JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
csHrevisionBook
Revision planning
Web development
Database development
Software development
Computer systems
More
Share
Explore
Systems topic checklists
click to expand a topic
Data Representation
use the table below track your revision progress to key ideas in
data representation
drag rows up
as you progress
update your
confidence level
update
quizlet
setting, you can add more then one activity option as you complete them
add personal
reminder
notes
revise key ideas in data representation
revise key ideas in data representation
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
learned
1
learned key point
drag
learned
items here
flashcard
learned
tested
1
Count
revising
1
key point being revised
drag
revising
items here
flashcard
1
Count
to do
7
twos' complement
negative and positive integers
Describe and give examples of the use of binary to represent positive and negative integers using two’s complement.
range of values
fixed number of bits, twos' complement
Describe and give examples of the range of numbers that can be represented using a fixed number of bits.
convert 2s complement
binary to denary, denary to binary
Convert two’s complement numbers from binary to denary and vice
versa.
floating-point
real number, mantissa, exponent
Describe and and give examples of floating-point representation of positive and negative real numbers, using the terms mantissa and exponent.
range, precision
relationship to number of bits
Describe the relationship between the number of bits assigned to the
mantissa/exponent, and the range and precision of floating-point numbers.
unicode
number of characters
Describe how Unicode is used to represent characters and its advantage over extended ASCII code (8-bit) in terms of numbers of characters.
bitmap graphics, vector graphics
compare: edit, file size, suitability
Describe the relative advantages and disadvantages of bit-mapped graphics versus vector graphics.
7
Count
9
Count
Computer Structure
use the table below track your revision progress to key ideas in
computer structure
drag rows up
as you progress
update your
confidence level
update
quizlet
setting, you can add more then one activity option as you complete them
add personal
reminder
notes
revise key ideas in computer structure 2
revise key ideas in computer structure 2
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
learned
1
learned key point
drag
learned
items here
flashcard
learned
tested
1
Count
revising
1
key point being revised
drag
revising
items here
flashcard
1
Count
to do
5
fetch-execute cycle
fetch, execute
Describe the concept of the fetch-execute cycle.
processor core
system performance
Describe how the number of processors (cores) affects computer system performance.
data bus width
system performance
Describe how the width of data bus affects computer system performance.
cache memory
system performance
Describe how cache memory affects computer system performance.
clock speed
system performance
Describe how clock speed affects computer system performance.
5
Count
7
Count
Security and Environment
use the table below track your revision progress to key ideas in
environment, security
drag rows up
as you progress
update your
confidence level
update
quizlet
setting, you can add more then one activity option as you complete them
add personal
reminder
notes
revise key ideas in environment, security 2
revise key ideas in environment, security 2
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
learned
1
learned key point
drag
learned
items here
flashcard
learned
tested
1
Count
revising
1
key point being revised
drag
revising
items here
flashcard
1
Count
to do
16
heating system
intelligent systems
Describe the environmental impact of intelligent systems on heating systems.
traffic control
intelligent systems
Describe the environmental impact of intelligent systems on traffic control.
car management systems
intelligent systems
Describe the environmental impact of intelligent systems on car management systems.
computer misuse act
Describe and identify the implications for individuals and businesses of the Computer Misuse Act 1990.
unauthorised access
computer misuse act
Describe the meaning of unauthorised access to computer material under the Computer Misuse Act 1990.
intent to commit further offence
computer misuse act
Describe the meaning of unauthorised access with intent to commit a further offence under the Computer Misuse Act 1990.
unauthorised modification
computer misuse act
Describe the meaning of unauthorised modification of programs or data on a computer under the Computer Misuse Act 1990.
tracking cookie
security risk
Describe and identify the security risks of tracking cookies.
DOS symptom
slow performance, inability to access service
Describe and identify Denial of Service attack symptoms: slow performance, inability to access.
DOS effects
service disruption to business, service disruption to users
Describe and identify Denial of Service attack effects: disruption to users and businesses.
DOS costs
lost revenue, fault maintenance cost
Describe and identify Denial of Service attack costs: lost revenue, labour in rectifying faults.
DOS fault type
bandwidth consumption, resource starvation, Domain Name Service
Describe and identify Denial of Service attack fault types: bandwidth consumption, resource starvation, Domain Name Service (DNS)
DOS attack motivation, reason
financial, political, personal
Describe and identify Denial of Service attack reasons: financial, political, personal
encryption
private key, public key
Describe use of public and private keys for encryption to provide secure data transmission.
digital certificate
certificate authority
Describe use of digital certificates for encryption to provide secure data transmission.
digital signature
Describe use of digital signatures for encryption to provide secure data transmission.
16
Count
18
Count
Data Representation
revise key ideas in data representation
Computer Structure
revise key ideas in computer structure 2
Security and Environment
revise key ideas in environment, security 2
Want to print your doc?
This is not the way.
Try clicking the ··· in the right corner or using a keyboard shortcut (
Ctrl
P
) instead.