ICT 0.0 / 5 ? ComputingNetworksProgrammingGCSEAQA Created by: mackenzie3Created on: 30-04-18 15:16 If in the wrong order then switch them then repeat until they are all in the right order. --> An algorithm. bubble sort 1 of 40 Divide into smaller groups, merge back together in the right order. --> An algorithm merge sort 2 of 40 Breaking down a task into smaller simpler tasks. decomposition 3 of 40 A number that can be fractional. real 4 of 40 A single character on a keyboard. char 5 of 40 A whole number. integer 6 of 40 A list of any key that can be pressed on the keyboard. string 7 of 40 A true or false statement. boolean 8 of 40 Completing a set of instructions until a condition is met. --> pseudo code. iteration 9 of 40 The index value is used to tell the program how any times to complete the loop. count controlled loop 10 of 40 The program stops executing the commands when a condition is met. condition controlled loop 11 of 40 A list of instructions carried out in order. sequence 12 of 40 Following a set path based on the result of a condition. selection 13 of 40 The aim is to reduce the number of bits used to represent a set of data. --> lossless RLE 14 of 40 This is a method of reducing complex code into simpler sequences and is common in video encoding. --> lossless huffman encofing 15 of 40 A set of rules. These rules as long as they are followed allow computers to communicate. protocol 16 of 40 very reliable – if one cable or device fails then all the others will continue to work star topology 17 of 40 If the main cable fails or gets damaged the whole network will fail bus topology 18 of 40 01-10 --> a logic gate NOT 19 of 40 000- 010- 100- 111 --> a logic gate AND 20 of 40 000-011-101-111 --> a logic gate OR 21 of 40 stores the operating system, installed programs and user data. --> hardware magnetic hard drive 22 of 40 Excellent for transferring files or distributing software. --> hardware optical disk 23 of 40 consumes little memory --> hardware flash memory 24 of 40 Uses secondary storage to hold parts of the program that are not currently needed. --> software virtual memory 25 of 40 programs that replicate themselves and attatch themselves to legitimate programs. --> software viruses 26 of 40 can be set up to check that users are who they say they are. --> software authentication 27 of 40 Can be transformed in such a way that an unauthorised peson cannot understand them. --> software encryption 28 of 40 programs that people use to do real world jobs. --> software applications 29 of 40 a group of 8 binary digits or bits. byte 30 of 40 1024 bytes kilobyte 31 of 40 1024 kilobytes megabyte 32 of 40 1024 megabytes gigabyte 33 of 40 1024 gigabytes terabyte 34 of 40 Repeated division by 2 --> conversion denary to binary 35 of 40 Uses 16 bit providing over 65000 possibilties. unicode 36 of 40 A subset of unicode. Uses 8 bits making 256 characters or symbols in total. ASCII 37 of 40 One 'dot' in a picture. --> images. pixel 38 of 40 number of pixels per unit/ e.g. per inch. resolution 39 of 40 The time between samples being taken. sample interval 40 of 40
Comments
No comments have yet been made