null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
11341627
Computer Science
Descripción
computer science November test
Sin etiquetas
computer science
gcse
Mapa Mental por
Luca Cameron
, actualizado hace más de 1 año
Más
Menos
Creado por
Luca Cameron
hace alrededor de 7 años
25
0
0
Resumen del Recurso
Computer Science
DATA REPRESENTATION
Computer storage - measured in multiples of bytes
Register - small piece of memory where values can be held
Computer don't work with hex, they convert it first
Data Compressions reduce size of a file - 1) Lossy 2) Lossless
COMMUNICATION & INTERNET TECHNOLOGIES
Malware
Software program made to damage/disrupt a computer
Virus
Software program made to corrupt a computer and its files
Spyware
Software program that collects user's info through internet connection
Firewalls & anti-virus software minimise risks
Cookies
Tiny piece of data downloaded by a computer when it visits a website.
Can store details or personalise adverts from surfing history - concerning for user
COMPUTER ARCHITECTURE, LANGUAGES & OPERATING SYSTEMS
Von Neuman Architecture
designed to be easier to program
uses buses and registers
Control Unit (CU)
'brain' - controls data
Buses
series of pathways
data bus - carries data
address bus - carries memory address
control bus - carries instructions
Compiler
takes whole program in high-level language and translates it to machine code
Assembly Language
low-level programming language that uses mnemonic codes to create programs
Inerpreter
translates program into machine code line-by-line
LOGIC GATES
SECURITY
Malware
cause data loss or unauthorised access to data
viruses, worms, Trojan horses & spyware
Pharming
uses emails to trick user into giving away personal details
Phishing
directs user to fake websites where they might give away personal data
Denial of Server (DoS)
attempt to prevent access to data
Encryption
disguises contents of a message using a key
Protocols
sets of rules that handle communication between computers
FLOWCHARTS
DATABASES
stored in tables consisting of records and fields
Primary Key - field that holds data that uniquely identifies a record
a search = a query
SQL = programming language used to maintain databases and to create queries.
Query by example = common method of searching a database
Recursos multimedia adjuntos
02772x02 (image/png)
Full Size Render (binary/octet-stream)
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr
Explorar la Librería