Computer science key words Flashcards

1
Q

What is the Internet?

A

A collection of devices that are connected through a system of routers and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the WWW?

A

A collection of websites and web browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is HTTP & what does it do?

A

Safety protocol, it transfers data between a client and a server in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HTTPS & what does it do?

A

Safety protocol, it uses encryption to protect data as it transfers between a client and a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is digital currency?

A

Money that only exists online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a blockchain?

A

A digital ledger that records every transaction made in a specific digital currency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the concept of decentralisation?

A

When something is not controlled by central authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are cookies?

A

Small text files that store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the functions of the WWW?

A

1) to render html
2) record user history
3) to store cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of the CPU

A

To fetch, decode, and execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Function of the MAR

A

stores the address of the data to be fetched or written to the memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Function of the MDR

A

Holds the data that has been fetched or written to the memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Function of the CIR

A

Stores the current instruction the CPU is decoding or executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Function of the Program Counter

A

Stores the address of the next instruction to be fetched from the memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Function of the Accumulator

A

Temporarily stores the results of the calculations that have been performed by ALU (Arithmetic Logic Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a register?

A

small amounts of high-speed memory that is contained in the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Function of the Control Unit

A

to send control signals to different components instructing them on what to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Function of the ALU (Arithmetic Logic Unit)

A

Performs calculations that are required to do, in order to execute instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Function of ROM

A

To store the instructions the computer executes when it is turned on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Function of RAM

A

To store data, instructions, and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Difference between ROM and RAM

A

ROM is non-volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does a computer fetch, decodes, and executes instructions?

A

1) Program counter check for the address of the next instruction to be executed.
2) The contents of the Program Counter will then be copied into the Memory Address Register.
3) The control unit sends a memory read request to the main memory through a control bus.
4) The address is sent through an address bus from the Memory Address Register to the main memory.
5) The contents of the Main memory will be sent down through a data bus into the Memory Data Register.
6) The contents of the MDR will be then copied into the current instruction register.
7) The CIR then inspects and decodes the instruction.
8) The instruction is then carried out by the ALU performing a calculation or storing the information back into the main memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Primary storage

A

Storage that is directly accessible by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is primary storage made of

A

made of RAM, Cache, and ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is Cache
small amount of memory that is situated near the CPU.
26
What is secondary storage
Storage that is not directly accessible by the CPU, used for permanent storage of data
27
How do Hard Disk Drives work
There are plates that spin at a high speed, a read or write arm is controlled by an actuator. The actuator head is moved towards the location of the data, and the data is written or read to by electromagnets.
28
How do Solid State Drives work
Made of transistors, uses NAND and NOR gates to control the flow of electrons
29
How do Optical storage (CD'S) works
A laser is shined at the disk and processing the reflection, an arm moves the laser across the disk. The laser burns the data into pits and lands. the laser is also used to read the data. When the laser shines where the pit changes into land or vice versa, this indicates a change in binary value.
30
What is virtual memory
secondary storage is used to act as RAM
31
What is Page Switching
Data than needs to be accessed by the CPU is switched by the operating system from virtual memory into ram and an inactive page from RAM replaces it in virtual memory.
32
What is Cloud storage
method of data storage where data is stored on remote servers.
33
3 types of Cloud storage
Public, Private, and Hybrid
34
What is public cloud storage
Customer and storage provider are different companies
35
What is Private cloud storage
Storage provided by a dedicated environment behind a company firewall, customer/company are integrated and act as a single entity.
36
What is Hybrid cloud storage
Combination of Public and Private: sensitive data will be stored privately, whereas less sensitive data will be stored in a public cloud storage provider.
37
NIC
connects a device to a wired/wireless network
38
what do NICS contain
MAC - generated at the manufacturing stage
39
MAC address
used to route frames on a local area network
40
2 features of MAC addresses
1. address is unique to every NIC 2. MAC is static
41
IP address
used to route packets on a wide area network
42
feature of IP addresses
not always static
43
Difference IPv4 and IPv6
IPv4 made of 32 bits and IPv6 made of 128 bits, so IPv4 cannot generate enough unique static addresses.
44
Router
Sends data between networks
45
2 jobs of a router
1. use devices IP address to route traffic to other routers 2. can assign IP addresses to devices on a local network.
46
Virus
simple program made to harm the user's computer
47
pharming
malware being downloaded on a user's device without the user knowing
48
Phishing
sending emails that appear to come from a reliable source and try to get a users confidential information.
49
Pre-condition loop
while loop - while a condition is true
50
Post-condition loop
Repeat..... until loop - repeats until a condition is true
51
Count-controlled loop
Repeats a loop a set number of times
52
Normal data
all values are accepted
53
Boundary data
Accepted -> upper and lower limits of the accepted range. Rejected -> values outside of the range
54
Extreme data
Upper and lower limits of the accepted range
55
Abnormal data
Values that are outside of the range / different data type
56
Validation
when the computer checks if the data that has been inputted is reasonable
57
Verification
checking the data has been accurately copied from one source to another.
58
example of validation
Length check, validation check, type check
59
example of verification
when a user manually verifies the data.
60
why is it important for a programmer to use both validation and verification methods
Helps the programmer easily identify mistakes within their program.