A-Level Computer Science

studied byStudied by 24 people
5.0(1)
get a hint
hint

What is a processor?

1 / 509

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

510 Terms

1

What is a processor?

A processor, also known as a central processing unit (CPU), is the primary component of a computer responsible for executing instructions, performing calculations, and managing data.

New cards
2

Define Clock Speed

Clock speed refers to the number of cycles per second that a processor can execute instructions. It is measured in Hertz (Hz) or gigahertz (GHz).

New cards
3

What does the ALU do?

Performs operations on data e.g. Addition, subtraction

New cards
4

What does the Control Unit do?

Coordinating activities of the CPU

New cards
5

What are registers?

Quick, small stores of data within the CPU

New cards
6

What does the MAR do?

Holds memory address for data or a instruction about to be used by the CPU

New cards
7

What does the MDR do?

Holds actual data or instruction

New cards
8

What does the Accumulator do?

Stores results of calculations in the ALU

New cards
9

What does the PC do?

Holds memory address of the instruction for each cycle

New cards
10

Explain FDE Cycle

Fetch-The next instruction is retrieved by CPU from main memory

Decode-The instruction is broken down and decided so computer can understand

Execute-The CPU performs what the instructions told

New cards
11

What is an embedded system?

A computer system built within a large device e.g. Camera, washer, car

New cards
12

Define volatile

Memory loses its data when power off

New cards
13

Define non-volatile

Memory retains its data when power is lost

New cards
14

What are buses?

Collection of wires that carry signals between various components of the computer system

New cards
15

What is the CPU?

Processes all of the data and instructions that make the system work - can be effected by clock speed, number of cores, cache size

New cards
16

Define virtual memory

A memory management procedure needed when the RAM is full so a temporary section is made which acts like a part of RAM

New cards
17

Define Flash memory

Solid state storage, non-volatile, more reliable/durable but can only be overwritten a limited number of times

New cards
18

Info on Optical Storage

CD, DVD, Blue-ray
+: cheap, easy to transport
-: slow, less storage than hard drives, stored data degrades over time, cannot be written over

New cards
19

Info on magnetic storage

Hard drives
+: fast access, stores large amounts of data, low cost
-: not very portable, easily be broken

New cards
20

Info on SSD:

USB, flash memory, SD
+: fast, small, light, easily potable, quiet
-: more expensive, storage capacity less, limited number erase/write cycles

New cards
21

Info on cloud storage

Data is stored on multiple servers in a remote location
+: secure, can be accessed anywhere, no need to buy
-: needs internet, download and upload can be effected by internet connection, less control if data is held

New cards
22

Define command line interface

Text commands where user has to type in command

New cards
23

What does Utility software do?

maintains a computer

New cards
24

What is defragmentation software

reorganises data on the hard drive to put fragmented files back together and moves files to collect all the free space

New cards
25

Info on backup software

Full Backup - a copy is taken from from every file on the system
Incremental Backup - only files created or edited since last backup are copied

New cards
26

Info on compression software

reduces file size so they take up less space on hard disk

New cards
27

Info on encryption software

scrambles data to stop others from accessing it

New cards
28

Info on Open Source software

source code is made freely available and users can modify it
+: free, ,made for greater good, can be adapted
-: small, buggy, security holes, no warranties, no customer support

New cards
29

Info on propriety software

only the compiled code is released and the source code is kept a secret
+: warranties, well-tested, reliable, cheaper
-: expensive, software may not fit user needs

New cards
30

What is a PAN

Personal Area Network

within the range of an individual person

New cards
31

What is a LAN

Local Area Network (LAN)

a network that connects devices close to each other e.g. school, house

  • Can be wired or wireless

  • infrastructure owned by LAN owner

  • Each device known as a node

New cards
32

What is WAN

Wide Area Network (WAN)

a network within a large geographical area e.g. internet

New cards
33

Define bandwidth

amount of data that can be transferred in a given time

New cards
34

What does a NIC do?

Network Interface Card

allow a device to connect to a network

New cards
35

Use of a switch

connect devices on a LAN

New cards
36

Use of a router

responsible for transmitting data between networks

New cards
37

Info on Ethernet

a set of standards for connecting computers

New cards
38

Info on Client-Server Network

client has connection to server, servers can backup and store centrally but can be expensive and difficult to maintain

New cards
39

Info on a peer to peer network

no central server, each computer equal in responsibility, have to work as both server and a client.

New cards
40

+ and - of a star topology

+: better performance, rest of network not affected in one fails, simple to add more devices
-: wire needed for all devices, expensive

New cards
41

+ and - of a mesh topology


+: faster
-: expensive

New cards
42

info on MAC address

assigned to all devices, unique to all devises and cannot be changed, permanent, identifies the actual device.

New cards
43

Info on IP address


assigned either manually or automatic, the location of your device on the internet

New cards
44

Info on packet switching

Split data into packets to be sent across the network, each packet given a number order of data, each router reads packet header and decides which way to send it according to IP rules, packets then arrive and reassemble them in the right order.

New cards
45

Define paradigm

A model for something explains it or shows how it can br produced

New cards
46

Why do we need different paradigms

Different programming languages follow different paradigms

Some languages are better suited to solving particular computational tasks than others (e.g. querying a database, voice recognition, bitcoin mining)

New cards
47

What is procedural programming

Instructions given in sequence

Selection used to decide next instruction

Iteration used to repeat instruction(s)

Functions and procedures

BASIC,COBOL, PASCAL,FORTRAN,C

New cards
48

What is Object Oriented Programming

  • Language model organised around objects and data (not actions and logic)

  • Java, Python, C++,VB.net ,Ruby, Objective C

  • Objects are components of an OOP programs that performs certain actions and knows

  • A program is written using an OOP paradigm and uses a class called song to organise the songs that are streamed to customers

  • The class song has these attributes:

    • title

    • number of listens

    • rating

  • The constructor method will set the name attribute to the name that is passed in as a parameter. The constructor will also initially set the number of listens to 0 and the star rating to 0

New cards
49

What is Functional Programming

Language based on and built around mathematical functions

Erlang, LISP, Haskell, Scala, ML

New cards
50

Info on Programming Languages

Lots of different languages

Constantly evolving

Set of instructions for the processor

Must be converted to binary

Machine code

New cards
51

Info on machine code

Each instruction represented in binary

Processor has an instruction set that it understands

Different sets for different processors

Operation Code (Opcode)- the instruction to be performed (e.g. Add, Store, Subtract)

Operand-data to be used or its memory location

GOLDEN HANDCUFFS-brilliant but can’t go outside of it and edit it

New cards
52

Method for remembering classes

Classes are the blueprints of an object that can be reused. If we take an example of a person, we could say that a person has a name, can do things like speaking and walking. This would be our blueprint. We can create multiple objects of this class by instantiating them, a bit like jelly coming out of a jelly mould. When an object is created, it has a method in the class called the constructor that sets up all the properties a newly created object should have.

New cards
53

What is inheritance

Inheritance uses the ideas of parent and child (super- and sub-classes) to abstract certain behaviours and attributes for similar classes.

New cards
54

What is inheritance?

Encapsulation is a way of ensuring that methods and attributes have the right permissions set for accessing and altering data. This is sometimes called information hiding. These are usually termed as public and private and are usually used to stop data from being changed accidentally.

New cards
55

What is polymorphism

Polymorphism is a property of OOP that allows the programmer to make a program accept any data that they want into a method and it will be able to cope with it.

New cards
56

What is logic programming

Problem expressed as set of facts and rules

New cards
57

Define lossy and lossless compression

Lossy compression- An algorithm that makes a file storage space smaller but the accuracy with which it represents data is reduced

Lossless compression-An algorithm that makes a file storage space smaller but accuracy with which it represents data is not reduced

Advantages to the user of a file being compressed

Downloads quicker. Saves user money by using less bandwidth

New cards
58

Why is lossy compression ok for photos?

Some loss of detail is acceptable

Unlikely to be noticeable

Will make the file size smaller than lossless

New cards
59

Waterfall Method of Software development

knowt flashcard image
New cards
60

Spiral Method of Software Development

A:

Reduced risk

Suitable for large projects

Good documentation control

Additional functionality can be added later

Software produced early in lifestyle

DA:

Can be very costly

Risk analysis requires high level of expertise

Success dependant on risk analysis

Not suitable for smaller projects

<p>A:</p><p>Reduced risk</p><p>Suitable for large projects</p><p>Good documentation control</p><p>Additional functionality can be added later</p><p>Software produced early in lifestyle</p><p>DA:</p><p>Can be very costly</p><p>Risk analysis requires high level of expertise</p><p>Success dependant on risk analysis</p><p>Not suitable for smaller projects</p>
New cards
61

