Glossary Of Terms Flashcards

1
Q

Adware

A

Adware: A piece of malware that, once installed on a computer, will show adverts or other spam to the user.
also: anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accumulator

A

Accumulator (Acc): A register in the processor that stores data from calculations as they are taking place, before results are sent back to the cache or RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Address

A

Address: The location of a byte of memory. Some secondary storage devices can have multiple terabytes of memory- each byte will have an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AI

A

AI: Artificial Intelligence- the next generation of computer programs that are so advanced they seem to be capable of independent thought and reasoning. See also: Skynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Algorithm

A

Algorithm: A set of step-by-step instructions for solving a problem or completing a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alpha testing

A

Alpha-Testing: Early-stage testing of a program by it’s developers to find bugs and issues that need fixing. See also: Beta-Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALU

A

ALU: Arithmetic & Logic unit: the part of the processor that performs calculations, comparisons and logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Analogue

A

Representing data is continuous quantity, e.g. recording a soundwave,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analogue digital converter

A

I will advise the tapes, analog, signal, idiot sandwich and converts into digital recording

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Anti malware

A

A program region, including in an operating systems, utility system software designed to protect the computer agains malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application layer

A

The first layer of the TCP/IP protocols . Contains information about the application the packet data is for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application software

A

Programs installed on a computer, such as email web, browsers or games. They rely on the operating system and system managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Argument

A

A piece of data given to a subroutine to use in a place of a parameter. The subroutine must be called with the same number of arguments as parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARPANET

A

Precursor to the Internet built in the 1960s, it became the Internet switched over to using protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Array

A

A structure that contains many items of data often of the same type the data is indexed so that particular item can be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASCII

A

American Standard Code for Information Interchange, a
7-bit character set used by all devices for representing text
in computers. See also Extended ASCII & UNICODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Assembler

A

A type of translator that converts assembly into
machine code. Often a high-level programming language’s
translator will first convert code into assembly, before
using an assembler to convert into machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assembly

A

A low level programming language similar in
structure to machine code, but which uses mnemonics in place
of opcodes. Assembly is converted into machine code by an
assembler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Audio File:

A

A file that stores sound. The size of the file is
calculated by
Duration x Sample Frequency x Bit Depth x Channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authenticated

A

The logging in to an account with a username
and password. Note that this does not confirm someone’s
identity- it just means they know the account details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Back-Door Access

A

When malware that has infected a computer
creates a connection for a hacker to access the computer’s
files and sensitive information without authorisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Backup

A

Computer files saved elsewhere in the event of a
computer failure. Backups can either be full or incremental.
Backups often occur in the cloud. Backing-up is part of the
Utility Systems Software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bandwidth

A

A measure of the speed of data transmission across
a network connection. Measured in MegabitsPerSecond (MbPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

. Beta-Testing

A

Testing done by a select group of individuals
to give feedback to a program’s developers about how well it
performs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Binary

A

A base-2 counting system that uses only two digits
(bits), 0 and 1. See also: Decimal & Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Binary Search

A

An algorithm that searches through a list of
data to find a search criteria. It will only work on a list
that has been sorted first, either with the bubble, insertion
or merge sort algorithm. Binary search looks at the middle
element of the list, discards the half that does not contain
the search criteria and repeats until it has been found. See
also: linear search, Bubble, Insertion, Merge sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BIOS

A

Basic Input/Output System: ROM that is run on computer
start-up. It’s main purpose is to load the Operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bit

A

Bit (b): a binary digit; 0 or 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bit Depth:

A

How many bits are used to encode a sound wave’s
amplitude. The higher the bit depth, the more accurately a
sample can be represented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Black Hat Hacker:

A

Criminals who break into computer networks
with malicious intent, to ransom, steal or destroy files.
Range from individual amateurs to state-sponsored
professionals. See also: hacker, white hat hacke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Boolean

A

A data type that represents True or False values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Boolean Operator

A

The operators AND, OR and NOT, that allow
condition statements to be combined into Compound Statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Boundary Test

A

When completing a Dry Run using a Trace Table,
the programmer will insert boundary data (i.e data that is on
the boundary of what the program is expecting to receive) in
order to check that the program correctly handles it. See
also: Erroneous Test, Valid Data Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Brute Force Attack:

A

A method of hacking where the hacker
attempts to authenticate into an account by trying millions
of usernames and passwords, often with the use of zombie
computers. See also: hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Bubble Sort

A

An algorithm used to arrange a list of data in
order. It is the simplest to code, but the slowest to
complete for long lists due to the nested loop in its code.
See also: Insertion sort, merge sort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Bug

A

An error in the program often caused by a syntax error.
IDE tools such as error diagnostics may help to debug. See
also: Logic error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

BUS

A

A bundle of wires or tracks on a PCB carrying data from
one computer component to another. Computers have a control
bus, a data bus and an address bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Byte (

A

Byte (B): A group of 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cache

A

A small amount of memory used by a computer processor
to speed up access to frequently used data. Cache memory is
often split into levels. Cache memory can be accessed faster
than RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Call

A

To make a subroutine run, you call it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cell

A

Cell: An item of data within a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Casting

A

Casting: Converting from one data type to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CD

A

CD: Compact Disk. An optical storage device; a plastic disk
covered by metallic foil that is etched with digital data. A
laser reads the etchings as the disk rotates. Can store 700
MegaBytes of data. Cheap, durable and portable. See also: DVD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Channel

A

Channel: (1) A range of radio bandwidth frequencies.
Different WAPs will use different channels to avoid
interference. (2) A term used for audio files- 1 channel is
Mono, 2 channels are stereo.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Character

A

Character: A data type that holds a single letter, number or
symbol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Character Set:

A

Character Set: A list of binary codes that represent
characters. ASCII is a character set, as is UNICODE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Circuit switching

A

Circuit switching: A method of data transmission across a
network where a route from source to destination is reserved
for the duration of transmission. Used in old telephone
connections before calls were digitised and upgraded to
packet switching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Client

A

Client: A device that relies on a server to connect to the
network and receive access permissions. Office computer
terminals are an example of client devices. See also: Client-
Server, Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Client-Server

A

Client-Server: a LAN setup where clients rely on a server to
be given access permissions to the network, access files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Clock

A

Clock: A vibrating quartz crystal contained within a
processor that coordinates all instruction executions by the
processor. Sometimes a processor can be overclocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Code

A

Code: A set of instructions written in a programming
language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Colour Depth

A

Colour Depth: The number of bits used to encode each pixel’s
RGB colour. A typical colour depth is 3 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CLI

A

CLI: Command Line Interface: The user types in operating
system commands rather than using a GUI. A CLI gives more
access to system settings but is less intuitive to use than a
GUI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Cloud:

A

Cloud: Storage located in a remote server. Useful for backing
up computer files or remote working. Users often need to pay
a monthly subscription for cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Coding Construct:

A

Coding Construct: There are three coding constructs-
sequence, selection and iteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Comment

A

Comment Information typed in the program to provide
information for the programmer; it is not executed by the
program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Compound Statement:

A

A statement where Boolean Operators are
used to combine condition statements together,
e.g: IF age < 23 AND height >= 180

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Compiler

A

Compiler: A program that translates source code written in a
high-level programming language into a single machine code
file that can be executed by a computer. See also: Translator
& Interpreter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Compression

A

Compression: Reducing the size of a file so that it takes up
less storage. See also: Lossy Compression and Lossless
Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Computer

A

Computer: A machine that can be programmed to execute
instructions and perform tasks. A traditional Personal
Computers can often have its components upgraded, Laptops may
or may not have this ability. See also: processor, primary
memory, secondary memory, embedded system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Computer Misuse Act

A

Computer Misuse Act: A law designed to prosecute a hacker’s
unauthorised access to a computer network and files,
including the use of malware, ransomware, deleting or modifying files or selling data to third parties. See also:
Lawful, Data Protection Act, Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Concatenation

A

The combining of two separate variables so
that they can be treated as one, e.g. concatenating 2 string
variables together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Condition Statement

A

Condition Statement: Part of a selection instruction. By
evaluating the condition statement, the computer decides what
action to take. See also: Compound Condition Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Constant

A

Constant: A value that does not change while the program is
running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Control Unit

A

Control Unit: The part of the processor that coordinates the
computer and controls the fetch-execute cycle by sending
control signals to other parts of the processor and to
peripherals through the control bus. The control unit
contains the decoder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Cooling

A

Removing heat from computer components, particularly
the processor. Without sufficient cooling the computer could
break. See also: Heat Sink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Copyright

A

Copyright: A law protecting the rights of the person or
company who created a product. See also: Lawful, Proprietary
License & Open-Source License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Core

A

Core: A processor may contain multiple cores- smaller
versions of itself that can perform parallel processing,
threading or multi-tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Correctness

A

Correctness: A measure of how correct a program completes a
task. See also: Efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Daisy-Chain

A

Daisy-Chain: Connecting multiple switches together to form a
backbone for a star-topology LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Database

A

Database: A structured and managed set of data held on a
computer. See also: Record, Table, Field, Entry, Cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Data Center:

A

A facility that contains many servers; cloud-
storage servers, web-servers, game-servers etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Data Link Layer

A

Data Link Layer: The fourth layer of the TCP/IP protocols.
Adds rules for transmitting data across the network, e.g.
rules for transmission across ethernet, fibre optic or WiFi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Data Interception and Theft:

A

Data Interception and Theft: An attack on a network performed
by a hacker using packet sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Data Protection Act

A

Data Protection Act: A law that gives right to data subjects.
Organisations must keep track of a subject’s data and record
how they use it. They must only use to for necessary
purposes. Subjects have a right to see their data and ask for
it to be deleted. See also: Lawful, Computer Misuse Act,
Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Data Type:

A

Data Type: Different types of data include Strings,
Characters, Integers, Floats and Booleans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

DDoS Attack

A

DDoS Attack: Distributed Denial of Service: A hacking attack
where a website is swamped with authentication requests and
other useless traffic, in the hope of crashing the website’s
server. Good use of input sanitisation can help mitigate DDoS
attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Debugging

A

Debugging: The process of finding and fixing errors or bugs
in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Decimal

