computer science vocab Flashcards

1
Q

binary number system

A

language used in computers. anything inputted into a computer needs to be converted into binary first (in order for the computer to understand)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

denary number system

A

language humans use every day. ordinary numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hexadecimal number system

A

humans can use hexadecimal, but in order for computers to understand it would need to be converted to binary. consists of 16 symbols (0-9 and A-F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in binary addition, what does 0+0 equal?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in binary addition, what does 1+0 equal?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in binary addition, what does 1+1 equal?

A

10 (as 10 in binary is 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in binary addition, what does 1+1+1 equal?

A

11 (as 11 in binary is 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

overflow error

A

occurs when a number larger than a register can store (larger than 255) is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what happens to a binary code when its shifted to the left?

A

multiplies by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what happens to a binary code when its shifted to the right?

A

divides by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do you create negative binary numbers? (twos complement)

A

you invert 1’s to 0’s and 0’s to 1’s and simply replace/add a 1 to the right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

benefits of using hexadecimal

A

easier for humans to understand
hex values are easier to remember and enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is ASCII?

A

a character set that represents characters using 8-bit binary numbers. (so can represent up to 256 characters).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is unicode?

A

a character set that represents characters using 16-bit binary numbers (so can represent up to 65000 characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

limitations of using binary

A

takes longer to decode or convert
difficult for humans to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

lossy compression

A

reduces the size of a file by PERMANENTLY removing data. this method is mainly used on an image or sound file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

lossless compression

A

reduces the size of a file by TEMPORARILY altering data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

packet header

A

part of a data packet. contains information about the contents of the packet and its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP address

A

unique address that is given to a device when its connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

payload

A

part of data packet. consists of the actual data that the user is sending (to the receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

trailer

A

part of data packet. contains information about any error checking methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

router

A

examines a data packet to obtain its destination address and send it off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

packet switching

A

process of transmitting data packets across a network down individual pathways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

serial data transmission

A

data sent one bit at a time down one wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
advantages of serial data transmission
less chance of data being mixed up/misplaces (skewed) less interference, meaning less chance of error cheaper as only one wire is needed
26
disadvantages of serial data transmission
transmission of data is slower a start and stop bit is required to be sent to allow the receiver to know where data starts and ends
27
parallel data transmission
multiple bits of data sent through multiple wires at the same time
28
advantages of parallel data transmission
transmission of data is quicker
29
disadvantages of parallel data transmission
high risk of data being mixed up/misplaced (skewed) higher chance of interference, meaning higher chance of errors more expensive as multiple wires are required
30
simplex data transmission
when data is transmitted from one device to another in one direction
31
half duplex data transmission
when data is transmitted from one device to another in both directions but NOT at the same time
32
full duplex data transmission
when data is transmitted from one device to another in both directions at the same time
33
advantages of USB
simple interface as USB can only be accessed one way, meaning less chance of errors USB' are fast and can transfer data quickly
34
disadvantages of USB
length of USB is limited (about 5 metres)
35
parity check
error detection method. uses either odd or even parity check. this is where you count/ sum up the 1' present and that determines whether there is an error or not. (eg: odd parity check, two 1' present which is an even number, so one more one must be added on the left most side in order for the 1' to sum up an odd number)
36
checksum
error detection method. performs calculations on the data to create a CHECKSUM VALUE. this checksum value is then compared after transmission to see if they match
37
echo check
error detection method. sends copy of the transmitted data back to the sender to be compared to original data.
38
check digit
error detection method. used for DATA ENTRY. a calculation is performed on the data entered to create a value. then are compared with each other to see if it is correct
39
encryption
securing data for storage or transmission by scrambling data and making it meaningless
40
encryption key
algorithm to encrypt data
41
symmetric encryption
uses the same key to encrypt and decrypt data
42
asymmetric encryption
uses two different keys to encrypt and decrypt data
43
microprocessor
an integrated circuit that performs multiple functions of the CPU.
44
embedded system
computer system that performs a dedicated function. eg : traffic light, washing machine, digital alarm clock.
45
program counter
in the FDE cycle (fetch stage) . stores the address of the next instruction to be processed
46
cloud storage
data storage that is owned by a third party and accessed by the user, using the internet
47
static IP
does not change each time the device connects to a network
48
dynamic IP
can change each time the device connects to a network
49
MAC address
unique address that is given to a NIC by the manufacturer
50
network interface card (NIC)
component in a computer that is used to connect to a network
51
characteristics of storing data in the cloud
- you dont have to pay for the hardware - you dont have the responsibility for the security of the hardware (however, you are relying on a third party that makes sure your data is safe) - you can access data using different devices from anywhere that you HAVE an internet connection - easy to increase and decrease the amount of storage space needed
52
characteristics of storing data locally
- need to purchase hardware - need to make sure your data storage is well-maintained and regularly checked - you can access data using different devices from anywhere and you DONT NEED internet connection
53
transistor
device that acts as a switch or gate for electronic signals
54
control gate
controls the flow of electric current
55
floating gate
can store electrical charge
56
virtual memory
can be used as an extension to the RAM
57
ROM
primary storage that store the start up instruction for the computer
58
primary storage
storage that is directly accessed by the CPU
59
secondary storage
storage that stores data permanently (until its deleted by the user)
60
characteristics of RAM
- volatile storage (required power to store data, if power is turned off contents of RAM are lost) - stores data and programs that are in use by the computer - contents are constantly changed as data is being processed by the CPU
61
characteristics of ROM
- non volatile storage (if power is turned off the contents of ROM are permanent) - stores programs that initially boot the computer - contents of ROM are fixed and usually not changed (it is possible to change it but only when computer isnt booting up properly)
62
magnetic storage
secondary storage that uses the properties of magnetism to store data
63
optical storage
secondary storage that uses lasers to store data
64
Solid State Storage
Secondary Storage that uses tranSiStorS to Store data
65
clock speed
a factor that affects a CPU' performance. the number of FDE cycles that can be performed in a second
66
cache
a factor that affects a CPU' performance. stores the most frequently used data and instructions
67
RAM
holds data and programs that are currently in use
68
system software
manages both hardware and software in a computer
69
operating system
manages the computer and allows the user to communicate with the computer, allowing software to run
70
utility program
system software that performs house-keeping activities
71
application software
allows the user to perform useful tasks
72
word processor
application software that allows the user to create text-based documents
73
spread sheet
application software that performs calculations on data
74
database
application software that stores and manipulates data
75
what is the process of software on a computer?
application software -> operating system -> firmware -> bootstrap
76
firmware
instructions stored in ROM and are loaded when computer starts
77
bootstrap
first commands loaded on the computer, checks hardware and loads firmware
78
interface
method where the user communicates with a computer
79
graphical user interface (GUI)
operating system that includes windows, icons, menus and pointers
80
command line interface
operating system where the user types commands
81
natural language interface
operating system that allows the user to type or speak commands
82
peripheral
hardware device, used to input, store or output data from a computer (that isnt part of the computer itself)
83
driver
program that controls a device like a printer or keyboard.
84
interrupt
a signal sent to the processor to tell it that its attention is required
85
interrupt service routine
program that retrieves an interrupt and performs required actions
86
high level language
programming language that uses english-like terms. considered portable
87
low level language
programming language that is closer to a machines language (either assembly or binary code)
88
portable
program that can be run on different types and manufacturers of computers
89
machine code
binary code, an example of low level language. non-portable
90
assembly language
low level language. code written in mnemonics that allows direct manipulation of the hardware. must be converted ton binary to be able to run
91
characteristics of high level language
- easier for users to understand, read and write - easier for humans to debug - portable, so machine independant - MUST be converted to binary before it can run - cannot directly manipulate hardware
92
characteristics of low level language
- more difficult for users to understand, read and write - not portable so machine dependant - harder for users to debug - does not need converting, but must be assembled before execution (which is faster than conversion) - can directly manipulate hardware
93
translator
software that converts code written in one programming language to another
94
assembler
converts assembly language into machine code
95
interpreter
translator that converts high level language into low level language by checking ONE LINE AT A TIME and executes it before checking the next (if the line checked is incorrect, an error is sent to the user)
96
compiler
translator that converts high level language into low level language by checking ALL code before running the program. (if any error is detected, they are reported to the user) an executable file is created if no errors are detected
97
executable file
file produced by compiler. can be run without conversion/translation and does not include source code
98
characteristics of interpreters
- translates one line of code at a time - reports error as soon as its detected and stops program until its corrected - useful when WRITING a program - code needs to be re-translated each time its run - source code is required to run the program
99
characteristics of compiler
- translates ALL line of code before executing the program - reports errors at the same time (not as soon as its detected - useful when program is FINISHED at needs to be tested - produces executable file- doesnt require source code
100
IDE
software that allows a user to write, test and run program code. includes an editor so you can enter and amend your code. also includes a run-time environment
101
auto completion
feature of an editor that gives user options when they start typing a command
102
auto correction
feature of an editor identifies and corrects spelling errors
103
pretty print
feature of an editor that changes the colour of text (like highlighting key words)
104
run-time environment
feature of an IDE that allows program to run and lets user interact with the program
105
HTML
scripting language that is used to CREATE web pages
106
active script
used to produce any of the interactive elements of a web page
107
SSL protocol
encrypts data for transmission (invloved in HTTPS and HTTP)
108
session cookies
type of cookie that is deleted when the web browser is closed
109
persistent cookie
type of cookie that is stored by web browser until it is deleted by user or has expired
110
cookie
two types. store data regularly used on the internet (like passwords, back details and online shopping carts)
111
crypto-currency
type of digital currency that uses encryption procedures
112
block chain
METHOD that is used to track all transactions made with a crypto-currency
113
digital ledger
database that is a LIST of all the transactions by the use of block chain
114
brute force attack
cyber threat that involves repeatedly inputting a password until the correct one is found
115
biometric password
type of password that uses a persons BIOlogical data (like a fingerprint)
116
packet sniffer
software used to examine contents of a data packet
117
DDoS
cyber threat that targets a web server to cause it to crash and prevent access to web pages it stores
118
botnet
bots created to perform a DDos attack
119
malware
type of malicious software that is downloaded onto a users device
120
proxy server
method of cyber security that examines requests sent by devices (to access web pages)
121
anti-malware
software that scans a computer with the purpose of finding and removing malware
122
fire wall
security method that is used to examine incoming and outgoing traffic from a network
123
trojan horse
cyber threat that is used to disguise other malware to sneak into a network
124
spyware
cyber threat that spies on a users action whilst using a computer such as copying key presses
125
adware
cyber tissue where advertisment automatically popup
126
ransomware
cyber threat (software-based) that encrypts users data to stop them from gaining access to it until money is paid
127
pharming
cyber threat that involves downloading malicious software onto a users hard drive. where a fake website asks a user to input personal details allowing it to be stolen.
128
phishing
cyber threat that involves sending a user a fake email that encourages the user to provide personal details.
129
social engineering
cyber threat that involves manipulating/deceiving a person to provide personal data
130
analogue
data that can be any value within a range
131
digital
limited data stored like 1' and 0'
132
actuator
causes another device or part to move
133
expert system
attempts to replicate the knowledge of an expert . includes knowledge base, rule base and interface engine.
134
knowledge base
part of an expert system. stores facts
135
rule base
part of an expert system. stores the rules
136
interface engine
part of an expert system. makes the decision