Computing

Cards (60)

  • RTF is a richer text format than the TXT file format, which is ‘poorer’ in its formatting information.
  • Standard algorithms include Input Validation, Running Total Algorithm, Loops, User interface, Label ------ input, process, output on diagram, Functional requirements, Selection statements, Conditional statements, Iteration Construct - Fixed loop, Array, if..then..else, While loop, 1D array.
  • When discussing arrays, it is important to define the type of array (e.g 1D, 2D, 3D, etc.).
  • When calculating total, always set total to 0 to begin with.
  • Predefined functions include Function name --> locale.currency(number) ← parameter, Random, Round, Length, Logic Error, Syntax Error, Execution Error, Normal Test Data, Extreme Test Data, Exceptional Test Data, Fit for Purpose, Robust, Readable, Efficiency.
  • When discussing database design & development, an Entity is something we store data about, Entity Integrity ensures each record has a unique, non null primary key value, Referential Integrity ensures a foreign key must always reference a non null primary key value.
  • An Entity Relationship Diagram is a tool used in database design & development.
  • When making a data dictionary, important data types/validation include Text, Number, Boolean, Date, Presence check, Length Check: >3 AND <7, Range: Age >= 3 AND Age <=15, Lookup from AGE table(foreign key only), Restricted: Table, Chair.
  • Types of SQL Statements include Select Statement, Insert Statement, Delete Statement, Update Statement, GDPR, Binary, Bit, Byte, Extended ASCII, Character Set, Control Characters, Unicode.
  • Firewalls can be used to monitor incoming and outgoing network data packets, and rules can be set up in a firewall to block certain packets based on sender or receiver address, port or contents.
  • Encryption is the process of scrambling data with a key so that it cannot be read again without knowing the original key, and it can be used to scramble both stored files and data being transmitted over a network.
  • There are two types of encryption: symmetric and asymmetric.
  • a file format that stores the characters in the document and some formatting information such as font, size, colour, and alignment.
  • When creating web pages, text, graphics, videos, audios are all covered by the Copyright, Designs and Patents Act 1988, which is a law designed to help content creators protect their intellectual property, such as having their work used without their permission.
  • Text file formats include TXT and RTF (Rich Text Format).
  • Finding copyright free material is another way to use content that has not been provided or you need extra.
  • Resolution of a graphic is the number of pixels making up the graphic, with smaller pixels leading to higher resolution and better quality.
  • Compression is the method of reducing the amount of storage space needed to save a file, with various techniques such as lossless and lossy compression.
  • Advantages of compression include files taking less time to upload/download if they were on a USB flashcard>
  • Screen resolution, for example, is typically measured in horizontal x vertical (1024x768).
  • Standard file formats for graphics include JPEG (Joint Photographic Experts Group), GIF (Graphics Interchange Format), and PNG (Portable Network Graphics).
  • Purchasing materials is another way to use content that has not been provided or you need extra.
  • Capture resolution, for example, is the resolution of a digital camera with a total of 8 megapixels.
  • Video file formats include AVI (Audio Video Interleave), MPG (Motion Picture Expert Group), and MPEG-4 (Motion Picture Expert Groups).
  • Asking for permission is one way to use content that has not been provided or you need extra.
  • Standard file formats for audio include WAV (Waveform), MP3 (Moving Pictures, Group Layer 3), and GIF (Graphics Interchange Format).
  • Creating your own content is another way to use content that has not been provided or you need extra.
  • Disadvantages of compression include compressing large files taking a lot of time and repeatedly compressing files damaging quality of video/audio/image.
  • Interpreters give error feedback line by line and are quicker to debug as you can keep running a program from the last successful line of code.
  • Disadvantages of compilers include complex debugging as errors are not reported immediately and needing to re-compile your code every time an error is found and corrected.
  • Compilers can be complex to debug as errors are not reported immediately and needing to re-compile your code every time an error is found and corrected.
  • Random Access Memory(RAM) is
  • An Address Bus is a unidirectional bus which specifies the memory location to be read from/written to.
  • True Colour is an image with a bit depth of 24.
  • A Data Bus is a bus used to carry data to and from the processor/memory.
  • GIF is an image with a bit depth of 8.
  • Advantages of Compilers include creating an executable file that can be run again without needing to be retranslated and being hard to reverse engineer so source code cannot be copied easily.
  • Only images as a whole can be edited.
  • In architecture, the Control Unit is the part of the processor responsible for the timing and execution of instructions.
  • Asymmetric encryption is normally used for communication securely over a distance as it relies on a public and private key.