Computer Science: Key Knowledge Flashcards
What is volatile memory?
Memory which will lose all the data when the power is turned off
Is RAM volatile or non-volatile?
Volatile
What is fast access storage?
Storage which is quicker to access by the CPU
What does RAM hold?
Parts of the operating system currently in use when the PC is in use
What are the 5 data types?
Integer, real/float, char, string, Boolean
How large is RAM?
A few GB in size
Are CPU registers and CPU cache volatile or non-volatile?
Volatile
What is an integer?
A while number such a 156, 0 or -54
How much space does an integer type take up?
2 bytes
What is a float or real number?
Number with a fractional part such as 1.5276, -68.4 or 20.0
How much space does a float or real number take up?
4 bytes
What is a char date type?
A single ASCII character such as A, b, 3, ! or space
How much space does a char data type take up?
1 byte
What is a string?
Data containing zero or more characters
How much space does a string take up?
1 byte per checker in the string
What is a Boolean?
Can only take the values true/false
How much space does a Boolean take up?
Theoretically just 1 bit, but in high level languages, more like a byte
What is virtual memory?
Volatile memory created temporarily on the storage drive
When is virtual memory required?
When the computer is running too many processes/RAM is being slow
How does virtual memory affect the computers speed?
It slows the computer down - copying to hard disk takes much longer than reading/writing RAM
What is a syntax error?
The rules for writing python have been broken
What is a logic error?
The code runs but gives an incorrect answer
What is concatenation?
Joining together. The ‘+’ concatenate operator is used to join together strings
Is ROM volatile or non-volatile memory?
Non-volatile
What is non-volatile memory?
When the data is stored even when the power is turned off
What is ROM used for?
Launching a PC’s operating system from the BIOS. Also used in embedded systems as a small store of software
What is the CPU?
The computer’s brain.
What is the purpose of the CPU?
Carry out the fetch-decode-execute
What is the fetch-decode-execute cycle?
CPU fetches next instruction from RAM, works out what to do and then carries out the instruction
What is the purpose of the Control Unit (CU)?
Controls the flow of data inside the CPU (to registers) and outside the CPU. to RAM and input/output devices
Is the hard disk volatile or non-volatile?
Non-volatile
How does sample rate frequency affect accuracy and sound file size?
The greater the sample frequency, the greater the accuracy and file size
What is the equation for calculating sound file size?
Sound file size = sample rate x bit depth x duration
How far do hex conversions go up to?
15
What is the largest hex number?
F
What is the largest binary number?
1111
What sound range can humans hear?
20 - 20,000 Hz
What are analogue signals?
Continuous
What are digital signals?
Discrete
How is sound digitized?
By repeatedly measuring and recording the sound wave
What does ADC stand for?
Analogue to digital conversions (inputs to digital signals)
What does DAC stand for?
Digital to audio converter (digital signals to outputs)
What is a sound sample?
A measurement of the amplitude of a sound wave at a given time
What determines how closely a wave is sampled on the y-axis?
Bit depth
What is the sample rate?
Samples per second (measured in Hz)
What is sample resolution?
The number of bits used to record each measurement
What does 1Hz mean?
1 sample per second
What is metadata?
Data about data
Give 2 examples of metadata:
Any 2 from:
file size, author, name, date last opened, etc.
What does DPI stand for?
Dots Per Inch
How does DPI affect image quality?
Higher DPI, better image quality
What are images made up of?
Pixels
What does each pixel represent?
A colour that is given a unique binary code
What is resolution?
The number of pixels in an image.
How does resolution effect image quality?
Higher resolution, better image quality
How does resolution affect file size?
Higher resolution, higher file size
What is increased colour depth?
Where more bits are stored per pixel - better quality, larger file size
Explain how to calculate the file size of a bitmap:
- Find the number of pixels. Example - 16 x 16 = 256
- Count the colours. Check powers. Example - 7 colours. 2^3 = 8 (2^2 is not enough)
- So we need 3 bits per pixel
- Size of an image = no. of pixels x bit depth -> 768 bits
- If necessary, divide by 8 to convert to bytes
What is any number to the power of 1 equal to?
