Computer science key words Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the Internet?

A

A collection of devices that are connected through a system of routers and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the WWW?

A

A collection of websites and web browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is HTTP & what does it do?

A

Safety protocol, it transfers data between a client and a server in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HTTPS & what does it do?

A

Safety protocol, it uses encryption to protect data as it transfers between a client and a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is digital currency?

A

Money that only exists online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a blockchain?

A

A digital ledger that records every transaction made in a specific digital currency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the concept of decentralisation?

A

When something is not controlled by central authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are cookies?

A

Small text files that store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the functions of the WWW?

A

1) to render html
2) record user history
3) to store cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of the CPU

A

To fetch, decode, and execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Function of the MAR

A

stores the address of the data to be fetched or written to the memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Function of the MDR

A

Holds the data that has been fetched or written to the memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Function of the CIR

A

Stores the current instruction the CPU is decoding or executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Function of the Program Counter

A

Stores the address of the next instruction to be fetched from the memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Function of the Accumulator

A

Temporarily stores the results of the calculations that have been performed by ALU (Arithmetic Logic Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a register?

A

small amounts of high-speed memory that is contained in the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Function of the Control Unit

A

to send control signals to different components instructing them on what to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Function of the ALU (Arithmetic Logic Unit)

A

Performs calculations that are required to do, in order to execute instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Function of ROM

A

To store the instructions the computer executes when it is turned on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Function of RAM

A

To store data, instructions, and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Difference between ROM and RAM

A

ROM is non-volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does a computer fetch, decodes, and executes instructions?

A

1) Program counter check for the address of the next instruction to be executed.
2) The contents of the Program Counter will then be copied into the Memory Address Register.
3) The control unit sends a memory read request to the main memory through a control bus.
4) The address is sent through an address bus from the Memory Address Register to the main memory.
5) The contents of the Main memory will be sent down through a data bus into the Memory Data Register.
6) The contents of the MDR will be then copied into the current instruction register.
7) The CIR then inspects and decodes the instruction.
8) The instruction is then carried out by the ALU performing a calculation or storing the information back into the main memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Primary storage

A

Storage that is directly accessible by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is primary storage made of

A

made of RAM, Cache, and ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Cache

A

small amount of memory that is situated near the CPU.

26
Q

What is secondary storage

A

Storage that is not directly accessible by the CPU, used for permanent storage of data

27
Q

How do Hard Disk Drives work

A

There are plates that spin at a high speed, a read or write arm is controlled by an actuator. The actuator head is moved towards the location of the data, and the data is written or read to by electromagnets.

28
Q

How do Solid State Drives work

A

Made of transistors, uses NAND and NOR gates to control the flow of electrons

29
Q

How do Optical storage (CD’S) works

A

A laser is shined at the disk and processing the reflection, an arm moves the laser across the disk. The laser burns the data into pits and lands. the laser is also used to read the data. When the laser shines where the pit changes into land or vice versa, this indicates a change in binary value.

30
Q

What is virtual memory

A

secondary storage is used to act as RAM

31
Q

What is Page Switching

A

Data than needs to be accessed by the CPU is switched by the operating system from virtual memory into ram and an inactive page from RAM replaces it in virtual memory.

32
Q

What is Cloud storage

A

method of data storage where data is stored on remote servers.

33
Q

3 types of Cloud storage

A

Public, Private, and Hybrid

34
Q

What is public cloud storage

A

Customer and storage provider are different companies

35
Q

What is Private cloud storage

A

Storage provided by a dedicated environment behind a company firewall, customer/company are integrated and act as a single entity.

36
Q

What is Hybrid cloud storage

A

Combination of Public and Private: sensitive data will be stored privately, whereas less sensitive data will be stored in a public cloud storage provider.

37
Q

NIC

A

connects a device to a wired/wireless network

38
Q

what do NICS contain

A

MAC - generated at the manufacturing stage

39
Q

MAC address

A

used to route frames on a local area network

40
Q

2 features of MAC addresses

A
  1. address is unique to every NIC
  2. MAC is static
41
Q

IP address

A

used to route packets on a wide area network

42
Q

feature of IP addresses

A

not always static

43
Q

Difference IPv4 and IPv6

A

IPv4 made of 32 bits and IPv6 made of 128 bits, so IPv4 cannot generate enough unique static addresses.

44
Q

Router

A

Sends data between networks

45
Q

2 jobs of a router

A
  1. use devices IP address to route traffic to other routers
  2. can assign IP addresses to devices on a local network.
46
Q

Virus

A

simple program made to harm the user’s computer

47
Q

pharming

A

malware being downloaded on a user’s device without the user knowing

48
Q

Phishing

A

sending emails that appear to come from a reliable source and try to get a users confidential information.

49
Q

Pre-condition loop

A

while loop - while a condition is true

50
Q

Post-condition loop

A

Repeat….. until loop - repeats until a condition is true

51
Q

Count-controlled loop

A

Repeats a loop a set number of times

52
Q

Normal data

A

all values are accepted

53
Q

Boundary data

A

Accepted -> upper and lower limits of the accepted range.
Rejected -> values outside of the range

54
Q

Extreme data

A

Upper and lower limits of the accepted range

55
Q

Abnormal data

A

Values that are outside of the range / different data type

56
Q

Validation

A

when the computer checks if the data that has been inputted is reasonable

57
Q

Verification

A

checking the data has been accurately copied from one source to another.

58
Q

example of validation

A

Length check, validation check, type check

59
Q

example of verification

A

when a user manually verifies the data.

60
Q

why is it important for a programmer to use both validation and verification methods

A

Helps the programmer easily identify mistakes within their program.