null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
11341627
Computer Science
Description
computer science November test
No tags specified
computer science
gcse
Mind Map by
Luca Cameron
, updated more than 1 year ago
More
Less
Created by
Luca Cameron
about 7 years ago
25
0
0
Resource summary
Computer Science
DATA REPRESENTATION
Computer storage - measured in multiples of bytes
Register - small piece of memory where values can be held
Computer don't work with hex, they convert it first
Data Compressions reduce size of a file - 1) Lossy 2) Lossless
COMMUNICATION & INTERNET TECHNOLOGIES
Malware
Software program made to damage/disrupt a computer
Virus
Software program made to corrupt a computer and its files
Spyware
Software program that collects user's info through internet connection
Firewalls & anti-virus software minimise risks
Cookies
Tiny piece of data downloaded by a computer when it visits a website.
Can store details or personalise adverts from surfing history - concerning for user
COMPUTER ARCHITECTURE, LANGUAGES & OPERATING SYSTEMS
Von Neuman Architecture
designed to be easier to program
uses buses and registers
Control Unit (CU)
'brain' - controls data
Buses
series of pathways
data bus - carries data
address bus - carries memory address
control bus - carries instructions
Compiler
takes whole program in high-level language and translates it to machine code
Assembly Language
low-level programming language that uses mnemonic codes to create programs
Inerpreter
translates program into machine code line-by-line
LOGIC GATES
SECURITY
Malware
cause data loss or unauthorised access to data
viruses, worms, Trojan horses & spyware
Pharming
uses emails to trick user into giving away personal details
Phishing
directs user to fake websites where they might give away personal data
Denial of Server (DoS)
attempt to prevent access to data
Encryption
disguises contents of a message using a key
Protocols
sets of rules that handle communication between computers
FLOWCHARTS
DATABASES
stored in tables consisting of records and fields
Primary Key - field that holds data that uniquely identifies a record
a search = a query
SQL = programming language used to maintain databases and to create queries.
Query by example = common method of searching a database
Media attachments
02772x02 (image/png)
Full Size Render (binary/octet-stream)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr
Browse Library