Save
Completed
Computer science
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Alfie folland
Visit profile
Cards (112)
What do transistors in computer processors act as?
Switches
View source
How many states do transistors have?
Two
states
View source
What do the two states of transistors represent?
1
(on
) and
0
(
off
)
View source
What are the binary units of measurement?
Bit
Byte
Kilobyte
Megabyte
Gigabyte
Terabyte
View source
How many bits are in a byte?
8 bits
View source
How many patterns can be represented by 4 bits?
16
patterns
View source
How many bytes are in a kilobyte?
1024
bytes
View source
How many kilobytes are in a megabyte?
1024
kilobytes
View source
How many megabytes are in a gigabyte?
1024
megabytes
View source
How many gigabytes are in a terabyte?
1024
gigabytes
View source
What are the rules for binary addition?
0 + 0 =
0
0 + 1 =
1
1
+
0
=
1
1
+ 1 =
0
with a carry of 1
View source
What is the purpose of logical shifts in binary operations?
To
multiply
or
divide unsigned numbers
View source
How are spaces filled in logical shifts?
With zeros
View source
How are spaces filled in arithmetic shifts when dividing?
With copies of the most significant bit (MSB)
View source
What are the expressions for calculating file sizes?
Image file size =
Width
x
Height
x
Colour Bit Depth
Sound file size =
Sample Rate
x
Sample Resolution
x
Seconds
Text file size =
Number of characters and spaces
x
number of bits
View source
How many bits does hexadecimal use to represent values?
6 bits
View source
What does the most significant bit in a two's complement number represent?
The sign of the number
View source
What are the principles of the Data Protection Act?
Lawfulness
,
fairness
, and
transparency
Purpose limitation
Data minimization
Accuracy
Storage limitation
Security
Accountability
View source
What must organizations do under the Data Protection Act?
Have a legitimate reason for processing a person's data
View source
What is the consequence of a short replacement cycle for devices?
It adds to the problem of e-waste
View source
What are the benefits of responsible recycling?
Reduces potential
for
chemical leakage
Recovers valuable metals
Reduces need
for
mining
Enables
recycling
of
plastic cases
View source
What is artificial intelligence (AI)?
AI is the
general term
for
artificial intelligence.
View source
What is machine learning?
A subset of
AI
that learns by looking for
rules
and
patterns
in
real-time
data.
View source
What is narrow AI designed to do?
Perform single tasks
or a very
narrow range
of
tasks.
View source
What are the types of malware?
Virus
Trojan
Spyware
Adware
Phishing
View source
What is a virus in the context of malware?
A malicious program that can
delete data
or
change
the way a device
performs.
View source
What is spyware?
A program used to
spy on the activity of a user on their device.
View source
What is phishing?
A
fake
email that
tricks users
into
giving up personal data
or
payment information.
View source
What is the purpose of an Acceptable Use Policy (AUP)?
Collection
of
rules
and
procedures
for
users
Defines appropriate
and inappropriate behavior
States
consequences
for
rule violations
View source
What is e-waste?
Electronic devices that are thrown away and not recycled.
View source
What is the purpose of backups?
To store a
copy
of
data away
from the
original.
View source
What is the role of patents?
To protect
new inventions
and
intellectual property.
View source
What does GDPR stand for?
General Data Protection Regulation
View source
What is the Computer Misuse Act?
A law that makes
unauthorized access
to an
ICT system illegal.
View source
What are the differences between open-
source
software and proprietary software?

Open-Source Software:
Users have access to
source
code
Can modify and
distribute
the software
Most is
free
to use
Proprietary Software:
Users cannot access the source code
Must pay for a
license
Supported by a
dedicated team
of
developers
View source
What are the characteristics of high-level languages compared to low-level languages?
High-Level Languages:
Easier
to read and understand
Must be
translated
into
machine code
Work across different
machines
Low-Level Languages:
Closer
to machine code
More
difficult
to read and understand
Specific
to a
particular
machine
View source
What is illegal regarding access to an ICT system?
Accessing
an
ICT system
or
creating
,
supplying
, or
obtaining material
used to
commit
another
crime
is
illegal.
View source
What are the potential penalties for illegal access to an ICT system?
Up to
5 years
in
prison
and
unlimited fine.
View source
What are the main differences between Open-Source Software and Proprietary Software?
Open-Source Software:
Users have access to
source code.
Users can modify and
distribute
the software.
Support through a
community.
Most is free to
use.
May not be free from
bugs.
May need
specialist
software to install.
Proprietary Software:
Thoroughly
tested by developers.
Supported by a
dedicated
team of developers.
Patches are released to fix
vulnerabilities.
Support from
third
parties (e.g., books).
Users cannot access the
source code.
Users do not have permission to modify the software.
Users must pay for a
license.
View source
What are the characteristics of High-Level
Languages
compared to
Low-Level Languages
?

High-Level
Languages
:
One instruction can represent many machine code instructions.
The same code works for many different machines
and
CPUs.
Code
is
easy to read
,
understand
, and modify.
Must be translated into machine code before execution.
Low-Level Languages:
One
instruction usually represents one machine code instruction.
Usually written for one type of machine or CPU.
Code
is
very difficult to read, understand, and modify.
Commands in machine code can be executed directly without a translator.
View source
See all 112 cards