Component 1 - Computer Science

HideShow resource information
CIR -
Current Instruction Register / Stores the Instructions currently being used by the CPU
1 of 67
MAR -
Memory Address Register / Stores the memory location of where data is read from or written to
2 of 67
Accumulator -
Register for storing the output of a mathematical process from the ALU
3 of 67
PC -
Program Counter / Stores the next instruction to be processed by the CPU
4 of 67
Data Bus -
Transfers data between the CPU and RAM in both directions
5 of 67
Address Bus -
Transfers data From CPU to RAM / Carries the memory address for the next instruction
6 of 67
Control Bus -
Carries information and commands from the CPU to other components
7 of 67
Contents of a Packet -
Source Address / Destination Address / Reassembly data / Tracking / Data itself / Checksum
8 of 67
Application Layer -
Provides interfaces to the software to allow the user to use the network
9 of 67
Transport Layer -
Responsible for making sure that data is transferred without errors and reliably
10 of 67
Network Layer -
Responsible for the ADDRESSING and ROUTING of data
11 of 67
Data Link Layer -
Sends the data from the Network layer to the Physical layer
12 of 67
Physical Layer -
Transports the raw Data itself
13 of 67
Bitmap Graphics / Raster Images -
Made of individual pixels to make up the full image / The larger the Image, the more pixels / Cannot be scaled without loss of quality (Pixelation) / E.G. Photo
14 of 67
Vector Images -
Computer generated objects are used to make an image / Can be enlarged without a loss of quality / Take up less storage space
15 of 67
Common Sample rate for Music -
44,100 samples per second
16 of 67
Record -
A collection of related items / Consists of fields / Can store different data types /
17 of 67
Array -
An array holds data so that it can be found individually or accessed consecutively / Each data point can be accessed with references - A(1,3) / Static data structure
18 of 67
Utility Software -
Virus Scanners / Task managers / Firewall / Defragmentation / Compression / System management / Disk scanning
19 of 67
Virus Scanners -
Scan and monitor a computer system by checking for anomalies and detecting potential threats
20 of 67
Firewall -
Monitors data traffic coming in to and out of a computer
21 of 67
Defragmentation -
Software rearranges data on a storage device to make it more efficient
22 of 67
System Monitoring -
Allows the tracking of users and reporting the applications used by the user on the computer system
23 of 67
IDE -
Integrated Development Environment / Acts as a tool for programmers to use to aid the development of software
24 of 67
Editor -
Allows programmers to edit and add to code that is written as a high level programming language
25 of 67
Compiler -
Converts source code into machine code all at once and returns all errors at the end / A code only needs to be compiled once
26 of 67
Interpreter -
Converts line by line of source code into machine code and executes it as it runs / Always requires a interpreter
27 of 67
Linker -
Allows previously compiled parts of code to be linked together
28 of 67
Loader -
Loads previously compiled code into the RAM
29 of 67
Debugger -
Helps to track errors in a code
30 of 67
The Process of Compilation -
Lexical Analysis / Syntax Analysis / Semantic Analysis / Code Generation / Optimisation
31 of 67
Assembly Language -
Uses Mnemonics for machine code instructions / Difficult to develop and test / Needs a lot of instructions
32 of 67
Syntax Analysis -
Each statement is checked for spelling, grammar and to make sure the code makes sense
33 of 67
Semantic Analysis -
Checking that the meaning of statements is consistent with the rules of the compiler / Making sure all variables are declaired
34 of 67
Lexical Analysis -
Comments and spaces removed / All key parts of the code replaced with tokens
35 of 67
Code generation -
Converting into machine code
36 of 67
Computer Misuse Act 1990 -
It is illegal to: Access files without permission / Gain access to files to use for a criminal purpose / Change or delete files without permission / Prevents fraud and blackmail
37 of 67
Regulation of Investigatory Powers Act 2000 -
It is illegal to intercept phone calls, letters and communications without permission / The government are allowed access to certain information about criminals etc
38 of 67
Freedom of Information Act 2000 -
Members of the public can request information from public authorities
39 of 67
Copyright, Designs and Patents Act 1988 -
It is illegal to copy or use someone else's data in certain ways if they have copyrighted it
40 of 67
Data Protection Act 1998 -
Data kept must only be used as stated and edited or deleted if no longer needed
41 of 67
ROM (Read Only Memory) -
Used for permanent storage of data / Non volatile / Stores the computers firmware
42 of 67
Flash Memory -
Permanently stores data / Can be rewritten / Non volatile
43 of 67
Magnetic Disk Drive / HDD -
Relatively fast / Not durable - moving parts / Not portable / Good for permanent storage / large storage space
44 of 67
SSD -
Good storage capacity / Durable due to no moving parts / Fast access speeds / Very portable
45 of 67
Optical Storage -
Used for multimedia files / Durable / Portable / Fast / Smaller storage capacity
46 of 67
High level Programming Languages -
Easier to use and understand / Built in functions and commands / Similar to natural language / Can be run on different platforms / Python , Java etc
47 of 67
Low Level Programming Languages -
Machine oriented / Executed faster / Occupies far less memory / Written in Binary / Direct interaction with the computer hardware
48 of 67
Optimisation -
Reducing the execution time of the code
49 of 67
Virus -
Attaches itself to a file and causes harm and damage when opened
50 of 67
Spyware -
Hidden malware that takes and stores data from the computer system
51 of 67
Trojan -
It appears to be useful software but gives the attacker a backdoor entrance into the computer system
52 of 67
Worm -
It is a malware that requires no interaction by a human to spread
53 of 67
Preventing Malware - Methods
Anti-Virus software / Firewalls / Updates and Patches / Avoiding AD’s and Dodgy Emails
54 of 67
SQL Injection -
It can manipulate databases and trick websites into giving unauthorised access
55 of 67
DDoS (Distributed Denial of Service) -
It will overload a website with requests causing high network traffic causing the site to possible go down
56 of 67
Password based attack -
Dictionary: uses every word to guess password / Brute force: Tries every combination
57 of 67
IP spoofing -
It changes the source address of packet data to make it seem like it came from a reliable source
58 of 67
Human weakness -
Uses social engineering or other methods that require human mistake to avoid security
59 of 67
Phishing -
A method used to gain private or confidential data by pretending to be an official organisation
60 of 67
Footprinting -
Gathering public information on a source to make it easier to breech its system
61 of 67
Cookies -
Small pieces of data generated by a website and stored by the browser
62 of 67
Router -
Forwards packets of data along a network / Determines the best path for packets
63 of 67
Hub -
Receives packets and send them to all connected hardware components in a network
64 of 67
Switch -
Filters and forwards packets to their intended destination
65 of 67
Bridge -
A bridge connects a LAN to a LAN
66 of 67
Gateway -
A gateway connects a LAN to a WAN
67 of 67

Other cards in this set

Card 2

Front

Memory Address Register / Stores the memory location of where data is read from or written to

Back

MAR -

Card 3

Front

Register for storing the output of a mathematical process from the ALU

Back

Preview of the back of card 3

Card 4

Front

Program Counter / Stores the next instruction to be processed by the CPU

Back

Preview of the back of card 4

Card 5

Front

Transfers data between the CPU and RAM in both directions

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Fun resources:

See all Fun resources »See all Computer Science resources »