1.4 + 1.5 data types + ethical Flashcards
What is a primitive data type
One that is provided by a programming language
Why is hexadecimal used
Simple to represent a byte in just two digits, therefore fewer mistakes likely to be made writing hex
Easier to write and remember
What is ASCII
Standard code for representing the characters on the keyboard
What is an array
Finite, ordered set of elements of the dame type
What is an nd array
Arrays may have more than one dimension. An nd array is a set of elements of the same type, indexed by n integers
What is a tuple
Ordered set of values that could be elements of any type
Immutable (elements cannot be changed and you cannot dynamically add or delete elements)
What is a record
Contains a number of fields each holding one item of data
What is an abstracts data type
One that is created by the programmer rather than defined within the programming language
These include queues, stacks, trees and graphs, which can be shown in graphical form at it is not hard to understand how to perform operations.
Logical description of how data us viewed and the operations that can be performed on it
What is a queue
First in first out data structure, new elements may only be added to the end of a queue and elements may only be retrieved from the front of the queue
What are the 4 operations that can be done on a queue
enQueue(item) add new item to rear
deQueue(item) Remove the front item from the queue and return it
IsEmpty()Test if queue is empty
IsFull()Test if queue is full
What is a dynamic data structure
Collection of data in memory that can grow or shrink in size with the aid of a heap
Can cause overflow
Helps implement queues when size is unknown
What is a heap
Portion of memory from which space is automatically allocated or de allocated as required
What is a static data structure
Fixed in size and cannot increase in size or free up memory while the program is running
What is a list
Abstract data type consisting of a number of items in which the same item may occur more than once
Many operations can be carried out
What is a stack
Last in first out data structure
What operations can be carried out on a stack
push(item) adds item to the top
pop() removes and returns top item
peek()returns top item
isEmpty()
isFull()
What does the XOR gate do
Output is only true if one or other input is true
What is a karnaugh map
Provides an alternative way of simplifying boolean expressions and allows us to easily detect groupings of expressions with common factors
What is the data protection act
Says that anyone who stores personal details must keep them secure
What are the principle of the data protection act 1998
Data must be processed fairly and lawfully
Data must be adequate and relevant
Data must be accurate and up to date
Data must not be retained longer than necessary
Data can only be used for the purpose for which it was collected
Data must be kept secure
Data must be handled in accordance with peoples rights
Data must be transferred outside the EU with adequate protection
What is the computer issues act 1990
Designed to prevent unauthorised access or hacking or programs or data
Includes:
Unauthorised access to computer material
Unauthorised access with intent to commit or facilitate a crime
Unauthorised modification of computer material
Making, supplying or obtaining anything which can be used in computer misuse offences
What is the copyright designs and patents act 1988
Act designed to protect the creators of books, music, video and software from having their work illegally copied.
What is the regulation of investigatory powers act 2000
Regulates the powers of public bodies to carry out surveillance and investigation and covers the interception of communications
Enables certain public bodies to demand that an ISP provide access to a customers communications in secret
Enables mass surveillance of communications in transit
Enables certain public bodies to demand an ISPs fit equipment to facilitate surveillance
Enables certain public bodies to demand that someone hand over keys to protected information
Allows certain public bodies to mount peoples internet activities
Prevents the existence of interception warrants and any data collected with them from being revealed in court