Computing Topics to Revise

?
  • Created by: brynclark
  • Created on: 07-06-17 14:07
Control Unit
Controls and coordinates the activities of the CPU, directing the flow of data between the CPU and other devices
1 of 82
Address Bus
When the CPU wants to access a particular main memory location, it sends the address to memory via this
2 of 82
Data Bus
Used to send data from memory to the CPU and visa versa
3 of 82
Control Bus
Used to send control signals from memory to the CPU and visa versa
4 of 82
Arithmetic Logic Unit
Performs arithmetic (ADD, SUB) and logical (OR, AND) operations on data
5 of 82
Program Counter
Holds the address of the next instruction to be executed
6 of 82
Current Instruction Register (CIR)
Holds the current instruction being executed, divided into operand and opcodes
7 of 82
Memory address register
Memory Address Registers Holds the location in memory (address) of the next piece of data or program to be fetched (or stored).
8 of 82
Memory Data Register
Temporarily hold instructions fetched from memory
9 of 82
RISC
Small instruction set, fewer transistors needed, cheaper to produce
10 of 82
CISC
Larger instruction set, used to perform tasks in a few lines of assembly code
11 of 82
GPU
A specialised CPU that is used for rendering graphics, designed to perform simple instructions of small amounts of data
12 of 82
Virtual Memory
When the hard disk is used as an extension of primary storage (RAM), e.g. when MS Word is open but you're not using it
13 of 82
OS - Multi-tasking
CPU switches from one program to another quickly to give the appearance of multi-tasking
14 of 82
OS - Multi-user
Allows more than one person to share a computer's resources at the same time by a mainframe computer
15 of 82
OS - Distributed
Combines the power of multiple computers, presenting them to the end user as if they were a single system
16 of 82
OS - Embedded
Carry out a single function, low powered CPUs and little RAM, e.g. card machines
17 of 82
OS - Real-time
Carry out a process in a guaranteed amount of time, e.g. safety critical systems
18 of 82
Assembler
Low-level assembly language to machine code, processor specific
19 of 82
Interpreter
Looks at each line of source code, if there are no syntax errors, it translates and runs it
20 of 82
Compiler
Translates all the source code and translates it into object code
21 of 82
SoC 1 - Lexical Analysis
Removes blank spaces and comments
22 of 82
SoC 2 - Syntax Analysis
Checks the syntax of the code against the rules
23 of 82
SoC 3 and 4 - Code Generation and Optimisation
High level code translated into machine code statements, optimisation techniques reduces execution time
24 of 82
Linker
Links the instructions from external subroutines into memory
25 of 82
Loader
Load the external object code anywhere in memory
26 of 82
Libraries
Pre-compiled programs that can be run when needed, saves time for the programmer
27 of 82
Direct Addressing
The address given is the location of the data to be used. E.g. LDA 43 loads the contents of memory location 43 into the accumulator
28 of 82
Indirect Addressing
The Address given is the memory location that holds the location of the data. E.g. if the memory location 43 contains the value 119, then the value in the memory address 119 is loaded into the accumulator
29 of 82
Indexed Addressing
The value given is added to the value stored in the index register to give the memory location. E.g. if the value in the index register is 100, LDA 43 will take the value in the memory address 143 and load it into the accumulator
30 of 82
Immediate Addressing
The Address given is not actually an address but the required value. LDA 43 would mean load the value 43 into the accumulator
31 of 82
Class
A template used to define an object. It specifies the methods and attributes an object should have
32 of 82
Object
An instance of a class
33 of 82
Method
A subroutine associated with an object. “new” is a special type of method called a constructor. Constructors define how an object is created
34 of 82
Attribute
Variables contained within and associated to an object
35 of 82
Encapsulation
Ensuring private attributes can only be amended through public methods. This prevents objects from being manipulated in unintended ways
36 of 82
Inheritance
The ability for a class to inherit the methods and attributes of a parent class. It’s ‘child’ class can have its own methods and attributes and override methods of its parent class
37 of 82
Polymorphism
Meaning ‘many forms’, is the ability for objects of different classes to be treated in the same way, e.g. different methods maybe applied to different objects of different classes
38 of 82
Lossless Compression - Dictionary Coding
Builds and index containing every data item and an index reference. The compressed file consists of the index, and the sequence of occurrences
39 of 82
Lossless Compression - Run Length Encoding
All that is stored is the data item along with how many times it is repeated, common with storing images
40 of 82
Symmetric Encryption
Same key used to encrypting and decryption, danger of interception or key generation
41 of 82
Asymmetric Encryption
Different keys for encryption and decryption, known as public and private keys, more secure
42 of 82
ACID - Atomicity
A change to a database is either completely performed or not at all, a half-completed change MUST NOT be saved back to the database
43 of 82
ACID - Consistency
Any change in the database must retain the overall state of the database
44 of 82
ACID - Isolation
