Computer science AS level

studied byStudied by 9 people
0.0(0)
get a hint
hint

Computer user system interface

1 / 199

200 Terms

1

Computer user system interface

Allows user to interact with the system allowing user to install and do what they want

New cards
2

Program hardware interface

Provides an interface for program to interact with the hardware so applications can access hardware to run through OS

New cards
3

Resource management

Hardware is limited as such memory must be allocated and managed as to not run out

New cards
4

Memory management

memory protection making sure processes cant be overridden by a program

New cards
5

Device Management

Used to access external devices through drives allowing communication between computer and peripheral which enables the sending and receiving of data as well as handling buffer and interrupts from I/O port

New cards
6

File management

Storage space is divided into file allocation units space is allocated to a particular file, creates and maintains directory structures

New cards
7

Security management

OS controlling what can be accessed by whom i.e clearance

New cards
8

Error detection and recovery

When there is an error it will halt the program and save as much data possible then restart

New cards
9

HDD formatter and checker

Delete storage and check if everything is readable and writable then reinstalls

New cards
10

Hard disk drive defragmenter

Fragmented data has a slower access time as such it is moved together by the HDD defragmenter to reduce access time and make the data contiguous

New cards
11

backup software

creates backup files at regular intervals

New cards
12

File compression

data compression method where the logical size of a file is reduced to save and facilitate faster data transmission, usually computer comes with lossy compression as most information is represented in a format where data cannot be lost

New cards
13

Virus checker

protect the computer from viruses scans files to protect computer system

New cards
14

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

New cards
15

WNIC

  • Used to connect to a network wirelessly

  • via the use of an antenna

  • can decode packets

  • can encode packets

New cards
16

Repeater

regenerates signal

New cards
17

Hub

functions as a central connection point within a LAN which broadcasts messages to all devices within the network

New cards
18

bridge

Connects two LANs of the same protocol

New cards
19

Switch

to recieve transmission from devices and forward them to their destination, allowing 2 or more devices to communicate with eachother

New cards
20

gateway

connects 2 networks of different protocols

New cards
21

WAP

allow connection of devices using radio signals

New cards
22

Router

  • recieve packets from the internet or external networks

  • forward packets to their destination

  • assign private IP's in a LAN

  • Store a routing table

  • finds most efficient route to destination

  • implements firewall

New cards
23

Drawing List

  • the list of shapes involved in an image // a list that stores the command/description required to draw each object

New cards
24

Property (Vector Graphic)

Data about the shapes, defines one aspect about the obejct being drawn

New cards
25

File Header

Data about a bitmap image for example number of colours

New cards
26

Sampling rate

The rate at which amplitude of the sound is recorded (at regular intervals)

  • Less quantization errors (diff between real and recorded sound)

  • Less gaps in the sound wave as such the sound is recorded more often
    Disadvantages:

  • Increased File size

  • Not all audio playback devices support higher sample rates

New cards
27

Sampling resolution

Number of bits used to represent sound amplitude (also known as bit depth) Advantages of increasing

  • More amplitudes can be recorded

  • quantisation errors are smaller Disadvantages

  • increased file size

New cards
28

LAN

Local Area Network

  • Covers a small geographical area

  • Uses dedicated infrastructure // company owned infrastructure

New cards
29

WAN

Wide Area Network

  • Covers a large geographical area

  • Not owned by an organisation or company

New cards
30

Peer to Peer Network (characteristic then advantages and disadvantages)

All computers use unique security to keep their data, devices both consume and produce resources, clients and server are not differentiated

  • Parts of a file can be downloaded separately

    Disadvantages

  • There is reduced security

  • There is no centralised server, disorganised

New cards
31

Thin client

Networking system whereby client computers rely on servers to perform their processing tasks.

New cards
32

Thick Client

Networking system where the client computer completes the majority of the processing and minimal processing is done by there server

New cards
33

Cables Advantages/Disadvantages

Twisted pair has the lowest cost but also lowest bandwidth the need for attenuation increases with higher frequency, and is worst affected by interference, it needs repeaters often
Coaxial has relatively cheap cost but low bandwidth and need for attenuation increases a lot with higher frequency can recieve some interference and needs repeaters more often than not
Fibre optic cable
has the highest cost but highest bandwidth and is least affected with higher frequencies, there is little interference and does not need a lot of repeaters

<p>Twisted pair has the lowest cost but also lowest bandwidth the need for attenuation increases with higher frequency, and is worst affected by interference, it needs repeaters often <br>Coaxial has relatively cheap cost but low bandwidth and need for attenuation increases a lot with higher frequency can recieve some interference and needs repeaters more often than not <br>Fibre optic cable<br>has the highest cost but highest bandwidth and is least affected with higher frequencies, there is little interference and does not need a lot of  repeaters</p>
New cards
34

