Computer Science Flashcards

1
Q

abstraction

A

the process of removing unnecessary details so that only the main, important points remain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

address

A

a number assigned to the storage location so that it can be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

adjacent items

A

items of data that are next to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

alpha testing

A

testing done by the programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

analogue

A

data which can use any value in a continuous range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

antivirus software

A

software designed to prevent, detect and remove malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

applet

A

a small application or program created in the Java programming language that can be sent to a user along with the web page they have requested (e.g. applets of animations, word processors and games)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

application software

A

are end-user programs. Also called ‘apps’ or ‘applications’, they are written to be run by users to perform user-identified tasks. For example, for productivity or entertainment. They include word processor, spreadsheet, database, game and image editing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

argument

A

the name for the data that is passed to a subroutine by the main program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

array

A

a structure that contains many items of data of the same type. The data are indexed so that a particular item of data can be easily found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

assembler

A

a program which translates assembly language into machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

assigning

A

giving a variable a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

authenticate

A

confirm that a user’s password has been entered correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

authentication

A

the process of determining whether someone trying to log into the network is who they declare to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

autonomous

A

the ability to act on their own without human input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

bandwidth

A

the amount of data that can pass through the transmission medium per second. It is often called the bit-rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

base 2

A

a base 2 number system represents numbers using two different symbols. Each place value is two times bigger than the place to its right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

base 10

A

a base 10 number system represents numbers using ten different symbols. Each place value is ten times bigger than the place to its right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

beta testing

A

testing done by a selected group of individuals to receive their feedback about how well the program works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

bitmap image

A

A set of bits that represents a graphic image, with each bit or group of bits corresponding to a pixel in the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

binary digits

A

computers can only communicate directly in 0s and 1s; series of 0s and 1s represent the codes for various instructions and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

binary tree

A

items of data are stored in leaves and the branch points are called internal nodes. In a binary tree, each node has at most two branches or children

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

biometric authentication

A

a process that validates the identity of a user who wishes to sign into a system by measuring some unique, physical characteristic of that user such as fingerprints, eye scans, face recognition and voice prints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

the Basic Input/Output System controls the computer when it is first switched on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

bot

A

(also known as an internet bot or WWW bot) is software that runs repetitive automated tasks over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

boundary test

A

where the highest or lowest acceptable numbers and those just inside or outside the acceptable range are entered; these check any logical errors that might have been introduced using the = operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

bus

A

a bundle of wires carrying data from one component to another or a number of tracks on a printed circuit board fulfilling the same function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

byte

A

a group of eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

cables

A

a way of connecting computers using cables and sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

cache

A

a temporary data store so that the data can be accessed very quickly when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

called

A

subroutines are ‘called’ by the main program: this means that they are started up, given data, run and then the output is collected by the main program (if required)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

casting

A

converting one data type to another data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

central processing unit

A

this is the component of the computer that controls the other devices, executes the instructions and processes the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

character

A

often abbreviated to ‘char’, it is a variable that holds one letter, number or symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

character set

A

the list of binary codes that can be recognised by computers as being usable characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

closed

A

when the computer has finished using the file, closing it saves it safely on to the disk for permanent retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

colour depth

A

the number of bits used to encode the colour of each pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

comment

A

a piece of information for the programmer. It does not form part of the program and is not executed by the computer. It is for information only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

compare

A

assess how items of data are similar or different to each other, to help decide which order they should go in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

compiler

A

a program that converts high-level programs into low-level programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

compound statement

A

a statement where Boolean operators are combined and work together to examine if several conditions are true or false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

compression

A

reducing the size of a file so that it takes up less storage space or bandwidth when it is transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

concatenation

A

the placing together of two separate objects so that they can be treated as one, for example a string variable can be joined end-to-end to produce a larger string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

constant

A

a value that does not change while the program is running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

control signals

A

electrical signals that are sent out to all of the devices to check their status and give them instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

copyright

A

the legal right of the person who created a work to use that work exclusively or to grant permission to others to use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

cracking

A

gaining unauthorised access to computer systems, often on a network, by bypassing internet security systems with the intent of committing a crime or with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

cyber security

A

the use of technology, working practices and precautions designed to protect networks, computers, programs and data from attack, damage or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

decision

A

when a question is asked (as in selection) the answer will lead to one or more varied alternative actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

