Computer Science

Description

A mind-map on the specification for the Computer Science course
marcus.bagley-ho
Mind Map by marcus.bagley-ho, updated more than 1 year ago
marcus.bagley-ho
Created by marcus.bagley-ho almost 8 years ago
20
1

Resource summary

Computer Science
  1. 1.1-Systems architecture
    1. CPU
      1. Von Neumann
        1. MAR
          1. MDR
            1. Program Counter
              1. Accumulator
              2. Embedded systems
              3. 1.2-Memory
                1. RAM
                  1. ROM
                    1. Flash
                      1. Virtual
                      2. 1.3-Storage
                        1. Secondary storage
                          1. Data capacity
                            1. Types
                              1. Devices
                              2. 1.4-Wired and wireless networks
                                1. LAN
                                  1. WAN
                                    1. Internet
                                      1. Hardware
                                        1. Virtual networks
                                        2. 1.5-Network topologies, protocols and layers
                                          1. Wifi
                                            1. Ethernet
                                              1. IP
                                                1. MAC
                                                  1. Protocols
                                                    1. Layers
                                                      1. Packet switching
                                                      2. 1.6-System security
                                                        1. Forms of attack
                                                          1. Threats
                                                            1. Vulnerabilites
                                                            2. 1.7-System software
                                                              1. Purpose and functionality
                                                                1. Operating systems
                                                                  1. Utility system software
                                                                  2. 1.8-Ethical, legal, cultural and environmental concerns
                                                                    1. Issues
                                                                      1. Environmental
                                                                        1. Cultural
                                                                          1. Ethical
                                                                          2. Open source vs proprietary software
                                                                            1. Legislation
                                                                            2. 2.1-Algorithms
                                                                              1. 2.2-Programming techniques
                                                                                1. 2.3-Producing robust programs
                                                                                  1. 2.4-Computational logic
                                                                                    1. 2.5-Translators and facilities of languages
                                                                                      1. 2.6-Data representation
                                                                                        1. 3.1-Programming techniques
                                                                                          1. 3.2-Analysis
                                                                                            1. 3.3-Design
                                                                                              1. 3.4-Development
                                                                                                1. 3.5-Testing and evaluation and conclusions
                                                                                                  Show full summary Hide full summary

                                                                                                  Similar

                                                                                                  Computing Hardware - CPU and Memory
                                                                                                  ollietablet123
                                                                                                  SFDC App Builder 2
                                                                                                  Parker Webb-Mitchell
                                                                                                  Data Types
                                                                                                  Jacob Sedore
                                                                                                  Intake7 BIM L1
                                                                                                  Stanley Chia
                                                                                                  Software Processes
                                                                                                  Nurul Aiman Abdu
                                                                                                  Design Patterns
                                                                                                  Erica Solum
                                                                                                  CCNA Answers – CCNA Exam
                                                                                                  Abdul Demir
                                                                                                  Abstraction
                                                                                                  Shannon Anderson-Rush
                                                                                                  Spyware
                                                                                                  Sam2
                                                                                                  HTTPS explained with Carrier Pigeons
                                                                                                  Shannon Anderson-Rush
                                                                                                  Data Analytics
                                                                                                  anelvr