Computing End of Year
5.0 / 5 based on 1 rating
- Created by: harrylonghurst
- Created on: 09-06-19 12:35
What is a computer?
A machine that processes data.
1 of 46
What is an embedded system?
A computer system inside a larger system.
2 of 46
What does CPU stand for?
Central Processing Unit
3 of 46
What does the CPU do?
Process all data and instructions to make the system work.
4 of 46
Name three factors processing power depends on
Clock speed, cache size and number of cores.
5 of 46
What is the CU
Control Unit
6 of 46
What does the CU do?
Execute instructions following the fetch-decode-execute cycle and controls flow of data inside the CPU.
7 of 46
What does the ALU stand for?
Arithmetic Logic Unit
8 of 46
What does the ALU do?
Does calculations and performs logic operations
9 of 46
What is the cache?
Very fast memory in the CPU which stores regularly used data.
10 of 46
What is RAM? (Random Access Memory)
High speed volatile memory which can be read and written to.
11 of 46
What is volatile memory?
Memory which is temporary and requires power.
12 of 46
What is non-volatile memory?
Memory that is permanent and keeps content without having power.
13 of 46
What is main memory used for?
Storing programs that aren't being used.
14 of 46
What happens to the operating system when a computer is turned on?
It is copied from secondary storage to RAM>
15 of 46
What is virtual memory?
Secondary storage used as extra RAM.
16 of 46
What happens when RAM is full?
The computer moves data that hasn't recently been used to a location on secondary storage called virtual memory.
17 of 46
When is virtual memory used?
When too many programs or applications are open at once.
18 of 46
What is ROM?
Read only memory
19 of 46
What does ROM do?
Tell the CPU how to boot up. It is non-volatile.
20 of 46
What are the two main types of storage?
Primary and Secondary
21 of 46
What is primary storage?
Areas that the CPU can access fast like ROM/RAM and cache. It is fast memory.
22 of 46
What is secondary storage?
Non-volatile storage where apps and data are stored.
23 of 46
What is a magnetic hard disk?
High capacity and reliable storage, internal storage. The HHD is made from a stack of magnetised metal disks.
24 of 46
Disadvantages of HDDs.
Can be damaged easily by dropping or from shock.
25 of 46
What is the internet?
A worldwide collection of networks. A WAN connecting networks all over the world.
26 of 46
What is the World Wide Web?
A collection of websites hosted on web servers that can be accessed through the http protocol.
27 of 46
What is a URL?
An address used to access web servers.
28 of 46
What is a domain name system (DNS)?
A DNS translates a website's domain name into an IP address.
29 of 46
What is a virtual network?
A software based network.
30 of 46
What is a VPN?
A virtual network used to privately send data securely over a large network.
31 of 46
What is a LAN?
Local Area Network -covers a small area on a single site
32 of 46
What is a LAN typically used for?
Small organisations, businesses and schools.
33 of 46
Why should you use a LAN?
Sharing files is easier, you can share hardware, share internet connection and install programs on all computers at once. Also user accounts stored centrally.
34 of 46
How do wireless networks work?
They use radio waves to transmit data.
35 of 46
Compare 2.4ghz and 5ghz frequency bands
2.4ghz has a greater range and is good going through walls whereas 5ghz is very fast at a short distance.
36 of 46
What are devices connect to a client server network called?
Clients
37 of 46
What is a protocol?
A set of rules for how devices should communicate
38 of 46
What do protocols do?
Cover how communication between two devices should start and end and how data should be organised.
39 of 46
What is a MAC address used for?
Communication on the same network
40 of 46
What is an IP address used for?
Communication between different networks
41 of 46
What is a passive attack?
When someone monitors data travelling and intercepts the sensitive data.
42 of 46
What is an active attack?
When someone attacks a network with malware.
43 of 46
What is a insider attack?
Someone with access to data will exploit it and steal information.
44 of 46
What is a brute force attack?
A type of active attack using trial and error on passwords.
45 of 46
What is a DoS attack?
Denial of service attack
46 of 46
Other cards in this set
Card 2
Front
What is an embedded system?
Back
A computer system inside a larger system.
Card 3
Front
What does CPU stand for?
Back
Card 4
Front
What does the CPU do?
Back
Card 5
Front
Name three factors processing power depends on
Back
Related discussions on The Student Room
- What do you do in computer science and how often a week do you have lessons on it? »
- Software engineering »
- Biomedical Eng vs Chem Eng vs EEE vs CompSci »
- computer science vs software engineering »
- Should I switch to comp sci with AI or stick with regular computer science »
- QMUL Engineering & Sciences Thread 2022-2023 »
- lancaster uni cs »
- MSc in computer science without degree in CS »
- need to choose last 2 options for UCAS application still »
- computer science vs EE for programming jobs e.g software engineering »
Similar Computing resources:
3.0 / 5 based on 1 rating
4.0 / 5 based on 1 rating
0.0 / 5
0.0 / 5
0.0 / 5
0.0 / 5
0.0 / 5
4.5 / 5 based on 2 ratings
5.0 / 5 based on 2 ratings
0.0 / 5
Comments
No comments have yet been made