click below
click below
Normal Size Small Size show me how
J277 Paper 1
Full Paper 1
Term | Definition |
---|---|
FDE Cycle | Fetching instructions/data from memory, decoding them into binary and executing the instruction |
Von Neuman Architecture | Computer system with instructions stored in memory which are fetched by the CPU |
Arithmetic Logic Unit | Part of the CPU that performs all of the arithmetic and logical functions |
Accumulator | Stores results of calculations and any data to be used in the calculations by the ALU |
Control Unit | Part of the CPU that co–ordinates the flow of data within the computer system and executes instructions |
Register | Fast access part of the processor that stores data being used by the CPU |
Memory Address Register | CPU component that stores the address of data being accessed in memory. |
Memory Data Register | Holds the actual data or instruction that has been fetched from memory |
Program Counter | Holds the memory address of the next instruction to be fetched |
Components | The devices and parts that make up a computer or device |
Execution | To run an instruction or set of instructions |
Clock Speed | Determines how many cycles of the Fetch Decode Execute cycle a CPU can complete in one second. |
Cores | An independent processing unit within a CPU responsible for executing instructions. Allows multitasking. |
Cache | Small, high–speed memory inside the CPU that stores frequently used instructions or data |
Embedded System | A computer system that is built into an electronic device e.g. a microwave, or a washing machine |
ROM | Type of non–volatile memory that holds crucial information such as the boot program (BIOS) |
RAM | Volatile main memory of a computer that stores currently running applications |
Virtual Memory | Using temporary space on your hard disk to act as RAM if your RAM is full |
Primary Storage | Internal memory of a computer system that is directly accessible to the CPU e.g. RAM |
Denary | Number system from 0–9 used by humans |
Volatile | Term used to describe memory that requires power to maintain the data stored within it |
Flash | Memory type used by SSDs, USB drives and SD cards (derived from solid–state storage) |
Secondary Storage | Non–volatile method for storing data for long term use e.g. files and applications |
Optical | Storage technology which involves the use of lasers to read and write data to a disc, e.g. CD, DVD |
Magnetic | Storage technology which uses magnetic disks to stores the data (HDD) |
Solid State | Storage technology that does not use any moving parts – stores the data with electrical signals. (SSD) |
Capacity | Characteristic for how much data a storage device can hold. |
Speed | Characteristic for the speed of data transfer on a storage device |
Portability | Characteristic for whether you can move around with a storage device |
Durability | Characteristic for how tough and robust a storage device is |
Reliability | Characteristic for how dependable a storage device is |
Cost | Characteristic for how much it costs for a storage device per Megabyte |
Bit | The smallest value of binary i.e. 0 or 1 |
Nibble | Binary unit of data made up of 4 bits |
Byte | Binary unit consiting of 8 bits |
Terabyte | Binary unit consisting of 1,024 gigabytes |
Kilobyte | Binary unit consisting of 1,024 bytes |
Gigabyte | Binary unit consisting of 1,024 megabytes |
Binary | Number system that computers use to represent data/instructions because electricity has 2 states (on or off) |
Overflow Error | When data does not fit into one byte after binary addition e.g. 100001000 |
Binary Shift | When binary numbers shift to the left for multiplication and right for division |
Character | Any letter, number or symbol used on a computer |
Pixel | One individual dot of colour within an image; sometimes called an element |
Resolution | The quality of an image indicated by the number of pixels used to create it |
File Size | The number of bits used to store a whole file |
Metadata | Extra Information about the data that allows a computer to recreate a file from binary e.g. height, width |
Bit Rate | The number of bits used per second for sound/video data |
Analogue | When data is in its original real–world format |
Colour Depth | The number of bits used to represent the colour of each individual pixel |
Hexadecimal | A number system with 16 possible options often used to represent colours on the web |
Character Set | A set of available characters used by the computer e.g. ASCII, Unicode |
ASCII | 8 bit Standard character set containing 128 characters for the English language |
Extended ASCII | 8 bit Character set containing 256 characters for the main European languages |
Unicode | 16 bit Character set containing millions of characters for all known languages and EMOJIS |
Sample rate | The number of samples taken per second in audio recording. |
Sound sampling | Converting analog audio into digital through measuring the height of the sound wave at regular intervals. |
Bit depth | The number of bits used to represent each sample in digital audio |
Digital | When data has been converted into binary format |
Lossy Compression | Where data is lost during compression and cannot be restored e.g. JPEG |
Lossless Compression | Where data is temporarily removed and can be restored upon decompression e.g. PNG |
Compression | The process of reducing the physical size of files, normally for use online so they can be sent quickly |
Internet | A worldwide network of computer networks; the hardware the WWW is stored on |
Router | Device that receives and forwards data packets to the appropriate parts of a computer network |
Packet | Formatted unit of data sent across networks |
Server | Software that provides services to a client, or the hardware that is running it |
Star Network | Topology that features a central connection point such as a switch or server |
Network Interface Controller | Circuit board installed into a computer to allow it to connect to networks |
Web Browser | An application used to browse the web |
Search Engine | An application used to search the index of the WWW |
Bandwidth | The amount of data that can be transmitted across a network e.g. 60mbps |
Network | One or more computers connected together |
HTML | The main markup language used for displaying web pages in a browser |
LAN (Local Area Network) | Where computers are connected in a small geographical area and the hardware is owned by the organisation |
WAN (Wide Area Network) | Where LANs are connected in different geographical locations and the hardware is owned by the ISP |
Latency | The amount of delay from sending a request to a server until it is answered |
Fibre Optic Cable | The fastest cable for data transfer which uses beams of light |
CAT5 | Copper based cable used to connect devices to a switch/hub/server. Often called Ethernet |
Topology | The layout of the network e.g. star, bus, ring |
Coaxial Cables | Made of a single copper wire surrounded by plastic for insulation. Used for TV aerials |
Client | A computer connected to a network which sends requests to a server |
Client–server network | A system where multiple devices connect to a central server for data and resource sharing |
Peer–Peer Network | All devices are equal connecting directly without a server |
Mesh Topology | Decentralised network layout where devices are connected without a central server |
Cloud | Using the Internet as remote service provision(e.g.storage,software, processing) |
Hosting | When a business uses its servers to store files for another organisation |
Web Server | A type of server used to host websites so they are always available |
File Server | A type of server used for file storage/retrieval on the cloud |
Virtual Network | A network which is entirely software based |
DNS (Domain Name System) | System that translates human–readable URLS (such as www.example.com) into IP addresses (such as 192.168.0.1) |
URL (Uniform Resource Locator) | A human readable website address e.g. www.bbc.co.uk |
Protocol | A set of rules for transferring data |
Mac Address | A unique number permanently assigned to every physical interface on a computer network |
IP Address | Unique number assigned to every computer or device connected to the Internet |
WWW | World Wide Web, a collection of web pages stored on the internet |
VOIP | Voice over IP, communication online via video and audio |
Ethernet | A wired network protocol used in LANs |
Network standard | Provides rules for areas of computing allowing hardware/software to interact across different manufacturers/producers |
WIFI | The standard for wireless networks using 2 frequencies 2.4GHz and 5GHz |
Bluetooth | A wireless technology that allows devices to communicate and exchange data over short distances |
Static IP | An IP address which doesn’t change usually used for websites |
Dynamic IP | An IP which can change and are assigned by the network server |
Packet Switching | Used by routers to direct data packets on the internet and other IP networks |
Layers | A specific level or division of tasks within a protocol during the communication process |
TCP/IP (Transmission Control Protocol/Internet Protocol) | Protocol used for transmitting data over the internet |
HTTP (Hyper Text Transfer Protocol) | Protocol used for transmitting web pages and other content over the internet |
HTTPS (Hyper Text Transfer Protocol Secure) | Secure version of HTTP |
FTP (File Transfer Protocol) | Protocol used for transferring files between computers over the internet |
SMTP (Simple Mail Transfer Protocol) | Protocol used for sending email messages between servers |
