ib computer science hl

This class was created by Brainscape user Edward DUNNE. Visit their profile to learn more about the creator.

Decks in this class (75)

1.1.1 - Identify the context for which a new system is planned.
What is the systems life cycle,
New systems are normally a replac...,
What should be considered when pl...
12  cards
1.1.2 - Describe the need for change management.
What is change management,
Give 3 reasons why change managem...,
State 3 factors to be regarded wh...
3  cards
1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers.
What is a business merger,
State five possible issues that c...,
Describe 4 merger strategies and ...
6  cards
1.1.4 - Compare the implementation of systems using a client’s hardware with hosting systems remotely.
Name and describe the two methods...,
Name and describe the two ways of...,
What can saas also be known as
7  cards
1.1.5 - Evaluate alternative installation processes.
Name the 4 methods of system conv...,
Describe how direct change over h...,
Explain the costs and risks of di...
14  cards
1.1.6 - Discuss problems that may arise as a part of data migration.
What is data migration,
State 5 possible issues that may ...,
Give a possible cause of file com...
3  cards
1.1.7 - Suggest various types of testing.
Why is testing important,
Give 3 possible testers,
Describe functional testing
12  cards
1.1.8 - Describe the importance of user documentation.
What is user documentation,
Why is user documentation important,
Give 3 properties of a good user ...
4  cards
1.1.9 - Evaluate different methods of providing user documentation.
State 3 methods of providing user...,
Give 6 properties of help files,
Give 3 disadvantages of help files
7  cards
1.1.10 - Evaluate different methods of delivering user training.
What is self instruction,
What is self instruction,
State 3 advantages of self learning
10  cards
1.1.11 - Identify a range of causes of data loss.
What is data loss,
Give 5 reasons for data loss,
What precaution should be taken t...
9  cards
1.1.12 - Outline the consequences of data loss in a specified situation.
When discussing the consequences ...
1  cards
1.1.13 - Describe a range of methods that can be used to prevent data loss.
What should the amount of resourc...,
What are the 4 main methods of da...,
Explain what data redundancy is
9  cards
1.1.14 - Describe strategies for managing releases and updates.
Why are updates needed,
What are the three levels of soft...,
What is a patch
16  cards
1.2.1 - Define the terms: hardware, software, peripheral, network, human resources.
What are the five components of a...,
What is computer hardware,
What is another name for internal...
11  cards
1.2.2 - Describe the roles that a computer can take in a networked world.
Give 4 possible tasks for a netwo...,
What are the two types of network...,
What is a server
12  cards
1.2.3 - Discuss the social and ethical issues associated with a networked world.
What is a social issue,
What is an ethical issue,
Provide 4 possible discussion poi...
4  cards
1.2.4 - Identify the relevant stakeholders when planning a new system.
What is a stakeholder,
Give 7 examples of stakeholders,
Are all stakeholders equal
7  cards
1.2.5 - Describe methods of obtaining requirements from stakeholders.
Give 3 advantages of surveys,
Give 4 disadvantages of surveys,
Give 2 advantages of interviews
9  cards
1.2.6 - Describe appropriate techniques for gathering the information needed to arrive at a workable solution.
State 4 ways to gather the inform...,
What does examining the current s...,
What 5 things should be considere...
8  cards
1.2.7 - Construct suitable representations to illustrate system requirements.
Give 4 types of diagram for illus...,
Describe a flowchart,
Describe a data flow diagram
5  cards
1.2.8 - Describe the purpose of prototypes to demonstrate the proposed system to the client.
What is a prototype,
Why are prototypes important,
Give 7 advantages of making a pro...
4  cards
1.2.9 - Discuss the importance of iteration during the design process.
Give the two definitions of itera...,
Give an example of an iterative p...,
What does iteration allow for
4  cards
1.2.10 - Explain the possible consequences of failing to involve the end-user in the design process.
For a system to be successful who...,
Why is user involvement necessary,
Would could happen if the user is...
5  cards
1.2.11 - Discuss the social and ethical issues associated with the introduction of new IT systems.
Are machines causing unemployment,
Provide 6 discussion points when ...
2  cards
1.2.12 - Define the term usability.
Define usability,
Explain the 5 parts of usability,
Define ergonomics
4  cards
1.2.13 - Identify a range of usability problems with commonly used digital devices.
List some devices that could have...,
State 6 sources of usability prob...
2  cards
1.2.14 - Identify methods that can be used to improve the accessibility of systems.
Identify 5 specialist peripherals...,
List 4 types of disability,
Give 4 specific ways to improve t...
3  cards
1.2.15 - Identify a range of usability problems that can occur in a system.
Give 4 questions for considering ...
1  cards
1.2.16 - Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines.
What is a moral issue,
Give 6 examples of moral issues,
What is an economic issue
7  cards
2.1.1 - Outline the architecture of the central processing unit (CPU) and the functions of the arithmetic logic unit (ALU) and the control unit (CU) and the registers within the CPU.
