Computer Science (paper 1 - 1.1 through 1.6) Flashcards

OCR GCSE J277 Computer Science specification

Systems architecture

The design and structure of a computer system, including the CPU, memory, and input/output devices.

1 / 110

Ready to master these flashcards?

Sign in to study with spaced repetition and track your progress.

Sign In to Track Progress

Terms in this set (110)

1

Systems architecture

The design and structure of a computer system, including the CPU, memory, and input/output devices.

2

CPU

The central processing unit that executes instructions and processes data.

3

Fetch-Decode-Execute cycle

The process the CPU uses to fetch an instruction, decode it, and execute it.

4

RAM

Random Access Memory, used for temporary storage of data and instructions currently in use.

5

ROM

Read-Only Memory, used to store permanent instructions like the boot sequence.

6

Secondary storage

Non-volatile storage used to store data and programs when not in use, e.g., hard drives, SSDs.

7

LAN

Local Area Network, a network that connects computers within a small geographical area.

8

WAN

Wide Area Network, a network that connects computers over a large geographical area.

9

Virtual memory

A section of a computer's storage used as RAM when physical RAM is full.

10

Cache memory

A small, fast type of memory located inside or near the CPU to store frequently used data.

11

Embedded systems

Specialised computer systems built into devices to perform specific tasks, e.g., washing machines.

12

Cloud storage

Online storage of data on remote servers accessed via the internet.

13

Star topology

A network topology where all devices are connected to a central hub or switch.

14

Von Neumann architecture

A computer architecture where instructions and data are stored in the same memory.

15

ALU

Arithmetic Logic Unit, part of the CPU that performs calculations and logical operations.

16

Control Unit

Part of the CPU that manages the execution of instructions and controls data flow.

17

Clock speed

The number of instructions a CPU can process per second, measured in Hertz.

18

Cores

Individual processing units within a CPU that can execute instructions independently.

19

Cache levels

Different levels of cache memory (L1, L2, L3) with varying speeds and sizes.

20

Primary storage

Memory directly accessible by the CPU, e.g., RAM and ROM.

21

Secondary storage types

Includes magnetic, optical, and solid-state storage devices.

22

Magnetic storage

Uses magnetic fields to store data, e.g., hard disk drives.

23

Optical storage

Uses lasers to read and write data, e.g., CDs, DVDs.

24

Solid-state storage

Uses flash memory to store data, e.g., SSDs and USB drives.

25

Cloud computing

Using remote servers hosted on the internet to store, manage, and process data.

26

Network protocols

Rules that govern how data is transmitted across a network, e.g., HTTP, FTP.

27

Packet switching

A method of data transmission where data is broken into packets and sent independently.

28

Firewall

A security system that monitors and controls incoming and outgoing network traffic.

29

Encryption

The process of converting data into a coded format to prevent unauthorised access.

30

Phishing

A cyber attack where users are tricked into revealing sensitive information.

31

Malware

Malicious software designed to harm or exploit systems, e.g., viruses, worms.

32

Ethical issues in computing

Concerns about privacy, data security, and the impact of technology on society.

33

Environmental impact of computing

The effects of technology on energy consumption, e-waste, and resource use.

34

Network topology

The arrangement of devices in a network, e.g., star or mesh.

35

Mesh topology

A network topology where devices are interconnected directly without a central hub.

36

Bandwidth

The amount of data that can be transmitted in a given time, measured in bits per second.

37

Latency

The delay between sending and receiving data in a network.

38

Client-server network

A network model where clients request services from a central server.

39

Peer-to-peer network

A network model where devices share resources directly without a central server.

40

DNS

Domain Name System, translates domain names into IP addresses.

41

IP address

A unique identifier for a device on a network.

42

MAC address

A unique identifier assigned to a network interface card (NIC).

43

HTTP

Hypertext Transfer Protocol, used for transferring web pages over the internet.

44

HTTPS

Secure version of HTTP, encrypts data for secure communication.

45

FTP

File Transfer Protocol, used for transferring files between devices on a network.

46

POP3

Post Office Protocol 3, used for retrieving emails from a server.

47

IMAP

Internet Message Access Protocol, used for managing emails on a server.

48

SMTP

Simple Mail Transfer Protocol, used for sending emails.

49

Star topology advantages

Easy to add devices and isolate faults; centralised management.

50

Star topology disadvantages

If the central hub fails, the entire network goes down.

51

Mesh topology advantages

Highly reliable; no single point of failure.

52

Mesh topology disadvantages

Expensive and complex to set up due to many connections.

53

Wired vs wireless networks

Wired networks use cables; wireless networks use radio waves.

54

Malware

Malicious software designed to harm or exploit systems, e.g., viruses, worms, trojans.

55

Phishing

A cyber attack where users are tricked into revealing sensitive information via fake emails or websites.

56

Social engineering

Manipulating people into giving away confidential information, e.g., through impersonation.

57

Brute force attack

A method of cracking passwords by systematically trying all possible combinations.

58

Denial of Service (DoS) attack

An attack that overwhelms a network or server with traffic, making it unavailable.

59

Data interception

The unauthorised capture of data as it is transmitted over a network.

60

SQL injection

A code injection technique used to exploit vulnerabilities in databases.

61

Zero-day attack

An attack that exploits a vulnerability before it is known or patched.

62

Firewall

A security system that monitors and controls incoming and outgoing network traffic.

63

Anti-malware software

Software designed to detect and remove malicious software from a system.

64

Encryption

The process of converting data into a coded format to prevent unauthorised access.

65

Penetration testing

Simulated attacks on a system to identify vulnerabilities.

66

Network policies

Rules and procedures to ensure the security of a network, e.g., password policies.

67

Authentication

Verifying the identity of a user, e.g., through passwords or biometrics.

68

Two-factor authentication

A security process requiring two forms of identification to access a system.

69

Physical security

Protecting hardware and data from physical threats, e.g., locks, CCTV.

70

User access levels

Restricting access to data and systems based on user roles.

71

Backup

Creating copies of data to restore in case of loss or corruption.

72

Patch management

Regularly updating software to fix vulnerabilities and improve security.

73

Operating system (OS)

Software that manages hardware and software resources and provides services for programs.

74

Functions of an OS

Includes managing memory, multitasking, peripheral devices, and user interfaces.

75

User interface

The part of the OS that allows users to interact with the computer, e.g., GUI or CLI.

76

GUI

Graphical User Interface, uses windows, icons, menus, and pointers for interaction.

77

CLI

Command Line Interface, allows users to interact with the computer by typing commands.

78

Multitasking

The ability of an OS to run multiple programs simultaneously.

79

Memory management

The process of allocating and managing RAM for running programs.

80

Peripheral management

The OS controls and communicates with external devices like printers and keyboards.

81

File management

The OS organises, stores, retrieves, and manages files on storage devices.

82

Utility software

Software designed to perform specific tasks to maintain or optimise a computer system.

83

Encryption software

Utility software that secures data by converting it into a coded format.

84

Defragmentation

A process that reorganises fragmented data on a hard drive to improve performance.

85

Backup software

Utility software that creates copies of data to restore in case of loss or corruption.

86

Compression software

Utility software that reduces the size of files to save storage space.

87

Anti-virus software

Utility software that detects and removes malicious software from a system.

88

System cleanup tools

Utility software that removes unnecessary files to free up storage and improve performance.

89

Open source software

Software where the source code is freely available for modification and distribution.

90

Proprietary software

Software owned by a company, with restrictions on use and modification.

91

Primary storage

Memory directly accessible by the CPU, e.g., RAM and ROM.

92

RAM

Random Access Memory, used for temporary storage of data and instructions currently in use.

93

ROM

Read-Only Memory, used to store permanent instructions like the boot sequence.

94

Virtual memory

A section of a computer's storage used as RAM when physical RAM is full.

95

Cache memory

A small, fast type of memory located inside or near the CPU to store frequently used data.

96

Secondary storage

Non-volatile storage used to store data and programs when not in use, e.g., hard drives, SSDs.

97

Magnetic storage

Uses magnetic fields to store data, e.g., hard disk drives.

98

Optical storage

Uses lasers to read and write data, e.g., CDs, DVDs.

99

Solid-state storage

Uses flash memory to store data, e.g., SSDs and USB drives.

100

Cloud storage

Online storage of data on remote servers accessed via the internet.

101

Binary

A number system that uses only 0s and 1s to represent data.

102

Bit

The smallest unit of data in computing, representing a binary value of 0 or 1.

103

Byte

A group of 8 bits, used to represent a single character in computing.

104

Kilobyte (KB)

Approximately 1,000 bytes, used to measure small files.

105

Megabyte (MB)

Approximately 1,000 kilobytes, used to measure medium-sized files.

106

Gigabyte (GB)

Approximately 1,000 megabytes, used to measure large files.

107

Terabyte (TB)

Approximately 1,000 gigabytes, used to measure very large storage capacities.

108

Data compression

Reducing the size of a file to save storage space or speed up transmission.

109

Lossy compression

Reduces file size by removing some data, e.g., JPEG images.

110

Lossless compression

Reduces file size without losing any data, e.g., ZIP files.

Genie

Want to Learn More?

Get personalised lessons, quizzes, and instant feedback from your AI tutor.

Start Learning