Computer Science A-level Unit 1

?
R V P U S D Q G D O V U S E P O C U I X U
E Q S G W U M H O U I M X X D N J S Q U T
T X D G Y G R D N G I E Q C L D H S F Q D
S L N V R Y X B C F E Y K T M E C J Y X O
I R T A W P N L W V T O Q K V M Y D G H Y
G O I U R M H O Q F H V B V N A X W S E D
E R A U T H E N T I C A T I O N I O V N W
R X T E M P O R A L R E D U N D A N C Y E
X T I X W Y F M F P Q O A I N B V T B O Q
E N C R Y P T I O N A L G O R I T H M Q P
D A T T H C S Q T T H H A O L T E X M D R
N U E B G G S C D M Q L N R K S R V B V Y
I D E V I C E M A N A G M E N T X G F Q R
X L Q E J R P C D I E C E H O R Q C Q N L
I C O M P U T E R E T H I C S E D S U F R
R E A L T I M E B I T S T R E A M I N G L
E P R O G R A M L I B R A R Y M W A P I V
C R P Q R E J P M M W R X D E I H D W C T
O P E R A T I N G S Y S T E M N J K J B M
L H L R O I K H E T X O K E B G S B A C F
D J C X M X B B N X Q G C X L A S X E A G

Clues

  • A software platform that provides facilities for programs to be run which are of benefit to a user. It is an example of system software. (9, 6)
  • It allows the user to 'catch-up' on broadcast that they may have missed. The bit stream is saved to the device's secondary storage (hard drive) and can then be watched by the user when convenient. (2, 6, 3, 9)
  • It exists between successive pictures e.g. the current frame and the subsequent frame in a video file. Where relatively little changed from one frame to the next. (8, 10)
  • It is a file that contains code/routines that can be used by other programs. Programmers have access to these and can incorporate the library routines in their code. It saves time as the programmer can use the code that has already been written. (7, 7)
  • It is where the usage of the device is controlled by the OS following installation of device driver software. (6, 9)
  • It stores a value but is only used for indexed addressing. (2, 5, 8)
  • The moral principles governing the design, building, implementation and use of computer systems. (8, 6)
  • The process that uses the key to encrypt the data. It uses maths and logic to 'mix' the key with the data so that the data becomes unreadable. Different keys can be used with the same algorithm to produce different results. (10, 9)
  • The verification of a user's identity. It is the main feature of a user account including methods such as a password and biometrics e.g. fingerprint or retina scans. (14)
  • This allows a user to watch 'live' events that are usually used on mobile and other devices over a wireless connection. (4, 4, 3, 9)

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Unit 1 resources »