0  cards
2.1.2 - Describe primary memory.
0  cards
2.1.3 - Explain the use of cache memory.
0  cards
2.1.4 - Explain the machine instruction cycle.
0  cards
2.1.5 - Identify the need for persistent storage.
0  cards
2.1.6 - Describe the main functions of an operating system.
0  cards
2.1.7 - Outline the use of a range of application software.
0  cards
2.1.8 - Identify common features of applications.
0  cards
2.1.9 - Define the terms: bit, byte, binary, denary/decimal, hexadecimal.
0  cards
2.1.10 - Outline the way in which data is represented in the computer.
0  cards
2.1.11 - Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR.
0  cards
2.1.12 - Construct truth tables using the above operators.
0  cards
2.1.13 - Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates.
0  cards
3.1.1 - Identify different types of networks.
What is a network,
Explain what a lan is,
What are the two ways to implemen...
14  cards
3.1.2 - Outline the importance of standards in the construction of networks.
What is a standard,
Why are standards important,
Give two examples of standards
3  cards
3.1.3 - Describe how communication over networks is broken down into different layers.
What is the osi model,
What are the seven layers of the ...,
Describe the application layer of...
9  cards
3.1.4 - Identify the technologies required to provide a VPN.
What is a vpn,
What is encryption,
What is tunnelling
3  cards
3.1.5 - Evaluate the use of a VPN.
Explain how vpns gave rise to tel...
1  cards
3.1.6 - Define the terms: protocol, data packet.
What is a protocol,
What is a data packet,
What is a data packet
3  cards
3.1.7 - Explain why protocols are necessary.
Why are protocols necessary,
Give 5 reasons why protocols are ...,
Explain protocols in the context ...
13  cards
3.1.8 - Explain why the speed of data transmission across a network can vary.
Describe 5 factors that can limit...
1  cards
3.1.9 - Explain why compression of data is often necessary when transmitting across a network.
What is data compression,
What is the difference between lo...
2  cards
3.1.10 - Outline the characteristics of different transmission media.
What are the 4 ways to compare tr...,
What are utp cables made of,
Describe utp cables
5  cards
3.1.11 - Explain how data is transmitted by packet switching.
What is packet switching,
Describe packet switching
2  cards
3.1.12 - Outline the advantages and disadvantages of wireless networks.
Explain 4 advantages of wireless ...,
Explain 4 disadvantages of wired ...
2  cards
3.1.13 - Describe the hardware and software components of a wireless network.
State 4 hardware components of a ...,
State 3 soft
2  cards
3.1.14 - Describe the characteristics of wireless networks.
What is wi fi an abbreviation for,
Outline the characteristics and u...,
Describe mobile generations
3  cards
3.1.15 - Describe the different methods of network security.
Describe the need for wireless se...,
What are the 3 factors of security,
Give 4 reasons why securing netwo...
10  cards
3.1.16 - Evaluate the advantages and disadvantages of each method of network security.
State 2 advantages of userid as a...,
State 4 disadvantages of userid a...,
State 2 advantages of encryption ...
6  cards
6.1.1 - Identify the resources that need to be managed within a computer system.
1  cards
6.1.2 - Evaluate the resources available in a variety of computer systems.
0  cards
6.1.3 - Identify the limitations of a range of resources in a specified computer system.
0  cards
6.1.4 - Describe the possible problems resulting from the limitations in the resources in a computer system.
0  cards
6.1.5 - Explain the role of the operating system in terms of managing memory, peripherals and hardware interfaces.
0  cards
6.1.7 - Outline OS resource management techniques: scheduling, policies, multitasking, virtual memory, paging, interrupt, polling.
0  cards
6.1.8 - Discuss the advantages of producing a dedicated operating system for a device.
0  cards
6.1.9 - Outline how an operating system hides the complexity of the hardware from users and applications.
0  cards
7.1.1 - Discuss a range of control systems.
0  cards
7.1.2 - Outline the uses of microprocessors and sensor input in control systems.
0  cards
7.1.3 - Evaluate different input devices for the collection of data in specified situations.
0  cards
7.1.4 - Explain the relationship between a sensor, the processor and an output transducer.
0  cards
7.1.5 - Describe the role of feedback in a control system.
0  cards
7.1.6 - Discuss the social impacts and ethical considerations associated with the use of embedded systems.
0  cards
7.1.7 - Compare a centrally controlled system with a distributed system.
0  cards
7.1.8 - Outline the role of autonomous agents acting within a larger system.
0  cards

More about
ib computer science hl

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Edward DUNNE's IB Computer Science HL flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

IB Computer Science HL
  • 4 decks
  • 21 flashcards
  • 1 learners
Decks: 111 Identify The Context For Which A New, 112 Describe The Need For Change Managem, 113 Outline Compatibility Issues Resulti, And more!
IB Computer Science (HL)
  • 7 decks
  • 151 flashcards
  • 3 learners
Decks: Topic 1 System Fundamentals, Topic 2 Computer Organisation, Topic 3 Networks, And more!
IB Biology HL
  • 33 decks
  • 603 flashcards
  • 138 learners
Decks: Ecology, Plants, Digestion, And more!
Make Flashcards