Computer science

Cards (112)

  • What do transistors in computer processors act as?
    Switches
  • How many states do transistors have?
    Two states
  • What do the two states of transistors represent?
    1 (on) and 0 (off)
  • What are the binary units of measurement?
    • Bit
    • Byte
    • Kilobyte
    • Megabyte
    • Gigabyte
    • Terabyte
  • How many bits are in a byte?
    8 bits
  • How many patterns can be represented by 4 bits?
    16 patterns
  • How many bytes are in a kilobyte?
    1024 bytes
  • How many kilobytes are in a megabyte?
    1024 kilobytes
  • How many megabytes are in a gigabyte?
    1024 megabytes
  • How many gigabytes are in a terabyte?
    1024 gigabytes
  • What are the rules for binary addition?
    • 0 + 0 = 0
    • 0 + 1 = 1
    • 1 + 0 = 1
    • 1 + 1 = 0 with a carry of 1
  • What is the purpose of logical shifts in binary operations?
    To multiply or divide unsigned numbers
  • How are spaces filled in logical shifts?
    With zeros
  • How are spaces filled in arithmetic shifts when dividing?
    With copies of the most significant bit (MSB)
  • What are the expressions for calculating file sizes?
    • Image file size = Width x Height x Colour Bit Depth
    • Sound file size = Sample Rate x Sample Resolution x Seconds
    • Text file size = Number of characters and spaces x number of bits
  • How many bits does hexadecimal use to represent values?
    6 bits
  • What does the most significant bit in a two's complement number represent?
    The sign of the number
  • What are the principles of the Data Protection Act?
    • Lawfulness, fairness, and transparency
    • Purpose limitation
    • Data minimization
    • Accuracy
    • Storage limitation
    • Security
    • Accountability
  • What must organizations do under the Data Protection Act?
    Have a legitimate reason for processing a person's data
  • What is the consequence of a short replacement cycle for devices?
    It adds to the problem of e-waste
  • What are the benefits of responsible recycling?
    • Reduces potential for chemical leakage
    • Recovers valuable metals
    • Reduces need for mining
    • Enables recycling of plastic cases
  • What is artificial intelligence (AI)?
    AI is the general term for artificial intelligence.
  • What is machine learning?
    A subset of AI that learns by looking for rules and patterns in real-time data.
  • What is narrow AI designed to do?
    Perform single tasks or a very narrow range of tasks.
  • What are the types of malware?
    • Virus
    • Trojan
    • Spyware
    • Adware
    • Phishing
  • What is a virus in the context of malware?
    A malicious program that can delete data or change the way a device performs.
  • What is spyware?
    A program used to spy on the activity of a user on their device.
  • What is phishing?
    A fake email that tricks users into giving up personal data or payment information.
  • What is the purpose of an Acceptable Use Policy (AUP)?
    • Collection of rules and procedures for users
    • Defines appropriate and inappropriate behavior
    • States consequences for rule violations
  • What is e-waste?
    Electronic devices that are thrown away and not recycled.
  • What is the purpose of backups?
    To store a copy of data away from the original.
  • What is the role of patents?
    To protect new inventions and intellectual property.
  • What does GDPR stand for?
    General Data Protection Regulation
  • What is the Computer Misuse Act?
    A law that makes unauthorized access to an ICT system illegal.
  • What are the differences between open-source software and proprietary software?

    Open-Source Software:
    • Users have access to source code
    • Can modify and distribute the software
    • Most is free to use

    Proprietary Software:
    • Users cannot access the source code
    • Must pay for a license
    • Supported by a dedicated team of developers
  • What are the characteristics of high-level languages compared to low-level languages?
    High-Level Languages:
    • Easier to read and understand
    • Must be translated into machine code
    • Work across different machines

    Low-Level Languages:
    • Closer to machine code
    • More difficult to read and understand
    • Specific to a particular machine
  • What is illegal regarding access to an ICT system?
    Accessing an ICT system or creating, supplying, or obtaining material used to commit another crime is illegal.
  • What are the potential penalties for illegal access to an ICT system?
    Up to 5 years in prison and unlimited fine.
  • What are the main differences between Open-Source Software and Proprietary Software?
    Open-Source Software:
    • Users have access to source code.
    • Users can modify and distribute the software.
    • Support through a community.
    • Most is free to use.
    • May not be free from bugs.
    • May need specialist software to install.

    Proprietary Software:
    • Thoroughly tested by developers.
    • Supported by a dedicated team of developers.
    • Patches are released to fix vulnerabilities.
    • Support from third parties (e.g., books).
    • Users cannot access the source code.
    • Users do not have permission to modify the software.
    • Users must pay for a license.
  • What are the characteristics of High-Level Languages compared to Low-Level Languages?

    High-Level Languages:
    • One instruction can represent many machine code instructions.
    • The same code works for many different machines and CPUs.
    • Code is easy to read, understand, and modify.
    • Must be translated into machine code before execution.

    Low-Level Languages:
    • One instruction usually represents one machine code instruction.
    • Usually written for one type of machine or CPU.
    • Code is very difficult to read, understand, and modify.
    • Commands in machine code can be executed directly without a translator.