Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
A-Level Computer Science
> 1.3.3.5 Network Hardware > Flashcards
1.3.3.5 Network Hardware Flashcards
Study These Flashcards
You may prefer our related Brainscape-certified flashcards:
Biology 101
flashcards
A-Level Computer Science
(73 decks)
1.1.1.1 Components of a Processor
1.1.1.2 Fetch-Decode-Execute Cycle and Registers
1.1.1.3 Factors affecting CPU Performance
1.1.1.4 Pipelining
1.1.1.5 Computer Architecture
1.1.2.1 RISC and CISC processors
1.1.2.2 Graphics Processing Unit (GPU)
1.1.2.3 Multi-core and Parallel Systems
1.1.3.1 Input, Output and Storage Devices
1.1.3.2 The Use of Storage
1.1.3.3 RAM and ROM
1.1.3.4 Virtual Storage
1.2.1.1 Operating Systems
1.2.1.2 Memory Management
1.2.1.3 Interrupts
1.2.1.4 Scheduling
1.2.1.5 Types of Operating System
1.2.1.6 BIOS
1.2.1.7 Device Drivers
1.2.1.8 Virtual Machines
1.2.2.1 Nature of applications
1.2.2.2 Utilities
1.2.2.3 Open Source vs Closed Source
1.2.2.4 Translators
1.2.2.5 Stages of Compilation
1.2.2.6 Linkers, Loaders and use of Libraries
1.2.3.1 Programming Methodologies
1.2.3.2 Merits, Drawbacks and uses of Programming Methodologies
1.2.3.3 Writing and Following Algorithms
1.2.4.1 Programming Paradigms
1.2.4.2 Procedural languages
1.2.4.3 Assembly Language
1.2.4.4 Modes of Addressing Memory
1.2.4.5 Object-Oriented Languages
1.3.1.1 Lossy vs Lossless compression
1.3.1.2 Run length Encoding and Dictionary Coding for Lossless Compression
1.3.1.3 Symmetric and Asymmetric Encryption
1.3.1.4 Different Uses of Hashing
1.3.2.1 Relational Database
1.3.2.2 Handling Data
1.3.2.3 SQL
1.3.2.4 Referential Integrity
1.3.3.1 Networks and Protocols
1.3.3.2 The Internet Structure
1.3.3.3 Network Communication
1.3.3.4 Network Security and Threats
1.3.3.5 Network Hardware
1.3.3.6 Client-Server and Peer-to-Peer
1.3.4.1 Web Development
1.3.4.2 Search Engine Indexing
1.3.4.3 Server and Client Side Processing
1.4.1.1 Data Types
1.4.1.2 Representing Positive Integers in Binary
1.4.1.3 Negative Numbers in Binary
1.4.1.4 Subtracting in Binary using Two’s Complement
1.4.1.5 Hexadecimal
1.4.1.6 Floating Point Numbers in Binary
1.4.1.7 Normalization
1.4.1.8 Addition and Subtraction of Floating Point Numbers
1.4.1.9 Bitwise Manipulation and Masks
1.4.1.10 Character Sets for Representing Text
1.4.2.1 Arrays, Records, Lists, and Tuples
1.4.2.2 Linked Lists, Graphs, Stacks, Queues, and Trees
1.4.3.1 Logic Gate Diagrams and Truth Tables
1.4.3.2 Combining Boolean Operations
1.4.3.3 Manipulating Boolean Expressions
1.4.3.4 Simplifying Boolean Algebra
1.4.3.5 Logic Circuits
1.5.1.1 The Data Protection Act 1998
1.5.1.2 The Computer Misuse Act 1990
1.5.1.3 The Copyright, Design and Patents Act 1988
1.5.1.4 The Regulation of Investigatory Powers Act 2000
1.5.2.1 Moral, social, ethical and cultural opportunities and risks of digital technology: