Computer Science

jacobhuntergoddard
Mind Map by , created almost 6 years ago

12 Computer Science Mind Map on Computer Science, created by jacobhuntergoddard on 10/08/2013.

755
21
3
Tags
jacobhuntergoddard
Created by jacobhuntergoddard almost 6 years ago
2.1.3 Software
Lavington ICT
GCSE AQA Computer Science - Definitions
James Jolliffe
OCR A-Level Computer Science from 2015 - Chapter 8 (Applications Generation)
Tyrone Muriithi
Hitler's Rise to Power
hanalou
C Programming
Miki Rana
OCR gcse computer science
Jodie Awthinre
GCSE Computing: Hardware
Yasmin F
computer systems and programming quiz
Molly Batch
GCSE Computer Science (AQA)
Wolfie Ruth
Think Python
tsilvo2001
Computer Science
1 Hardware
1.1 Virtualisation
1.1.1 Advantages/Disadvantages
1.1.2 Platform Virtualisation
1.2 Parallel Processing
1.3 Cache
1.4 CPU
1.4.1 Fetch And Execute
1.5 RAID
1.6 RAM
1.7 Storage
1.7.1 HDD
1.7.2 SSD
1.7.3 Volatile/Non-Volatile
1.8 Trouble Shooting
1.9 Convergance
1.10 Buses
1.11 Benchmarking
1.12 Disaster Recovery
1.13 Disposal
2 Software
2.1 Network Operating System
2.1.1 Admin/User
2.2 Open Source
2.3 EULA
2.4 Encryption
2.5 Anti-Virus
2.6 Utility Software
2.7 SOA
2.8 Backup
2.8.1 Full
2.8.2 Incremental
2.8.3 Differential
2.9 Phishing
2.10 Defragmentation
2.11 BIOS
2.12 Legacy
2.13 Benchmarking
3 Networks
3.1 IPV6
3.2 IPV4
3.3 Topology
3.3.1 Star Network
3.3.2 Router
3.3.3 Repeater
3.3.4 WLAN
3.3.5 Proxy
3.3.6 Firewall
3.3.7 Modem
3.3.8 Legacy Network
3.3.9 Switch
3.3.10 WAP
3.3.11 Gateway
3.3.12 Gateway
3.3.13 Bridge
3.3.14 NIC
3.3.15 LAN
3.4 Protocols
3.4.1 TCP/IP Model
3.4.2 DHCP
3.5 SAN/NAS
3.6 OS
3.6.1 Stand Alone
3.6.2 Embedded
3.6.3 Server Operated System
3.7 Transmission Media
3.7.1 Wireless
3.7.1.1 802.11
3.7.1.2 Cellular
3.7.1.3 Satellite
3.7.1.4 Microwave
3.7.1.5 RadioWave
3.7.2 Cable
3.7.2.1 802.3
3.7.2.2 Twisted Pair
3.7.2.2.1 UTP
3.7.2.2.2 STP
3.7.2.2.3 Cat 5e
3.7.2.3 Fibre
3.8 On/Off Peak
3.9 CSMA/CD --- CSMA/CA
3.10 Security
3.10.1 WAP/WEP
3.10.2 Intrusion Detection
3.10.3 SSID
3.10.4 Proxy
3.10.5 Firewall
3.11 Error Detection
3.12 Protocols
3.12.1 HTTP
3.12.2 FTP
3.12.3 SMTP
3.12.4 DNS
3.13 Attenuation
3.14 Packets
3.15 NOS
3.16 TCP/IP Model
3.16.1 Transport
3.16.1.1 Transport
3.16.2 Application
3.16.2.1 Application
3.16.2.2 Presentation
3.16.2.3 Session
3.16.3 Internet
3.16.3.1 Network
3.16.4 Network
3.16.4.1 Data Link
3.16.4.2 Physical
3.17 Intranet
3.18 Extranet
3.19 Cloud
3.20 Inter Networking
4 Programming
4.1 Pseudo code
4.1.1 Data into a record
4.1.2 Arrays
4.2 Trace Tables
4.3 Functions
4.4 CASE statements
4.5 Modules
4.6 Parameters
4.7 Structure charts
4.8 Byte Code
4.9 Generation Languages
4.9.1 First
4.9.1.1 Machine
4.9.2 Second
4.9.2.1 Assembly
4.9.3 Third
4.9.3.1 High Level: C, Java, Etc...
4.9.4 Fourth
4.9.4.1 SQL
4.9.5 Fifth
4.9.5.1 Visual Basic
4.10 Compiler/Interpretator
4.11 Errors
4.11.1 Syntax
4.11.2 Runtime
4.12 Prototypes
4.13 Stub
4.14 Form
4.15 Object Orientated
4.16 Procedural
5 Databases
5.1 Normalisation
5.1.1 1NF
5.1.2 2NF
5.1.3 3NF
5.2 Anomalies
5.3 ER Diagrams
5.4 Database
5.5 SQL
5.6 Foreign Keys
5.7 Index
5.8 Types
5.8.1 Distributed
5.8.2 Centralised
5.9 Data Integrety
5.10 Data Dictionary
5.11 ER Diagram
6 Systems
6.1 Project Management Tools
6.1.1 Gantt
6.1.2 PERT
6.2 Implementation
6.3 RAD
6.4 Waterfall
6.5 SDLC
6.6 Data Gathering Techniques
6.7 Diagrams
6.7.1 Context
6.7.2 DFD
6.7.2.1 Level 0
6.7.2.2 Level 1
7 Ethics
7.1 Privacy
7.2 Data Gathering

Media attachments