Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

J277 Paper 1

Full Paper 1

TermDefinition
FDE Cycle Fetching instructions/data from memory, decoding them into binary and executing the instruction
Von Neuman Architecture Computer system with instructions stored in memory which are fetched by the CPU
Arithmetic Logic Unit Part of the CPU that performs all of the arithmetic and logical functions
Accumulator Stores results of calculations and any data to be used in the calculations by the ALU
Control Unit Part of the CPU that co–ordinates the flow of data within the computer system and executes instructions
Register Fast access part of the processor that stores data being used by the CPU
Memory Address Register CPU component that stores the address of data being accessed in memory.
Memory Data Register Holds the actual data or instruction that has been fetched from memory
Program Counter Holds the memory address of the next instruction to be fetched
Components The devices and parts that make up a computer or device
Execution To run an instruction or set of instructions
Clock Speed Determines how many cycles of the Fetch Decode Execute cycle a CPU can complete in one second.
Cores An independent processing unit within a CPU responsible for executing instructions. Allows multitasking.
Cache Small, high–speed memory inside the CPU that stores frequently used instructions or data
Embedded System A computer system that is built into an electronic device e.g. a microwave, or a washing machine
ROM Type of non–volatile memory that holds crucial information such as the boot program (BIOS)
RAM Volatile main memory of a computer that stores currently running applications
Virtual Memory Using temporary space on your hard disk to act as RAM if your RAM is full
Primary Storage Internal memory of a computer system that is directly accessible to the CPU e.g. RAM
Denary Number system from 0–9 used by humans
Volatile Term used to describe memory that requires power to maintain the data stored within it
Flash Memory type used by SSDs, USB drives and SD cards (derived from solid–state storage)
Secondary Storage Non–volatile method for storing data for long term use e.g. files and applications
Optical Storage technology which involves the use of lasers to read and write data to a disc, e.g. CD, DVD
Magnetic Storage technology which uses magnetic disks to stores the data (HDD)
Solid State Storage technology that does not use any moving parts – stores the data with electrical signals. (SSD)
Capacity Characteristic for how much data a storage device can hold.
Speed Characteristic for the speed of data transfer on a storage device
Portability Characteristic for whether you can move around with a storage device
Durability Characteristic for how tough and robust a storage device is
Reliability Characteristic for how dependable a storage device is
Cost Characteristic for how much it costs for a storage device per Megabyte
Bit The smallest value of binary i.e. 0 or 1
Nibble Binary unit of data made up of 4 bits
Byte Binary unit consiting of 8 bits
Terabyte Binary unit consisting of 1,024 gigabytes
Kilobyte Binary unit consisting of 1,024 bytes
Gigabyte Binary unit consisting of 1,024 megabytes
Binary Number system that computers use to represent data/instructions because electricity has 2 states (on or off)
Overflow Error When data does not fit into one byte after binary addition e.g. 100001000
Binary Shift When binary numbers shift to the left for multiplication and right for division
Character Any letter, number or symbol used on a computer
Pixel One individual dot of colour within an image; sometimes called an element​
Resolution The quality of an image indicated by the number of pixels used to create it​
File Size The number of bits used to store a whole file
Metadata Extra Information about the data that allows a computer to recreate a file from binary e.g. height, width
Bit Rate The number of bits used per second for sound/video data
Analogue When data is in its original real–world format
Colour Depth The number of bits used to represent the colour of each individual pixel​
Hexadecimal A number system with 16 possible options often used to represent colours on the web​
Character Set A set of available characters used by the computer e.g. ASCII, Unicode
ASCII 8 bit Standard character set containing 128 characters for the English language
Extended ASCII 8 bit Character set containing 256 characters for the main European languages
Unicode 16 bit Character set containing millions of characters for all known languages and EMOJIS
Sample rate The number of samples taken per second in audio recording.
Sound sampling Converting analog audio into digital through measuring the height of the sound wave at regular intervals.
Bit depth The number of bits used to represent each sample in digital audio
Digital When data has been converted into binary format
Lossy Compression Where data is lost during compression and cannot be restored e.g. JPEG
Lossless Compression Where data is temporarily removed and can be restored upon decompression e.g. PNG
Compression The process of reducing the physical size of files, normally for use online so they can be sent quickly
Internet A worldwide network of computer networks; the hardware the WWW is stored on
Router Device that receives and forwards data packets to the appropriate parts of a computer network
Packet Formatted unit of data sent across networks
Server Software that provides services to a client, or the hardware that is running it
Star Network Topology that features a central connection point such as a switch or server
Network Interface Controller Circuit board installed into a computer to allow it to connect to networks
Web Browser An application used to browse the web
Search Engine An application used to search the index of the WWW
Bandwidth The amount of data that can be transmitted across a network e.g. 60mbps
Network One or more computers connected together
HTML The main markup language used for displaying web pages in a browser
LAN (Local Area Network) Where computers are connected in a small geographical area and the hardware is owned by the organisation
WAN (Wide Area Network) Where LANs are connected in different geographical locations and the hardware is owned by the ISP
Latency The amount of delay from sending a request to a server until it is answered
Fibre Optic Cable The fastest cable for data transfer which uses beams of light
CAT5 Copper based cable used to connect devices to a switch/hub/server. Often called Ethernet
Topology The layout of the network e.g. star, bus, ring
Coaxial Cables Made of a single copper wire surrounded by plastic for insulation. Used for TV aerials
Client A computer connected to a network which sends requests to a server
Client–server network A system where multiple devices connect to a central server for data and resource sharing
Peer–Peer Network All devices are equal connecting directly without a server
Mesh Topology Decentralised network layout where devices are connected without a central server
Cloud Using the Internet as remote service provision(e.g.storage,software, processing)
Hosting When a business uses its servers to store files for another organisation
Web Server A type of server used to host websites so they are always available
File Server A type of server used for file storage/retrieval on the cloud
Virtual Network A network which is entirely software based
DNS (Domain Name System) System that translates human–readable URLS (such as www.example.com) into IP addresses (such as 192.168.0.1)
URL (Uniform Resource Locator) A human readable website address e.g. www.bbc.co.uk
Protocol A set of rules for transferring data
Mac Address A unique number permanently assigned to every physical interface on a computer network
IP Address Unique number assigned to every computer or device connected to the Internet
WWW World Wide Web, a collection of web pages stored on the internet
VOIP Voice over IP, communication online via video and audio
Ethernet A wired network protocol used in LANs
Network standard Provides rules for areas of computing allowing hardware/software to interact across different manufacturers/producers
WIFI The standard for wireless networks using 2 frequencies 2.4GHz and 5GHz
Bluetooth A wireless technology that allows devices to communicate and exchange data over short distances
Static IP An IP address which doesn’t change usually used for websites
Dynamic IP An IP which can change and are assigned by the network server
Packet Switching Used by routers to direct data packets on the internet and other IP networks
Layers A specific level or division of tasks within a protocol during the communication process
TCP/IP (Transmission Control Protocol/Internet Protocol) Protocol used for transmitting data over the internet
HTTP (Hyper Text Transfer Protocol) Protocol used for transmitting web pages and other content over the internet
HTTPS (Hyper Text Transfer Protocol Secure) Secure version of HTTP
FTP (File Transfer Protocol) Protocol used for transferring files between computers over the internet
SMTP (Simple Mail Transfer Protocol) Protocol used for sending email messages between servers
POP3 (PostOfficeProtocol) Protocol used for downloading email messages onto the device
IMAP (Internet Message Access Protocol) Protocol used for retrieving email messages online
Malware Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems
Data Interception Using packet sniffers to intercept data during transmission
Brute–force attacks A method of trying all possible combinations to guess a password or encryption key
Denial of Service Attack Cyber attacks that overwhelm a network or system by flooding it with requests, making it inaccessible to users
SQL injection A technique where malicious code is inserted into a website form to manipulate or extract data.
Ransomware Telling the user their computer is infected to scare them into buying a solution
Cybercriminal An online/computer criminal
Hacking The use of computers to access data without authorisation
Virus Attach themselves to certain files and spread across a system
Worm A Self replicating type of malware
Trojan Malware disguised as something safe.
Social Engineering A way of gaining sensitive info by manipulating people usually over the phone or phishing emails
Phishing When emails or texts are sent pretending to be from a bank or retailer asking you for sensitive info
Authentication Can confirm the identity of a user before they're allowed to access certain pieces of data or features of the program.
Patch An update designed to make something better or more secure
Privacy Keeping things secret from others
Encryption The purpose of scrambling data so it can be sent securely over networks and requires a key to read the data
Anti–Malware Software designed to find and quarantine or remove malware
Physical Security Using physical methods to protect data e.g. locks, biometrics etc
Penetration testing A method of assessing the security of a system by simulating real–world attacks
User Access Levels Protecting a system by setting level of permissions and privileges granted to users
Firewall Blocks unauthorised access by scanning all data packets entering and leaving the network
Operating System Software that manages and controls the hardware and software resources of a computer.
User interface The interactive element of a system that allows user interaction e.g. GUI
Memory management Process of controlling and optimizing the allocation and use of RAM
Peripheral management Involves the control of external devices connected to a computer system.
User management Using the Operating System to have different users with different rights on a system
File management Using the Operating System to create, edit, rename, copy, move files and folders
Drivers software that allows an operating system to communicate with hardware devices
Utility Software Tools that assist in managing and maintaining computer systems e.g. degfragmentation
Defragmentation Utility which speeds up hard drive read/write access by moving files physically closer together
Device Drivers Software which allows Operating Systems to communicate with hardware devices
Open Source Freely licensed software – the code can be read and modified by anybody
Proprietary Privately owned, paid software which restricts user access and modification.
Artificial Intelligence A computer which can learn and give the appearance of being intelligent
Ethical Whether something is right or wrong to do
Data Protection Act (2018) UK legal Act regarding the handling of sensitive information such as personal details
Computer Misuse Act (1990) UK legal Act preventing the use of computers for crime or malicious purposes
Copyright, Design and Patents Act (1988) UK legal Act preventing the use of people's work without permission
Plagiarism The practice of taking someone else's work to claim as your own
Piracy Unauthorised copying of computer software/media
Legal Right and wrong in the eyes of the law
Cultural Issues How groups of people with particular beliefs or languages may be affected
Environmental Issues How we impact the natural world e.g. finite resources, e–waste
Stakeholders Individuals or groups who have an interest in or are affected by a scenario
Censorship When someone tries to control what other people can access on the internet
Surveillance When someone monitors what other people are accessing on the internet
Cyberbullying When somebody uses social media to deliberately harm someone else
Trolling When somone tries to cause public arguments online
Digital Divide Some people have access to technology that others do not and are therefore disadvantaged
Global Divide Some countries do not have the money or the infastructure to access technology like the internet
E–Waste Electronic waste where devices are thrown away
Created by: weirdog
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards