GCSE Computer Science- Topic 1
🇬🇧
In English
In English
Practice Known Questions
Stay up to date with your due questions
Complete 5 questions to enable practice
Exams
Exam: Test your skills
Test your skills in exam mode
Learn New Questions
Manual Mode [BETA]
The course owner has not enabled manual mode
Specific modes
Learn with flashcards
multiple choiceMultiple choice mode
SpeakingAnswer with voice
TypingTyping only mode
GCSE Computer Science- Topic 1 - Leaderboard
GCSE Computer Science- Topic 1 - Details
Levels:
Questions:
78 questions
🇬🇧 | 🇬🇧 |
Each core in a CPU can process data independently so the more cores a CPU has, the more instructions it can carry out at once. | Number of Cores |
It is where all data is stored when not in use so is non-volatile. Includes SSDs, CDs and SD cards. | Secondary storage |
Cheaper, higher capacity, longer read/write life. | Advantages of HDDs |
Faster, don't need defragmenting, more shock proof, silent | Advantages of SSDs |
Have very great capacity and are very cheap so are often used by large organisations to store huge amounts of data. | Magnetic Tapes |
Reorganises data on a hard drive to put fragmented files back together and collects all the free space. | Defragmentation Software |
When only the files created or edited since the last backup are copied which takes less storage space and are quicker. | Incremental Backup |
Reduces the size of files so they take up less disk space and is used a lot on the internet to make files download quicker. | Compression Software |
It scrambles the data to stop third-parties from accessing it and has to be decrypted using a special 'key'. | Encryption Software |
A network of networks- WAN. | Internet |
A collection of websites that are hosted on web servers.and accessed through the HTTP protocol. | World Wide Web |
When someone within an organisation exploits their network access to steal information. | Insider attack |
Where a hacker tries to stop users from accessing a part of a network or website by flooding it with useless traffic. | Denial-of-Service Attack |
Malware disguised as legitimate software so users install them not realising their true purpose. | Trojans |
A way of gaining senstive information or illegal access to networks by influencing people like employees of large companies. | Social Engineering |
Pieces of SQL typed into a website's input box which then reveal senstive information. | SQL Injections |
When organisations employ specialists to stimulate potential attacks on their network and is used to identify possible weaknesses in security. | Penetration testing |
Investigations undertaken to find the cause of attacks on a network. | Network Forensics |
They prevent unauthorised users accessing the network and should be strong and changed regularly. | Passwords |
Control which parts of a network different groups of people can access which limit the number of insider attacks. | User Access Levels |