0% found this document useful (0 votes)
39 views16 pages

Ash Gaind - GCSE Level Key Terminology Computer Science

The document defines various terms related to computer hardware, software, and networking. It discusses the central processing unit (CPU) and its components like the arithmetic logic unit (ALU) and control unit (CU). It also covers primary and secondary storage, including memory types like RAM and ROM. Additional topics include computer networks, wired and wireless connectivity standards, and data storage formats for numbers, characters, images, and sound.

Uploaded by

Ash Gaind
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views16 pages

Ash Gaind - GCSE Level Key Terminology Computer Science

The document defines various terms related to computer hardware, software, and networking. It discusses the central processing unit (CPU) and its components like the arithmetic logic unit (ALU) and control unit (CU). It also covers primary and secondary storage, including memory types like RAM and ROM. Additional topics include computer networks, wired and wireless connectivity standards, and data storage formats for numbers, characters, images, and sound.

Uploaded by

Ash Gaind
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

No.

Spec Section Sub-topic Term Definition

1. 1.1.1 1.1 Systems architecture Architecture of the CPU CPU The central processing unit is where all the algorithms are processed

2. 1.1.1 1.1 Systems architecture Architecture of the CPU Fetch-execute cycle

3. 1.1.1 1.1 Systems architecture Architecture of the CPU ALU

4. 1.1.1 1.1 Systems architecture Architecture of the CPU CU

5. 1.1.1 1.1 Systems architecture Architecture of the CPU Cache

6. 1.1.1 1.1 Systems architecture Architecture of the CPU Register

7. 1.1.1 1.1 Systems architecture Architecture of the CPU Von Neumann architecture

8. 1.1.1 1.1 Systems architecture Architecture of the CPU MAR

9. 1.1.1 1.1 Systems architecture Architecture of the CPU MDR

10. 1.1.1 1.1 Systems architecture Architecture of the CPU Program Counter

11. 1.1.1 1.1 Systems architecture Architecture of the CPU Accumulator

12. 1.1.2 1.1 Systems architecture CPU performance Clock speed

13. 1.1.2 1.1 Systems architecture CPU performance Cache size

14. 1.1.2 1.1 Systems architecture CPU performance Cores

15. 1.1.3 1.1 Systems architecture Embedded systems Embedded system

16. 1.2.1 1.2 Memory and storage Primary storage (Memory) Primary storage

17. 1.2.1 1.2 Memory and storage Primary storage (Memory) RAM Where temporary memory is stored for certain software to operate

18. 1.2.1 1.2 Memory and storage Primary storage (Memory) ROM Where memory is stored for an indefinite amount of time.
19. 1.2.1 1.2 Memory and storage Primary storage (Memory) Virtual memory

20. 1.2.2 1.2 Memory and storage Secondary storage Secondary storage

21. 1.2.2 1.2 Memory and storage Secondary storage Optical storage

22. 1.2.2 1.2 Memory and storage Secondary storage Magnetic storage

23. 1.2.2 1.2 Memory and storage Secondary storage Solid state storage

24. 1.2.2 1.2 Memory and storage Secondary storage Storage capacity

25. 1.2.2 1.2 Memory and storage Secondary storage Storage speed

26. 1.2.2 1.2 Memory and storage Secondary storage Storage portability

27. 1.2.2 1.2 Memory and storage Secondary storage Storage durability

28. 1.2.2 1.2 Memory and storage Secondary storage Storage reliability

29. 1.2.2 1.2 Memory and storage Secondary storage Storage cost

30. 1.2.3 1.2 Memory and storage Units Bit Smallest amount of storage possible to be saved

31. 1.2.3 1.2 Memory and storage Units Nibble

32. 1.2.3 1.2 Memory and storage Units Byte

33. 1.2.3 1.2 Memory and storage Units Kilobyte

34. 1.2.3 1.2 Memory and storage Units Megabyte

35. 1.2.3 1.2 Memory and storage Units Gigabyte

36. 1.2.3 1.2 Memory and storage Units Terabyte

37. 1.2.3 1.2 Memory and storage Units Petabyte

38. 1.2.4 1.2 Memory and storage Data storage (Numbers) Denary numbers

39. 1.2.4 1.2 Memory and storage Data storage (Numbers) Binary numbers
40. 1.2.4 1.2 Memory and storage Data storage (Numbers) Binary arithmetic

