computer science

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

RAM

1 / 36

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

37 Terms

1

RAM

Random Access Memory

- temporarily stores data and programs currently in use

- more RAM = more apps open

- storage measured in gigabytes

<p>Random Access Memory</p><p>- temporarily stores data and programs currently in use</p><p>- more RAM = more apps open</p><p>- storage measured in gigabytes</p>
New cards
2

CPU

Central Processing Unit

- calculations and operations

speed measured in gigahertz

- faster CPU = faster response from computer

<p>Central Processing Unit</p><p>- calculations and operations</p><p>speed measured in gigahertz</p><p>- faster CPU = faster response from computer</p>
New cards
3

HDD

Hard Disk Drive

- non volatile, stores data outside of computer

- bigger HDD = more data storage

- has moving parts

<p>Hard Disk Drive</p><p>- non volatile, stores data outside of computer</p><p>- bigger HDD = more data storage</p><p>- has moving parts</p>
New cards
4

SDD

Solid State Drive

- non volatile storage

- no moving parts

- read/write quicker than HDD

- low power consumption

<p>Solid State Drive</p><p>- non volatile storage</p><p>- no moving parts</p><p>- read/write quicker than HDD</p><p>- low power consumption</p>
New cards
5

ASCII

American Standard Code for Information Interchange

- substitutes a number for each character

- stored in binary using 7 bits

- 128 characters

New cards
6

colour depth

(bit depth)

- number of bits assigned to each pixel

- higher = more colours = larger file size

New cards
7

resolution

number of pixels

New cards
8

sound (data representation)

- microphone converts sound to electrical signal

- analogue to digital converter (ADC) digitises the signal

- via sampling the analogue signal

New cards
9

sampling frequency

how often the analog signal is measured

- determines sound quality and file size

New cards
10

lossy compression

- discards data

- reduces file size

- data to discard is chosen by algorithm

New cards
11

lossless compression

- reduces file size by storing data more efficiently

- original file can be recreated or uncompressed afterwards

New cards
12

Computer Networks

local area network (LAN)

- house or small company

wide area network (WAN)

- over 1km size

- across city or continents

non connected computers are standalone

New cards
13

network media

- Ethernet cables

- fibre optic

- wireless access points

- undersea cables

New cards
14

benefits of networking computers

- files can be accesses on any computer on the network quickly

- no download required

- peripherals (eg, printers) can be shared

- internet connection and email can be shared

- user profiles/security has centralised management

- centralised backup

software can be installed across a network

New cards
15

disadvantages of networking computers

- management is complicated and expensive

- viruses can infiltrate one computer and spread across network quickly

New cards
16

topology

layout or map of the different parts of a network

New cards
17

node

a client (computer) on a network

New cards
18

router

hardware that routes packets across a wide area network

New cards
19

server

central controlling computer on network

New cards
20

protocol

set of rules for communicating across a network

New cards
21

packet

what large data items are split into for sending across a network

New cards
22

ISP

chunk of info that can be sent of a network

larger files are broken into packets

New cards
23

IP adress

and internet protocol address

unique for each device connected to a network

New cards
24

encryption

used to protect data in case it is hacked or illegally hacked

New cards
25

ciphertext

an encrypted message

New cards
26

key

a sequence of numbers used to encrypt/decrypt

New cards
27

encryption algorithm

method used for encrypting the plain text

New cards
28

penetration-testing

pen testing

- professional security experts try to hack their own system

New cards
29

firewall

a securirty device

- monitors incoming and outgoing traffic

-can block access

New cards
30

network policies

in school sand businesses

- policies to keep network safe

- rules to guide users

New cards
31

malware

malicious software

- any program or file that is harmful to a computer user

- includes computer viruses, worms, Trojan horses and spyware

New cards
32

phishing

- sending emails pretending to be from reputable companies

- to sneak personal information

eg, passwords and credit card numbers

New cards
33

DOS attack

Denial Of SErvice attack

- spamming a website with packets do deny real users access

- crashes server

New cards
34

SQL injection attack

- users enter a SQL statement into a form in which they are supposed to enter a name or other data

eg, username == true

New cards
35

cores

- where instructions are executed in CPU

- cpu can have multi-core

- 2 cores may result in double the speed (other factors may change this)

- effects cpu speed

New cards
36

quartz clock

- vibrations per second (Hz)

- 1M Hz executes 1M instructions per second

- clock speed effects CPU speed

New cards
37

cache in CPU

- expensive

- super fast

- small amount of memory on processor chip

- holds commonly used instructions

New cards

Explore top notes

note Note
studied byStudied by 34 people
... ago
4.2(5)
note Note
studied byStudied by 80 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(3)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 46 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 4 people
... ago
4.0(1)
note Note
studied byStudied by 12 people
... ago
3.5(2)

Explore top flashcards

flashcards Flashcard (30)
studied byStudied by 4 people
... ago
5.0(4)
flashcards Flashcard (40)
studied byStudied by 133 people
... ago
4.3(7)
flashcards Flashcard (94)
studied byStudied by 168 people
... ago
5.0(2)
robot