Computer Science Revision Flashcards
Machine Code
Coding in Binary
Assembly Language
Binary code substituted with simple sequences of letters known as mnemonics.
Assembler
Used to translate assembly code into machine code binary.
Low Level Languages
Machine Language and Assembly Language
High Level Languages
Python, C#, etc
Interpreter
Translates and executes code line by line.
Compiler
Compiles and translates all source code into an executable file.
Opcode and Operand
8-Bit binary digit split into opcode and operand:
Opcode: Assembly Instruction (e.g. 0001 would be ADD in assembly).
Operand: Contains the binary value (e.g. 1010 would be 10).
Data Protection Act/GDPR
Year?
What does it ensure?
1998 and 2018.
Must be processed securely, must be processed lawfully and fairly, must be collected for legitimate reasons, must be adequate and limited, must be accurate and kept up to date, must not be kept for longer than it is needed, data controllers must be able to prove that their data protection measures are sufficient.
Computer Misuse Act.
Year?
What it covers.
1990
- Unauthorised access to a computer: 2 year prison sentence and 5000 pound fine.
- Unauthorised access to a computer to commit another offence: 10 year prison sentence and unlimited fine.
- Unauthorised acts that impair operation of a computer (DDoS and ransomware): 10 year sentence and unlimited fine.
3A: Writing viruses and other tools: 2 year sentence
3ZA: Unauthorised acts creating a risk of serious damage: 14 year sentence.
Copyright, Designs, and Patents Act.
Year?
What it covers.
Covers protection of various digital works such as music and art.
Covers anti-piracy and software licenses.
Regulation of Investigatory Powers Act.
Year?
What it covers.
2000
Lays out the limits of police and government power when it comes to ISPs, telecom companies, and social media.
Allows for mass surveillance, handing over encryption keys, intercept and monitor digital comms by the police and government.
Symmetric Encryption
Same key used to encode and decode.
Asymmetric Encryption
Two different but mathematically connected keys used for encryption and decryption.
Cipher
Encryption algorithm with certain rules.
What does URL stand for.
Uniform Resource Locater
FQDN of Google Website
www.google.com
Scheme/Protocol of Google Website
https
Domain name of Google Website
Subdomain of Google Website
www
TCP
Stands for Transmission Control Protocol
One of the standards for data transfer on the internet, resends packets if lost.
HTTP(S)
Protocol for transfer between Client and Web Server.
S stands for secure, refers to encrypted web transfer.
FTP
File Transfer Protocol
Rules for transferring files.
POP
Post Office Protocol
Retrieves and deletes email from server and downloads to local machine.
IMAP
Internet Message Access Protocol.
Retrieves email from server but doesn’t delete.
SMTP
Simple Mail Transfer Protocol
Governs the sending of emails.
DNS
Domain Name Server.
Connects domain of website to its IP for end user.