POP3 (PostOfficeProtocol) | Protocol used for downloading email messages onto the device |
IMAP (Internet Message Access Protocol) | Protocol used for retrieving email messages online |
Malware | Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems |
Data Interception | Using packet sniffers to intercept data during transmission |
Brute–force attacks | A method of trying all possible combinations to guess a password or encryption key |
Denial of Service Attack | Cyber attacks that overwhelm a network or system by flooding it with requests, making it inaccessible to users |
SQL injection | A technique where malicious code is inserted into a website form to manipulate or extract data. |
Ransomware | Telling the user their computer is infected to scare them into buying a solution |
Cybercriminal | An online/computer criminal |
Hacking | The use of computers to access data without authorisation |
Virus | Attach themselves to certain files and spread across a system |
Worm | A Self replicating type of malware |
Trojan | Malware disguised as something safe. |
Social Engineering | A way of gaining sensitive info by manipulating people usually over the phone or phishing emails |
Phishing | When emails or texts are sent pretending to be from a bank or retailer asking you for sensitive info |
Authentication | Can confirm the identity of a user before they're allowed to access certain pieces of data or features of the program. |
Patch | An update designed to make something better or more secure |
Privacy | Keeping things secret from others |
Encryption | The purpose of scrambling data so it can be sent securely over networks and requires a key to read the data |
Anti–Malware | Software designed to find and quarantine or remove malware |
Physical Security | Using physical methods to protect data e.g. locks, biometrics etc |
Penetration testing | A method of assessing the security of a system by simulating real–world attacks |
User Access Levels | Protecting a system by setting level of permissions and privileges granted to users |
Firewall | Blocks unauthorised access by scanning all data packets entering and leaving the network |
Operating System | Software that manages and controls the hardware and software resources of a computer. |
User interface | The interactive element of a system that allows user interaction e.g. GUI |
Memory management | Process of controlling and optimizing the allocation and use of RAM |
Peripheral management | Involves the control of external devices connected to a computer system. |
User management | Using the Operating System to have different users with different rights on a system |
File management | Using the Operating System to create, edit, rename, copy, move files and folders |
Drivers | software that allows an operating system to communicate with hardware devices |
Utility Software | Tools that assist in managing and maintaining computer systems e.g. degfragmentation |
Defragmentation | Utility which speeds up hard drive read/write access by moving files physically closer together |
Device Drivers | Software which allows Operating Systems to communicate with hardware devices |
Open Source | Freely licensed software – the code can be read and modified by anybody |
Proprietary | Privately owned, paid software which restricts user access and modification. |
Artificial Intelligence | A computer which can learn and give the appearance of being intelligent |
Ethical | Whether something is right or wrong to do |
Data Protection Act (2018) | UK legal Act regarding the handling of sensitive information such as personal details |
Computer Misuse Act (1990) | UK legal Act preventing the use of computers for crime or malicious purposes |
Copyright, Design and Patents Act (1988) | UK legal Act preventing the use of people's work without permission |
Plagiarism | The practice of taking someone else's work to claim as your own |
Piracy | Unauthorised copying of computer software/media |
Legal | Right and wrong in the eyes of the law |
Cultural Issues | How groups of people with particular beliefs or languages may be affected |
Environmental Issues | How we impact the natural world e.g. finite resources, e–waste |
Stakeholders | Individuals or groups who have an interest in or are affected by a scenario |
Censorship | When someone tries to control what other people can access on the internet |
Surveillance | When someone monitors what other people are accessing on the internet |
Cyberbullying | When somebody uses social media to deliberately harm someone else |
Trolling | When somone tries to cause public arguments online |
Digital Divide | Some people have access to technology that others do not and are therefore disadvantaged |
Global Divide | Some countries do not have the money or the infastructure to access technology like the internet |
E–Waste | Electronic waste where devices are thrown away |