⌨️Computer Science 1.1-1.6 (Paper 1) Flashcards

You can edit cards if I forgot something, flashcards based on the OCR J277 spec document

1
Q

1.1.1 - What happens in the Fetch stage of the FDE cycle?

A

Address of next instruction is loaded into MAR and PC is incremented by 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1.1 - What is the ALU and what does it do?

A

Arithmetic Logic Unit - performs arithmetic and logical calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1.1 - What is the CU and what does it do?

A

Control Unit - Decodes instructions and organises the other registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.1.1 - What is the cache and what does it do?

A

Smaller, volatile primary storage which is faster to access than the RAM and stores frequently used instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.1.1 - What are registers?

A

Specialised units in the CPU which store one piece of information each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.1.1 - What is the MAR and what does it do?

A

Memory Address Register - stores the current memory address where data is to be retrieved from or stored to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.1.1 - What is the MDR and what does it do?

A

Memory Data Register - stores the data that’s been retrieved from or will be stored to memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.1.1 - What is the PC and what does it do?

A

Program Counter - keeps track of the current instruction and increments which each clock cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.1.1 - What does the accumulator do?

A

Stores the results of calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.1.1 - What is the difference between data and an address?

A

Data is a value used in calculations, whereas an address describes where in memory the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.1.2 - What are the 3 factors affecting CPU speed?

A

Clock speed, cache size, number of cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.1.2 - How does clock speed affect CPU performance?

A

A higher clock speed means more FDE cycles can be performed every second, so the CPU performs better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.1.2 - How does cache size affect CPU performance?

A

A larger cache means more instructions can be stored with a faster access time, so it takes less time to retrieve instructions on average, leading to each instruction taking less time to execute on average ==> higher CPU performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.1.2 - How does number of cores affect CPU performance?

A

More cores allow the CPU to run more FDE cycles in parallel, increasing the CPU performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.1.3 - What is an embedded system?

A

A computer system which is designed for a specific purpose, e.g. automatic thermostat in a fridge, traffic lights. It is also part of another machine or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.1.3 - What are the typical characteristics of embedded systems?

A

Fast and efficient, streamlined for one task, low memory capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1.2.1 - Why do computers have primary storage?

A

It is faster to access than secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

1.2.1 - What is RAM and what are its characteristics?

A

Random Access Memory - volatile, fast access time, random access (any part of it can be accessed at any time), low storage (usually around 4-16GB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

1.2.1 - What is ROM and what are its characteristics?

A

Read Only Memory - non-volatile, very small (a few MB), contains the boot loader which loads the OS from secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

1.2.1 - Why might virtual memory be needed in a system?

A

So the system doesn’t crash if it runs out of space in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

1.2.1 - What is virtual memory?

A

When the RAM is full, part of the secondary storage is used as temporary RAM - processes currently in use have priority to be in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

1.2.2 - Why do computers have secondary storage?

A

To be able to store information in a non-volatile way, i.e. it won’t get wiped when the computer switches off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

1.2.2 - Name 3 types of secondary storage

A

Optical, Magnetic, Solid-state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1.2.2 - What are the advantages of optical storage?

A

Shock resistant, lightweight, portable, low cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
1.2.2 - What are the disadvantages of optical storage?
Low capacity, vulnerable to scratches, requires an external device to read/write
26
1.2.2 - What are the advantages of magnetic storage?
Durable, high capacity, medium cost
27
1.2.2 - What are the disadvantages of magnetic storage?
Moving parts so vulnerable to shocks, not very portable
28
1.2.2 - What are the advantages of solid state storage?
Portable (USB flash memory), high capacity, shock resistant since no moving parts
29
1.2.2 - What are the disadvantages of solid state storage?
High cost, limited number of read/write cycles
30
1.2.3 - Why is data stored in binary?
Binary can be represented by on/off switches, making calculations and storage easier and more efficient
31
1.2.3 - How many bits are in a nibble?
4
32
1.2.3 - How many nibbles are in a byte?
2 (8 bits)
33
1.2.3 - How many bytes are in a kilobyte?
1024
34
1.2.3 - How many kilobytes are in a megabyte?
1024
35
1.2.3 - How many megabytes are in a gigabyte?
1024
36
1.2.3 - How many gigabytes are in a terabyte?
1024
37
1.2.3 - How many terabytes are in a petabyte?
1024
38
1.2.3 - Order the data units from bit to petabyte
bit, nibble, B, KB, MB, GB, TB, PB
39
1.2.3 - How do you calculate required storage capacity given a number of files and their size?
file size x number of files
40
1.2.3 - How do you calculate the size of a sound file?
Duration (s) x Sample rate x bit depth (+ metadata)
41
1.2.3 - How do you calculate the size of an image file?
Colour Depth x Width x Height (+ metadata)
42
1.2.3 - How do you calculate the size of a text file?
Bits per character x Number of characters (+ metadata)
43
1.2.4 - What is the range of one byte of data in denary, binary and hexadecimal?
255, 11111111, FF
44
1.2.4 - What is the most significant bit and why?
The leftmost bit because it has the highest value
45
1.2.4 - What is the least significant bit and why?
The rightmost bit because it has the lowest value
46
1.2.4 - How do you peform a binary left shift?
Move each bit to the left, ‘chop off’ the remainder
47
1.2.4 - What is the effect of a binary left shift?
Multiplies the number by 2
48
1.2.4 - How do you perform a binary right shift?
Move each bit one place to the right, ‘chop off’ the remainder
49
1.2.4 - What is the effect of a binary right shift?
Divides the number by 2
50
1.2.4 - How are characters represented in binary?
A character set is used, so that each character corresponds to one binary value taking up a certain amount of space
51
1.2.4 - How is the number of different characters stored in a character set limited by the bits available?
One byte for each character only allows for 256 different values, or 256 characters, etc.
52
1.2.4 - Describe ASCII
ASCII uses 1B per character, allowing for 256 different characters, however only using 128, which doesn’t allow for international languages or all punctuation signs, but is more memory efficient
53
1.2.4 - Describe Unicode
Unicode uses 2B per character, allowing for 65,536 possible characters, allowing for all international characters and emojis, but is less memory efficient than ASCII
54
1.2.4 - How are character sets logically ordered?
The value of B is one more than A, the value of 7 is one more than 6, etc.
55
1.2.4 - How are pixels stored in binary?
Each pixel has a specific colour, represented by a specific binary code (hex codes)
56
1.2.4 - What is the effect of changing the colour depth of an image?
Increasing the colour depth increases the quality and increases the image size
57
1.2.4 - What is the effect of changing the resolution of an image?
Increasing the resolution increases the quality and increases the image size
58
1.2.4 - What does metadata do?
It stores additional information about the file, such as file type, image width, bit depth, etc.
59
1.2.4 - How is analogue sound stored in binary?
The amplitude of the sound wave is taken at specific intervals and stored as a binary value, the size of which depends on bit depth
60
1.2.4 - What is sample rate measured in?
Hertz (Hz)
61
1.2.4 - What is bit depth?
The number of bits available to store each sample in an audio file
62
1.2.5 - Where may compression be needed?
Transportation of files, uploading and downloading files from the internet, archiving files
63
1.2.5 - What are the advantages of lossy compression?
Makes the file smaller than lossless compression
64
1.2.5 - What are the disadvantages of lossy compression?
Some information is permanently lost; file quality decreases
65
1.2.5 - What are the advantages of lossless compression?
The same quality is retained
66
1.2.5 - What are the disadvantages of lossless compression?
File is made less small than lossy compression
67
1.3.1 - What is a LAN and what are its characteristics?
Local Area Network - a network of devices in a single building, or a group of buildings
68
1.3.1 - What is a WAN and what are its characteristics?
Wide Area Network - a network of LANs and decides across a larger area such as a region or country
69
1.3.1 - How does the number of connected devices affect the performance of a network?
More connected devices mean more requests sent, leading to an overall decrease in performance
70
1.3.1 - How does bandwidth affect the performance of a network?
Higher bandwidth means more requests and responses can be sent at once, increasing the performance
71
1.3.1 - How does a client-server network work?
Clients send requests to a central server, which replies with responses
72
1.3.1 - How does a peer-to-peer network work?
Any device can send requests or responses to any other device
73
1.3.1 - What hardware is needed to connect stand-alone computers in a LAN?
Wireless Access Point (WAP), Router, Switch, Network Interface Controller/Card, Transmission Media
74
1.3.1 - What is a WAP and what does it do?
Wireless Access Point - provides a link between wireless and wired networks
75
1.3.1 - What does a router do?
Transfers data packets between networks using IP addresses
76
1.3.1 - What does a switch do?
Connects devices together on a LAN using MAC addresses to send data packets to their destination device
77
1.3.1 - What is an NIC and what does it do?
Network Interface Controller/Card - hardware required for a device to join a network, has a MAC address
78
1.3.1 - What is transmission media?
The communication channel on a network, wired or wireless
79
1.3.1 - What is the Internet?
A network of computer networks spanning the entire world
80
1.3.1 - What is a DNS?
Domain Name Service - made up of multiple Domain Name Servers
81
1.3.1 - How does a DNS convert a URL to an IP address?
The domain extension is used to locate the correct domain name server, where the domain name is mapped to the URL and returned back to the client
82
1.3.1 - What does a web server provide?
Web pages
83
1.3.1 - What server provides web pages?
Web server
84
1.3.1 - What does a file server provide?
File storage/retrieval
85
1.3.1 - What server provides file storage and retrieval?
File server
86
1.3.1 - How do servers provide services?
The client makes a request, and they carry out their function and provide a useful response, e.g. DNS returning an IP address
87
1.3.1 - What is the Cloud?
When data and software is stored and run in a remote cloud server, which can be accessed at any time
88
1.3.1 - What are the advantages of the Cloud?
Data can be accessed from any device, less money needs to be spent on secondary storage
88
1.3.1 - What are the disadvantages of the Cloud?
You don't have full control over who can access your data, can cost money, large servers are bad for the environment, data could be lost
89
1.3.1 - What is a star topology?
A network where each device is connected to the central server, but not to each other
90
1.3.1 - What is a mesh topology?
A network where each device is connected to every other device
91
1.3.1 - What is a partial mesh topology?
A network where each device is connected to a few other devices, i.e. multiple different pathways, but not as many as a mesh topology
92
1.3.1 - What are the advantages of a star topology?
Less wiring needed for wired networks, the server can filter packets and provide better security
93
1.3.1 - What are the disadvantages of a star topology?
If the server fails, all devices are disconnected from the network, and if one connection breaks, that device is completely disconnected from the network
94
1.3.1 - What are the advantages of a mesh topology?
If one connection breaks, devices can still communicate, and alternative pathways can be used if there are a lot of requests/responses
95
1.3.1 - What are the disadvantages of a mesh topology?
Expensive for a wired network, worse security due to multiple transmission pathways which need to be monitored
96
1.3.2 - Name the wired mode of connection
Ethernet -- twisted pair cables
97
1.3.2 - Name the wireless modes of connection
Wi-Fi and Bluetooth
98
1.3.2 - What is the range of Wi-Fi?
100m
99
1.3.2 - What is the range of Bluetooth?
10m
100
1.3.2 - What are the advantages of wired networks?
Better security, faster, higher bandwidth
101
1.3.2 - What are the disadvantages of wired networks?
Lots of cables can be expensive, harder to rewire the network or add/remove devices
102
1.3.2 - What are the advantages of wireless networks?
Easy to add/remove devices, no cables required
103
1.3.2 - What are the disadvantages of wireless networks?
Poorer security, multiple WAPs may be needed due to limited range, slower, lower bandwidth
104
1.3.2 - What is encryption?
Scrambling of data using a key to prevent interception across network connections
105
1.3.2 - What is an IP address?
The address of a LAN used by routers to communicate across the Internet
106
1.3.2 - Name the two IP standards
IPv4 and IPv6
107
1.3.2 - How are IP addresses formatted?
IPv4 is 32 bits; IPv6 is 8 groups of 4 hexadecimal digits
108
1.3.2 - What is a MAC address?
The local address of a device in a LAN -- used by the switch
109
1.3.2 - How is a MAC address formatted?
48 bits, usually represented as a string of 12 hexadecimal digits (6 pairs separated by colons)
110
1.3.2 - What is a standard?
A way to format addresses, etc. to provide global rules for areas of computing
111
1.3.2 - What does a standard allow?
For different hardware/software made by different manufacturers/producers to be able to communicate
112
1.3.2 - Name the 7 common protocols
TCP/IP, HTTP, HTTPS, FTP, POP, IMAP, SMTP
113
1.3.2 - What is TCP/IP and what is it used for?
Transmission Control Protocol/Internet Protocol - Communication across the Internet
114
1.3.2 - What is HTTP and what is it used for?
Hyper Text Transfer Protocol - transferring files over the Internet
115
1.3.2 - What is HTTPS and what is it used for?
Hyper Text Transfer Protocol Secure - transferring secure files over the Internet and uses encryption
116
1.3.2 - What is FTP and what is it used for?
File Transfer Protocol - transfer of files in a client-server network
117
1.3.2 - What is POP and what is it used for?
Post Office Protocol - accessing messages from the Internet - messages are deleted from the mail server after a copy is sent to the requesting client
118
1.3.2 - What is IMAP and what is it used for?
Internet Message Access Protocol - accessing messages from the Internet - messages are not deleted from the mail server after a copy is sent to the requesting client, allowing for access from multiple devices
119
1.3.2 - What is SMTP and what is it used for?
Simple Mail Transfer Protocol - sending messages across the Internet
120
1.3.2 - What is layering?
Different levels of a network only have to access or change certain information, without needing access to other information, e.g. the 4 layer TCP/IP model
121
1.3.2 - Why is layering useful?
It allows software developers to specialise and work on their own areas without having to worry about other parts, like decomposition
122
1.4.1 - What is malware?
Software used to compromise or break into a system
123
1.4.1 - What is social engineering?
Using people as the weak point in a network, manipulating them into giving away important information
124
1.4.1 - What is a brute-force attack?
Trying every possible password to try and hack into a system
125
1.4.1 - What is a dictionary attack?
Trying every potential password in a set list, e.g. words in a dictionary, to try and hack into a system
126
1.4.1 - What is a DoS attack?
Denial of Service - flooding a network with useless requests to shut it down
127
1.4.1 - What is a DDoS attack?
Distributed Denial of Service - flooding a network with useless requests from multiple sources to shut it down
128
1.4.1 - What is data interception/theft?
Intercepting data as it is transmitted, usually through packet sniffing, to gain unauthorised access to important company files
129
1.4.1 - What is SQL injection?
Pasting code into an input box to get the system to do something else, e.g. return a list of all usernames and passwords in a company
130
1.4.1 - Name the different forms of attack
Malware, Brute force, Dictionary, DoS, DDoS, Data interception (packet sniffing), SQL injection
131
1.4.2 - Name the ways to prevent attacks
Penetration testing, Anti-malware software, Firewalls, User access levels, Passwords, Encryption, Physical Security
132
1.4.2 - How does penetration testing prevent attacks?
It allows companies to identify and fix security weaknesses before they are found by hackers
133
1.4.2 - How does anti-malware software prevent attacks?
It stops malware from harming the network
134
1.4.2 - How do firewalls prevent attacks?
They stop malware entering the network and doing damage
135
1.4.2 - How do user access levels prevent attacks?
They make sure as few people have access to important files as necessary, reducing the chance of them escaping
136
1.4.2 - How do passwords prevent attacks?
They reduce the likelihood of unauthorised access to important files
137
1.4.2 - How does encryption prevent attacks?
It stops intercepters from being able to read important files when they’re being transmitted
138
1.4.2 - How does physical security prevent attacks?
It prevents attackers from being able to access important information physically, e.g. walking into the data centre with a USB stick
139
1.5.1 - Name the parts of an operating system
User interface, Memory management & multitasking, Peripheral management & drivers, User management, File management
140
1.5.1 - What does a user interface do?
It provides an interface through which the user can control the computer and navigate its systems
141
1.5.1 - What are the features of a user interface?
WIMP model - Window, Icon, Menu, Pointer
142
1.5.1 - What does memory management do?
It manages the transfer of data between memory, the allocation of memory to applications, and multitasking
143
1.5.1 - What is multitasking?
Quickly switching between processes to give the illusion of them happening simultaneously
144
1.5.1 - What does peripheral management do?
It manages the transmission of data between the computer and its peripherals, e.g. printers, keyboard
145
1.5.1 - What do device drivers do?
They allow peripherals made by different manufacturers to still be able to communicate with the computer in a language both the computer and peripheral can understand
146
1.5.1 - What does user management control?
The allocation of an account, Access rights and Security
147
1.5.1 - What does file management control?
Naming files, Allocating files to folders, Moving files, Saving files, etc.
148
1.5.2 - Name the types of utility software
Encryption, Defragmentation, Data compression
149
1.5.2 - Why is encryption software needed?
To allow secure transmission and prevent sensitive information being intercepted
150
1.5.2 - What is defragmentation software?
Rearranging secondary storage so it is in order and all the empty space is at one end
151
1.5.2 - Why is defragmentation software needed?
To reduce read/write time - only for hard disk drives with moving parts, provides no benefit for solid state drives
152
1.5.2 - Why is compression software needed?
To allow for more efficient storage and faster uploading of files to the Internet
153
1.5.2 - Why is utility software needed?
To perform tasks which may not be carried out by the operating system
154
1.6.1 - Name the different issues with digital technology
Ethical, Legal, Cultural, Environmental, Privacy
155
1.6.1 - When was the Data Protection Act?
2018
156
1.6.1 - What did the Data Protection Act do?
Protects personal data - it must be fairly & lawfully processed, obtained for specific purposes, adequate & relevant, accurate & up to date, kept for no longer than necessary, processes in line with your rights, and held securely
157
1.6.1 - When was the Computer Misuse Act?
1990
158
1.6.1 - What did the Computer Misuse Act do?
It makes it illegal to seek or gain unauthorised access to computer material, steal data or destroy information unauthorised, modify data unauthorised, and make or supply anything to allow the above
159
1.6.1 - When was the Copyright Designs and Patents Act?
1988
160
1.6.1 - What did the Copyright Designs and Patents Act do?
It gives creators of digital media the rights to control how their work is used and distributed
161
1.6.1 - What is software licensing?
Proprietary software can only be used or distributed with a license
162
1.6.1 - What are the advantages of open source software?
Free, source code can be accessed and modified, support provided by the community
163
1.6.1 - What are the disadvantages of open source software?
May not be fully tested, may not have extensive support
164
1.6.1 - What are the advantages of proprietary software?
Will be extensively tested and supported, will be regularly patched
165
1.6.1 - What are the disadvantages of proprietary software?
Need to pay for a license, can’t access the source code