will automatically update in another

○ ... linked data cannot be entered differently in two tables

● Program-data independence is ensured

○ ... changes to the data do not require programs to be re-written // queries are not dependent on the structure of the data

● Complex queries are easier to run

● Different views can be provided

○ .... so users can only see specific aspects of the database

● Multiple concurrent access is possible

○ ... through record locking

93
New cards

Explain the reasons why referential integrity is important in a database

● Referential Integrity makes sure data is consistent

● Referential Integrity makes sure all data is up-to-date

● Referential integrity ensures that every foreign key has a corresponding primary key

● Referential Integrity prevents records from being added / deleted / modified incorrectly

● Referential Integrity makes sure that if data is changed in one place the change is reflected in all related records

● Referential Integrity makes sure any queries return accurate and complete results

94
New cards

Description of the three normal forms

● First Normal Form (1NF): no repeating groups of attributes

● Second Normal Form (2NF): no partial dependencies

● Third Normal Form (3NF): no non-key dependencies

95
New cards

Explain how a DBMS supports data integrity

● Referential integrity is enforced

● ... such as cascade update/delete // if the data is changed in one place it is updated in every other place

● validation/verification rules

96
New cards

Items that are stored in a data dictionary

● Table name

● Field name // attribute

● Data type

● Type of validation

● Primary Key

● Foreign Key

● Relationships

97
New cards

Describe what is meant by a logical schema

● Conceptual design

● Platform/database independent overview of the database

● Is used to design the physical structure

● Appropriate example e.g. Design of entities / E-R diagram / views

98
New cards

Purpose of a query processor in a DBMS

● Allows the user to enter criteria

● Searches for the data that meets the entered criteria

● Organises the results to be displayed to the user

99
New cards

Ways in which access rights can be used to protect data in database

● Access rights give individuals access to different elements by having different accounts / logins which have different access rights e.g. read only // no access / read / write

● Specific views can be assigned to groups of users

○ e.g. managers can only see the data for their own shop(s)

100
New cards

Describe methods that a DBMS can use to improve the security of a database

● Backup / recovery procedures

○ ... automatically takes copies of the database and store off site on a regular basis / weekly, etc.

○ ... so that the data can be recovered if lost

● Use of access rights

○ ... some users are given different access permissions to different tables

○ ... read/write, read only, full access, etc.

● Views

○ ... different users are able to see different parts of the database

○ ... only see what users need to see

● Record and table locking

○ ... prevents simultaneous access to data

○ ... so updates are not lost // data is not overwritten

● Encryption

○ ... the data is turned into ciphertext

○ ... so it cannot be understood without a decryption key