Computer Science Flashcards
abstraction
the process of removing unnecessary details so that only the main, important points remain
address
a number assigned to the storage location so that it can be accessed
adjacent items
items of data that are next to each other
alpha testing
testing done by the programmer
analogue
data which can use any value in a continuous range
antivirus software
software designed to prevent, detect and remove malware
applet
a small application or program created in the Java programming language that can be sent to a user along with the web page they have requested (e.g. applets of animations, word processors and games)
application software
are end-user programs. Also called ‘apps’ or ‘applications’, they are written to be run by users to perform user-identified tasks. For example, for productivity or entertainment. They include word processor, spreadsheet, database, game and image editing software
argument
the name for the data that is passed to a subroutine by the main program
array
a structure that contains many items of data of the same type. The data are indexed so that a particular item of data can be easily found
assembler
a program which translates assembly language into machine code
assigning
giving a variable a value
authenticate
confirm that a user’s password has been entered correctly
authentication
the process of determining whether someone trying to log into the network is who they declare to be
autonomous
the ability to act on their own without human input
bandwidth
the amount of data that can pass through the transmission medium per second. It is often called the bit-rate
base 2
a base 2 number system represents numbers using two different symbols. Each place value is two times bigger than the place to its right
base 10
a base 10 number system represents numbers using ten different symbols. Each place value is ten times bigger than the place to its right
beta testing
testing done by a selected group of individuals to receive their feedback about how well the program works
bitmap image
A set of bits that represents a graphic image, with each bit or group of bits corresponding to a pixel in the image.
binary digits
computers can only communicate directly in 0s and 1s; series of 0s and 1s represent the codes for various instructions and data
binary tree
items of data are stored in leaves and the branch points are called internal nodes. In a binary tree, each node has at most two branches or children
biometric authentication
a process that validates the identity of a user who wishes to sign into a system by measuring some unique, physical characteristic of that user such as fingerprints, eye scans, face recognition and voice prints
BIOS
the Basic Input/Output System controls the computer when it is first switched on
bot
(also known as an internet bot or WWW bot) is software that runs repetitive automated tasks over the internet
boundary test
where the highest or lowest acceptable numbers and those just inside or outside the acceptable range are entered; these check any logical errors that might have been introduced using the = operators
bus
a bundle of wires carrying data from one component to another or a number of tracks on a printed circuit board fulfilling the same function
byte
a group of eight bits
cables
a way of connecting computers using cables and sockets
cache
a temporary data store so that the data can be accessed very quickly when needed
called
subroutines are ‘called’ by the main program: this means that they are started up, given data, run and then the output is collected by the main program (if required)
casting
converting one data type to another data type
central processing unit
this is the component of the computer that controls the other devices, executes the instructions and processes the data
character
often abbreviated to ‘char’, it is a variable that holds one letter, number or symbol
character set
the list of binary codes that can be recognised by computers as being usable characters
closed
when the computer has finished using the file, closing it saves it safely on to the disk for permanent retention
colour depth
the number of bits used to encode the colour of each pixel
comment
a piece of information for the programmer. It does not form part of the program and is not executed by the computer. It is for information only
compare
assess how items of data are similar or different to each other, to help decide which order they should go in
compiler
a program that converts high-level programs into low-level programs
compound statement
a statement where Boolean operators are combined and work together to examine if several conditions are true or false
compression
reducing the size of a file so that it takes up less storage space or bandwidth when it is transmitted
concatenation
the placing together of two separate objects so that they can be treated as one, for example a string variable can be joined end-to-end to produce a larger string
constant
a value that does not change while the program is running
control signals
electrical signals that are sent out to all of the devices to check their status and give them instructions
copyright
the legal right of the person who created a work to use that work exclusively or to grant permission to others to use it
cracking
gaining unauthorised access to computer systems, often on a network, by bypassing internet security systems with the intent of committing a crime or with malicious intent
cyber security
the use of technology, working practices and precautions designed to protect networks, computers, programs and data from attack, damage or unauthorised access
decision
when a question is asked (as in selection) the answer will lead to one or more varied alternative actions
decomposition
breaking a problem down into smaller, more manageable parts which are then easier to solve
domain name
this is part of the URL for a resource on the internet. When the domain name is used, it will be converted to the correct IP address by the Domain Name Service (DNS) and the contact will take place
driver
a program called by a peripheral manager to operate any device, for example printers, the screen and mouse, when they are called by the main program
dry run
the program is run on paper and each stage is carefully analysed to see what values the various variables, inputs and outputs have. At this stage, a computer is not being used
dynamic array
an array that has not had its size defined and can change as data are appended
efficiency
efficiency can be assessed by: How long it takes a program to generate a result. How much code has been written to generate the result. How much memory it uses
electrical storage
storing data using devices such as flash memory. This is sometimes called ‘solid state’
entity
something recognised as being capable of an independent existence, which can be uniquely identified, and about which data can be stored. It can be a physical object, for example a car, person, student or book. It can also be a concept, for example a customer transaction
erroneous test
data that should be rejected are deliberately input to check that validation routines are functioning as expected (sometimes called an ‘out-of-range test’)
Ethernet
a set of rules or protocols for computers to follow when communicating data over a network
ethics
a system of moral principles, often shown by doing things that society recognises as being good or by acting in ways that individuals and societies believe reflects good values
execute
to run a computer program or process
execution
when a program or part of a program is run by the computer
field
one item of information. For example, the make, model and maximum speed of a car are all fields
file handle
a label that is assigned to a resource needed by the program. It can only access the file through the computer’s operating system
flash memory
this is memory which can be programmed electrically but then keeps its data when the power is turned off
frequency
the number of waves produced per second
global variable
a variable that is used in the main program. It can be used by any of the commands or subroutines in the program
hacking
the unauthorised access to a computer system and the data it contains
hardware
the physical components making up the computer and its peripheral devices