Higher Computing Science

Chris Hulme
Mind Map by Chris Hulme, updated more than 1 year ago
Chris Hulme
Created by Chris Hulme about 4 years ago
16
1

Description

Mind Map on Higher Computing Science, created by Chris Hulme on 03/14/2016.

Resource summary

Higher Computing Science
1 Languages and environments
1.1 Low-Level
1.1.1 Corresponds directly to a processor's instruction set
1.2 High-Level
1.2.1 Written in English
1.3 Procedural
1.3.1 Uses procedures, functions or sub-routines.
1.3.2 Visual Basic
1.4 Declarative
1.4.1 Uses facts, rules and queries to interrogate the knowledge base
1.4.2 {"item": "bread", "type": "wheat"}
1.5 Object-Orientated
1.5.1 Uses classes
2 Parameters
2.1
2.1.1 Formal - this refers to the variable name used within the subroutine to hold the data passed into it, for example, age.
2.1.2 Actual - this refers to the actual data that is passed into the subroutine, for example, 45.
2.2
2.2.1 Global - these variables can be used throughout a program at any point in the code
2.2.2 Local - the values stored in these variables exist within only one part of the code, usually within a subroutine
3 Methods of Testing
3.1 Dry Run - reading the code and predicting what will happen without actually running the code.
3.2 Trace Table - lists the variables in a program and tracks the values they store as the code is executed store as the code is executed.
3.3 Test Plan
3.3.1 Normal, Extreme, Exceptional
3.4 Beta Testing - final stage of testing involving community
4 Software Development Methodologies
4.1 Rapid Application Development
4.1.1 Involves building prototypes of parts of the software
4.1.1.1 Easier to test
4.1.1.2 Feedback early on
4.2 Agile Methodologies
4.2.1 Lack of emphasis on design and documentation
5 Legal Implications
5.1 Computer Misuse Act
5.1.1 Unauthorised access of a computer
5.1.2 Unauthorised access of a computer to commit further criminal offences
5.1.3 Unauthorised altering of computer data
5.2 Copyright, Designs and Patents Act
5.2.1 Protect time, money and effort invested by content creators.
5.3 The Communications ACt
5.3.1 Use other people's Wi-Fi broadband connections without permission
5.3.2 Offensive / upsetting messaging
5.3.3 Unauthorised interception of communications (e.g. phone hacking)
5.4 Regulation of Investigatory Powers Act (RIPA)
5.4.1 Certain organisations can intercept data, access password protected data and carry out surveillance for the purposes of crime prevention.
5.4.2 Protects individuals' rights to privacy
5.4.3 The employers must notify employees if they want to intercept communications data
6 Processor Buses
6.1 Data Bus
6.1.1 Transfer data between main memory and the processor.
6.1.2 Two-way
6.2 Address Bus
6.2.1 Specify the address of the memory location
6.2.2 One-way
6.3 Control Bus
6.3.1 Read - Reads the contents of a memory location
6.3.2 Write - Writes an item of data from the processor into a memory location
6.3.3 Clock - sends a regular series of pulses into the processor to synchronise events.
6.3.4 Reset - stop execution of current program and then to reboot
6.3.5 Interrupt - peripheral devices, such as printers, can send a signal on the interrupt line into the processor when the require attention. This causes the processor to deal with the interrupting device.
7
Show full summary Hide full summary

Similar

Data Types and Structures
Saji McCorkindale
UNIT 1 DIGITAL MEDIA SECTORS AND AUDIENCES
carolyn ebanks
English Poetry Key Words
Oliviax
Camera Angles
saradevine97
Chemistry (C3)
Amy Lashkari
The Effects of Climate Change
j. stu
GCSE AQA Chemistry 2 Salts & Electrolysis
Lilac Potato
General questions on photosynthesis
Fatima K
Acids, Bases and Salts
asramanathan
Language Techniques
Liam Quach
TEORÍA DE LA PERSONALIDAD según Freud
JOSE MIGUEL RODRIGUEZ RESENDIZ