A-Level Computer Science mock

Description

To Help With Mock Test
Myles Lawson
Flashcards by Myles Lawson, updated more than 1 year ago
Myles Lawson
Created by Myles Lawson over 6 years ago
38
0

Resource summary

Question Answer
Bus A bus is a communication system that transfers data between components inside a computer, or between computers. E.g. hardware components (Cables), software and communication protocols.
Uni-directional Bus Signals are in one direction.
Bi-directional bus Signals can be carried in both directions. Data and address buses are Sheared by all components.
Control bus A Bi-directional bus with control lines needed, to ensure that different components of the system do not lead to conflict
Control lines - Control Bus Bus Request: indicates that a device is requesting the use of the data bus. Bus Grant: indicates that the CPU has granted access to the bus data. Memory Wright: Causes data on the data bus to be written into the address location.
Control lines - Control Bus Continued Memory read: causes data from addressed location to be placed on the data bus. Interrupt request: indicates that a device is requesting access to the CPU. Clock: used to synchronise operations.
Data Bus Typically consisting of 8,16,32 or 64 separate lines, provide a bi-directional path for moving data and instructions between system components.
Address Bus A uni-directional, meaning that it passes the address one way from CPU to RAM. The sole purpose of an address bus is to identify the address of the location in cache or main memory that is to be read from or written to.
Addressability Is when each location in memory will have its own unique address.
RISC There are two main types of CPU: CISC and RISC. Smartphones and tablets use RISC.(reduced instruction set computing)
CISC One of two main types of CPU, CISC. Most desktop or laptop computers use CISC. (complex instruction set computing)
Pro's of CISC Little RAM is required to store the instructions. The compiler has little work to do to translate high level language to machine code.
Con's of CISC Many specialised instructions have to be built into the hardware.
Pro's of CISC Pipelineing is possible, so faster to execute instructions.
Con's of RISC More RAM is required to store the instructions. The compiler has more work to do to translate high level language to machine code.
co-processor A computer processor used to supplement the functions of the primary processor (the CPU).
GPU A co-possessor which can be used with a CPU to accelerate scientific, engineering, analytics and other applications.
Different types of Input devices. Laser scanners, Pen-type readers, Barcodes, Barcode readers, Digital cameras, CD-players and Tags.
Different types of Out-put devices. Screens (LCD,LED), Printers (Laser printers, Inkjet printers, Dot matrix printers, 3-D printers), Projectors, Speakers and Actuators.
Random access memory (RAM) RAM is used to store programs and data that are currently being used.
Read-only memory (ROM) ROM is used to hold information that needs to be permanently in memory.
Virtual storage An extension of memory to hold programs that are to big to store on RAM.
Pipelineing Pipelineing is a technique to improve possessor speed utilising fetch decode execute cycle (fetch decode execute simultaneously)
Seonday storage ?
Local area network (LAN) A network that connects computers and other devices in a relatively small area. LANs connect workstations and personal computers and enable users to access data and devices.
Wide-area network (WAN) A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs).
Client-server A computer network in which one centralised, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected.
Peer to peer In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
structured query language (SQL) Used for querying and updating tables in a relational database.
Foreign key It's defined in a second table, but it refers to the primary key or a unique key in the first table.
Primary key A special relational database table column (or combination of columns) designated to uniquely identify all table records. A primary key's main features are: It must contain a unique value for each row of data.
Secondary key Made on a field that you would like to be indexed for faster searches. A table can have more than one secondary key.
Lossy compression or Irreversible compression The class of data encoding methods that uses inexact approximations and partial data discarding to represent the content. (All unnecessary information is discarded.)
Lossless A class of data compression algorithms that allows the original data to be perfectly reconstructed from the compressed data. Used in the ZIP file.
Uses of hashing One use is a data structure called a hash table, widely used in computer software for rapid data lookup. Storing and encrypting passwords and PIN's.
Encapsulation Can be used to hide data members and members function. You can test parts of a program without having to worry about affects on other parts, so isolates.
Assembly code Low level language that can be transferred into machine code.
Waterfall cycle One step at a time but you can revert back a stage if needed.
Spiral model
Inheritance Inheritance allows a class to have the same properties as another class and extend or tailor that properties to provide special action for specific needs.
The Rapid Application Development (RAD) Model is based on prototyping and iterative model with no (or less) specific planning. Using spastic focus groups to gather requirements.
Sprint (Agile Method) A period of time allocated for a particular phase of a project. Sprints are considered to be complete when the time period expires.
Agile Methodology Stages of software development may not be implement in linear stages.
Extreme programming (XP) It's intended to improve software quality and responsiveness to changing customer requirements. Shorter cycle.
Show full summary Hide full summary

Similar

How well do you know GoConqr?
Sarah Egan
Historical Development of Computer Languages
Shannon Anderson-Rush
What is a Computer?
cscutt
Module 1 and 2
msbniel
OCR gcse computer science
Jodie Awthinre
MICROSOFT WORD 2013 SKILLS FOR WORK
John O'Driscoll
computer systems and programming quiz
Molly Batch
Revision Timetable
katy.lay
The Weimar Republic, 1919-1929
shann.w
The Rise of the Nazis
shann.w