RAD software development

A:
End user involvement increases flexibility

Prototype provides tangible product early on

Shortened dev cycle

DA:
Inefficient for large scale projects

Results focused-solution may be inefficient

Changing user requirements

<p>A:<br>End user involvement increases flexibility</p><p>Prototype provides tangible product early on</p><p>Shortened dev cycle</p><p>DA:<br>Inefficient for large scale projects</p><p>Results focused-solution may be inefficient</p><p>Changing user requirements</p>
New cards
62

Extreme programming software development

Type of agile software development

Focus on programming

Short iterations

User requirements drip-fed

Flexible process

A:

cost effective

robust solutions

meet user requirements

DA:
Needs constant end-user involvement

No quality assurance of coding

Often poorly documented

New cards
63

Info on redundancy

  • Multiple identical systems in different geographical locations

  • Transactions written to each systems

  • Provides immediate backup in case of system failure in 1 location

New cards
64

Info on Commitment Ordering

  • Serialisation technique

  • Priority awarded to transactions based on dependencies and timestamps

  • Prevents deadlock by blocking request until previous transaction is complete

New cards
65

Info on Serialisation

  • Only 1 transaction happens at a time

  • Overlapping transactions may result in loss of data

  • Implemented using timestamp ordering

New cards
66

Info on Timestamp Ordering

  • Timestamp issued at start of transaction

  • Earlier timestamp given priority

  • DB objects have ‘read’ timestamp AND ‘write’ timestamp

  • Timestamps updated whenever object is read or written

New cards
67

Info on Record Looking

  • Only 1 user can access a record at a time

  • Prevents data inconsistencies

  • Can result in Deadlock

Deadlock Resolution

  • DBMS is responsible for identifying and resolving deadlock (Timestamp ordering, serialisation, commitment ordering, redundancy)

New cards
68

Info on ACID

  • Set of rules that DBs use

  • Ensure no inconsistent changes made

  • Refer to transactions (actions that bring about a change to the data)

A- Atomic- A change is either completely performed or not at all

C-Consistent-A transaction must take a database from 1 consistent state to another

I-isolated- A transaction should not be visible to any other transaction or user until it is irrevocably committed

D-Durable- Once a change has been made, it must not be lost due to any subsequent failure

New cards
69

info on referential integrity

Every value of 1 attribute of a table must exist as a value of another attribute in another table

Changes to a DB might not make sense. E.g. Delete songs from your music library, playlist still refers to songs, playlist cannot locate the songs to play them

DBMS allows enforcement of referential integrity to prevent inconsistent changes

New cards
70

info on domain integrity

Data must be of a predefined type (e.g. string)

New cards
71

info on Entity Integrity

Each row in a table must have a unique identifier

New cards
72

Info on DB integrity

  • Ensures data is entered into DB is:

    • accurate

    • valid

    • consistent

  • Validation rules to enforce

  • May be compromised by malicious individuals, poor design, accident, etc

New cards
73

Info on Transaction Processing

A Transaction refers to a change of state in a DB resulting from a single logical operation on data

Any relation DB requires basic functionality to be useful

All (except READ) result in transactions

Transactions must maintain DB integrity

New cards
74

Info on Selecting Data

  • Only relevant/ valid data will be entered into DB

  • Selection can occur during data capture (e.g. through form design)

  • or during data entry (e.g. Boolean)

  • Data retrieved from a DB using SQL statements

New cards
75

Info on Optical Mark Recognition (OMR)

  • Capture human-marked data from document forms such as surveys and tests

  • e.g. read questionnaires

New cards
76

Info on Optical Character Recognition (OCR)

  • Scans images of text

  • Converts into editable and searchable data

  • Used to digitise printed texts

New cards
77

info on automated devices

  • Scanners

    • Collect data by scanning barcodes with laser or LED lights

    • e.g supermarket checkouts

  • Smart Card Readers

    • Collect data electronically from card with embedded microchip

    • ATMs

New cards
78

Info on Paper-Based Forms

  • Paper forms designed to elicit valid data from users

  • Data must be manually entered

  • Prone to errors in data entry

  • e.g. passport applications

New cards
79

info on Web-Based Forms

  • Input boxes, radio buttons, check-buttons, select menus, text areas

  • Data validated client-side (JavaScript)

  • Validated data sent to server for further processing/ validation (PHP, ASP, Perl)

  • Data can be automatically sent into DB user server-side scripting

New cards
80

What is a network

  • linked set of resources

  • capable of sharing power and resources

    • printers

    • CD-ROM

    • DVD-Drives

    • databases

  • Connected devices

  • Communicate

New cards
81

Info on network topology

  • Theoretical arrangement of the components of a network

  • Actual arrangement determined by physical factors

  • Effects:

    • cost

    • performance

    • ease of installation

New cards
82

Why do we use twisted pair cabling

Both sides need an input and an output so it has to be a pair.

We use multiple twisted pairs to increase speed (more bandwidth)

New cards
83

Difference between hub and switch

Hub is sending packets to all devices

Switch takes packets of data to specific MAC addresses (has software to do this) (only sends to the 1 needed device). Useful for large networks as it reduces traffic, increasing the speed.

New cards
84

Info on bus topology

  • 1 common linking communications cable (bus)

  • Nodes connecting off the table

  • Cheap

  • Slows down when heavy traffic

  • Lots of data collisions

  • Breakage to bus will affect the whole network

  • Limited distance coverage

New cards
85

Info on star topology

  • Shared link to server(s)

  • Central node is the Hub

  • Few data collisions

  • Fast, robust and cost-effective

  • Can set up independent segments

  • Hub can be another node, or switch etc.

  • Hub has seperate connections to each node

New cards
86

Info on ring topology

  • 1 direction traffic

  • fast performance

  • 1 common linking table

  • passes through NIC of each node

  • Network must be able to cope if 1 node fails

  • Good for high volumes of traffic

  • SPF

New cards
87

Info on mesh topology

  • Decentralised design

  • Wired or wireless

  • No single point of failure (SPF)

  • Each nodes connect to 2+ other nodes

  • Nodes communicate directly with each other without need for internet connection

New cards
88

Why use a LAN

  • Communications between workers

  • Share data/files/ info

  • Share peripherals, e.g. printers

  • Easy to upgrade machines

  • Logon from any connected machine

  • Distributed processing

New cards
89

What is a NIC?

  • Network Interface Card

  • Used on a LAN

  • Each node on the network needs a NIC in order to connect to the LAN

  • Allows computers to communicate over a computer network by providing physical access to the network and a unique address for each individual node (MAC address)

New cards
90

What is a MAC?

  • MAC- Media Access Control

  • Unique number to identify individual network interfaces

  • Used to communicate with physical layer of network

  • Can be used to restrict network access

  • Used on a LAN

New cards
91

What is a switch?

  • Used on a LAN

  • Connects network segments

  • No data collisions

New cards
92

What is a router?

  • Forwards data packets between networks

    • Receive packet

    • Reads address info

    • Use routing table/ routing policy

    • Forward packet to next network

    • Repeat until packet reaches destination

New cards
93

What is a WAP?

  • Wireless device that can be connected to a wired network

  • Uses Wi-fi/ Bluetooth/ related standards

  • Usually connects to router via wired network

  • Relays data between wireless and wired devices

New cards
94

A and DA of a wireless network

A:

  • No building work needed

  • Quick to add new workstations

  • Flexible deployment of nodes

  • Visitors can access network/ internet

DA:

  • Slower performance

  • Security issues

New cards
95

Info on WAN

  • Computers located in seperate locations

  • 2 or more seperate LANs joined together

  • Satellite/ fibre-optic/ telephone lines

  • Infrastructure may be provided by others

  • The Internet

New cards
96

Info on SAN

  • Storage Area Network

  • Dedicated network used for large scale storage of data in data centres

  • Common uses of a SAN includes email servers, databases, and high usage file servers

New cards
97

Info on PAN

  • Personal Area Network

  • Used for data transmissions among devices (e.g. phones, tablets)

  • Can be used for communication between personal devices or to connect to a higher level network and/or Internet

New cards
98

Info on the Cloud

  • It is not a place

  • Data storage and servers moved off site

  • 3rd party management maintenance, security, backups etc

A:

  • Cheaper

  • No in-house maintenance

  • DA:
    Loss of control/ security

New cards
99

Info on peer to peer network

  • All nodes have equal status

  • Can share files and peripherals

  • Prone to data collisions

  • Overall speed of the network is reduced

  • Each peer can be accessed by any other

  • Can be implemented over the Internet… used to facilitate file sharing

New cards
100

Info on client-server network

  • Most common network architecture

  • Dedicated, high-spec machine

  • Handles data storage and processing of shared files

  • Handles services e.g. printing and internet access

  • Clients request services from the Servers

  • Data centres= multiple servers stacked together

  • Virtualised servers= more efficient and less energy consumption

New cards

Explore top notes

note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 16 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 188 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard475 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard48 terms
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard93 terms
studied byStudied by 38 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard89 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard47 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard150 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)