41. 1.2.4 1.2 Memory and storage Data storage (Numbers) Overflow

42. 1.2.4 1.2 Memory and storage Data storage (Numbers) Hexadecimal

43. 1.2.4 1.2 Memory and storage Data storage (Numbers) Binary shifts

44. 1.2.4 1.2 Memory and storage Data storage (Characters) Character set

45. 1.2.4 1.2 Memory and storage Data storage (Characters) ASCII

46. 1.2.4 1.2 Memory and storage Data storage (Characters) Unicode

47. 1.2.4 1.2 Memory and storage Data storage (Images) Pixels

48. 1.2.4 1.2 Memory and storage Data storage (Images) Metadata

49. 1.2.4 1.2 Memory and storage Data storage (Images) Colour depth

50. 1.2.4 1.2 Memory and storage Data storage (Images) Resolution

51. 1.2.4 1.2 Memory and storage Data storage (Images) Image quality

52. 1.2.4 1.2 Memory and storage Data storage (Images) Image file size

53. 1.2.4 1.2 Memory and storage Data storage (Sound) Sample rate

54. 1.2.4 1.2 Memory and storage Data storage (Sound) Sample duration

55. 1.2.4 1.2 Memory and storage Data storage (Sound) Sample bit depth

56. 1.2.4 1.2 Memory and storage Data storage (Sound) Playback quality

57. 1.2.4 1.2 Memory and storage Data storage (Sound) Sound file size

58. 1.2.5 1.2 Memory and storage Compression Compression

59. 1.2.5 1.2 Memory and storage Compression Lossy compression

60. 1.2.5 1.2 Memory and storage Compression Lossless compression


61. 1.3.1 1.3 Computer networks, Networks and topologies LAN A cable that allows a
connections and protocols

62. 1.3.1 1.3 Computer networks, Networks and topologies WAN


connections and protocols

63. 1.3.1 1.3 Computer networks, Networks and topologies Client-server network
connections and protocols

64. 1.3.1 1.3 Computer networks, Networks and topologies Peer-to-peer network
connections and protocols

65. 1.3.1 1.3 Computer networks, Networks and topologies Wireless access point
connections and protocols

66. 1.3.1 1.3 Computer networks, Networks and topologies Router


connections and protocols

67. 1.3.1 1.3 Computer networks, Networks and topologies Switch


connections and protocols

68. 1.3.1 1.3 Computer networks, Networks and topologies NIC


connections and protocols

69. 1.3.1 1.3 Computer networks, Networks and topologies Transmission media
connections and protocols

70. 1.3.1 1.3 Computer networks, Networks and topologies The Internet
connections and protocols

71. 1.3.1 1.3 Computer networks, Networks and topologies DNS


connections and protocols

72. 1.3.1 1.3 Computer networks, Networks and topologies Hosting


connections and protocols

73. 1.3.1 1.3 Computer networks, Networks and topologies The Cloud
connections and protocols
74. 1.3.1 1.3 Computer networks, Networks and topologies Web server
connections and protocols

75. 1.3.1 1.3 Computer networks, Networks and topologies Client


connections and protocols

76. 1.3.1 1.3 Computer networks, Networks and topologies Network topology
connections and protocols

77. 1.3.1 1.3 Computer networks, Networks and topologies Star topology
connections and protocols

78. 1.3.1 1.3 Computer networks, Networks and topologies Mesh topology
connections and protocols

79. 1.3.2 1.3 Computer networks, Wired and wireless Wired connection
connections and protocols networks, protocols and
layers

80. 1.3.2 1.3 Computer networks, Wired and wireless Ethernet An internet connection that is connected to eg. PC, Console, TV that uses a LAN
connections and protocols networks, protocols and cable
layers

81. 1.3.2 1.3 Computer networks, Wired and wireless Wireless connection
connections and protocols networks, protocols and
layers

82. 1.3.2 1.3 Computer networks, Wired and wireless Wi-Fi


connections and protocols networks, protocols and
layers

83. 1.3.2 1.3 Computer networks, Wired and wireless Bluetooth


connections and protocols networks, protocols and
layers

84. 1.3.2 1.3 Computer networks, Wired and wireless Encryption


connections and protocols networks, protocols and
layers
85. 1.3.2 1.3 Computer networks, Wired and wireless IP address
connections and protocols networks, protocols and
layers

86. 1.3.2 1.3 Computer networks, Wired and wireless MAC address
connections and protocols networks, protocols and
layers

87. 1.3.2 1.3 Computer networks, Wired and wireless Standards


connections and protocols networks, protocols and
layers

88. 1.3.2 1.3 Computer networks, Wired and wireless Protocol


connections and protocols networks, protocols and
layers

89. 1.3.2 1.3 Computer networks, Wired and wireless TCP/IP


connections and protocols networks, protocols and
layers

90. 1.3.2 1.3 Computer networks, Wired and wireless HTTP


connections and protocols networks, protocols and
layers

91. 1.3.2 1.3 Computer networks, Wired and wireless HTTPS


connections and protocols networks, protocols and
layers

92. 1.3.2 1.3 Computer networks, Wired and wireless FTP


connections and protocols networks, protocols and
layers

93. 1.3.2 1.3 Computer networks, Wired and wireless POP


connections and protocols networks, protocols and
layers

94. 1.3.2 1.3 Computer networks, Wired and wireless IMAP


connections and protocols networks, protocols and
layers

95. 1.3.2 1.3 Computer networks, Wired and wireless SMTP


connections and protocols networks, protocols and
layers

96. 1.3.2 1.3 Computer networks, Wired and wireless Protocol layering
connections and protocols networks, protocols and
layers

97. 1.4.1 1.4 Network security Threats to computer Malware


systems and networks

98. 1.4.1 1.4 Network security Threats to computer Social engineering


systems and networks

99. 1.4.1 1.4 Network security Threats to computer Phishing


systems and networks

100. 1.4.1 1.4 Network security Threats to computer Brute-force attack An attempt to break into someones eg. email account by repetitively repeating
systems and networks letters and numbers together in the hopes to get the password correct.

101. 1.4.1 1.4 Network security Threats to computer Denial of service attack
systems and networks

102. 1.4.1 1.4 Network security Threats to computer Data interception and theft
systems and networks

103. 1.4.1 1.4 Network security Threats to computer SQL injection


systems and networks

104. 1.4.2 1.4 Network security Identifying and preventing Penetration testing
vulnerabilities

105. 1.4.2 1.4 Network security Identifying and preventing Anti-malware software Software that detects potential malicious software and prevents you from
vulnerabilities installing that software.

106. 1.4.2 1.4 Network security Identifying and preventing Firewall


vulnerabilities
107. 1.4.2 1.4 Network security Identifying and preventing User access level Depending on what permissions you have on your account you will be restricted
vulnerabilities to certain things. Like teacher accounts having impero and student accounts not.

108. 1.4.2 1.4 Network security Identifying and preventing Password A sequence of eg. numbers, letters that the owner of the eg. Fortnite account
vulnerabilities knows in order to log in and out of their account.

109. 1.4.2 1.4 Network security Identifying and preventing Physical security
vulnerabilities

110. 1.5.1 1.5 Systems software Operating systems Systems software

111. 1.5.1 1.5 Systems software Operating systems Operating system

112. 1.5.1 1.5 Systems software Operating systems User interface

113. 1.5.1 1.5 Systems software Operating systems Memory management

114. 1.5.1 1.5 Systems software Operating systems Multitasking

115. 1.5.1 1.5 Systems software Operating systems Peripheral management

116. 1.5.1 1.5 Systems software Operating systems Driver

117. 1.5.1 1.5 Systems software Operating systems User management

118. 1.5.1 1.5 Systems software Operating systems File management

119. 1.5.2 1.5 Systems software Utility software Utility software

120. 1.5.2 1.5 Systems software Utility software Encryption software

121. 1.5.2 1.5 Systems software Utility software Defragmentation software

122. 1.5.2 1.5 Systems software Utility software Data compression software

123. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Ethical issues
environmental concerns environmental impact

124. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Legal issues
environmental concerns environmental impact
125. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Cultural issues
environmental concerns environmental impact

126. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Environmental issues
environmental concerns environmental impact

127. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Privacy issues
environmental concerns environmental impact

128. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and The Data Protection Act Makes it so that the companies which track your data are legally obligated to
environmental concerns environmental impact 2018 allow their users do delete all there data if they would like to.

129. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Computer Misuse Act 1990
environmental concerns environmental impact

130. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Copyright Design and
environmental concerns environmental impact Patents Act 1998

131. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Software licences
environmental concerns environmental impact

132. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Open source A library of code created by people in a community to share with others who may
environmental concerns environmental impact want to know about that certain thing. GitHub is an example on where to get code
that is open sourced.

133. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Proprietary
environmental concerns environmental impact

134. 2.1.1 2.1 Algorithms Computational thinking Computational thinking Thinking of a problem and a solution to go with that problem, then implementing
it into code on a computer.

135. 2.1.1 2.1 Algorithms Computational thinking Abstraction Removing unnecessary code that makes your piece of code more concise.

136. 2.1.1 2.1 Algorithms Computational thinking Decomposition Breaking a problem down into multiple easier to work with problems in order to
ease out the workload

137. 2.1.1 2.1 Algorithms Computational thinking Algorithmic thinking Being able to identify steps in order to solve a problem.

138. 2.1.2 2.1 Algorithms Designing, creating and Problem inputs


refining algorithms

139. 2.1.2 2.1 Algorithms Designing, creating and Problem processes


refining algorithms

140. 2.1.2 2.1 Algorithms Designing, creating and Problem outputs


refining algorithms

141. 2.1.2 2.1 Algorithms Designing, creating and Structure diagram


refining algorithms

142. 2.1.2 2.1 Algorithms Designing, creating and Pseudocode Algorithms that are in broken English that are easy to understand.
refining algorithms

143. 2.1.2 2.1 Algorithms Designing, creating and Flowchart


refining algorithms

144. 2.1.2 2.1 Algorithms Designing, creating and Trace table


refining algorithms

145. 2.1.3 2.1 Algorithms Searching and sorting Searching algorithms


algorithms

146. 2.1.3 2.1 Algorithms Searching and sorting Binary search


algorithms

147. 2.1.3 2.1 Algorithms Searching and sorting Linear search


algorithms

148. 2.1.3 2.1 Algorithms Searching and sorting Sorting algorithm


algorithms

149. 2.1.3 2.1 Algorithms Searching and sorting Bubble sort


algorithms

150. 2.1.3 2.1 Algorithms Searching and sorting Merge sort


algorithms

151. 2.1.3 2.1 Algorithms Searching and sorting Insertion sort


algorithms

152. 2.2.1 2.2 Programming Programming Variable


fundamentals fundamentals

153. 2.2.1 2.2 Programming Programming Constant


fundamentals fundamentals

154. 2.2.1 2.2 Programming Programming Operator


fundamentals fundamentals

155. 2.2.1 2.2 Programming Programming Assignment


fundamentals fundamentals

156. 2.2.1 2.2 Programming Programming Programming construct


fundamentals fundamentals

157. 2.2.1 2.2 Programming Programming Sequence


fundamentals fundamentals

158. 2.2.1 2.2 Programming Programming Selection


fundamentals fundamentals

159. 2.2.1 2.2 Programming Programming Count controlled iteration


fundamentals fundamentals

160. 2.2.1 2.2 Programming Programming Condition controlled


fundamentals fundamentals iteration

161. 2.2.1 2.2 Programming Programming Arithmetic operator


fundamentals fundamentals

162. 2.2.1 2.2 Programming Programming Boolean operator: AND


fundamentals fundamentals

163. 2.2.1 2.2 Programming Programming Boolean operator: OR


fundamentals fundamentals

164. 2.2.1 2.2 Programming Programming Boolean operator: NOT


fundamentals fundamentals

165. 2.2.1 2.2 Programming Programming Comparison operator: ==


fundamentals fundamentals

166. 2.2.1 2.2 Programming Programming Comparison operator: !=


fundamentals fundamentals

167. 2.2.1 2.2 Programming Programming Comparison operator: <


fundamentals fundamentals

168. 2.2.1 2.2 Programming Programming Comparison operator: <=


fundamentals fundamentals

169. 2.2.1 2.2 Programming Programming Comparison operator: >


fundamentals fundamentals

170. 2.2.1 2.2 Programming Programming Comparison operator: >=


fundamentals fundamentals

171. 2.2.1 2.2 Programming Programming Arithmetic operator: +


fundamentals fundamentals

172. 2.2.1 2.2 Programming Programming Arithmetic operator: -


fundamentals fundamentals

173. 2.2.1 2.2 Programming Programming Arithmetic operator: *


fundamentals fundamentals

174. 2.2.1 2.2 Programming Programming Arithmetic operator: /


fundamentals fundamentals

175. 2.2.1 2.2 Programming Programming Arithmetic operator: MOD


fundamentals fundamentals

176. 2.2.1 2.2 Programming Programming Arithmetic operator: DIV


fundamentals fundamentals

177. 2.2.1 2.2 Programming Programming Arithmetic operator: ^


fundamentals fundamentals

178. 2.2.2 2.2 Programming Data types Data type


fundamentals

179. 2.2.2 2.2 Programming Data types Integer


fundamentals

180. 2.2.2 2.2 Programming Data types Real


fundamentals

181. 2.2.2 2.2 Programming Data types Boolean


