click below
click below
Normal Size Small Size show me how
J277 Paper 1
Full Paper 1
| Term | Definition |
|---|---|
| FDE Cycle | Fetching instructions/data from memory, decoding them into binary and executing the instruction |
| Von Neuman Architecture | Computer system with instructions stored in memory which are fetched by the CPU |
| Arithmetic Logic Unit | Part of the CPU that performs all of the arithmetic and logical functions |
| Accumulator | Stores results of calculations and any data to be used in the calculations by the ALU |
| Control Unit | Part of the CPU that co–ordinates the flow of data within the computer system and executes instructions |
| Register | Fast access part of the processor that stores data being used by the CPU |
| Memory Address Register | CPU component that stores the address of data being accessed in memory. |
| Memory Data Register | Holds the actual data or instruction that has been fetched from memory |
| Program Counter | Holds the memory address of the next instruction to be fetched |
| Components | The devices and parts that make up a computer or device |
| Execution | To run an instruction or set of instructions |
| Clock Speed | Determines how many cycles of the Fetch Decode Execute cycle a CPU can complete in one second. |
| Cores | An independent processing unit within a CPU responsible for executing instructions. Allows multitasking. |
| Cache | Small, high–speed memory inside the CPU that stores frequently used instructions or data |
| Embedded System | A computer system that is built into an electronic device e.g. a microwave, or a washing machine |
| ROM | Type of non–volatile memory that holds crucial information such as the boot program (BIOS) |
| RAM | Volatile main memory of a computer that stores currently running applications |
| Virtual Memory | Using temporary space on your hard disk to act as RAM if your RAM is full |
| Primary Storage | Internal memory of a computer system that is directly accessible to the CPU e.g. RAM |
| Denary | Number system from 0–9 used by humans |
| Volatile | Term used to describe memory that requires power to maintain the data stored within it |
| Flash | Memory type used by SSDs, USB drives and SD cards (derived from solid–state storage) |
| Secondary Storage | Non–volatile method for storing data for long term use e.g. files and applications |
| Optical | Storage technology which involves the use of lasers to read and write data to a disc, e.g. CD, DVD |
| Magnetic | Storage technology which uses magnetic disks to stores the data (HDD) |
| Solid State | Storage technology that does not use any moving parts – stores the data with electrical signals. (SSD) |
| Capacity | Characteristic for how much data a storage device can hold. |
| Speed | Characteristic for the speed of data transfer on a storage device |
| Portability | Characteristic for whether you can move around with a storage device |
| Durability | Characteristic for how tough and robust a storage device is |
| Reliability | Characteristic for how dependable a storage device is |
| Cost | Characteristic for how much it costs for a storage device per Megabyte |
| Bit | The smallest value of binary i.e. 0 or 1 |
| Nibble | Binary unit of data made up of 4 bits |
| Byte | Binary unit consiting of 8 bits |
| Terabyte | Binary unit consisting of 1,024 gigabytes |
| Kilobyte | Binary unit consisting of 1,024 bytes |
| Gigabyte | Binary unit consisting of 1,024 megabytes |
| Binary | Number system that computers use to represent data/instructions because electricity has 2 states (on or off) |
| Overflow Error | When data does not fit into one byte after binary addition e.g. 100001000 |
| Binary Shift | When binary numbers shift to the left for multiplication and right for division |
| Character | Any letter, number or symbol used on a computer |
| Pixel | One individual dot of colour within an image; sometimes called an element |
| Resolution | The quality of an image indicated by the number of pixels used to create it |
| File Size | The number of bits used to store a whole file |
| Metadata | Extra Information about the data that allows a computer to recreate a file from binary e.g. height, width |
| Bit Rate | The number of bits used per second for sound/video data |
| Analogue | When data is in its original real–world format |
| Colour Depth | The number of bits used to represent the colour of each individual pixel |
| Hexadecimal | A number system with 16 possible options often used to represent colours on the web |
| Character Set | A set of available characters used by the computer e.g. ASCII, Unicode |
| ASCII | 8 bit Standard character set containing 128 characters for the English language |
| Extended ASCII | 8 bit Character set containing 256 characters for the main European languages |
| Unicode | 16 bit Character set containing millions of characters for all known languages and EMOJIS |
| Sample rate | The number of samples taken per second in audio recording. |
| Sound sampling | Converting analog audio into digital through measuring the height of the sound wave at regular intervals. |
| Bit depth | The number of bits used to represent each sample in digital audio |
| Digital | When data has been converted into binary format |
| Lossy Compression | Where data is lost during compression and cannot be restored e.g. JPEG |
| Lossless Compression | Where data is temporarily removed and can be restored upon decompression e.g. PNG |
| Compression | The process of reducing the physical size of files, normally for use online so they can be sent quickly |
| Internet | A worldwide network of computer networks; the hardware the WWW is stored on |
| Router | Device that receives and forwards data packets to the appropriate parts of a computer network |
| Packet | Formatted unit of data sent across networks |
| Server | Software that provides services to a client, or the hardware that is running it |
| Star Network | Topology that features a central connection point such as a switch or server |
| Network Interface Controller | Circuit board installed into a computer to allow it to connect to networks |
| Web Browser | An application used to browse the web |
| Search Engine | An application used to search the index of the WWW |
| Bandwidth | The amount of data that can be transmitted across a network e.g. 60mbps |
| Network | One or more computers connected together |
| HTML | The main markup language used for displaying web pages in a browser |
| LAN (Local Area Network) | Where computers are connected in a small geographical area and the hardware is owned by the organisation |
| WAN (Wide Area Network) | Where LANs are connected in different geographical locations and the hardware is owned by the ISP |
| Latency | The amount of delay from sending a request to a server until it is answered |
| Fibre Optic Cable | The fastest cable for data transfer which uses beams of light |
| CAT5 | Copper based cable used to connect devices to a switch/hub/server. Often called Ethernet |
| Topology | The layout of the network e.g. star, bus, ring |
| Coaxial Cables | Made of a single copper wire surrounded by plastic for insulation. Used for TV aerials |
| Client | A computer connected to a network which sends requests to a server |
| Client–server network | A system where multiple devices connect to a central server for data and resource sharing |
| Peer–Peer Network | All devices are equal connecting directly without a server |
| Mesh Topology | Decentralised network layout where devices are connected without a central server |
| Cloud | Using the Internet as remote service provision(e.g.storage,software, processing) |
| Hosting | When a business uses its servers to store files for another organisation |
| Web Server | A type of server used to host websites so they are always available |
| File Server | A type of server used for file storage/retrieval on the cloud |
| Virtual Network | A network which is entirely software based |
| DNS (Domain Name System) | System that translates human–readable URLS (such as www.example.com) into IP addresses (such as 192.168.0.1) |
| URL (Uniform Resource Locator) | A human readable website address e.g. www.bbc.co.uk |
| Protocol | A set of rules for transferring data |
| Mac Address | A unique number permanently assigned to every physical interface on a computer network |
| IP Address | Unique number assigned to every computer or device connected to the Internet |
| WWW | World Wide Web, a collection of web pages stored on the internet |
| VOIP | Voice over IP, communication online via video and audio |
| Ethernet | A wired network protocol used in LANs |
| Network standard | Provides rules for areas of computing allowing hardware/software to interact across different manufacturers/producers |
| WIFI | The standard for wireless networks using 2 frequencies 2.4GHz and 5GHz |
| Bluetooth | A wireless technology that allows devices to communicate and exchange data over short distances |
| Static IP | An IP address which doesn’t change usually used for websites |
| Dynamic IP | An IP which can change and are assigned by the network server |
| Packet Switching | Used by routers to direct data packets on the internet and other IP networks |
| Layers | A specific level or division of tasks within a protocol during the communication process |
| TCP/IP (Transmission Control Protocol/Internet Protocol) | Protocol used for transmitting data over the internet |
| HTTP (Hyper Text Transfer Protocol) | Protocol used for transmitting web pages and other content over the internet |
| HTTPS (Hyper Text Transfer Protocol Secure) | Secure version of HTTP |
| FTP (File Transfer Protocol) | Protocol used for transferring files between computers over the internet |
| SMTP (Simple Mail Transfer Protocol) | Protocol used for sending email messages between servers |
| POP3 (PostOfficeProtocol) | Protocol used for downloading email messages onto the device |
| IMAP (Internet Message Access Protocol) | Protocol used for retrieving email messages online |
| Malware | Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems |
| Data Interception | Using packet sniffers to intercept data during transmission |
| Brute–force attacks | A method of trying all possible combinations to guess a password or encryption key |
| Denial of Service Attack | Cyber attacks that overwhelm a network or system by flooding it with requests, making it inaccessible to users |
| SQL injection | A technique where malicious code is inserted into a website form to manipulate or extract data. |
| Ransomware | Telling the user their computer is infected to scare them into buying a solution |
| Cybercriminal | An online/computer criminal |
| Hacking | The use of computers to access data without authorisation |
| Virus | Attach themselves to certain files and spread across a system |
| Worm | A Self replicating type of malware |
| Trojan | Malware disguised as something safe. |
| Social Engineering | A way of gaining sensitive info by manipulating people usually over the phone or phishing emails |
| Phishing | When emails or texts are sent pretending to be from a bank or retailer asking you for sensitive info |
| Authentication | Can confirm the identity of a user before they're allowed to access certain pieces of data or features of the program. |
| Patch | An update designed to make something better or more secure |
| Privacy | Keeping things secret from others |
| Encryption | The purpose of scrambling data so it can be sent securely over networks and requires a key to read the data |
| Anti–Malware | Software designed to find and quarantine or remove malware |
| Physical Security | Using physical methods to protect data e.g. locks, biometrics etc |
| Penetration testing | A method of assessing the security of a system by simulating real–world attacks |
| User Access Levels | Protecting a system by setting level of permissions and privileges granted to users |
| Firewall | Blocks unauthorised access by scanning all data packets entering and leaving the network |
| Operating System | Software that manages and controls the hardware and software resources of a computer. |
| User interface | The interactive element of a system that allows user interaction e.g. GUI |
| Memory management | Process of controlling and optimizing the allocation and use of RAM |
| Peripheral management | Involves the control of external devices connected to a computer system. |
| User management | Using the Operating System to have different users with different rights on a system |
| File management | Using the Operating System to create, edit, rename, copy, move files and folders |
| Drivers | software that allows an operating system to communicate with hardware devices |
| Utility Software | Tools that assist in managing and maintaining computer systems e.g. degfragmentation |
| Defragmentation | Utility which speeds up hard drive read/write access by moving files physically closer together |
| Device Drivers | Software which allows Operating Systems to communicate with hardware devices |
| Open Source | Freely licensed software – the code can be read and modified by anybody |
| Proprietary | Privately owned, paid software which restricts user access and modification. |
| Artificial Intelligence | A computer which can learn and give the appearance of being intelligent |
| Ethical | Whether something is right or wrong to do |
| Data Protection Act (2018) | UK legal Act regarding the handling of sensitive information such as personal details |
| Computer Misuse Act (1990) | UK legal Act preventing the use of computers for crime or malicious purposes |
| Copyright, Design and Patents Act (1988) | UK legal Act preventing the use of people's work without permission |
| Plagiarism | The practice of taking someone else's work to claim as your own |
| Piracy | Unauthorised copying of computer software/media |
| Legal | Right and wrong in the eyes of the law |
| Cultural Issues | How groups of people with particular beliefs or languages may be affected |
| Environmental Issues | How we impact the natural world e.g. finite resources, e–waste |
| Stakeholders | Individuals or groups who have an interest in or are affected by a scenario |
| Censorship | When someone tries to control what other people can access on the internet |
| Surveillance | When someone monitors what other people are accessing on the internet |
| Cyberbullying | When somebody uses social media to deliberately harm someone else |
| Trolling | When somone tries to cause public arguments online |
| Digital Divide | Some people have access to technology that others do not and are therefore disadvantaged |
| Global Divide | Some countries do not have the money or the infastructure to access technology like the internet |
| E–Waste | Electronic waste where devices are thrown away |