Please enable JavaScript.
Coggle requires JavaScript to display documents.
2021 Mock Revision, c (b, z), m, ,, Yes sir, : : : : : :, jaf smells -…
2021 Mock Revision
-
ALGORITHM
An algorithm is a series of steps that can be followed to complete a task.
An algorithm is not a computer program. A computer program is an interpretation of an algorithm
DECOMPOSITION
Breaking a problem down into a series of sub problems, so that each sub-problem accomplishes an identifiable task, which itself might be further subdivided
Sort
Merge
Split the original list into paris, sort the paris by checking each one for the correct order, if they're not, wap them. Then merge the pairs into bigger lists and sort the bigger lists. Keep merging and sorting the lists until the original list is restored and it is sorted
-
Bubble
Look at the first and second number, if they're in the wrong order, swap them, then look at the second and third, and do the same. Continue for every pair in the list. The sort only stops when no swaps are made in one run through
-
-
Search
Linear
Searches through each item of the list individually, only stops when it finds the item it is looking for or reaches the end of the list.
It is slower than a binary search, but it doesn't require the list to be in order, it also works when letters are involoved
Binary
Looks at the middle item, if it is lower than the desired value, it will discard the first half of the list and itself and vice versa, if it is the value it's looking for, the search will end. It will continue to do this with each new half the search creates until it finds what it's looking for or it gets down to the last value.
It is faster than a linear search, but it requires the list to be ordered from lowest to highest
-
-
-
Data Types - Character, String, Integer, Boolean, Real
-
-
-
LAN, WAN, PAN
-
Wide Area Network
Spread over a wide geographical area. Usually used by things like organisations with more than one office
-
-
Personal Area Network
Network used to connect personal devices and spread over a very small area. for example, bluetooth.
-
-
-
Topologies
Star
Advantages - If one node is damaged or disconnected, the entire network DOES NOT go down
New nodes can be added to the network, simply by connecting them to the switch
Star networks tend to have higher performance as a message is only passed on to the intended node
Disadvantages - The whole network fails if the main switch fails
A wired star topology is more expensive than a bus
A star topology consists of multiple nodes, individually connected to a main hub switch
Bus
Disadvantages
If there is an issue with the backbone cable, all of the nodes will fail.
-
-
-
All the nodes on a network are connected through a backbone. Data is sent across the backbone cable to get to its node. If the corRect node is not found, the data continues to a terminator at the end of the backbone cable and the data is destroyed.
Network Security
-
-
Firewalls - A security system that monitors incoming and outgoing data based on predetermined security walls
-
Protocols
A protocol is a set of rules for how devices communicated and how data is transmitted across a network
-
LAYER 4 - THE APPLICATION LAYER: provides networking services to applications e.g turning data into websites.
-
FTP - File Transfer Protocol - USed to send files from one node to another over the Internet or other network. Used to upload web pages
-
-
-
LAYER 3 - THE TRANSPORT LAYER: Setting up communications between devicces, splitting data into packets. Examples include TCP and UDP
TCP - Transmission Control Protocol - Controls how devices connect to a network. Creates a connection between two devices and checks if the data is sent and delivered
-
LAYER 2 - THE INTERNET LAYER - Adding IP addresses to packets, directing them between devices. Handling traffic. This is used by routers. Examples include IP
IP - Internet Protocol - The method in which a computer sends data to another computer across the Internet
LAYER 1 - THE LINK LAYER: Passing data over the physical network, responsible for hardware and electrical signals. Examples include Wi-Fi and Ethernet
MAC Address - Media Access Control - The address is the description of your computer's address. MAC addresses cannot change
Hardware
-
-
-
-
WAP
Wireless Access Point - Uses a radio transceiver to allow wireless connections to a network. Can be used to extend the range of a wireless network
-
Fibre-Optic
High Bandwidth More expensive, 40 terabits per second
-
-
Images
One type of digital image is a bitmap image - made up of pixels, a block of solid colour
Colour Depth
-
-
The higher the colour depth of an image, the larger the file of that image will be
Resolution
Image resolution is the number of pixels in a specific area of the image - This is usually measured in PPI , pixels per inch
In a low resolution image, the images appear blocky and more pixelated as less pixels are used to fill the space - The higher an images resolution, the larger the file will be
Metadata
-
The data used in metadata information includes things like:
- File Type
- Date Created
- Author
- The height and width of the image
- The resolution
- The colour depth
Sound
Sound collection
-
An analogue to digital converter will capture the sound by measuring the amplitude (height) of the sound wave. This is called a sample
-
Sample Rate
Sample rate is the number of samples recorded per second. Sample rate is measured in hertz. The higher the hertz, the closer the sound sounds to the original
The higher sample rate, the larger the resultant file size
Bit depth and Bit Rate
Bit depth refers to the number of bits used to record each sample - The higher the bit depth, the more accurately a sound can be recorded, but the larger file size
Bit rate is simply a measure of how much data is processed for each second of sound
The equation for calculating bit rate is:
Bit depth x Sample rate
-
Boolean Logic
Variables - Boolean variables can contain one of two values, true or false,#. This can be represented by the computer using a 0 or a 1
Gates -
Gates are some of the most basic operations within a computer, they can take in inputs and change it based on conditions
-
Not Gate - Changes the input from a 0 to a 1, and vice versa
-
-
The purpose of a computer is to take data, process, and then output said data
There are many types of computers built for specific tasks, of various sizes and power levels. Some computers are general purpose, while others are dedicated systems designed for one particular function.
Embedded systems were built into other devices to perform one task. As they're dedicated to a singular task, embedded systems are easier to design, cheaper to produce and more efficient
The CPU and Von Neumann
-
The CPU is the brain of a computer system and it processes all data and instructions to make a system work. It's processing power depends on different characteristics such as clock speed, number of cores and cache size
-
Social Engineering
-
Phishing
Similar to blagging, phishing is sent by a person or organisation pretending to be a legitimate business. When a person clicks on the link and logs in, information is stolen from the victim.
Pharming
A type of attack that redirects a user from a genuine website to a fake one that looks real. When the user logs in, the attacker will then use the information to log in to the real account
Shouldering
Looking over someone's shoulder in order to read the information they have inputted before memorising it
Malicious Code
Viruses
Malware that infects another computer, then replicates itself to be passed on to another computer
Therefore, anti-virus software hosts a large database of known viruses. If a virus is detected it will place all important data in a secured folder until it is safe
Trojans
A trojan appears to be a piece of harmless software, but actually contains malicious code
Ransomware
Hijacks the data on a computer system by encrypting it and then demands a ransom for unencrypting it
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-