Computing End of Year

?
What is a computer?
A machine that processes data.
1 of 46
What is an embedded system?
A computer system inside a larger system.
2 of 46
What does CPU stand for?
Central Processing Unit
3 of 46
What does the CPU do?
Process all data and instructions to make the system work.
4 of 46
Name three factors processing power depends on
Clock speed, cache size and number of cores.
5 of 46
What is the CU
Control Unit
6 of 46
What does the CU do?
Execute instructions following the fetch-decode-execute cycle and controls flow of data inside the CPU.
7 of 46
What does the ALU stand for?
Arithmetic Logic Unit
8 of 46
What does the ALU do?
Does calculations and performs logic operations
9 of 46
What is the cache?
Very fast memory in the CPU which stores regularly used data.
10 of 46
What is RAM? (Random Access Memory)
High speed volatile memory which can be read and written to.
11 of 46
What is volatile memory?
Memory which is temporary and requires power.
12 of 46
What is non-volatile memory?
Memory that is permanent and keeps content without having power.
13 of 46
What is main memory used for?
Storing programs that aren't being used.
14 of 46
What happens to the operating system when a computer is turned on?
It is copied from secondary storage to RAM>
15 of 46
What is virtual memory?
Secondary storage used as extra RAM.
16 of 46
What happens when RAM is full?
The computer moves data that hasn't recently been used to a location on secondary storage called virtual memory.
17 of 46
When is virtual memory used?
When too many programs or applications are open at once.
18 of 46
What is ROM?
Read only memory
19 of 46
What does ROM do?
Tell the CPU how to boot up. It is non-volatile.
20 of 46
What are the two main types of storage?
Primary and Secondary
21 of 46
What is primary storage?
Areas that the CPU can access fast like ROM/RAM and cache. It is fast memory.
22 of 46
What is secondary storage?
Non-volatile storage where apps and data are stored.
23 of 46
What is a magnetic hard disk?
High capacity and reliable storage, internal storage. The HHD is made from a stack of magnetised metal disks.
24 of 46
Disadvantages of HDDs.
Can be damaged easily by dropping or from shock.
25 of 46
What is the internet?
A worldwide collection of networks. A WAN connecting networks all over the world.
26 of 46
What is the World Wide Web?
A collection of websites hosted on web servers that can be accessed through the http protocol.
27 of 46
What is a URL?
An address used to access web servers.
28 of 46
What is a domain name system (DNS)?
A DNS translates a website's domain name into an IP address.
29 of 46
What is a virtual network?
A software based network.
30 of 46
What is a VPN?
A virtual network used to privately send data securely over a large network.
31 of 46
What is a LAN?
Local Area Network -covers a small area on a single site
32 of 46
What is a LAN typically used for?
Small organisations, businesses and schools.
33 of 46
Why should you use a LAN?
Sharing files is easier, you can share hardware, share internet connection and install programs on all computers at once. Also user accounts stored centrally.
34 of 46
How do wireless networks work?
They use radio waves to transmit data.
35 of 46
Compare 2.4ghz and 5ghz frequency bands
2.4ghz has a greater range and is good going through walls whereas 5ghz is very fast at a short distance.
36 of 46
What are devices connect to a client server network called?
Clients
37 of 46
What is a protocol?
A set of rules for how devices should communicate
38 of 46
What do protocols do?
Cover how communication between two devices should start and end and how data should be organised.
39 of 46
What is a MAC address used for?
Communication on the same network
40 of 46
What is an IP address used for?
Communication between different networks
41 of 46
What is a passive attack?
When someone monitors data travelling and intercepts the sensitive data.
42 of 46
What is an active attack?
When someone attacks a network with malware.
43 of 46
What is a insider attack?
Someone with access to data will exploit it and steal information.
44 of 46
What is a brute force attack?
A type of active attack using trial and error on passwords.
45 of 46
What is a DoS attack?
Denial of service attack
46 of 46

Other cards in this set

Card 2

Front

What is an embedded system?

Back

A computer system inside a larger system.

Card 3

Front

What does CPU stand for?

Back

Preview of the front of card 3

Card 4

Front

What does the CPU do?

Back

Preview of the front of card 4

Card 5

Front

Name three factors processing power depends on

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Computer systems resources »