A transaction must not be interrupted by another transaction, it must occur in isolation so that other users or processes cannot have access to the data concerned
45 of 82
ACID - Durability
Once a change has been made to a database it must not be lost due to a system failure
46 of 82
Domain Name System (DNS)
Identifies the area or domain that an internet resource resides in e.g. ".co.uk"
47 of 82
Bus Topology
All the computers are connected to a single cable. The ends of the cable are plugged into a terminator
48 of 82
Star Topology
Has a central node, which maybe a switch or a computer which acts as a router to transmit messages. A switch keeps a record of all the MAC addresses of each device on the network so it can identify which computer to send data.
49 of 82
Mesh Topology
Each node is connected to every other node, only one node requires a connection to the internet in order to share this connection.
50 of 82
Circuit Switching
Circuit switching creates a direct link between two devices for the duration of the communication. E.g. Public telephone system. Packets must be sent and received in the same order
51 of 82
Packet Switching
This is a method of communicating packets of data across a network on which other similar communications are happening simultaneously. Data arrives in a series of packets and is reassembled.
52 of 82
TCP/IP Stack
Used worldwide to enable computers to communicate regardless of location.
53 of 82
TCP/IP - Application
Uses protocols relating to the application being used, e.g. HTTP for the browser.
54 of 82
TCP/IP - Transport
Packets are split and labelled with the port and where it is in the sequence.
55 of 82
TCP/IP - Network
Adds the IP address so it can be routed to the correct device, the addition of the IP address to the port number forms a socket that specifies which device the packet is being sent to and the application to be used.
56 of 82
TCP/IP - Link
Physical connection between network nodes. It adds the unique MAC Address and identifies the network interface cards of the source and destination computers.
57 of 82
File Transfer Protocol (FTP)
FTP is a very efficient method of transferring data across a network. Works as a high level protocol in the application layer using the appropriate software.
58 of 82
Firewall
Filter communications in and out of networks using a set of rules
59 of 82
Proxy
Another physical computer placed between a network and a remote source, configured as a hardware firewall
60 of 82
Network Interface Cards (NIC)
Receive and send electrical signals across a network, designed to work with standards e.g. Ethernet
61 of 82
Router
Used to connect networks, receives packets and forwards them to the correct location
62 of 82
Switch
A device to connect devices together on a network, makes use of physical hardware MAC addresses
63 of 82
Hubs
A connectivity device that broadcasts a signal to all possible destinations at once
64 of 82
Wireless Access Points (WAP)
Makes use of wireless to connect a node to a Wi-Fi network
65 of 82
Transmission Media
Physical medium to transmit data, older slower coaxial copper cables, and quicker fibre optic cables
66 of 82
Search Engine Indexing
The actual process of a particular search engine, collecting, sorting, and storing data into its index
67 of 82
PageRank Algorithm
Compiles and ranks website pages and results list when you perform a search
68 of 82
Array
A static data structure that stores multiple items that are the same data type under a shared common name
69 of 82
Record
A collection of related fields under one name, a field is a variable and each one can have a different data type
70 of 82
Tuple
An immutable list, cannot be changed once created
71 of 82
List
An abstract data type consisting of a number of items in which the same item can occur more than once
72 of 82
Linked List
A dynamic data structure used to hold a sequence, each item contains a data field and a pointer
73 of 82
Graph
A set or vertices/nodes connected by edges. Edges can may be one way or two way and can also be weighted
74 of 82
Queue
A first in first out (FIFO) data structure, items are added to the rear and retrieved from the front
75 of 82
Stack
A last in last out data structure (LIFO), items are pushed on the top and popped as well from the top
76 of 82
Tree
Used to store hierarchical data, represented as an array with the data, a subtree pointer and pointers to other nodes at the same level
77 of 82
Hash Table
An array, coupled with a hash function, a hash function manipulates the data and the hash value is stored in the table
78 of 82
Half Adder
A circuit that takes a 2-bit input and outputs the binary sum of the two inputs, connects an AND and a XOR gate
79 of 82
Full Adder
Combines two half adders, enables a 3 bit input that outputs the sum and the carry bit
80 of 82
Concatenating Full Adders
Connect n full adders together means you can add a binary number of n bits
81 of 82
D-Type Flip Flops
A sequential logic circuit that can store one bit and flip between two states, two inputs, a control input and a clock signal
82 of 82

Other cards in this set

Card 2

Front

When the CPU wants to access a particular main memory location, it sends the address to memory via this

Back

Address Bus

Card 3

Front

Used to send data from memory to the CPU and visa versa

Back

Preview of the back of card 3

Card 4

Front

Used to send control signals from memory to the CPU and visa versa

Back

Preview of the back of card 4

Card 5

Front

Performs arithmetic (ADD, SUB) and logical (OR, AND) operations on data

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all All resources »