{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Computer Science Flashcards

(24 cards)

1
Q

5 laws in computer science

A
Copyright
Freedom of information
Data protection
Computer misuse
Creative commons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give 2 ethical issues of computers

A

public safety

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 2 cultural issues of computers

A

digital divide

changing nature of employnment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give 2 environmental issues of computers

A

web DNS etc servers need a lot of energy

a lot of waste from people throwing tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you protect against phishing

A

By using a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give 5 utility programs

A
Compression
Anti-malware
Back up
Encryption
Defragmentation
CABED
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify 5 threats to networks

A
Brute forcing passwords
Denial of service
Phishing
Data interception
Malware
BDPDM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify 3 types of malware

A

Viruses
Worms
Ransomware
VW-R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give 2 differences between viruses and worms

A

Viruses are embedded in files and attack other files. Worms are their own file and spread through emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symbol for decision

A

Diamond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symbol for process

A

Rectangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Input output symbol

A

Slanted rectangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define insertion sort

A

Goes through each element and puts it in the right place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define bubble sort

A

Compares two elements and switches them if needs be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define binary search

A

Repeatedly finds middle value and checks the half it is in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define linear search

A

Looks through each element until it’s found

17
Q

Define merge sort

A

Splits list up and merges them while ordering them

18
Q

Define structure diagram

A

Shows the component parts of a program (decomposition)

19
Q

What is meant by authentication

A

Checking the identity of the user

20
Q

What is meant by validation

A

Checking that the data is sensible and follows certain rules

21
Q

3 programming control structures

A

Sequence selection iteration

22
Q

Give 6 tools of the IDE

A
Code highlighter
Run time environment
Auto completion
Translator
Editor
Debugger
CRATED
23
Q

What is the function of the CU

A

Controls flow to information to the memory and cpu

24
Q

What are the two types of translators

A

Compiler and interpreter