CSMA/CD

Carrier Sense Multiple Access/Collision Detection Procedure:

  1. Check if there is voltage in transmission medium

  2. if there is activity wait a random amount of time and check again

  3. if no activity is detected start transmission

  4. continuously check for a collision

  5. if no collision is detected continue transmission

  6. if a collision is detected stop transmission of the message and transmit a jamming signal to warn all end stations after a random amount of time try again

New cards
35

PTSN

When a call is placed a private cable is connected between the dialler and the reciever via circuit switching this is open indefinitely

New cards
36

IPv4 address:

IPv6 address:

IPv4: 32 bit long address represented as 4 groups of 8 bits represented as their denary character IPv6: 128 bit long address represented as 8 16 bit segments represented as 8 sets of 4 hexadecimal characters seperated by a colon

New cards
37

DHCP (Dynamic Host Control Protocol)

  • The computer broadcasts a request for an IP address

  • Assigns IP from within its scope

  • The IPS's assigned is as a lease

New cards
38

Default Gateway

The first IP address of the device that a client computer will look for when attempting to gain access outside the local network.

New cards
39

Subnetting

Process of dividing a network into multiple logical subnetworks when representing the subnets IP address a portion of the Host Id must be sacrificed

New cards
40

CIDR Notation

Adjusting the size of a network to be more realistic by reducing the amount of network or host id bits this change is shown as a prefix at the end of the IP address defining the length of the network id

New cards
41

Private Cloud Computing

Computing services over the internet or private internal network, only available to select users and not the general public, dedicated system only accessible for the organisation

New cards
42

Public cloud computing

Computing services offered by 3rd party provider over the public internet, open to anyone with appropriate equipment

New cards
43

On Demand Bit streaming

incoming data is received into a buffer media player takes data from buffer and plays it
Advantages
Can be accessed at the users convenience
not as susceptible to having weak connections
Disadvantages:
Can lack real time interaction

New cards
44

real time bit streaming

content is being delivered the same its being generated, data is given to provider servers which compress it then to the users
Advantages
Allows for real time communication

New cards
45

MAC address

Unique hardcoded identifier

New cards
46

Benefits of subnetting

BENEFITS

  • Increases the number of allowed hosts in a LAN

  • Decreases volume of broadcast and network traffic

  • It enhances routing efficiency

  • Improves network security and organisation

  • Reduces network strain and congestion

New cards
47

URL To DNS

  1. User opens their browser and types URL

  2. Browser asks the DNS server for the IP address

  3. The DNS server checks its database to locate the IP or requests another DNS if it cant find it, it checks other DNS servers

  4. The IP address is sent back to the users browser

  5. The browser now sets up communication with the website server and required pages are downloaded

  6. The browser interprets the HTML code and displays website on users screen

New cards
48

pros and cons of cloud computing

Pros and Cons

Pro's

Con's

Can easily share documents and have multiple people working on them

reliant on someone elses backup and security

No need to customer to carry external storage or continuous need to use the same computer

Costs may be high if large storage is required

Do not need to install security // security might be better

Expensive to pay for high download/upload data transfer with ISP (internet service provider)

You do not need to perform backups of your data

Potential failure of company possible, or can not access data if servers go down

Offers almost unlimited storage capacity

 Can not be accessed without wifi

Can be accessed from anywhere with internet access

New cards
49

Cloud software

applications and services that are accessed, managed, and stored online through remote servers, providing users with flexibility, scalability, and accessibility from any device with an internet connection.

New cards
50

Data movement

assembly instructions which cause data to change place

New cards
51

Input and output of data

transferrence of data between the computer program an external sources such as keyboards
ex, INPUT AND OUTPUT

New cards
52

Arithmetic operations

manipulation of numbers

New cards
53

Unconditional and conditional instruction

Doing something if a certain condition has been met or doing it regardless

New cards
54

compare instruction

compares two different values

New cards
55

Direct addressing 

The address location is the operand

New cards
56

Indirect addressing

Using the address inside the memory location

New cards
57

Indexed addressing

Accessing the data inside an address + the value in the index register

New cards
58

Immediate addressing

Accessing data of the value proceeding the #

New cards
59

Register mode

Accessing the address inside a given register

New cards
60

control system

checks the environment for change when it notices a change it performs some sort of output

New cards
61

monitoring system

checks the environment for change if it notices change then it may record it or report it

New cards
62

actuator

a device that causes a machine or another device to do an action as a result of detecting an input

New cards
63

Closed loop feedback control system

A portion of the output is fed back into the input, feedback ensures that a system operates within set criteria by enabling system output to effect subsequent system input thus allowing conditions to be automatically adjusted

New cards
64

Libraries

Built in functions available when programming in a particular language

Advantages
- Saves time as you dont need to code your own functions
- Saves time as you dont have to error check these functions as they have most likely already been tested
- can perform complex calculations that the programmer may be unable to do

New cards
65

DLL

A shared library can be used in multiple programs simultaneously, If the library is updated it is updated in every program which uses it.

