Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
A-Level Computing OCR
> Algorithms > Flashcards
Algorithms Flashcards
(0 cards)
Study These Flashcards
A-Level Computing OCR
flashcards
Decks in class (52)
# Cards
OSI Model
7
Operating Systems
9
Memory Management
3
Interrupts
6
Scheduling
6
BIOS
3
Device Drivers
1
Virtual Machines
5
Computer related legislation
8
TCP/IP Stack
6
Circuit/Packet Switching
2
Client-server and Peer-Peer
2
DNS (Domain name system)
2
Networks
4
Protocols
2
LAN and WAN
2
Lossy vs Lossless
4
Data Structures
9
Stacks and Queues
4
Software Development Lifecycle
7
Testing
6
Programming Techniques
9
Development Methodlogies
11
LMC
11
Algorithms
0
Fetch Decode Execute Cycle
3
Parts of the CPU
12
CPU performance
4
Architecture
2
CISC and RISC
6
Multi core and parallel
2
Databases
18
Normalisation
3
Linkers, loaders and libraries
5
Stages of comilation
5
Length and Dictionary encoding
2
Encryption and hashing
5
GPUs
6
Types of Operating Systems
5
Utilities
2
Open vs Closed Source
2
Translators: Interpreters, Compilers & Assemblers
9
Stages of compilation
5
Run length encoding and dictionary coding
1
Symmetric and Asymmetric encryption
13
Methods of capturing data
6
Transaction Processing
5
Referential Integrity
2
Network Security Threats
6
Network Hardware
6
Search Algorithms
4
Tree/Graph Traversal
3