Computer Science (paper 1 - 1.1 through 1.6) Flashcards
OCR GCSE J277 Computer Science specification
Ready to master these flashcards?
Sign in to study with spaced repetition and track your progress.
Sign In to Track ProgressTerms in this set (110)
Systems architecture
The design and structure of a computer system, including the CPU, memory, and input/output devices.
CPU
The central processing unit that executes instructions and processes data.
Fetch-Decode-Execute cycle
The process the CPU uses to fetch an instruction, decode it, and execute it.
RAM
Random Access Memory, used for temporary storage of data and instructions currently in use.
ROM
Read-Only Memory, used to store permanent instructions like the boot sequence.
Secondary storage
Non-volatile storage used to store data and programs when not in use, e.g., hard drives, SSDs.
LAN
Local Area Network, a network that connects computers within a small geographical area.
WAN
Wide Area Network, a network that connects computers over a large geographical area.
Virtual memory
A section of a computer's storage used as RAM when physical RAM is full.
Cache memory
A small, fast type of memory located inside or near the CPU to store frequently used data.
Embedded systems
Specialised computer systems built into devices to perform specific tasks, e.g., washing machines.
Cloud storage
Online storage of data on remote servers accessed via the internet.
Star topology
A network topology where all devices are connected to a central hub or switch.
Von Neumann architecture
A computer architecture where instructions and data are stored in the same memory.
ALU
Arithmetic Logic Unit, part of the CPU that performs calculations and logical operations.
Control Unit
Part of the CPU that manages the execution of instructions and controls data flow.
Clock speed
The number of instructions a CPU can process per second, measured in Hertz.
Cores
Individual processing units within a CPU that can execute instructions independently.
Cache levels
Different levels of cache memory (L1, L2, L3) with varying speeds and sizes.
Primary storage
Memory directly accessible by the CPU, e.g., RAM and ROM.
Secondary storage types
Includes magnetic, optical, and solid-state storage devices.
Magnetic storage
Uses magnetic fields to store data, e.g., hard disk drives.
Optical storage
Uses lasers to read and write data, e.g., CDs, DVDs.
Solid-state storage
Uses flash memory to store data, e.g., SSDs and USB drives.
Cloud computing
Using remote servers hosted on the internet to store, manage, and process data.
Network protocols
Rules that govern how data is transmitted across a network, e.g., HTTP, FTP.
Packet switching
A method of data transmission where data is broken into packets and sent independently.
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
Encryption
The process of converting data into a coded format to prevent unauthorised access.
Phishing
A cyber attack where users are tricked into revealing sensitive information.
Malware
Malicious software designed to harm or exploit systems, e.g., viruses, worms.
Ethical issues in computing
Concerns about privacy, data security, and the impact of technology on society.
Environmental impact of computing
The effects of technology on energy consumption, e-waste, and resource use.
Network topology
The arrangement of devices in a network, e.g., star or mesh.
Mesh topology
A network topology where devices are interconnected directly without a central hub.
Bandwidth
The amount of data that can be transmitted in a given time, measured in bits per second.
Latency
The delay between sending and receiving data in a network.
Client-server network
A network model where clients request services from a central server.
Peer-to-peer network
A network model where devices share resources directly without a central server.
DNS
Domain Name System, translates domain names into IP addresses.
IP address
A unique identifier for a device on a network.
MAC address
A unique identifier assigned to a network interface card (NIC).
HTTP
Hypertext Transfer Protocol, used for transferring web pages over the internet.
HTTPS
Secure version of HTTP, encrypts data for secure communication.
FTP
File Transfer Protocol, used for transferring files between devices on a network.
POP3
Post Office Protocol 3, used for retrieving emails from a server.
IMAP
Internet Message Access Protocol, used for managing emails on a server.
SMTP
Simple Mail Transfer Protocol, used for sending emails.
Star topology advantages
Easy to add devices and isolate faults; centralised management.
Star topology disadvantages
If the central hub fails, the entire network goes down.
Mesh topology advantages
Highly reliable; no single point of failure.
Mesh topology disadvantages
Expensive and complex to set up due to many connections.
Wired vs wireless networks
Wired networks use cables; wireless networks use radio waves.
Malware
Malicious software designed to harm or exploit systems, e.g., viruses, worms, trojans.
Phishing
A cyber attack where users are tricked into revealing sensitive information via fake emails or websites.
Social engineering
Manipulating people into giving away confidential information, e.g., through impersonation.
Brute force attack
A method of cracking passwords by systematically trying all possible combinations.
Denial of Service (DoS) attack
An attack that overwhelms a network or server with traffic, making it unavailable.
Data interception
The unauthorised capture of data as it is transmitted over a network.
SQL injection
A code injection technique used to exploit vulnerabilities in databases.
Zero-day attack
An attack that exploits a vulnerability before it is known or patched.
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
Anti-malware software
Software designed to detect and remove malicious software from a system.
Encryption
The process of converting data into a coded format to prevent unauthorised access.
Penetration testing
Simulated attacks on a system to identify vulnerabilities.
Network policies
Rules and procedures to ensure the security of a network, e.g., password policies.
Authentication
Verifying the identity of a user, e.g., through passwords or biometrics.
Two-factor authentication
A security process requiring two forms of identification to access a system.
Physical security
Protecting hardware and data from physical threats, e.g., locks, CCTV.
User access levels
Restricting access to data and systems based on user roles.
Backup
Creating copies of data to restore in case of loss or corruption.
Patch management
Regularly updating software to fix vulnerabilities and improve security.
Operating system (OS)
Software that manages hardware and software resources and provides services for programs.
Functions of an OS
Includes managing memory, multitasking, peripheral devices, and user interfaces.
User interface
The part of the OS that allows users to interact with the computer, e.g., GUI or CLI.
GUI
Graphical User Interface, uses windows, icons, menus, and pointers for interaction.
CLI
Command Line Interface, allows users to interact with the computer by typing commands.
Multitasking
The ability of an OS to run multiple programs simultaneously.
Memory management
The process of allocating and managing RAM for running programs.
Peripheral management
The OS controls and communicates with external devices like printers and keyboards.
File management
The OS organises, stores, retrieves, and manages files on storage devices.
Utility software
Software designed to perform specific tasks to maintain or optimise a computer system.
Encryption software
Utility software that secures data by converting it into a coded format.
Defragmentation
A process that reorganises fragmented data on a hard drive to improve performance.
Backup software
Utility software that creates copies of data to restore in case of loss or corruption.
Compression software
Utility software that reduces the size of files to save storage space.
Anti-virus software
Utility software that detects and removes malicious software from a system.
System cleanup tools
Utility software that removes unnecessary files to free up storage and improve performance.
Open source software
Software where the source code is freely available for modification and distribution.
Proprietary software
Software owned by a company, with restrictions on use and modification.
Primary storage
Memory directly accessible by the CPU, e.g., RAM and ROM.
RAM
Random Access Memory, used for temporary storage of data and instructions currently in use.
ROM
Read-Only Memory, used to store permanent instructions like the boot sequence.
Virtual memory
A section of a computer's storage used as RAM when physical RAM is full.
Cache memory
A small, fast type of memory located inside or near the CPU to store frequently used data.
Secondary storage
Non-volatile storage used to store data and programs when not in use, e.g., hard drives, SSDs.
Magnetic storage
Uses magnetic fields to store data, e.g., hard disk drives.
Optical storage
Uses lasers to read and write data, e.g., CDs, DVDs.
Solid-state storage
Uses flash memory to store data, e.g., SSDs and USB drives.
Cloud storage
Online storage of data on remote servers accessed via the internet.
Binary
A number system that uses only 0s and 1s to represent data.
Bit
The smallest unit of data in computing, representing a binary value of 0 or 1.
Byte
A group of 8 bits, used to represent a single character in computing.
Kilobyte (KB)
Approximately 1,000 bytes, used to measure small files.
Megabyte (MB)
Approximately 1,000 kilobytes, used to measure medium-sized files.
Gigabyte (GB)
Approximately 1,000 megabytes, used to measure large files.
Terabyte (TB)
Approximately 1,000 gigabytes, used to measure very large storage capacities.
Data compression
Reducing the size of a file to save storage space or speed up transmission.
Lossy compression
Reduces file size by removing some data, e.g., JPEG images.
Lossless compression
Reduces file size without losing any data, e.g., ZIP files.

Want to Learn More?
Get personalised lessons, quizzes, and instant feedback from your AI tutor.
Start Learning