Last Minute Revision Flashcards
Assembler
a computer program that will take the mnemonics used in assembly language and convert them into machine code so they can be processed by the computer. This is done by converting one word assembly instructions into opcode, and allocating memory to variables, often resulting in an operand
Check Digit
checks to see if an error has occurred by doing some mathematical calculations, normally with one or two digits
Double Entry
used in situations where the same identical piece of data needs to be entered twice, such as when changing a password
Format Check
checks the format of something, e.g. that a postcode or NI number has been entered correctly
Length Check
restricts how many characters can be entered into a text box
Lookup Table
reduces error, used in situations such as to select a title from a menu
Presence Check
checks something has been entered
Range Check
checks data is between two endpoints
Address Bus
where the address of the data is communicated to main memory. The width (number of wires) defines the amount of physical memory that can be addressed.
Control Bus
used to tell the memory or device which operation is to be performed
Data Bus
a series of wires that connects the processor to the main memory (RAM) or cache memory. Can be used to read from or write to memory. Characterised by its width.
Audio Port
connector to plug ANALOGUE audio signals into a computer
Digital Visual Interface
to connect a video source to a computer monitor
Ethernet
mainly used for networking and internet connectivity, carries broadband signals between different wired internet-capable devices
High-Definition Multimedia Interface
used to transfer audio/visual data to compatible monitors/IDTV/video projectors
IEEE1934 Interface / Firewire
used for high speed data transfer
PS/2 Connector
a six-pin connector used to connect mice and computers
Universal Serial Bus
allows high-speed connectivity with peripheral devices
Attribution Licence
allows work to be shared, copied and modified, but the creator must be credited
Non-Commercial Licence
allows work to be shared, copied and modified, but the creator must be credited and the work cannot be used to make a profit
No Derivative Works Licence
allows work to be shared and redistributed, but not modified in any way
Share-Alike Licence
allows work to be shared, copied and modified, but the creator must be credited and the modified work must be released under the same terms as the original
First Data Protection Principle
processing of personal data for any of the law enforcement purposes must be lawful and fair
Second Data Protection Principle
the law enforcement purpose for which personal data is collected on any occasion must be specified, explicit and legitimate, and personal data so collected must not be processed in a manner that is incompatible with the purpose for which it was collected
Third Data Protection Principle
personal data processed for any of the law enforcement purposes must be adequate, relevant and not excessive in relation to the purpose for which it is processed
Fourth Data Protection Principle
personal data processed for any of the law enforcement purposes must be adequate, relevant and, where necessary, kept up to date, and every reasonable step must be taken to ensure that personal data that is inaccurate, having regard to the las enforcement purpose for which it is processed, is erased and rectified without delay
Fifth Data Protection Principle
personal data processed for any law enforcement purposes must be kept for no longer than is necessary for the purposes for which it is processed
Sixth Data Protection Principle
personal data processed for any of the law enforcement purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical and organisational measures
Fetch-Decode-Execute Step 1
The fetch cycle takes the address required from the memory, stores it in the instruction register, and moves the program counter on one so that it points at the next instruction.
Fetch-Decode-Execute Step 2
The control unit checks the instruction in the instruction register. The instruction is decoded to determine the action that needs to be carried out.
Fetch-Decode-Execute Step 3
That actual actions that happen during the execution cycle depend on the instruction itself.
FOIA exemption 1
correspondence with royal family
FOIA exemption 2
information relating to criminal investigations
FOIA exemption 3
information where disclosure may cause a specific type of harm
FOIA exemption 4
information that would breach health and safety
FOIA exemption 5
information prejudicing law enforcement
FOIA exemption 6
information prejudicing someone’s commercial interests
Bitmap Image
a type of raster image and is composed of many tiny parts, called pixels, which are often many different colours. It is possible to edit each individual pixel
Raster Graphics
dot matrix data structures representing a grid of pixels and cannot scale up without loss of apparent quality. They tend to be large in terms of the memory required to store them
Vector Graphics
allow the graphic to resize without losing quality, unlike the other two. This is because they use geometrically primitive objects such as points, lines, curves and shapes or polygons which are based on mathematical expression to represent images.
Layer 1
Applications Layer
tells the computer how data is to be used
Layer 2
Presentation Layer
changes the data into a form that can be read
Layer 3
Session Layer
tells whether it is full or half-duplex
Layer 4
Transport Layer
how data is going to be transported, broken up and put back together
Layer 5
Network Layer
how things are sent across e.g. traffic control, uses internet protocol, keeps addresses of different computers to each computer, decides routes which data takes
Layer 6
Data Link Layer
says how quickly it will be carried
Layer 7
Physical Layer
the raw bit of data that streams over the physical medium
RIPA Power 1
powers concerning interception of telecommunications
RIPA Power 2
powers concerning acquisition of telecommunications
RIPA Power 3
powers concerning intrusive surveillance
RIPA Power 4
powers concerning covert surveillance
RIPA Power 5
powers concerning CHISs and UCOs
RIPA Power 6
powers concerning access to encrypted data
Translation Stage 1
Lexical Analysis
takes the sequence of characters you wrote and translates it into a series of tokens, removing any white space, allowing the computer to see the collection of typed words
Translation Stage 2
Symbol Table Construction
created to store variable names and subroutines, checking that variables have been declared properly
Translation Stage 3
Syntax Analysis
checks to ensure the code conforms to the rules of that particular language, eg for missing semi-colons
Translation Stage 4
Semantic Analysis
checks to ensure the program makes sense, eg checking that variables have been given suitable types and have been declared before use
Translation Stage 5
Code Generation
the tokens are translated into object code
Translation Stage 6
Optimisation
optimises the program for the processor that it is run on, stopping the process from doing unnecessary work
Scheme
either http or https
Subdomain
part of the URL after http or https, for example www.
Second Level Domain
after www.
Top Level Domain
for example .com
Sub Directory
after .com