Computer systems

icon picker
Systems topic checklists

click to expand a topic

Data Representation

use the table below track your revision progress to key ideas in data representation
drag rows up as you progress
update your confidence level
update quizlet setting, you can add more then one activity option as you complete them
add personal reminder notes
revise key ideas in data representation
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
learned
1
learned key point
drag learned items here
flashcard
learned
tested
1
Count
revising
1
key point being revised
drag revising items here
flashcard
1
Count
to do
7
twos' complement
negative and positive integers
Describe and give examples of the use of binary to represent positive and negative integers using two’s complement.
range of values
fixed number of bits, twos' complement
Describe and give examples of the range of numbers that can be represented using a fixed number of bits.
convert 2s complement
binary to denary, denary to binary
Convert two’s complement numbers from binary to denary and vice versa.
floating-point
real number, mantissa, exponent
Describe and and give examples of floating-point representation of positive and negative real numbers, using the terms mantissa and exponent.
range, precision
relationship to number of bits
Describe the relationship between the number of bits assigned to the mantissa/exponent, and the range and precision of floating-point numbers.
unicode
number of characters
Describe how Unicode is used to represent characters and its advantage over extended ASCII code (8-bit) in terms of numbers of characters.
bitmap graphics, vector graphics
compare: edit, file size, suitability
Describe the relative advantages and disadvantages of bit-mapped graphics versus vector graphics.
7
Count
9
Count

Computer Structure

use the table below track your revision progress to key ideas in computer structure
drag rows up as you progress
update your confidence level
update quizlet setting, you can add more then one activity option as you complete them
add personal reminder notes
revise key ideas in computer structure 2
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
learned
1
learned key point
drag learned items here
flashcard
learned
tested
1
Count
revising
1
key point being revised
drag revising items here
flashcard
1
Count
to do
5
fetch-execute cycle
fetch, execute
Describe the concept of the fetch-execute cycle.
processor core
system performance
Describe how the number of processors (cores) affects computer system performance.
data bus width
system performance
Describe how the width of data bus affects computer system performance.
cache memory
system performance
Describe how cache memory affects computer system performance.
clock speed
system performance
Describe how clock speed affects computer system performance.
5
Count
7
Count

Security and Environment

use the table below track your revision progress to key ideas in environment, security
drag rows up as you progress
update your confidence level
update quizlet setting, you can add more then one activity option as you complete them
add personal reminder notes
revise key ideas in environment, security 2
status
key-point 1
key-point 2
I can use key-points to
confidence level
quizlet done
reminders
learned
1
learned key point
drag learned items here
flashcard
learned
tested
1
Count
revising
1
key point being revised
drag revising items here
flashcard
1
Count
to do
16
heating system
intelligent systems
Describe the environmental impact of intelligent systems on heating systems.
traffic control
intelligent systems
Describe the environmental impact of intelligent systems on traffic control.
car management systems
intelligent systems
Describe the environmental impact of intelligent systems on car management systems.
computer misuse act
Describe and identify the implications for individuals and businesses of the Computer Misuse Act 1990.
unauthorised access
computer misuse act
Describe the meaning of unauthorised access to computer material under the Computer Misuse Act 1990.
intent to commit further offence
computer misuse act
Describe the meaning of unauthorised access with intent to commit a further offence under the Computer Misuse Act 1990.
unauthorised modification
computer misuse act
Describe the meaning of unauthorised modification of programs or data on a computer under the Computer Misuse Act 1990.
tracking cookie
security risk
Describe and identify the security risks of tracking cookies.
DOS symptom
slow performance, inability to access service
Describe and identify Denial of Service attack symptoms: slow performance, inability to access.
DOS effects
service disruption to business, service disruption to users
Describe and identify Denial of Service attack effects: disruption to users and businesses.
DOS costs
lost revenue, fault maintenance cost
Describe and identify Denial of Service attack costs: lost revenue, labour in rectifying faults.
DOS fault type
bandwidth consumption, resource starvation, Domain Name Service
Describe and identify Denial of Service attack fault types: bandwidth consumption, resource starvation, Domain Name Service (DNS)
DOS attack motivation, reason
financial, political, personal
Describe and identify Denial of Service attack reasons: financial, political, personal
encryption
private key, public key
Describe use of public and private keys for encryption to provide secure data transmission.
digital certificate
certificate authority
Describe use of digital certificates for encryption to provide secure data transmission.
digital signature
Describe use of digital signatures for encryption to provide secure data transmission.
16
Count
18
Count

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.