decomposition

A

breaking a problem down into smaller, more manageable parts which are then easier to solve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

domain name

A

this is part of the URL for a resource on the internet. When the domain name is used, it will be converted to the correct IP address by the Domain Name Service (DNS) and the contact will take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

driver

A

a program called by a peripheral manager to operate any device, for example printers, the screen and mouse, when they are called by the main program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

dry run

A

the program is run on paper and each stage is carefully analysed to see what values the various variables, inputs and outputs have. At this stage, a computer is not being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

dynamic array

A

an array that has not had its size defined and can change as data are appended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

efficiency

A

efficiency can be assessed by: How long it takes a program to generate a result. How much code has been written to generate the result. How much memory it uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

electrical storage

A

storing data using devices such as flash memory. This is sometimes called ‘solid state’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

entity

A

something recognised as being capable of an independent existence, which can be uniquely identified, and about which data can be stored. It can be a physical object, for example a car, person, student or book. It can also be a concept, for example a customer transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

erroneous test

A

data that should be rejected are deliberately input to check that validation routines are functioning as expected (sometimes called an ‘out-of-range test’)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Ethernet

A

a set of rules or protocols for computers to follow when communicating data over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

ethics

A

a system of moral principles, often shown by doing things that society recognises as being good or by acting in ways that individuals and societies believe reflects good values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

execute

A

to run a computer program or process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

execution

A

when a program or part of a program is run by the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

field

A

one item of information. For example, the make, model and maximum speed of a car are all fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

file handle

A

a label that is assigned to a resource needed by the program. It can only access the file through the computer’s operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

flash memory

A

this is memory which can be programmed electrically but then keeps its data when the power is turned off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

frequency

A

the number of waves produced per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

global variable

A

a variable that is used in the main program. It can be used by any of the commands or subroutines in the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

hacking

A

the unauthorised access to a computer system and the data it contains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

hardware

A

the physical components making up the computer and its peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

heat sink

A

a metal device, glued to the CPU chip with thermally conducting paste, to transfer the heat away from the chip

71
Q

HTML

A

hypertext markup language (HTML) is used to write web pages for the internet as well as for ebooks, PDF documents, etc.

72
Q

identifier

A

the ‘name’ given to a variable

73
Q

index

A

a number that identifies each element of an array or string

74
Q

input sanitisation

A

when any inputs from users that could be harmful to its systems are filtered out and removed

75
Q

instruction

A

an instruction to a microprocessor to perform a specific task

76
Q

instruction set

A

the set of instructions for a particular processor which it will understand and be able to process

77
Q

integer

A

a whole number without decimals (can be positive or negative)

78
Q

interpreter

A

a program which will run a high-level program directly, interpreting the instructions and converting them, without them needing to be in the machine code of a computer

79
Q

IP address

A

a unique software address used to communicate over the internet

80
Q

iteration

A

a procedure or a set of statements or commands is repeated either for a set number of times or until there is a desired outcome

81
Q

legal

A

abiding by the laws and rules of a particular country or jurisdiction

82
Q

local area network

A

network used for data transmission by computing devices within one building or site, such as an office building, a school or university campus. It is usually owned and managed by a single organisation, for example a school or business

83
Q

local variable

A

a variable that is used only within a subroutine. When the subroutine has completed its work, the local variable is discarded

84
Q

logic circuit

A

a combination of standard logic gates used to perform complex logic operations where the outputs of some gates act as the inputs to others

85
Q

logical error

A

a problem in the design of the algorithm

86
Q

logic gate

A

an electronic component that either produces or does not produce an output depending on the inputs it receives and the logic rule it is designed to apply

87
Q

logical operator

A

operators such as ‘AND’, ‘OR’ and ‘NOT’ that perform a Boolean operation on some inputs

88
Q

loop

A

part of a program where the same activity is repeated over and over again for a fixed number of times or until a condition is met. Usually the condition is stated within the loop itself

89
Q

lossless compression

A

lossless compression: no data are lost and the file can be decompressed with all of its information intact

90
Q

lossy compression

A

data are lost in the compression process and when the file is decompressed it will not contain all of the original material

91
Q

low-level language

A

a computer language that provides instructions that are the same as or very similar to a computer’s instruction set

92
Q

machine code

A

the instructions in a form that the processor can execute; strings of 0s and 1s

93
Q

magnetic storage

A

storing data using magnetic media such as a hard disk drive

94
Q

main memory

A

the physical memory that is internal to the computer. The word ‘main’ is used to distinguish it from storage devices such as hard disk drives. It can be directly accessed by the CPU

95
Q

malware

A

software designed to gain unauthorised access to a computer system in order to disrupt its functioning or collect information without the user’s knowledge

96
Q

menu

A

a set of options to help a user find information or use a program function

97
Q

microwaves

A

electromagnetic waves which can be used to carry data between computers

98
Q

mnemonic

A

a tool or technique designed to help a person’s memory (e.g. ‘Richard of York gave battle in vain’ used to help remember the order of the colours of the spectrum: red, orange, yellow, green, blue, indigo and violet)

99
Q

modem

A

short for ‘modulatordemodulator’; modulates and demodulates signals (converts them from digital to analogue and vice versa) sent from and received by a computer over a communications network

100
Q

motherboard

A

the main printed circuit board of the computer; it has connectors that other circuit boards can be slotted into

101
Q

multitasking

A

when a computer is running several programs at the same time

102
Q

nibble

A

half a byte or 4 bits

103
Q

node

A

places on the network where there are items of equipment

104
Q

normal test

A

ensures that the correct result will be produced with the expected data (sometimes called an ‘in-range test’)

105
Q

opcode

A

the code for the instruction being given

106
Q

operand

A

the data that might be attached to the opcode and that the instruction might need to work with

107
Q

operator

A

the symbol that tells the computer what to do

108
Q

optical storage

A

storing data using optical devices such as CDs and DVDs

109
Q

ordered

A

the data in the list are stored in order

110
Q

overflow error

A

when a calculation produces a result that is greater than the computer can deal with or store in the available number of bits

111
Q

overwritten

A

if a file exists on the computer and a new file is created with the same name, the new file is kept and the old file is written over and lost

112
Q

packet

A

a small block of data that is transmitted from one computer to another

113
Q

packet switching

A

a method of data transmission in which a message is broken into a number of parts which are sent independently over the most suitable routes. The message is reassembled at the destination

114
Q

parallel processing

A

when the processor cores work on different parts of the same program

115
Q

parameter

A

the names of the variables that are used in the subroutine to store the data passed from the main program as arguments

116
Q

parentheses

A

brackets

117
Q

patch

A

software designed to update a computer program in order to fix or improve it

118
Q

patent

A

a permission granted by a government to a person for a set period of time to stop other people from making use of their inventions without their permission

119
Q

penetration test

A

tests a computer system or network to find vulnerabilities that an attacker could exploit

120
Q

permission

A

a rule that is set up for a particular file to control who can edit, read or write on the file

121
Q

personal area network

A

network used for data transmission over short distances by devices such as laptops, mobile phones, tablets, media players, speakers and printers

122
Q

pixel

A

the smallest possible dot on a computer screen which can have its colour set independently; images are made up of pixels

123
Q

place value

A

the value that a digit’s position in a number gives it, for example (for decimal) in the number 356, the digit 5 has a value of 50 whereas in the number 3560, the digit 5 has a value of 500

124
Q

printed circuit board

A

the base that supports the wiring and electronic components that are soldered to it or fit into sockets on the board

125
Q

process

A

an activity that a computer program is performing

126
Q

property

A

one of the characteristics of attributes of a data type, for example one of the properties of a string variable is its length, that is the number of characters it contains

127
Q

protocols

A

agreed rules for requesting and sending data across networks

128
Q

pseudo-code

A

a language that is similar to a real programming language but is easier for humans to use and understand when they are developing algorithms. Although it doesn’t actually run on a computer it can easily be converted to a regular programming language

129
Q

RAM

A

(also known as random access memory) memory that can be used by computer programs to store data and instructions, but all of its data is lost when the computer is switched off

130
Q

read mode

A

the file is opened in such a way as to allow the data to be used by the program but not to allow the program to write any data to the file. Using read mode protects the data file from being accidentally changed by the program

131
Q

real

A

a numeric variable which can have a fractional value; it can have digits on either side of a decimal point. Commonly used to store currency values, for example 1.5 for £1.50

132
Q

redundancy

A

the number of items of data in a file which are repeated

133
Q

register

A

a storage location that is inside the CPU itself

134
Q

Regulation of Investigatory Powers Act 2000

A

this is a law that regulates the behaviour of officers who are investigating crime; it covers surveillance, listening to phone calls, obtaining information from internet service providers, mobile phone providers etc.

135
Q

relational operator

A

an operator which compares two items of data, for example , =

136
Q

resolution

A

the number of pixels per square inch on the computer screen. The higher the resolution, the better the picture

137
Q

run

A

a sequence of repeated characters, for example: aaaa

138
Q

sampling

A

making physical measurements of the amplitude of an electronic representation of the sound wave at set time intervals and then converting the measurements to digital values

139
Q

searching

A

looking through a file to see if particular data are there

140
Q

secondary storage devices

A

devices that store information but which do not lose the data when they are switched off; usually not on the main circuit board (motherboard)

141
Q

selection

A

a question is asked, and depending on the answer, the algorithm takes one of two courses of action

142
Q

sequence

A

the order in which tasks are carried out

143
Q

sequential

A

starts at the beginning and moves through the list one-by-one

144
Q

social engineering

A

psychologically tricking people into divulging their secret information or doing things that they would not otherwise do

145
Q

sorting

A

putting items of data into a precise order, for example alphabetical or numerical

146
Q

static array

A

an array that is of a set size

147
Q

storage location

A

a place in RAM where a single piece of data can be kept until it is needed

148
Q

string traversal

A

moving through a string, one piece of data at a time; sometimes this might just mean counting

149
Q

subroutine

A

a self-contained piece of code that can be ‘called’ by the main program when it is needed

150
Q

substring

A

a smaller string which is part of the main string that you are using

151
Q

sub-tasks

A

small steps making up a larger task

152
Q

syntax

A

the rules of spelling, punctuation and grammar of a language so that the meaning of what is being communicated is clear (humans can make allowances if the rules are broken, but computers can’t!)

153
Q

syntax error

A

a grammatical mistake in the code. For example, it could be caused by a misspelling, e.g. ‘prnit’ instead of ‘print’ or by missing colons, semi-colons or brackets

154
Q

systems development cycle

A

a defined process of planning, designing, creating, testing and deploying an information system

155
Q

system software

A

software that manages the operation of the computer, tells it what to do, tells it which programs to run, controls what the users see on screen etc.

156
Q

table

A

a collection of rows and columns forming cells which is used to store data and user information in a structured and organised manner

157
Q

test data

A

carefully planned sample data, used to try out programs to check that they give the correct outputs

158
Q

testing plan

A

a plan for the way in which a program is to be tested

159
Q

trace table

A

while a dry run is being worked through, a table is drawn up showing the values of each variable, input and output, and how they change as the program is running. A trace table has columns for each of the variables and rows for each of the steps in the algorithm

160
Q

topology

A

the structure of the network

161
Q

traverse

A

go through a loop item by item

162
Q

Trojan horse

A

a phrase used to describe unintentionally accepting a hidden enemy attack; from an ancient Greek myth where, a large wooden horse (in which enemy soldiers were hidden) was left a a gift for the city of Troy, and the people took it into the city, sealing their fate

163
Q

true or false

A

indicates whether a logical statement is correct or incorrect; this could be represented in a computer as 1s (true statements) and 0s (false statements)

164
Q

truth table

A

a table that shows all the possible combinations of outputs which can occur with all of the different possible inputs; usually used with logic problems

165
Q

user interface

A

the way in which a user interacts with a computer system

166
Q

unambiguous

A

this means that the instruction cannot be misunderstood and the correct action will always be performed. All instructions given to a computer must be unambiguous or it won’t do anything!

167
Q

validation

A

the process through which the program checks that data are sensible and that they are suitable for use by the program

168
Q

variable

A

a container which is used to store values such as an ‘attempts’ counter

169
Q

volatile

A

data are permanently lost when power is switched off

170
Q

wearable technology

A

includes clothing or electronic devices that can be carried or attached to the body

171
Q

wide area network

A

a network connecting local area networks over a large geographical area

172
Q

Wi-Fi

A

consists of the protocols needed for communication over a wireless network. It is the wireless version of a wired Ethernet protocols

173
Q

write mode

A

the program can ‘write’ to the file or in other words it can change the data in the file