Ash Gaind - GCSE Level Key Terminology Computer Science
Ash Gaind - GCSE Level Key Terminology Computer Science
1. 1.1.1 1.1 Systems architecture Architecture of the CPU CPU The central processing unit is where all the algorithms are processed
7. 1.1.1 1.1 Systems architecture Architecture of the CPU Von Neumann architecture
10. 1.1.1 1.1 Systems architecture Architecture of the CPU Program Counter
16. 1.2.1 1.2 Memory and storage Primary storage (Memory) Primary storage
17. 1.2.1 1.2 Memory and storage Primary storage (Memory) RAM Where temporary memory is stored for certain software to operate
18. 1.2.1 1.2 Memory and storage Primary storage (Memory) ROM Where memory is stored for an indefinite amount of time.
19. 1.2.1 1.2 Memory and storage Primary storage (Memory) Virtual memory
20. 1.2.2 1.2 Memory and storage Secondary storage Secondary storage
21. 1.2.2 1.2 Memory and storage Secondary storage Optical storage
22. 1.2.2 1.2 Memory and storage Secondary storage Magnetic storage
23. 1.2.2 1.2 Memory and storage Secondary storage Solid state storage
24. 1.2.2 1.2 Memory and storage Secondary storage Storage capacity
25. 1.2.2 1.2 Memory and storage Secondary storage Storage speed
26. 1.2.2 1.2 Memory and storage Secondary storage Storage portability
27. 1.2.2 1.2 Memory and storage Secondary storage Storage durability
28. 1.2.2 1.2 Memory and storage Secondary storage Storage reliability
29. 1.2.2 1.2 Memory and storage Secondary storage Storage cost
30. 1.2.3 1.2 Memory and storage Units Bit Smallest amount of storage possible to be saved
38. 1.2.4 1.2 Memory and storage Data storage (Numbers) Denary numbers
39. 1.2.4 1.2 Memory and storage Data storage (Numbers) Binary numbers
40. 1.2.4 1.2 Memory and storage Data storage (Numbers) Binary arithmetic
41. 1.2.4 1.2 Memory and storage Data storage (Numbers) Overflow
42. 1.2.4 1.2 Memory and storage Data storage (Numbers) Hexadecimal
43. 1.2.4 1.2 Memory and storage Data storage (Numbers) Binary shifts
44. 1.2.4 1.2 Memory and storage Data storage (Characters) Character set
45. 1.2.4 1.2 Memory and storage Data storage (Characters) ASCII
46. 1.2.4 1.2 Memory and storage Data storage (Characters) Unicode
47. 1.2.4 1.2 Memory and storage Data storage (Images) Pixels
48. 1.2.4 1.2 Memory and storage Data storage (Images) Metadata
49. 1.2.4 1.2 Memory and storage Data storage (Images) Colour depth
50. 1.2.4 1.2 Memory and storage Data storage (Images) Resolution
51. 1.2.4 1.2 Memory and storage Data storage (Images) Image quality
52. 1.2.4 1.2 Memory and storage Data storage (Images) Image file size
53. 1.2.4 1.2 Memory and storage Data storage (Sound) Sample rate
54. 1.2.4 1.2 Memory and storage Data storage (Sound) Sample duration
55. 1.2.4 1.2 Memory and storage Data storage (Sound) Sample bit depth
56. 1.2.4 1.2 Memory and storage Data storage (Sound) Playback quality
57. 1.2.4 1.2 Memory and storage Data storage (Sound) Sound file size
63. 1.3.1 1.3 Computer networks, Networks and topologies Client-server network
connections and protocols
64. 1.3.1 1.3 Computer networks, Networks and topologies Peer-to-peer network
connections and protocols
65. 1.3.1 1.3 Computer networks, Networks and topologies Wireless access point
connections and protocols
69. 1.3.1 1.3 Computer networks, Networks and topologies Transmission media
connections and protocols
70. 1.3.1 1.3 Computer networks, Networks and topologies The Internet
connections and protocols
73. 1.3.1 1.3 Computer networks, Networks and topologies The Cloud
connections and protocols
74. 1.3.1 1.3 Computer networks, Networks and topologies Web server
connections and protocols
76. 1.3.1 1.3 Computer networks, Networks and topologies Network topology
connections and protocols
77. 1.3.1 1.3 Computer networks, Networks and topologies Star topology
connections and protocols
78. 1.3.1 1.3 Computer networks, Networks and topologies Mesh topology
connections and protocols
79. 1.3.2 1.3 Computer networks, Wired and wireless Wired connection
connections and protocols networks, protocols and
layers
80. 1.3.2 1.3 Computer networks, Wired and wireless Ethernet An internet connection that is connected to eg. PC, Console, TV that uses a LAN
connections and protocols networks, protocols and cable
layers
81. 1.3.2 1.3 Computer networks, Wired and wireless Wireless connection
connections and protocols networks, protocols and
layers
86. 1.3.2 1.3 Computer networks, Wired and wireless MAC address
connections and protocols networks, protocols and
layers
96. 1.3.2 1.3 Computer networks, Wired and wireless Protocol layering
connections and protocols networks, protocols and
layers
100. 1.4.1 1.4 Network security Threats to computer Brute-force attack An attempt to break into someones eg. email account by repetitively repeating
systems and networks letters and numbers together in the hopes to get the password correct.
101. 1.4.1 1.4 Network security Threats to computer Denial of service attack
systems and networks
102. 1.4.1 1.4 Network security Threats to computer Data interception and theft
systems and networks
104. 1.4.2 1.4 Network security Identifying and preventing Penetration testing
vulnerabilities
105. 1.4.2 1.4 Network security Identifying and preventing Anti-malware software Software that detects potential malicious software and prevents you from
vulnerabilities installing that software.
108. 1.4.2 1.4 Network security Identifying and preventing Password A sequence of eg. numbers, letters that the owner of the eg. Fortnite account
vulnerabilities knows in order to log in and out of their account.
109. 1.4.2 1.4 Network security Identifying and preventing Physical security
vulnerabilities
122. 1.5.2 1.5 Systems software Utility software Data compression software
123. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Ethical issues
environmental concerns environmental impact
124. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Legal issues
environmental concerns environmental impact
125. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Cultural issues
environmental concerns environmental impact
126. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Environmental issues
environmental concerns environmental impact
127. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Privacy issues
environmental concerns environmental impact
128. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and The Data Protection Act Makes it so that the companies which track your data are legally obligated to
environmental concerns environmental impact 2018 allow their users do delete all there data if they would like to.
129. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Computer Misuse Act 1990
environmental concerns environmental impact
130. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Copyright Design and
environmental concerns environmental impact Patents Act 1998
131. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Software licences
environmental concerns environmental impact
132. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Open source A library of code created by people in a community to share with others who may
environmental concerns environmental impact want to know about that certain thing. GitHub is an example on where to get code
that is open sourced.
133. 1.6.1 1.6 Ethical, legal, cultural and Ethical, legal, cultural and Proprietary
environmental concerns environmental impact
134. 2.1.1 2.1 Algorithms Computational thinking Computational thinking Thinking of a problem and a solution to go with that problem, then implementing
it into code on a computer.
135. 2.1.1 2.1 Algorithms Computational thinking Abstraction Removing unnecessary code that makes your piece of code more concise.
136. 2.1.1 2.1 Algorithms Computational thinking Decomposition Breaking a problem down into multiple easier to work with problems in order to
ease out the workload
137. 2.1.1 2.1 Algorithms Computational thinking Algorithmic thinking Being able to identify steps in order to solve a problem.
142. 2.1.2 2.1 Algorithms Designing, creating and Pseudocode Algorithms that are in broken English that are easy to understand.
refining algorithms
198. 2.2.3 2.2 Programming Additional programming Function Premade lines of code that you can recall once stated
fundamentals techniques
200. 2.3.1 2.3 Producing robust programs Defensive design Defensive design
201. 2.3.1 2.3 Producing robust programs Defensive design Anticipating misuse
203. 2.3.1 2.3 Producing robust programs Defensive design Input validation
205. 2.3.1 2.3 Producing robust programs Defensive design Naming conventions
206. 2.3.1 2.3 Producing robust programs Defensive design Indentation
214. 2.3.2 2.3 Producing robust programs Testing Test data: Normal
215. 2.3.2 2.3 Producing robust programs Testing Test data: Boundary
216. 2.3.2 2.3 Producing robust programs Testing Test data: Invalid
217. 2.3.2 2.3 Producing robust programs Testing Test data: Erroneous
220. 2.4.1 2.4 Boolean logic Boolean logic Logic gate: AND Two 1’s in order to complete a process.
221. 2.4.1 2.4 Boolean logic Boolean logic Logic gate: OR At least one 1 in order to complete a process.
222. 2.4.1 2.4 Boolean logic Boolean logic Logic gate: NOT
229. 2.5.2 2.5 Programming languages The Integrated IDE An environment specifically made in order to make coding easier eg. Arduino IDE
and IDEs Development Environment
230. 2.5.2 2.5 Programming languages The Integrated IDE: Error diagnostics
and IDEs Development Environment
231. 2.5.2 2.5 Programming languages The Integrated IDE: Run-time environment
and IDEs Development Environment