Advantages:
memory requirements of program is reduced as DLL is only loaded once
A single DLL file can be made available to multiple programs saving memory

New cards
66

Data integrity

Making sure data is accurate and up to date

New cards
67

Data security

Protecting data from loss / corruption

New cards
68

Data privacy

Ensuring data can not be accessed by unauthorised users

New cards
69

Threats to the security of a computer system

Mistreatment
Internal mismanagement
Natural disasters
Unauthorised intrusion into system
malware

New cards
70

malware characteristics

may steal of encrypt sensitive data, may alter computer functions

New cards
71

System vulnerability from user activity

Weak passwords
Not recognising phishing or pharming attack
may introduce malware accidently (downloaded files, email attachement)

New cards
72

security weaknesses from system

increased security complexity means vulnerabilities may be overlooked in OS
App packages allowing macros to spread
Buffer overflow

New cards
73

Safe system update

Mayor updates can create vulnerabilities as such it will need to be checked

New cards
74

User authentication

checks if user is authorised in a multiuser system normally via username or password

New cards
75

Good practice

Not leaving computer on when unattended or allowing someone to observe computer access

New cards
76

Check digit

A form of data verification used for error detection by adding a digit based on the previous digits in the string on the end of a string of bits

New cards
77

Even / Odd parity

A method to check for data corruption from flipped bits by checking if the number of 1s has become even or odd

New cards
78

Copyright

the formal and legal right of ownership which stops others from reproducing work without authorisation

New cards
79

Commercial-ware

Requires users to pay for a license to recieve the program, you are not given the source code and it is illegal to redistribute software

New cards
80

Shareware

Free software available for a trial period or with limited capabilties

New cards
81

Open Source software

You are given the software as well as the source code as to allow the user to change and distribute it

New cards
82

Free software foundation

free software which can be altered in anyway you wish and redistributed aims to improve software rather than earn any monetary value

New cards
83

Current instruction register

Stores the current instruction while it is being decoded and executed

New cards
84

Index register

Stores a value; only used for indexed addressing

New cards
85

MAR

Stores the address of a memory location or an I/O component which is about to have a value read from or written to

New cards
86

MDR

Stores data that has just been read from memory or is just about to be written to memory

New cards
87

Program Counter

Stores the address of where the next instruction is to be read from

New cards
88

Status register

Contains bits that are either set or cleared which can be referenced individually

New cards
89

Address bus

its sole function is to transfer an address for a location from the program counter or I/O component, to be loaded into the MAR

New cards
90

Data bus

function is to carry data which may be a instruction address or value it is bidirectional

New cards
91

Control bus

Connected to the CU and is bidirectional transmits signal from CI, part of the bus architecture carries commands from processor and receives status signals from components connected to the computer system, transmits clock interrupt and read write signals

New cards
92

Clock speed

electrical impulses which dictate the amount of F-E cycles per second,

New cards
93

Multiple Cores

Amount of cores affects the number of instructions which can be executed in a given amount of time can allow the user to run multiple programs at once with minimal performance issues, does not inherently double speed as they must communicate

New cards
94

Word Length

The amount of bytes the system considers as one unit as such higher word lengths can contain more information as such more information can be executed per cycle

New cards
95

Interrupt handling

An interrupt is handled with the following steps

  • Interrupts are checked for at the start/end of each F-E cycle

  • Contents of PC and other registers stored safe in stack

  • Appropriate interrupt handler or interrupt service routine initiated by loading start address into PC

  • When the ISR program has been executed there is a check to see if there are further interrupts

  • Further interrupts are dealt with by repetition of the ISR program

  • If there are no further interrupts the stored contents of registers are restored to the Cpu and the originally running program is resumed.

New cards
96

File-Based approach limitations

There is no way to validate data entry, sensitive data may be accessed without the correct clearance may result in a loss of referential integrity

New cards
97

1NF

there are no repeating groups the fields are atomic

New cards
98

2NF

All attributes depend on all parts of a compound key

New cards
99

3NF

All data is fully dependent on the primary key, there are no many to many relationships, no non key dependencies, there are no repeated attributes

New cards
100

Query processor

Allows users to enter criteria searches for data which matches the entered criteria organises results to be displayed to the user

New cards

Explore top notes

note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 32 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 16 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 51 people
Updated ... ago
4.5 Stars(4)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 33238 people
Updated ... ago
4.9 Stars(62)

Explore top flashcards

flashcards Flashcard101 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard34 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard33 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard76 terms
studied byStudied by 41 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard59 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 10 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 215 people
Updated ... ago
5.0 Stars(2)