fundamentals

182. 2.2.2 2.2 Programming Data types Character


fundamentals

183. 2.2.2 2.2 Programming Data types String


fundamentals

184. 2.2.2 2.2 Programming Data types Casting


fundamentals

185. 2.2.3 2.2 Programming Additional programming String manipulation


fundamentals techniques

186. 2.2.3 2.2 Programming Additional programming File handling: Open


fundamentals techniques

187. 2.2.3 2.2 Programming Additional programming File handling: Read


fundamentals techniques

188. 2.2.3 2.2 Programming Additional programming File handling: Write


fundamentals techniques

189. 2.2.3 2.2 Programming Additional programming File handling: Close


fundamentals techniques

190. 2.2.3 2.2 Programming Additional programming Record


fundamentals techniques

191. 2.2.3 2.2 Programming Additional programming SQL


fundamentals techniques

192. 2.2.3 2.2 Programming Additional programming SQL command: SELECT


fundamentals techniques

193. 2.2.3 2.2 Programming Additional programming SQL command: FROM


fundamentals techniques

194. 2.2.3 2.2 Programming Additional programming SQL command: WHERE


fundamentals techniques

195. 2.2.3 2.2 Programming Additional programming Array


fundamentals techniques

196. 2.2.3 2.2 Programming Additional programming Sub programs


fundamentals techniques

197. 2.2.3 2.2 Programming Additional programming Procedure


fundamentals techniques

198. 2.2.3 2.2 Programming Additional programming Function Premade lines of code that you can recall once stated
fundamentals techniques

199. 2.2.3 2.2 Programming Additional programming Random number generation


fundamentals techniques

200. 2.3.1 2.3 Producing robust programs Defensive design Defensive design

201. 2.3.1 2.3 Producing robust programs Defensive design Anticipating misuse

202. 2.3.1 2.3 Producing robust programs Defensive design Authentication

203. 2.3.1 2.3 Producing robust programs Defensive design Input validation

204. 2.3.1 2.3 Producing robust programs Defensive design Maintainability

205. 2.3.1 2.3 Producing robust programs Defensive design Naming conventions
206. 2.3.1 2.3 Producing robust programs Defensive design Indentation

207. 2.3.1 2.3 Producing robust programs Defensive design Commenting

208. 2.3.2 2.3 Producing robust programs Testing Testing

209. 2.3.2 2.3 Producing robust programs Testing Iterative testing

210. 2.3.2 2.3 Producing robust programs Testing Final/terminal testing

211. 2.3.2 2.3 Producing robust programs Testing Syntax error

212. 2.3.2 2.3 Producing robust programs Testing Logical error

213. 2.3.2 2.3 Producing robust programs Testing Test data

214. 2.3.2 2.3 Producing robust programs Testing Test data: Normal

215. 2.3.2 2.3 Producing robust programs Testing Test data: Boundary

216. 2.3.2 2.3 Producing robust programs Testing Test data: Invalid

217. 2.3.2 2.3 Producing robust programs Testing Test data: Erroneous

218. 2.4.1 2.4 Boolean logic Boolean logic Logic diagram

219. 2.4.1 2.4 Boolean logic Boolean logic Logic gate

220. 2.4.1 2.4 Boolean logic Boolean logic Logic gate: AND Two 1’s in order to complete a process.

221. 2.4.1 2.4 Boolean logic Boolean logic Logic gate: OR At least one 1 in order to complete a process.

222. 2.4.1 2.4 Boolean logic Boolean logic Logic gate: NOT

223. 2.4.1 2.4 Boolean logic Boolean logic Truth table

224. 2.5.1 2.5 Programming languages Languages High-level language


and IDEs

225. 2.5.1 2.5 Programming languages Languages Low-level language


and IDEs
226. 2.5.1 2.5 Programming languages Languages Translator
and IDEs

227. 2.5.1 2.5 Programming languages Languages Compiler


and IDEs

228. 2.5.1 2.5 Programming languages Languages Interpreter


and IDEs

229. 2.5.2 2.5 Programming languages The Integrated IDE An environment specifically made in order to make coding easier eg. Arduino IDE
and IDEs Development Environment

230. 2.5.2 2.5 Programming languages The Integrated IDE: Error diagnostics
and IDEs Development Environment

231. 2.5.2 2.5 Programming languages The Integrated IDE: Run-time environment
and IDEs Development Environment

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy