click below
click below
Normal Size Small Size show me how
IB Computer Science
Term | Definition |
---|---|
Peripheral | Auxiliary device that can connect to, communicate and work with the computer (e.g. input/output devices, printers, etc). |
GUI | Allow users to interact with software in different ways |
Collecting info from stakeholders | interviews-face-to-face with verbal responses. can be structured with the same questions and manner for every stakeholder, or unstructured with more flexibility. reasons for: -talk directly to users/members of the organization and can observe non-verbal |
prototyping | Simply, a Prototype is an early version or model of a System. It will typically: -Display the minimum necessary features, sued to test and gather feedback on a new concept or system from clients. -Allows stakeholders to gain an idea of how the system wo |
MAR | Stores the Memory Address of next data/instruction to be decoded and executed by the ALU. In order for the MAR to communicate with the Primary Memory, it connect through the Memory Address Bus. |
CPU | A hardware component of a computer system and can perform basic arithmetic, logical or input/output operations; essentially the 'brain' of the computer system. Also known as the 'Processor'. The CPU contains the Control Unit; Arithmetic Logic Unit; Memo |
Compilers - Unit 4 | When a high-level language is translated into lower-level language. Translation into machine code for final execution. |
Protocols in communication - Unit 3 - textbook | 1.The presence of an identified sender 2.The presence of an identified receiver 3.The presence of an agreed-upon method of communicating 4.The presence of a common language 5.The presence of a common grammar 6.The presence of an agreed-upon speed an |
PANs | Network covering individuals Workspace, essentially a LAN which only supports 1 person, instead of a group of people |
Packet switching - Unit 3 - textbook | Network communication method that creates and transmits small units of data, called packets, through a network, independently of the overall message. |
Data loss | Causes: -User -Natural Disasters -Malicious Activities -Corruption Consequences: These can be Serious and Fatal and may have Enormous Costs. Could possibly Los Customers and severely damage company Reputation, or may Inconvenience users by failing |
Backup strategies - Unit 1 - textbook - possibly pg. 19 | |
Software testing - beta testing | Testing prior to the Release.Performed by end-users outside of Development to receive real-world Feedback.The involvement of other uses can increase the objectivity of Evaluation.However, user reports are not of technical quality, and there are many repor |
RAM | Stores executing data and instructions of program currently being run. Data is stored in Unique Memory Location; each of these Locations has an Address as well as Content. RAM is a 'General Purpose' storage area, since data stored can be overwritten and |
Persistent storage - Unit 2 - possibly pg. 9 | |
application software | - Word Processors - Spreadsheets - Database Management - Web Browsers - Computer Aided Design CAD - Graphic Processing - Email |
security methods on a wireless network - Unit 3 - textbook | - Use a password to access your device - Install an antivirus program on your device - Use a software firewall installed on each device - Use a password to access the web interface that is used to setup your wireless routers or access points - Turn On |
Why speeds are affected on a wireless network | - Bandwidth - Data transfer Rate of Storage Devices - PC System Performance |
Businesses merging - implications | Issues: - Language Differences - Software Incompatibility - Legacy Systems Strategies: - Keep both systems, and develop them to have the same functionality. High maintenance cost. Consideration of the time frame this will take place within. - Repl |
WAN V LAN | WAN - Connects different computer systems or LANs from different geographical areas, can span over a city, country or the world. A WAN would require Security; using login, passwords, security questions and encryption. LAN - Network devices are connecte |
'Usability' definition | Means making the computer systems easy to use, matching them more closely to user needs and requirements. Ability to accomplish user goals. More usable means more efficient to use, easier to learn and acquire the functions of the system. |
cache memory | RAM can be further distinguished into 2 Types: 1. Dynamic RAM 2. Static RAM DRAM is used as the primary source of RAM in a Computer System. However, SRAM is faster; and a small section of SRAM, known as the Cache Memory is placed between the main RAM |
The use of standards in network construction | Common Rules and Standards are crucial to the formation of a Network, otherwise Systems may not be able to connect and communicate due to Incompatibility. Standards play an important role in the construction of Networks; and can be thought of a common 'L |
Functions of web browsers | Used to access, retrieved and present content on the World-side Web. Connects to web servers to request information. |
Compression - purpose of/ types of | Lossy Compression - Permanently deletes certain information, only part of the original data is displayed when compressed. This is an acceptable solution for formats such as JPEG, GIF, MP3 as the difference isn't easily noticed. Lossless Compression - O |