0
Why do we use binary?
Because the CPU is made up of millions of transistors. These can either be on/off - 0/1.
What is MOD?
The remainder after dividing.
What is 5 MOD 2?
1
What are denary numbers?
Normal numbers - base 10
What is lossless compression?
Compression where no data is lost
What is lossless compression?
Compression where some data is lost (not really a visible difference, but decreased quality)
How does image quality affect file size?
Higher file size, better image quality. Lower file size, lower quality.
What is capacity?
How much something can store
What is portability?
How portable something is
What is durability?
How durable something is
What is speed (of data transfer)?
How fast data is transferrd
What is reliability?
How reliable something is, how long it will last
What is price?
How much something costs
Give 2 examples of input devices:
Any 2 from:
Mouse, keyboard, joystick, barcode scanner, microphone
Give 2 examples of output devices:
Any 2 from:
Headphones, speakers
What is the equation for calculating text file size?
Text file size = Bits per character x Number of characters
What are the 3 types of secondary storage?
Optical, magnetic, solid state
Name 2 examples of solid state storage:
Any 2 from:
USB flash drive, SSD hard drive, SD card
Name 2 examples of optical storage:
Any 2 from:
Blu-ray, DVD RAM, CD ROM
Name 2 examples of magnetic storage:
Any 2 from:
Hard disk drive, Floppy disk drive, Backup tape drive
What does magnetic storage consist of?
This consists of tiny magnetic particles responsible for storing your data
What does optical storage consist of?
This consists of a laser beam which burns dark pits onto the surface of a disk. The pits are read in binary - a pit represents a ‘1’, no pit represents a ‘0’
What does solid state storage consist of?
This consists of a series of electronic switches which hold data temporarily. Open switches represent a ‘1’. Closed switches represent a ‘0’. These are read in binary.
What does != mean?
Not equal to
What does > mean?
Greater than
What does < mean?
Less than
What does >= mean?
Greater than or equal to
What does <= mean?
Less than or equal to
What does == mean?
Equal to
What does the hat ‘^’ symbol mean?
To the power of
What does the ‘*’ symbol mean?
Multiply
What does the ‘/’ symbol mean?
Divide
What does ASCII use to represent characters?
Bits
How many values does ASCII represent?
128 (0-127)
What is Null in ASCII?
00000000
What is A in ASCII?
10000001
What is DEL in ASCII?
11111111
What is the equation for sound file size?
File size (bits) = sample rate x bit depth x duration
Give one advantage and one disadvantage of optical secondary storage:
Advantage: Relatively low cost
Disadvantage: Low durability - risk of scratching disk
Give one advantage and one disadvantage of solid state secondary storage:
Advantage: Very portable
Disadvantage: Expensive
Give one advantage and one disadvantage of magnetic secondary storage:
Advantage: Largest capacity
Disadvantage: Low durability - moving parts
Name the different types of sorts:
Binary search, bubble sort, merge sort, linear search, insertion sort
Give 2 examples of issues:
Any 2 from:
Ethical, cultural, environmental, technological, industrial
What is selection?
An if statement. Something which runs depending on a specific condition
What is iteration?
A loop. A piece of code that is repeated.
What are the 8 conditions laid out in the Data Protection Act? (JUST READ IF NECESSARY)
- Confidential information that is no longer required should be properly disposed of
- Data must be obtained fairly - not transferred company to company
- Data collected for one purpose (ie. CCTV) cannot be used for another purpose (ie. spying on staff)
- Do not disclose/reveal data without a person’s consent
- Data must be relevant and not excessive
- Data must be accurate and up to date
- Retain data for no longer than necessary
- Provide a copy of the data upon request
What are the 4 offences listed in the Computer Misuse Act?
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate a crime
- Unauthorised modification of software or data
- Making, supplying or obtaining anything which can be used in computer misuse offences
What are inventions covered by?
Patents
What do patents do?
Prevent anyone using an idea for 20 years
What are books, music and software covered by?
Copyright
How long does copyright last?
70 years after publication or the author’s death
What is the purpose of copyright?
To allow the author to decide how their work can be used
What is open source software?
Software where the source code is made available. Users may legally modify the source code and share it under the same licence
What is proprietary software?
Software where only the compiled code is released and usually this costs money. The licence prevents users from modifying or editing the software. Examples include word and excel.
What does APPEARS stand for?
A - Accurate
P - Purpose
P - Processing
E - Excessive
A - Accountable
R - Retention
S - Security
How many values are in Extended ASCII?
256
How many bits does Extended ASCII use?
8
How many bits does ASCII use?
7
How many values are in Unicode?
65, 536
How manty bits does Unicode use?
16
What does ASCII stand for?
American Standard Code for Information Interchange
How manty bits does Unicode use?
16
How does lossless compression work?
Algorithm finds groups of repeating data and records the data once along with the number of repetitions
Give 2 examples of network security threats:
Any 2 from:
Poor network policies, malware, phishing, SQL injection, DoS attack, data interception, brute force attacks, social engineering
What is social engineering?
A technique used by criminals to trick/manipulate people into revealing confidential information - info is gained to gain computer access
Give 2 examples of social engineering:
Any 2 from:
Fake emails which require info/downloads, USB in a public zone, phishing
What is phishing?
Sending emails from trusted organisations (ie. tax, bank) to trick someone into providing account information
What is a brute force attack?
Where software is used to try every possible combination of words, numbers and symbols to crack a password
How could you prevent a brute force attack?
Limit number of password attempts, use captchas (swirly letters computers can’t read)
What is a Denial of Service attack?
A criminal uses software to bombard a web server with fake requests from one computer/internet connection. This uses up server memory and CPU cycles in order to crash the server - more often for revenge than obtaining data
What is a Distributed Denial of Service attack?
A DoS attack which uses many computers infected with botnet malware to spam servers with simultaneous requests
What is data interception?
Where someone gets in between you and what you’re doing online - if connected to a risky network, they may spy on your screen and even edit messages sent from your device
Give 2 ways in which data interception could be prevented:
Any 2 from:
VPN, up to date anti-viral software, being alert to phishing scams, spotting the signs of a ‘man in the middle’ - long sudden page delays, HTTPS to HTTP in the URLs
What does VPN stand for?
Virtual Private Network
What are the 4 types of harmful software?
Malware, Spyware, Ransomware, Trojans (as in trojan horse)
What is SQL Injection?
When an attacker enters malicious code into a web forum. If there are any vulnerabilities, the injection can bypass the authentication process allowing access to the backend database
Give 2 ways to prevent SQL injection:
Any 2 from:
Updating and patching software regularly, using a firewall to filter data, using data validation to check input data (ie. email format ‘@’)
What are network policies?
Formal documents containing the rules that you must follow in order to use a network
What is an embedded system?
A computer system that is made up of both hardware and software - often known as firmware
Give 2 examples of embedded systems:
Any 2 from:
MRI scanner, watch, traffic lights, microwave, dishwasher
What does CPU stand for?
Central Processing Unit
Order the levels of cache by speed (1 being fastest):
Level 1, Level 2, Level 3
What is the function of the Control Unit (CU)?
Decodes instructions and controls the timing of operations in the CPU
What is the function of the Arithmetic Logic Unit (ALU)?
Performs arithmetic and logic calculations
What is the function of the Program Counter (PC)?
Calls the next instruction
What is the function of the Memory Address Register (MAR)?
For the memory location of data to be fetched
What is the function of the Memory Data Register (MDR)?
Data recieved from the RAM
What is the function of the Accumulator (ACC)?
Stores the results from the ALU
What is clock speed?
Cycles per second, measured in Hz (Hertz)
How does clock speed affect CPU performance?
Faster the clock speed, faster the CPU can process instructions
What are processor cores?
The number of processor cores in one CPU. A dual-core processor has 2 processes in 1 integrated circuit, in order to perform 2 tasks at once
How will having more processor cores affect CPU performance?
More processor cores, faster CPU performance
What is cache?
Memory on the CPU that is faster than RAM but slower than registers
What are the rules when adding binary?
0 + 0 = 0
1 + 0 = 0
1 + 1 = 0 carry the 1
1 + 1 + 1 = 1 carry the 1