Topic 1: System Fundamentals Topic 3: Networking Topic 5: Abstract Data Web Science Case Study
100
What is a prototype
An original type, form, or instance serving as a basis or standard for later stages.
100
What is a protocol
A set of rules/standards to coordinate data transmission (between a sender and a receiver.)
100
What is a linked list
A type of data structure in which represents a group of nodes as a sequence.
100
What is black hat search engine optimization
A form of search engine optimization that is against the search engine’s terms of service
100
What is telemedicine
Diagnosis and treatment of patients by means of calling or online communication
200
What is the extent and limitations of a new system
Identify two features that need to be considered when planning a new computing system for an organization.
200
What is a Local Area Network (LAN)
A physical, private network defined by cables and networking hardware that has a bunch of interconnected computers within a limited area. which is linked together through hardware such as switches, hub and routers.
200
What is a dynamic data structure
A type of data structure in which represents a group of nodes as a sequence.
200
What is lossy compression
When a file is permanently reduced to eliminate redundant information to increase transfer speed over the Internet
200
What is a CT scan
The most risky/dangerous form of medical imagery
300
What is iteration
A process which includes prototyping, testing, analyzing and refining a product or system after receiving some feedback from customers.
300
What is Wi-Fi Protected Access (WPA)
Designed to work with all wireless network adapters, this form of network security encrypts information and makes sure that the network security key can not be modified or changed. It also authenticates the users to help ensure that only authorized people can access the network.
300
What are: enqueue() dequeue() isEmpty()
Identify the three standard queue operations
300
What is the Power law
This law suggests that the internet is developing exponentially, however, it is unlikely that the growth will continue indefinitely
300
What is CDSS
A system that helps doctors to suggest treatments for patients after diagnosis
400
What are Voice Recognition, Text-To-Speech, Braille Keyboards, Trackball Mouse
Identify four methods that can be used to improve the accessibility of systems
400
What is the OSI Model
A standardized system/model for network connections, consisting of 7 layers. Each layer deals with a specific part of network communication.
400
What is a keyboard- key strokes from a keyboard would be placed in a queue
Within a computer system, state where the processing might utilise a queue.
400
What is Ambient Intelligence
This is when technology is brought into our environment and the environment is enabled to become sensitive to us
400
What is RFID
This form of communication uses electromagnetic fields to automatically identify and locate special tags attached to objects
500
What are
External Storage: Files could be stored on an external flash disk or hard drive. Files could also be stored on a mobile phone or any storage device that is peripheral to the main operating system.

Failover System: switching to a redundant or standby computer server, system, hardware component or network upon the failure of the system.

Redundancy: these are computers that have duplicated data, however unlike a failover system, this system does not take over the initial system’s requests.
Describe three main methods that can be used to prevent data loss
500
What are Data encryption, authentication, and authorization
Identify 3 VPN functions.
500
What is parent, left-child, right-child, subtree, root and leaf.
Identify the six terms related to the structure and nodes of the binary tree
500
What is the semantic web
The idea that new technologies can be used to store information about objects on the web and how they interconnect.
500
What is the internet of helath things
The process of medical data being relayed continually to a health centre to monitor health of an individual






IB Computer Science Review

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline