ICT

?
If in the wrong order then switch them then repeat until they are all in the right order. --> An algorithm.
bubble sort
1 of 40
Divide into smaller groups, merge back together in the right order. --> An algorithm
merge sort
2 of 40
Breaking down a task into smaller simpler tasks.
decomposition
3 of 40
A number that can be fractional.
real
4 of 40
A single character on a keyboard.
char
5 of 40
A whole number.
integer
6 of 40
A list of any key that can be pressed on the keyboard.
string
7 of 40
A true or false statement.
boolean
8 of 40
Completing a set of instructions until a condition is met. --> pseudo code.
iteration
9 of 40
The index value is used to tell the program how any times to complete the loop.
count controlled loop
10 of 40
The program stops executing the commands when a condition is met.
condition controlled loop
11 of 40
A list of instructions carried out in order.
sequence
12 of 40
Following a set path based on the result of a condition.
selection
13 of 40
The aim is to reduce the number of bits used to represent a set of data. --> lossless
RLE
14 of 40
This is a method of reducing complex code into simpler sequences and is common in video encoding. --> lossless
huffman encofing
15 of 40
A set of rules. These rules as long as they are followed allow computers to communicate.
protocol
16 of 40
very reliable – if one cable or device fails then all the others will continue to work
star topology
17 of 40
If the main cable fails or gets damaged the whole network will fail
bus topology
18 of 40
01-10 --> a logic gate
NOT
19 of 40
000- 010- 100- 111 --> a logic gate
AND
20 of 40
000-011-101-111 --> a logic gate
OR
21 of 40
stores the operating system, installed programs and user data. --> hardware
magnetic hard drive
22 of 40
Excellent for transferring files or distributing software. --> hardware
optical disk
23 of 40
consumes little memory --> hardware
flash memory
24 of 40
Uses secondary storage to hold parts of the program that are not currently needed. --> software
virtual memory
25 of 40
programs that replicate themselves and attatch themselves to legitimate programs. --> software
viruses
26 of 40
can be set up to check that users are who they say they are. --> software
authentication
27 of 40
Can be transformed in such a way that an unauthorised peson cannot understand them. --> software
encryption
28 of 40
programs that people use to do real world jobs. --> software
applications
29 of 40
a group of 8 binary digits or bits.
byte
30 of 40
1024 bytes
kilobyte
31 of 40
1024 kilobytes
megabyte
32 of 40
1024 megabytes
gigabyte
33 of 40
1024 gigabytes
terabyte
34 of 40
Repeated division by 2 --> conversion
denary to binary
35 of 40
Uses 16 bit providing over 65000 possibilties.
unicode
36 of 40
A subset of unicode. Uses 8 bits making 256 characters or symbols in total.
ASCII
37 of 40
One 'dot' in a picture. --> images.
pixel
38 of 40
number of pixels per unit/ e.g. per inch.
resolution
39 of 40
The time between samples being taken.
sample interval
40 of 40

Other cards in this set

Card 2

Front

Divide into smaller groups, merge back together in the right order. --> An algorithm

Back

merge sort

Card 3

Front

Breaking down a task into smaller simpler tasks.

Back

Preview of the front of card 3

Card 4

Front

A number that can be fractional.

Back

Preview of the front of card 4

Card 5

Front

A single character on a keyboard.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »