Computer Science Flashcards

1
Q

abstraction

A

the process of removing unnecessary details so that only the main, important points remain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

address

A

a number assigned to the storage location so that it can be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

adjacent items

A

items of data that are next to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

alpha testing

A

testing done by the programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

analogue

A

data which can use any value in a continuous range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

antivirus software

A

software designed to prevent, detect and remove malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

applet

A

a small application or program created in the Java programming language that can be sent to a user along with the web page they have requested (e.g. applets of animations, word processors and games)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

application software

A

are end-user programs. Also called ‘apps’ or ‘applications’, they are written to be run by users to perform user-identified tasks. For example, for productivity or entertainment. They include word processor, spreadsheet, database, game and image editing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

argument

A

the name for the data that is passed to a subroutine by the main program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

array

A

a structure that contains many items of data of the same type. The data are indexed so that a particular item of data can be easily found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

assembler

A

a program which translates assembly language into machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

assigning

A

giving a variable a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

authenticate

A

confirm that a user’s password has been entered correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

authentication

A

the process of determining whether someone trying to log into the network is who they declare to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

autonomous

A

the ability to act on their own without human input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

bandwidth

A

the amount of data that can pass through the transmission medium per second. It is often called the bit-rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

base 2

A

a base 2 number system represents numbers using two different symbols. Each place value is two times bigger than the place to its right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

base 10

A

a base 10 number system represents numbers using ten different symbols. Each place value is ten times bigger than the place to its right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

beta testing

A

testing done by a selected group of individuals to receive their feedback about how well the program works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

bitmap image

A

A set of bits that represents a graphic image, with each bit or group of bits corresponding to a pixel in the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

binary digits

A

computers can only communicate directly in 0s and 1s; series of 0s and 1s represent the codes for various instructions and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

binary tree

A

items of data are stored in leaves and the branch points are called internal nodes. In a binary tree, each node has at most two branches or children

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

biometric authentication

A

a process that validates the identity of a user who wishes to sign into a system by measuring some unique, physical characteristic of that user such as fingerprints, eye scans, face recognition and voice prints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

the Basic Input/Output System controls the computer when it is first switched on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
bot
(also known as an internet bot or WWW bot) is software that runs repetitive automated tasks over the internet
26
boundary test
where the highest or lowest acceptable numbers and those just inside or outside the acceptable range are entered; these check any logical errors that might have been introduced using the = operators
27
bus
a bundle of wires carrying data from one component to another or a number of tracks on a printed circuit board fulfilling the same function
28
byte
a group of eight bits
29
cables
a way of connecting computers using cables and sockets
30
cache
a temporary data store so that the data can be accessed very quickly when needed
31
called
subroutines are ‘called’ by the main program: this means that they are started up, given data, run and then the output is collected by the main program (if required)
32
casting
converting one data type to another data type
33
central processing unit
this is the component of the computer that controls the other devices, executes the instructions and processes the data
34
character
often abbreviated to ‘char’, it is a variable that holds one letter, number or symbol
35
character set
the list of binary codes that can be recognised by computers as being usable characters
36
closed
when the computer has finished using the file, closing it saves it safely on to the disk for permanent retention
37
colour depth
the number of bits used to encode the colour of each pixel
38
comment
a piece of information for the programmer. It does not form part of the program and is not executed by the computer. It is for information only
39
compare
assess how items of data are similar or different to each other, to help decide which order they should go in
40
compiler
a program that converts high-level programs into low-level programs
41
compound statement
a statement where Boolean operators are combined and work together to examine if several conditions are true or false
42
compression
reducing the size of a file so that it takes up less storage space or bandwidth when it is transmitted
43
concatenation
the placing together of two separate objects so that they can be treated as one, for example a string variable can be joined end-to-end to produce a larger string
44
constant
a value that does not change while the program is running
45
control signals
electrical signals that are sent out to all of the devices to check their status and give them instructions
46
copyright
the legal right of the person who created a work to use that work exclusively or to grant permission to others to use it
47
cracking
gaining unauthorised access to computer systems, often on a network, by bypassing internet security systems with the intent of committing a crime or with malicious intent
48
cyber security
the use of technology, working practices and precautions designed to protect networks, computers, programs and data from attack, damage or unauthorised access
49
decision
when a question is asked (as in selection) the answer will lead to one or more varied alternative actions
50
decomposition
breaking a problem down into smaller, more manageable parts which are then easier to solve
51
domain name
this is part of the URL for a resource on the internet. When the domain name is used, it will be converted to the correct IP address by the Domain Name Service (DNS) and the contact will take place
52
driver
a program called by a peripheral manager to operate any device, for example printers, the screen and mouse, when they are called by the main program
53
dry run
the program is run on paper and each stage is carefully analysed to see what values the various variables, inputs and outputs have. At this stage, a computer is not being used
54
dynamic array
an array that has not had its size defined and can change as data are appended
55
efficiency
efficiency can be assessed by: How long it takes a program to generate a result. How much code has been written to generate the result. How much memory it uses
56
electrical storage
storing data using devices such as flash memory. This is sometimes called ‘solid state’
57
entity
something recognised as being capable of an independent existence, which can be uniquely identified, and about which data can be stored. It can be a physical object, for example a car, person, student or book. It can also be a concept, for example a customer transaction
58
erroneous test
data that should be rejected are deliberately input to check that validation routines are functioning as expected (sometimes called an ‘out-of-range test’)
59
Ethernet
a set of rules or protocols for computers to follow when communicating data over a network
60
ethics
a system of moral principles, often shown by doing things that society recognises as being good or by acting in ways that individuals and societies believe reflects good values
61
execute
to run a computer program or process
62
execution
when a program or part of a program is run by the computer
63
field
one item of information. For example, the make, model and maximum speed of a car are all fields
64
file handle
a label that is assigned to a resource needed by the program. It can only access the file through the computer's operating system
65
flash memory
this is memory which can be programmed electrically but then keeps its data when the power is turned off
66
frequency
the number of waves produced per second
67
global variable
a variable that is used in the main program. It can be used by any of the commands or subroutines in the program
68
hacking
the unauthorised access to a computer system and the data it contains
69
hardware
the physical components making up the computer and its peripheral devices
70
heat sink
a metal device, glued to the CPU chip with thermally conducting paste, to transfer the heat away from the chip
71
HTML
hypertext markup language (HTML) is used to write web pages for the internet as well as for ebooks, PDF documents, etc.
72
identifier
the ‘name’ given to a variable
73
index
a number that identifies each element of an array or string
74
input sanitisation
when any inputs from users that could be harmful to its systems are filtered out and removed
75
instruction
an instruction to a microprocessor to perform a specific task
76
instruction set
the set of instructions for a particular processor which it will understand and be able to process
77
integer
a whole number without decimals (can be positive or negative)
78
interpreter
a program which will run a high-level program directly, interpreting the instructions and converting them, without them needing to be in the machine code of a computer
79
IP address
a unique software address used to communicate over the internet
80
iteration
a procedure or a set of statements or commands is repeated either for a set number of times or until there is a desired outcome
81
legal
abiding by the laws and rules of a particular country or jurisdiction
82
local area network
network used for data transmission by computing devices within one building or site, such as an office building, a school or university campus. It is usually owned and managed by a single organisation, for example a school or business
83
local variable
a variable that is used only within a subroutine. When the subroutine has completed its work, the local variable is discarded
84
logic circuit
a combination of standard logic gates used to perform complex logic operations where the outputs of some gates act as the inputs to others
85
logical error
a problem in the design of the algorithm
86
logic gate
an electronic component that either produces or does not produce an output depending on the inputs it receives and the logic rule it is designed to apply
87
logical operator
operators such as ‘AND’, ‘OR’ and ‘NOT’ that perform a Boolean operation on some inputs
88
loop
part of a program where the same activity is repeated over and over again for a fixed number of times or until a condition is met. Usually the condition is stated within the loop itself
89
lossless compression
lossless compression: no data are lost and the file can be decompressed with all of its information intact
90
lossy compression
data are lost in the compression process and when the file is decompressed it will not contain all of the original material
91
low-level language
a computer language that provides instructions that are the same as or very similar to a computer's instruction set
92
machine code
the instructions in a form that the processor can execute; strings of 0s and 1s
93
magnetic storage
storing data using magnetic media such as a hard disk drive
94
main memory
the physical memory that is internal to the computer. The word ‘main’ is used to distinguish it from storage devices such as hard disk drives. It can be directly accessed by the CPU
95
malware
software designed to gain unauthorised access to a computer system in order to disrupt its functioning or collect information without the user's knowledge
96
menu
a set of options to help a user find information or use a program function
97
microwaves
electromagnetic waves which can be used to carry data between computers
98
mnemonic
a tool or technique designed to help a person's memory (e.g. ‘Richard of York gave battle in vain’ used to help remember the order of the colours of the spectrum: red, orange, yellow, green, blue, indigo and violet)
99
modem
short for ‘modulatordemodulator’; modulates and demodulates signals (converts them from digital to analogue and vice versa) sent from and received by a computer over a communications network
100
motherboard
the main printed circuit board of the computer; it has connectors that other circuit boards can be slotted into
101
multitasking
when a computer is running several programs at the same time
102
nibble
half a byte or 4 bits
103
node
places on the network where there are items of equipment
104
normal test
ensures that the correct result will be produced with the expected data (sometimes called an ‘in-range test’)
105
opcode
the code for the instruction being given
106
operand
the data that might be attached to the opcode and that the instruction might need to work with
107
operator
the symbol that tells the computer what to do
108
optical storage
storing data using optical devices such as CDs and DVDs
109
ordered
the data in the list are stored in order
110
overflow error
when a calculation produces a result that is greater than the computer can deal with or store in the available number of bits
111
overwritten
if a file exists on the computer and a new file is created with the same name, the new file is kept and the old file is written over and lost
112
packet
a small block of data that is transmitted from one computer to another
113
packet switching
a method of data transmission in which a message is broken into a number of parts which are sent independently over the most suitable routes. The message is reassembled at the destination
114
parallel processing
when the processor cores work on different parts of the same program
115
parameter
the names of the variables that are used in the subroutine to store the data passed from the main program as arguments
116
parentheses
brackets
117
patch
software designed to update a computer program in order to fix or improve it
118
patent
a permission granted by a government to a person for a set period of time to stop other people from making use of their inventions without their permission
119
penetration test
tests a computer system or network to find vulnerabilities that an attacker could exploit
120
permission
a rule that is set up for a particular file to control who can edit, read or write on the file
121
personal area network
network used for data transmission over short distances by devices such as laptops, mobile phones, tablets, media players, speakers and printers
122
pixel
the smallest possible dot on a computer screen which can have its colour set independently; images are made up of pixels
123
place value
the value that a digit's position in a number gives it, for example (for decimal) in the number 356, the digit 5 has a value of 50 whereas in the number 3560, the digit 5 has a value of 500
124
printed circuit board
the base that supports the wiring and electronic components that are soldered to it or fit into sockets on the board
125
process
an activity that a computer program is performing
126
property
one of the characteristics of attributes of a data type, for example one of the properties of a string variable is its length, that is the number of characters it contains
127
protocols
agreed rules for requesting and sending data across networks
128
pseudo-code
a language that is similar to a real programming language but is easier for humans to use and understand when they are developing algorithms. Although it doesn't actually run on a computer it can easily be converted to a regular programming language
129
RAM
(also known as random access memory) memory that can be used by computer programs to store data and instructions, but all of its data is lost when the computer is switched off
130
read mode
the file is opened in such a way as to allow the data to be used by the program but not to allow the program to write any data to the file. Using read mode protects the data file from being accidentally changed by the program
131
real
a numeric variable which can have a fractional value; it can have digits on either side of a decimal point. Commonly used to store currency values, for example 1.5 for £1.50
132
redundancy
the number of items of data in a file which are repeated
133
register
a storage location that is inside the CPU itself
134
Regulation of Investigatory Powers Act 2000
this is a law that regulates the behaviour of officers who are investigating crime; it covers surveillance, listening to phone calls, obtaining information from internet service providers, mobile phone providers etc.
135
relational operator
an operator which compares two items of data, for example , =
136
resolution
the number of pixels per square inch on the computer screen. The higher the resolution, the better the picture
137
run
a sequence of repeated characters, for example: aaaa
138
sampling
making physical measurements of the amplitude of an electronic representation of the sound wave at set time intervals and then converting the measurements to digital values
139
searching
looking through a file to see if particular data are there
140
secondary storage devices
devices that store information but which do not lose the data when they are switched off; usually not on the main circuit board (motherboard)
141
selection
a question is asked, and depending on the answer, the algorithm takes one of two courses of action
142
sequence
the order in which tasks are carried out
143
sequential
starts at the beginning and moves through the list one-by-one
144
social engineering
psychologically tricking people into divulging their secret information or doing things that they would not otherwise do
145
sorting
putting items of data into a precise order, for example alphabetical or numerical
146
static array
an array that is of a set size
147
storage location
a place in RAM where a single piece of data can be kept until it is needed
148
string traversal
moving through a string, one piece of data at a time; sometimes this might just mean counting
149
subroutine
a self-contained piece of code that can be ‘called’ by the main program when it is needed
150
substring
a smaller string which is part of the main string that you are using
151
sub-tasks
small steps making up a larger task
152
syntax
the rules of spelling, punctuation and grammar of a language so that the meaning of what is being communicated is clear (humans can make allowances if the rules are broken, but computers can't!)
153
syntax error
a grammatical mistake in the code. For example, it could be caused by a misspelling, e.g. ‘prnit’ instead of ‘print’ or by missing colons, semi-colons or brackets
154
systems development cycle
a defined process of planning, designing, creating, testing and deploying an information system
155
system software
software that manages the operation of the computer, tells it what to do, tells it which programs to run, controls what the users see on screen etc.
156
table
a collection of rows and columns forming cells which is used to store data and user information in a structured and organised manner
157
test data
carefully planned sample data, used to try out programs to check that they give the correct outputs
158
testing plan
a plan for the way in which a program is to be tested
159
trace table
while a dry run is being worked through, a table is drawn up showing the values of each variable, input and output, and how they change as the program is running. A trace table has columns for each of the variables and rows for each of the steps in the algorithm
160
topology
the structure of the network
161
traverse
go through a loop item by item
162
Trojan horse
a phrase used to describe unintentionally accepting a hidden enemy attack; from an ancient Greek myth where, a large wooden horse (in which enemy soldiers were hidden) was left a a gift for the city of Troy, and the people took it into the city, sealing their fate
163
true or false
indicates whether a logical statement is correct or incorrect; this could be represented in a computer as 1s (true statements) and 0s (false statements)
164
truth table
a table that shows all the possible combinations of outputs which can occur with all of the different possible inputs; usually used with logic problems
165
user interface
the way in which a user interacts with a computer system
166
unambiguous
this means that the instruction cannot be misunderstood and the correct action will always be performed. All instructions given to a computer must be unambiguous or it won't do anything!
167
validation
the process through which the program checks that data are sensible and that they are suitable for use by the program
168
variable
a container which is used to store values such as an ‘attempts’ counter
169
volatile
data are permanently lost when power is switched off
170
wearable technology
includes clothing or electronic devices that can be carried or attached to the body
171
wide area network
a network connecting local area networks over a large geographical area
172
Wi-Fi
consists of the protocols needed for communication over a wireless network. It is the wireless version of a wired Ethernet protocols
173
write mode
the program can ‘write’ to the file or in other words it can change the data in the file