computer science vocab Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

binary number system

A

language used in computers. anything inputted into a computer needs to be converted into binary first (in order for the computer to understand)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

denary number system

A

language humans use every day. ordinary numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hexadecimal number system

A

humans can use hexadecimal, but in order for computers to understand it would need to be converted to binary. consists of 16 symbols (0-9 and A-F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in binary addition, what does 0+0 equal?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in binary addition, what does 1+0 equal?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in binary addition, what does 1+1 equal?

A

10 (as 10 in binary is 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in binary addition, what does 1+1+1 equal?

A

11 (as 11 in binary is 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

overflow error

A

occurs when a number larger than a register can store (larger than 255) is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what happens to a binary code when its shifted to the left?

A

multiplies by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what happens to a binary code when its shifted to the right?

A

divides by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do you create negative binary numbers? (twos complement)

A

you invert 1’s to 0’s and 0’s to 1’s and simply replace/add a 1 to the right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

benefits of using hexadecimal

A

easier for humans to understand
hex values are easier to remember and enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is ASCII?

A

a character set that represents characters using 8-bit binary numbers. (so can represent up to 256 characters).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is unicode?

A

a character set that represents characters using 16-bit binary numbers (so can represent up to 65000 characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

limitations of using binary

A

takes longer to decode or convert
difficult for humans to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

lossy compression

A

reduces the size of a file by PERMANENTLY removing data. this method is mainly used on an image or sound file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

lossless compression

A

reduces the size of a file by TEMPORARILY altering data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

packet header

A

part of a data packet. contains information about the contents of the packet and its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP address

A

unique address that is given to a device when its connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

payload

A

part of data packet. consists of the actual data that the user is sending (to the receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

trailer

A

part of data packet. contains information about any error checking methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

router

A

examines a data packet to obtain its destination address and send it off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

packet switching

A

process of transmitting data packets across a network down individual pathways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

serial data transmission

A

data sent one bit at a time down one wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

advantages of serial data transmission

A

less chance of data being mixed up/misplaces (skewed)
less interference, meaning less chance of error
cheaper as only one wire is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

disadvantages of serial data transmission

A

transmission of data is slower
a start and stop bit is required to be sent to allow the receiver to know where data starts and ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

parallel data transmission

A

multiple bits of data sent through multiple wires at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

advantages of parallel data transmission

A

transmission of data is quicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

disadvantages of parallel data transmission

A

high risk of data being mixed up/misplaced (skewed)
higher chance of interference, meaning higher chance of errors
more expensive as multiple wires are required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

simplex data transmission

A

when data is transmitted from one device to another in one direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

half duplex data transmission

A

when data is transmitted from one device to another in both directions but NOT at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

full duplex data transmission

A

when data is transmitted from one device to another in both directions at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

advantages of USB

A

simple interface as USB can only be accessed one way, meaning less chance of errors
USB’ are fast and can transfer data quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

disadvantages of USB

A

length of USB is limited (about 5 metres)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

parity check

A

error detection method. uses either odd or even parity check. this is where you count/ sum up the 1’ present and that determines whether there is an error or not. (eg: odd parity check, two 1’ present which is an even number, so one more one must be added on the left most side in order for the 1’ to sum up an odd number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

checksum

A

error detection method. performs calculations on the data to create a CHECKSUM VALUE. this checksum value is then compared after transmission to see if they match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

echo check

A

error detection method. sends copy of the transmitted data back to the sender to be compared to original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

check digit

A

error detection method. used for DATA ENTRY. a calculation is performed on the data entered to create a value. then are compared with each other to see if it is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

encryption

A

securing data for storage or transmission by scrambling data and making it meaningless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

encryption key

A

algorithm to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

symmetric encryption

A

uses the same key to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

asymmetric encryption

A

uses two different keys to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

microprocessor

A

an integrated circuit that performs multiple functions of the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

embedded system

A

computer system that performs a dedicated function. eg : traffic light, washing machine, digital alarm clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

program counter

A

in the FDE cycle (fetch stage) . stores the address of the next instruction to be processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

cloud storage

A

data storage that is owned by a third party and accessed by the user, using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

static IP

A

does not change each time the device connects to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

dynamic IP

A

can change each time the device connects to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

MAC address

A

unique address that is given to a NIC by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

network interface card (NIC)

A

component in a computer that is used to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

characteristics of storing data in the cloud

A
  • you dont have to pay for the hardware
  • you dont have the responsibility for the security of the hardware (however, you are relying on a third party that makes sure your data is safe)
  • you can access data using different devices from anywhere that you HAVE an internet connection
  • easy to increase and decrease the amount of storage space needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

characteristics of storing data locally

A
  • need to purchase hardware
  • need to make sure your data storage is well-maintained and regularly checked
  • you can access data using different devices from anywhere and you DONT NEED internet connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

transistor

A

device that acts as a switch or gate for electronic signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

control gate

A

controls the flow of electric current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

floating gate

A

can store electrical charge

56
Q

virtual memory

A

can be used as an extension to the RAM

57
Q

ROM

A

primary storage that store the start up instruction for the computer

58
Q

primary storage

A

storage that is directly accessed by the CPU

59
Q

secondary storage

A

storage that stores data permanently (until its deleted by the user)

60
Q

characteristics of RAM

A
  • volatile storage (required power to store data, if power is turned off contents of RAM are lost)
  • stores data and programs that are in use by the computer
  • contents are constantly changed as data is being processed by the CPU
61
Q

characteristics of ROM

A
  • non volatile storage (if power is turned off the contents of ROM are permanent)
  • stores programs that initially boot the computer
  • contents of ROM are fixed and usually not changed (it is possible to change it but only when computer isnt booting up properly)
62
Q

magnetic storage

A

secondary storage that uses the properties of magnetism to store data

63
Q

optical storage

A

secondary storage that uses lasers to store data

64
Q

Solid State Storage

A

Secondary Storage that uses tranSiStorS to Store data

65
Q

clock speed

A

a factor that affects a CPU’ performance. the number of FDE cycles that can be performed in a second

66
Q

cache

A

a factor that affects a CPU’ performance. stores the most frequently used data and instructions

67
Q

RAM

A

holds data and programs that are currently in use

68
Q

system software

A

manages both hardware and software in a computer

69
Q

operating system

A

manages the computer and allows the user to communicate with the computer, allowing software to run

70
Q

utility program

A

system software that performs house-keeping activities

71
Q

application software

A

allows the user to perform useful tasks

72
Q

word processor

A

application software that allows the user to create text-based documents

73
Q

spread sheet

A

application software that performs calculations on data

74
Q

database

A

application software that stores and manipulates data

75
Q

what is the process of software on a computer?

A

application software -> operating system -> firmware -> bootstrap

76
Q

firmware

A

instructions stored in ROM and are loaded when computer starts

77
Q

bootstrap

A

first commands loaded on the computer, checks hardware and loads firmware

78
Q

interface

A

method where the user communicates with a computer

79
Q

graphical user interface (GUI)

A

operating system that includes windows, icons, menus and pointers

80
Q

command line interface

A

operating system where the user types commands

81
Q

natural language interface

A

operating system that allows the user to type or speak commands

82
Q

peripheral

A

hardware device, used to input, store or output data from a computer (that isnt part of the computer itself)

83
Q

driver

A

program that controls a device like a printer or keyboard.

84
Q

interrupt

A

a signal sent to the processor to tell it that its attention is required

85
Q

interrupt service routine

A

program that retrieves an interrupt and performs required actions

86
Q

high level language

A

programming language that uses english-like terms. considered portable

87
Q

low level language

A

programming language that is closer to a machines language (either assembly or binary code)

88
Q

portable

A

program that can be run on different types and manufacturers of computers

89
Q

machine code

A

binary code, an example of low level language. non-portable

90
Q

assembly language

A

low level language. code written in mnemonics that allows direct manipulation of the hardware. must be converted ton binary to be able to run

91
Q

characteristics of high level language

A
  • easier for users to understand, read and write
  • easier for humans to debug
  • portable, so machine independant
  • MUST be converted to binary before it can run
  • cannot directly manipulate hardware
92
Q

characteristics of low level language

A
  • more difficult for users to understand, read and write
  • not portable so machine dependant
  • harder for users to debug
  • does not need converting, but must be assembled before execution (which is faster than conversion)
  • can directly manipulate hardware
93
Q

translator

A

software that converts code written in one programming language to another

94
Q

assembler

A

converts assembly language into machine code

95
Q

interpreter

A

translator that converts high level language into low level language by checking ONE LINE AT A TIME and executes it before checking the next (if the line checked is incorrect, an error is sent to the user)

96
Q

compiler

A

translator that converts high level language into low level language by checking ALL code before running the program. (if any error is detected, they are reported to the user) an executable file is created if no errors are detected

97
Q

executable file

A

file produced by compiler. can be run without conversion/translation and does not include source code

98
Q

characteristics of interpreters

A
  • translates one line of code at a time
  • reports error as soon as its detected and stops program until its corrected
  • useful when WRITING a program
  • code needs to be re-translated each time its run
  • source code is required to run the program
99
Q

characteristics of compiler

A
  • translates ALL line of code before executing the program
  • reports errors at the same time (not as soon as its detected
  • useful when program is FINISHED at needs to be tested
  • produces executable file- doesnt require source code
100
Q

IDE

A

software that allows a user to write, test and run program code. includes an editor so you can enter and amend your code. also includes a run-time environment

101
Q

auto completion

A

feature of an editor that gives user options when they start typing a command

102
Q

auto correction

A

feature of an editor identifies and corrects spelling errors

103
Q

pretty print

A

feature of an editor that changes the colour of text (like highlighting key words)

104
Q

run-time environment

A

feature of an IDE that allows program to run and lets user interact with the program

105
Q

HTML

A

scripting language that is used to CREATE web pages

106
Q

active script

A

used to produce any of the interactive elements of a web page

107
Q

SSL protocol

A

encrypts data for transmission (invloved in HTTPS and HTTP)

108
Q

session cookies

A

type of cookie that is deleted when the web browser is closed

109
Q

persistent cookie

A

type of cookie that is stored by web browser until it is deleted by user or has expired

110
Q

cookie

A

two types. store data regularly used on the internet
(like passwords, back details and online shopping carts)

111
Q

crypto-currency

A

type of digital currency that uses encryption procedures

112
Q

block chain

A

METHOD that is used to track all transactions made with a crypto-currency

113
Q

digital ledger

A

database that is a LIST of all the transactions by the use of block chain

114
Q

brute force attack

A

cyber threat that involves repeatedly inputting a password until the correct one is found

115
Q

biometric password

A

type of password that uses a persons BIOlogical data (like a fingerprint)

116
Q

packet sniffer

A

software used to examine contents of a data packet

117
Q

DDoS

A

cyber threat that targets a web server to cause it to crash and prevent access to web pages it stores

118
Q

botnet

A

bots created to perform a DDos attack

119
Q

malware

A

type of malicious software that is downloaded onto a users device

120
Q

proxy server

A

method of cyber security that examines requests sent by devices (to access web pages)

121
Q

anti-malware

A

software that scans a computer with the purpose of finding and removing malware

122
Q

fire wall

A

security method that is used to examine incoming and outgoing traffic from a network

123
Q

trojan horse

A

cyber threat that is used to disguise other malware to sneak into a network

124
Q

spyware

A

cyber threat that spies on a users action whilst using a computer such as copying key presses

125
Q

adware

A

cyber tissue where advertisment automatically popup

126
Q

ransomware

A

cyber threat (software-based) that encrypts users data to stop them from gaining access to it until money is paid

127
Q

pharming

A

cyber threat that involves downloading malicious software onto a users hard drive. where a fake website asks a user to input personal details allowing it to be stolen.

128
Q

phishing

A

cyber threat that involves sending a user a fake email that encourages the user to provide personal details.

129
Q

social engineering

A

cyber threat that involves manipulating/deceiving a person to provide personal data

130
Q

analogue

A

data that can be any value within a range

131
Q

digital

A

limited data stored like 1’ and 0’

132
Q

actuator

A

causes another device or part to move

133
Q

expert system

A

attempts to replicate the knowledge of an expert . includes knowledge base, rule base and interface engine.

134
Q

knowledge base

A

part of an expert system. stores facts

135
Q

rule base

A

part of an expert system. stores the rules

136
Q

interface engine

A

part of an expert system. makes the decision