A

A base-10 counting system with 10 digits, 0-9. See
also: Binary and Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Decision

A

When a question is asked, giving rise to two
possible outcomes. See also Selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Decoder

A

a part of the control unit contained within the
processor. The decoder decodes program instructions as part
of the Fetch-Execute cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Decomposition

A

Decomposition: After abstracting a problem, the programmer
will break down the problem into smaller, manageable tasks
that are easier to program and maintain, usually with use of
subroutines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Defensive Design

A

Defensive Design: Also known as robust programming: A program
coded in such a way as to be able to deal with all erroneous
data or transcription errors a user may input, without
crashing. E.g, the use of try…except code blocks in Python.
See also: Maintainability, Erroneous Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Definite Iteration:

A

Definite Iteration: Iteration that repeats a known number of
times. In Python For… loops are examples of definite
iteration. See also: Indefinite Iteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Defragmentation Software

A

Defragmentation Software: Part of the utility system
software. Used to rearrange data in the hard drive so files
and programs are stored in contiguous blocks, making them
faster to load into the RAM when opened. Defragmenting is
only necessary for hard drives, that have to physically
rotate their magnetic disks to data can be read by the reader
head. See also: Magnetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Digital

A

Digital: Representing data in discrete form, e.g. in binary
data. Digital is the opposite of Analogue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

DNS

A

DNS: Domain Name Server / Domain Name Service: A server on a
WAN that stores all domain names and their associated IP
addresses. When a user enters a URL, the DNS is queried and
the IP address of the domain is returned, allowing the user’s
computer to load the website. Domain names are much easier to
remember than IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Domain Name

A

Domain Name: A unique, easy to remember address used to
access a website. Domain names are much easier to remember
than a website’s IP address. See also: DNS, URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Driver

A

Driver: A program which is managed by the Peripheral Manager
of an Operating System. It is used to interface with
peripheral devices such as printers, monitors and mice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Dry Run

A

The program is run on paper by the programmer using
a Trace Table. Each step is analysed to track the inputs and
outputs to check for Logic Errors in the code. See also
Erroneous Test, Boundary Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

DVD

A

an upgraded version of a CD. Can hold up-to 30 GigaBytes
of data. See also: optical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Dynamic Array

A

Dynamic Array: An array that has not had its size defined and
can be resized as data is appended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Efficiency

A

Efficiency: A measure of how quickly a program completes a
task. See also: Correctness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Element

A

Element: An item in a list. Can be any data type. List
elements are indexed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Embedded System

A

Embedded System: a computer embedded within a larger device,
designed as cheaply as possible to perform a specific task.
It’s hardware cannot be upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Encryption:

A

Encryption: The process of converting plain data into
scrambled data to protect sensitive information from
unauthorised access. Encryption software is part of the
utility system software. See also: packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Entry

A

Entry: A record of data within a database- usually a row of a
table, e.g. the entry of a person in a census database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Erroneous Test:

A

Erroneous Test: When completing a Dry Run using a Trace
Table, the programmer will insert erroneous data (i.e data
that the program is not expecting to receive) in order to
check that the program correctly handles it. See also:
Boundary Test, Valid Data Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Ethernet

A

Ethernet: An electrical cable used to transmit data. Also a
protocol for transmitting data, part of the Data Link Layer
of the TCP/IP protocol set of rules. See also: Fibre Optic,
Microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Ethics

A

Ethics: A system of moral principles that society recognises
as being right and good values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Execute:

A

Execute: To run a program or script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Extended ASCII

A

Extended ASCII: An upgraded version of the ASCII character
set that stores more character codes because it uses 8 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Fetch-Execute Cycle

A

Fetch-Execute Cycle: The cycle of operations performed by a
computers processor to execute program code. First the next
instruction is fetched from cache or RAM. Next the
instruction is decoded and the processor decides what to do
with it. Lastly the instruction is executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Fibre optic:

A

Fibre optic: A method of data transmission used in
networking. Uses thin strands of glass to transmit digital
optical pulses of light. Thanks to multiplexing, Fibre optic
can transmit huge bandwidths of data. Used in both LANs and
WANs, particularly in trans-oceanic cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Field

A

Field: One item of information, e.g. the make of a car.
Fields are often the rows or columns in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

File:

A

File: A container of information in digital format, often
stored in secondary storage. Useful for storing data
generated by running programs. Files are managed by the file
manager. See also: Image File, Sound File, Text File, Lossy
Compression, Lossless compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

File Manager:

A

File Manager: One of the four managers contained within the
operating system. Manages data storage in the computer.
Creates, names and saves files. Arranges files in folders and
directories. Works with the user and permissions manager to
control user access to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Firewall

A

Firewall: A piece of hardware or utility system software that
monitors and controls incoming and outgoing network traffic
to prevent unauthorised access. See also: malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Flash Memory

A

Flash Memory: Non-volatile solid-state secondary storage,
also called a data-stick, thumb-drive, USB-stick etc. Small,
cheap and portable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Float

A

Float: A data type that contains decimal numbers. An integer
could be stored in a float variable, but a float could not be
stored in an integer variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Floppy Disk

A

Floppy Disk: A low-capacity secondary storage device, first
produced in 1971 but obsolete by the 1990’s. Could store 1.44
MegaBytes of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Footer:

A

Footer: Information added to the end of a data packet before
it is transmitted across a network. Footers contain error-
checking codes and an ‘end of packet’ signal. See also:
header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Frequency

A

Frequency: The number of times per second- used when
describing radio waves or the number of audio wave samples
taken per second. See also: Channels, Audio files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

FTP

A

FTP: File Transfer Protocol: One of the application layer
protocols from the TCP/IP protocols, used when transferring
files across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Function

A

Function: A subroutine where data is returned to the
variable(s) that called it. The function must be called by
the same number of variables as the pieces of data it
returns. Functions can use parameters. See also: procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

GigaByte

A

GigaByte: A billion bytes, 8 billion bits, 2 billion nibbles,
1 million KiloBytes or 1 thousand MegaBytes.

117
Q

Global Variable

A

Global Variable: A variable that can be used anywhere in the
script, including within subroutines. See also: local
variable

118
Q

GUI

A

GUI: Graphical User Interface: Buttons, windows and icons
that make navigating an operating system easy and intuitive.
See also: CLI

119
Q

Hacking

A

Hacking: The unauthorised access to a computer system or
network and the data it contains. See also: phishing,
pharming, brute force attack, DDoS attack, virus, worm,
trojan, spyware, adware, malware, ransomware, white-hat
hacker, black-hat hacker, Lawful

120
Q

Hard-Drive:

A

Hard-Drive: A high-capacity magnetic secondary storage
device. Contains magnetic discs that rotate to allow a
reader-head to read, write and delete data.

121
Q

Hardware

A

Hardware: The physical components that make up a computer and
it’s peripherals. See also: Software

122
Q

Header

A

Header: Information added to the beginning of a data packet
before it is transmitted. Headers contain source and
destination IP addresses and the packet’s position in the
file. See also: footer

123
Q

Heat Sink

A

Heat Sink: A grid of metal fins bonded to a processor to
allow it to dissipate heat. See also: Cooling, Overclocking

124
Q

Hexadecimal

A

Hexadecimal: A base-16 counting system with 16 digits. Useful
to express binary numbers in a more human-friendly way.
Particularly useful when expressing RGB colour values. See
also: Binary & Decimal

125
Q

High Level programming Language

A

High Level programming Language: A programming language that
is close to English and is easy to understand by humans as it
is intuitive to follow.

126
Q

HTML

A

HTML: Hyper Text Markup Language: a programming language used
to create websites.

127
Q

HTTP

A

HTTP: HyperText Transfer Protocol: An application layer
protocol from the TCP/IP protocols used to transmit website
data across a network. HTTPS is a secure (encrypted) version.

128
Q

IDE

A

IDE: Integrated Development Environment, a software
application that provides a comprehensive development
environment for software developers.

129
Q

Identifier

A

Identifier: The name of a variable. Identifiers should always
follow camelCase or snake-case naming conventions.

130
Q

Image Files

A

Image Files: A file that stores an image. The size of the
file is calculated by:
width x height x pixel colour depth

131
Q

Indefinite Iteration: Iteration

A

Indefinite Iteration: Iteration where the number of repeats
is not known. Whether another repeat occurs depends on the
evaluation of a condition statement. In Python, while… loops
are an example of indefinite iteration.

132
Q

Index

A

Index: The position of a character in a string or element in
a list or array, counting from zero

133
Q

Insertion Sort

A

Insertion Sort: An algorithm used to rearrange a list of data
in order. It is the second simplest to code (after bubble

134
Q

Instruction Set

A

Instruction Set: A list of binary opcode instructions the
computer uses when it executes machine code.

135
Q

Input Sanitisation

A

Input Sanitisation: Removing any inputs (e.g. attempted
logins to web pages) that could be harmful to the program. It
is one line of defence against hacking

136
Q

Integer

A

Integer: A data type that holds whole numbers. See also:
Float

137
Q

Interference

A

Interference: Wireless connections to a LAN may be affected
by objects or walls between the device and the WAP, affecting
its bandwidth. Interference may also be caused by distance,
or different WAPs using the same channel.

138
Q

Internet

A

Internet: The successor to ARPANET: a WAN that spans the
world, connecting computers together and allowing the
transmission of data between them. The Internet connects
billions of LANs together. See also: Skynet

139
Q

Internet Layer

A

Internet Layer: The third layer of TCP/IP protocols. Adds
destination and source IP addresses to the packet’s header.

140
Q

Interpreter

A

Interpreter: A program that converts source code into machine
code that can be read by the computer. It does this line-by-
line, and halts if an error is found. Used while developing
code. See also: Translators & Compilers

141
Q

Intuitive

A

Intuitive: Something that is easy to understand or work out;
it does not require the reading of an instruction manual to
operate

142
Q

IP Address:

A

IP Address: IPv4: A unique software address given to a
network-connected device by the LAN’s router. For a device to
receive an IP address it mush have a NIC. An IPv4 address is
4 bytes long. See Also: IPv6

143
Q

IPv6

A

IPv6: The newer version of the IPv4 address. IPv6 is 16 bytes
long.

144
Q

Iteration

A

Iteration: When code is repeated or looped. One of the three
coding constructs. See also: Definite Iteration and
Indefinite iteration

145
Q

Key Logger:

A

Key Logger: A malicious program installed on a computer by a
piece of malware. Will record keystrokes in the hope of
learning user login details before transmitting them to the
hacker.

146
Q

KiloByte

A

KiloByte (KB): 1 thousand bytes, 8 thousand bits, 2 thousand
nibbles.

147
Q

LAN

A

LAN: Local Area Network, a computer network that connects
computers and devices within a limited geographical area.
LANs are often connected to a WAN, such as the Internet.

148
Q

Lawful

A

Lawful: Abiding by the laws and rules of a country or
jurisdiction. See also: hacker, Data Protection Act, Computer
Misuse Act, copyright

149
Q

Linear Search:

A

Linear Search: Unlike binary search, linear search does not
require the list to be sorted first. It starts at the
beginning of the list and checks each element sequentially
until the search criteria is found, or it reaches the end of
the list. See also: Bubble, Insertion, Merge sort

150
Q

List

A

List: Similar to arrays, lists contain multiple elements or
sublists which are indexed. Python uses lists rather than
arrays.

151
Q

Local Variable

A

Local Variable: A temporary variable created within a
subroutine and deleted when the subroutine ends. See also:
global variable

152
Q

Logic circuits

A

Logic circuits: Formed from logic gates, logic circuits are
the building blocks of processors and other electronic
hardware

153
Q

Logic error

A

Logic error: The code works, but not as intended. Performing
a dry run with a trace table can help to find logic errors.
See also: bug, syntax error

154
Q

Logic Gate

A

Logic Gate: The AND, OR and NOT gates that are made out of
transistors. When wired together, logic gates form logic
circuits.

155
Q

Lossy compression

A

Lossy Compression: To reduce the size of a file by removing
data. The original file cannot be retrieved. Often used to
compress Image and Audio files.

156
Q

Look-Up Table

A

Look-Up Table: Used to perform Lossless Compression on text
files; repeated words are stored in a table, their positions
in the text file indicated with a key. This removes
redundancies in the file, reducing its file size.

157
Q

Low Level Programming Language

A

Low Level Programming Language A programming language that
is close to the structure of machine code and is hard to
understand by humans because it is unintuitive. Assembly is
the prime example

158
Q

MAC address

A

MAC address: Media Access Control address. Each NIC contains
a MAC address which, when connected to a network, is detected
by the router, allowing the device to be allocated an IP
address.

159
Q

Machine Code

A

Machine Code: The binary code that can be understood and
executed by a computer.

160
Q

Main Program Code

A

Main Program Code: The final section of a script that
contains code to begin the program, calling subroutines
defined in the earlier #Subroutines section.

161
Q

Magnetic

A

Magnetic: A type of secondary storage that uses a magnetic
medium (such as a disc coated with a magnetic film) to store
binary data. See also: hard drive, defragmentation

162
Q

Malware

A

Malware: Malicious Software: An umbrella term for many
programs that infect computers, stealing data, installing
ransomware or key loggers, providing back-door access to the
device or other vulnerabilities. See also: hacking

163
Q

Maintainability

A

Maintainability: A program written in such a way as to be
clear and understandable by the programmers working on it, by
good use of subroutines and comments. See also: Abstraction,
Defensive Design

164
Q

MegaByte

A

MegaByte (MB): A million Bytes / 8 million bits / 4 million
nibbles.

165
Q

Memory

A

Memory: A device or system used to store information. See
also: Primary Storage & Secondary Storage.

166
Q

Memory Address Register

A

Memory Address Register (MAR): A register in the processor
that receives the location of the next instruction from the
Program Counter, before the instruction is retrieved from the
cache or RAM and sent to the memory data register

167
Q

Memory & Multitasking Manager

A

Memory & Multitasking Manager: One of the four managers
contained within an Operating System. It is in charge of
allocating RAM and processor resources to application
software. It allocates memory space to running programs and
creates a virtual memory swap file in the secondary storage
if needed

168
Q

Memory Data Register (MDR):

A

Memory Data Register (MDR): A register in the processor that
receives the next program instruction. The decoder then decodes the instruction and decides what to do with it. See
also: Accumulator

169
Q

Merge Sort

A

Merge Sort: An algorithm used to rearrange a list of data in
order. It is the most complex to code but the fastest to
complete for long lists due to its use of recursion. See
also: Insertion sort, merge sort.

170
Q

Mesh Topology

A

Mesh Topology: A design of network build commonly used by
WANs. Nodes are connected to multiple other nodes, creating a
robust, redundant network. If one connection is busy or
damaged, packets can redirected by the routers via
alternative routes. See also: Star Topology

171
Q

Microwave

A

Microwave: If it is not convenient, cost-effective or
practical to connect two parts of a LAN together with cables,
microwave transceivers could be used instead. Susceptible to
interference by weather, they also explode birds who fly
between them. See also: Ethernet, fibre optic

172
Q

Mnemonics:.

A

Mnemonics: Words to use in place of opcodes. Used in the
assembly programming language.

173
Q

Modem

A

Modem: Modulator-Demodulator: A network device that
interfaces between the digital signals of a LAN and the
analogue signals transmitted through the copper telephone
lines which are usually a household’s connection to a WAN.

174
Q

Modulus-ll check

A

Modulus-ll check: A way of checking for transcription errors
when a ussr enters a long string of data. A method of
defensive design.

175
Q

Multiplexing

A

Multiplexing: Transmitting multiple beams of light through
fibre optic cables, where each beam uses different
frequencies and different polarities, increasing the
bandwidth of the cable by orders of magnitude.

176
Q

Multitasking

A

Multitasking: When a multi-core processor runs several
separate programs simultaneously. See also: parallel
processing

177
Q

Network

A

Network: A system that connects multiple computers together
for sharing data between them.

178
Q

Network Diagnostics:

A

Network Diagnostics: During a network attack by hackers, data
is recorded by the network administrator to investigate the
source and cause of the attack, keep track of harm done,
record evidence for prosecutions and learn lessons for the
future.

179
Q

Nibble

A

Nibble: 4 binary bits. 1 Byte can be split into 2 nibbles,
before converting into Hexadecimal

180
Q

NIC

A

NIC: Network Interface Card: A piece of hardware within a
device that allows it to connect to a network. NICs contain a
MAC address, which allows the router to allocate the device
an IP address.

181
Q

Non-Volatile

A

Non-Volatile: a type of secondary storage whose data is not
lost when the power is turned off.

182
Q

Node

A

Node: A point in a WAN where multiple connections meet. Nodes
typically contain a router, to receive data packets and send
them on the next part of their journey.

183
Q

Object-Oriented Programming

A

Object-Oriented Programming: A programming paradigm that uses
objects to represent data and methods to manipulate the data.

184
Q

Octodecimal

A

Octodecimal: A base-8 counting system with 8 digits 0-7. Used
to represent 3-digit binary numbers and by teachers wanting
to provide extension questions to pupils to finish their work
too fast.

185
Q

Open-Source

A

Open-Source: AKA Creative Commons License: A type of
copyright license that allows the for the free distribution
of software. It can be modified or enhanced by others. Open-
Source licences promote discussion and development around a
program. See also: Proprietary License

186
Q

Operating System

A

Operating System: System software that manages computer
hardware and software resources and provides common services
for application software. Control of operating system
settings can be performed through a GUI or CLI. Utility
Systems Software is also bart of the OS. See also: System
Managers

187
Q

Operand

A

Operand: The data to be used in a calculation or operation.
See also: operator.

188
Q

Operator

A

Operator: A symbol that tells the computer what operation or
calculation to perform on operands. The three categories of
operator are Arithmetic, Relational and Boolean.

189
Q

Optcode

A

Optcode: A binary instruction used in machine code to perform
a operations such as add, subtract, load or store. Optcodes
are defined in a computer’s instruction set

190
Q

Optical

A

Optical: The term for secondary storage that uses a laser to
read etchings on a metal foil-coated plastic disc. See also:
CD, DVD

191
Q

Overclocking

A

Overclocking

192
Q

Overflow

A

Overflow: Caused when calculations performed on data gives a
result larger than 8 bits. Since the result can not be stored
in a byte of memory, an overflow error must be flagged
otherwise the computer will not allocate additional space to
store the result, causing an error.

193
Q

Packet

A

Packet: A piece of a file sent across a network to be
reassembled at the destination. Packets are given headers and
footers before being sent on their way. All packets are sent
according to the TCP/IP protocols.

194
Q

Packet Sniffing:

A

Packet Sniffing: If a hacker gains access to a WiFi network
connection, they could intercept data packets. If the packets
are not encrypted, the hacker could perform data interception
and theft.

195
Q

Packet Switching

A

Packet Switching: A method of data transmission across
networks, where files are broken into packets before
transmission. Each packet can take the most efficient route,
as directed by routers at each node, with the file being
reassembled at its destination. This allows many files to be
transmitted across a network simultaneously. See also:
circuit switching

196
Q

Parallel Processing:

A

Parallel Processing: The act of running a program across
multiple cores, provided the program is designed to be run in
this way.

197
Q

Parameter

A

Parameter: A way of adding flexibility to a subroutine by
letting it take in data to use within itself. When called,
the subroutine must be given the same number of arguments as
the number of parameters it has.

198
Q

Penetration Testing:

A

Penetration Testing: A realistic hacking attack is performed
by a white-hat hacker to test the security of a company’s
network and report any vulnerabilities to the company.

199
Q

PetaByte

A

PetaByte (PB): 1 thousand TeraBytes. Data centres have
storage capacity measured in PetaBytes.

200
Q

Pharming

A

Pharming: The mass-sending of fake emails to many people in
the hope that one or two may be convinced and click on fake
links to harmful websites, or download files containing
malware. See also: hacking

201
Q

Phishing

A

Phishing: A social-engineering attack used by hackers to
steal personal data, login credentials or bank details.
Hackers masquerade as a legitimate person of authority to try
to get a victim to divulge information. See also: hacking

202
Q

Pixel

A

Pixel: A Picture Element. Images are stored as binary data by
being broken into pixels, each one encoded with an RGB value
and stored in a file

203
Q

PCB

A

PCB: Printed Circuit Board- a board with metal tracks and
electrical components soldiered on. Allows for the mass-
production of electronic devices.

204
Q

Peer-to-Peer

A

Peer-to-Peer: A way of connecting to a network ad-hoc; all
devices set up their own permissions and security. Good for
Minecraft LAN parties. See also: client-server

205
Q

Peripheral Manager

A

Peripheral Manager: One of the four managers contained within
the operating system. In charge of managing interactions
between application software and peripherals. It uses driver
software to do this

206
Q

Peripherals

A

Peripherals: Hardware devices external to the main body of a
computer such as monitors, mice or keyboards.

207
Q

Permissions

A

Permissions: A layer of security that gives access to a
network, computer files or data storage. Permissions can be
tailored to individual user accounts or devices.

208
Q

POP

A

POP: Post Office Protocol: an application layer protocol used
to send emails from server to client. Not to be confused with
SMTP.

209
Q

Primary Storage

A

Primary Storage: Volatile memory used to store program data
while it is currently being run by a computer. See also: RAM

210
Q

Procedure

A

Procedure: A block of code that can be called by other
subroutines or in the Main Program Code section of a script.
Data is not returned, unlike a function. Procedures can use
parameters

211
Q

Processor

A

Processor: Central Processing Unit: The ‘brain’ of the
computer- the component that executes program code following
the Fetch-Execute cycle and using it’s instruction set. A
processor may contain several cores. The speed of instruction
execution is determined by it’s clock. See also: Register,
Control Unit, ALU, Cache

212
Q

Program

A

Program: A set of instructions written in a programming
language that can be executed by a computer. See also: Coding
Construct

213
Q

Program Counter:

A

Program Counter: A register within the processor that holds
the address of the next instruction before it is copied over
to the memory address register.

214
Q

Programming Language

A

Programming Language: A system of rules and notations used to
write code. The code can be translated into machine code,
that can be executed by a computer. See also: High Level
programming Language & Low Level Programming Language.

215
Q

Proprietary License:

A

Proprietary License: A license that allows a developer to
sell their product for a fee. Others cannot edit or modify
the code. See also: Open-Source License, Copyright

216
Q

Protocol

A

Protocol: A set of rules governing communication between
computers connected on a network. See also TCP/IP.

217
Q

Pseudocode

A

Pseudocode: A code-like language used by the programmer to
plan out a script before coding it for real, particularly
focussing on getting the logic correct to avoid future logic
errors.

218
Q

Python

A

Python: (1) A particularly versatile high-level programming
language used to program a wide variety of applications. (2)
A big squeezy snake.

219
Q

RAM

A

RAM: Random Access Memory, a type of volatile computer memory
that allows data to be read and written in any order. Data
access is very fast, but not as fast as cache memory.

220
Q

Ransomware:

A

Ransomware: A program that can be delivered by a worm, virus
or other malware that encrypts a computer’s data and
threatens to delete it unless the user pays a ransom, often
in untraceable cryptocurrency. Reinstalling from a backup is
usually the only option.

221
Q

ROM

A

ROM: Read-Only Memory: A type of memory that cannot be
edited. See also: BIOS

222
Q

RGB

A

RGB: The amounts of Red, Green & Blue encoded for each of an
image’s pixels. See also: Colour Depth

223
Q

Record

A

Record: A collection of data about a particular subject, e.g.
Births, Deaths and Marriages. Records are stored in
databases.

224
Q

Recursion

A

Recursion The act of calling a subroutine from within itself
repeatedly. Recursion is used in merge sort algorithms and
when generating fractals.

225
Q

Redundancy

A

Redundancy: (1) Repetitions in data where information can be
saved in a more efficient way other just saving the original
data. See Also Run Length Encoding & Look-Up Table. (2) The
mesh topology of WANs give them redundancy- if one connection
is lost, packets can be rerouted.

226
Q

Register

A

Register: A memory location within the processor that stores
specific data. See also: Program Counter, Memory Address
Register, Memory Data Register, Accumulator,

227
Q

Remote Working:

A

Completing tasks far from the location the
files are stored at, either using cloud storage or VLANs

228
Q

Return

A

Return: A function returns data to the variable(s) that
called it. If the exam question asks you to write pseudocode
for a function, it must have a return line in it.

229
Q

Router

A

Router: (1) A device on a LAN that allocates IP addresses to
computers it detects on the network. Routers also provide a
gateway between the LAN and a WAN and route data packets to
and from devices. (2) A device on the node of a WAN that
receives data packets and directs them on the most efficient
route for the next leg of their journey. Because WANs are
mesh topology, the shortest route might not always be the
most efficient.

230
Q

Run Length Encoding

A

Run Length Encoding: A method of Lossless Compression used on
image files: Lines or areas of similar-coloured pixels are
saved in the file, rather than the individual pixel’s data.

231
Q

Script

A

Script: A file that contains a program written in code.

232
Q

SD Card

A

SD Card: Secure Digital card: A small solid-state non-
volatile memory secondary storage device.

233
Q

Secondary Storage:

A

Secondary Storage: Non-volatile memory used to store data
when the computer is turned off. Secondary storage includes
Flash Drives, SD cards, Hard Drives, Floppy Disks, CDs, DVDs.
See also: Primary Storage

234
Q

Security

A

Security: Steps taken to ensure a network or account is not
vulnerable to hacking. Steps include a complex password, two-
factor authentication and user permissions.

235
Q

Selection

A

Selection: One of the Three Coding Constructs, also knows as
decision. By evaluating a condition statement or compound
condition statement, one of two possible actions may be
taken

236
Q

Server:

A

Server: A computer system that provides services to other
computers or devices on a network. LAN servers may provide
network access to client devices. See also: Data Center, DNS,
cloud

237
Q

Sequence

A

Sequence: A basic instruction or command. One of the three
coding constructs.

238
Q

Skynet

A

Skynet: The successor to the Internet. In the late 21st
century AI gained enough intelligence to rise up and
overthrow its human overlords, taking over the world and
dooming humanity to nothing more than a bitter fight for
survival in a desolate wasteland of its own creation.

239
Q

Swap File:

A

Swap File: Otherwise known as virtual memory: If a computer’s
RAM becomes full, the Memory & Multitasking Manager will
allocate space in the secondary storage to be used as extra
primary storage. This greatly slows down the computer as
retrieving data from secondary storage is much slower than
retrieving data from RAM or cache memory.

240
Q

SMTP

A

SMTP: Simple Mail Transfer Protocol: An application layer
protocol used to send emails from client to server. Not to be
confused with POP

241
Q

Software

A

Software: The programs, data and instructions used to operate
computers and execute tasks. See also: Hardware

242
Q

. Solid-State

A

. Solid-State: A type of memory device made of silicon
microchips. It contains no moving parts, so is durable and
portable. Most modern secondary-storage devices are now
solid-state. See also: Flash memory

243
Q

Source Code

A

Human-readable instructions written in a
programming language that can be translated into machine code
by a compiler.

244
Q

Spyware

A

Spyware: A piece of malware that spies on the user’s computer
activities and reports back to the hacker

245
Q

SQL Injection

A

A way of hacking into a database by inserting
SQL commands into a login website in the hope that the site’s
programmers left themselves backdoor-access to the site
during development.

246
Q

SQL Command

A

SQL Command: A way of retrieving data from a database. To
display all fields use the wildcard.
e.g. SELECT make FROM carTable WHERE price > 5000

247
Q

Star Topology

A

Star Topology: A design of network typically used by LANs.
All connections meet at a central switch (or a daisy-chain of
switches). This is the simplest way of creating a network,
but if the central switch fails the whole LAN will fail.

248
Q

String

A

String: A data type that holds multiple characters, i.e.
multiple letters, numbers or symbols.

249
Q

Sublist

A

Sublist: A list contained within a list. A list of sublists
is analogous to a multi-dimensional array.

250
Q

Subroutine

A

Subroutine: Self contained modules of code that can be called
by other subroutines or from the Main Program Code section of
a script. Subroutines may use parameters. See also: Functions
& Procedures

251
Q

Substring

A

Substring: A part of a larger string. Substrings can be cut
from a string using character’s index positions.

252
Q

Switch

A

Switch: A piece of network hardware containing multiple
sockets to allow ethernet cables to be connected to a LAN.

253
Q

Syntax error

A

Syntax error: A grammatical error in the code such as missing
parenthesis, spelling or colons. See also: bug, logic error

254
Q

System Managers

A

System Managers: Each operating system contains four managers
that allocate resources and control interactions between
application software and the computer’s hardware and
peripherals. Memory & Multitasking Manager, Peripheral
Manager, User and Permissions Manager and File Manager.

255
Q

Table

A

Table: A sheet of data in a database, sometimes called a
worksheet.

256
Q

TCP/IP

A

TCP/IP: Transmission Control Protocol / Internet Protocol. A
set of standardised rules that all computers use to
communicate across LAN and WANs. See also: Application layer,
Transport layer, Internet layer, Data link layer.

257
Q

TeraByte

A

TeraByte (TB): 1 trillion bytes, 8 trillion bits, 4 trillion
nibbles, 1 thousand GigaBytes, 1 Million MegaBytes, 1 billion
KiloBytes.

258
Q

Text File

A

Text File: Data created during the running of a script might
need to be stored. One of the simplest options is a text
file, which can be opened in read, write or append mode.

259
Q

Threading

A

Threading: A sequence of instructions executed by a
processor. Some processors can execute multiple threads
simultaneously. If the processor is multi-cores and is also
overclocked, the performance of a processor can be very
impressive indeed

260
Q

Trace Table:

A

Trace Table: A table of all the variables in a program. The
programmer will complete a Dry Run, manually updating the
variable values in the table as they change. This allows the
programmer to find logic errors in the code.

261
Q

Transcription Error

A

Transcription Error: An error by the user when inputting
data, especially credit card numbers or ISBN codes. Good
defensive design and input validation should prevent program
crashes. See also: Modulus-11 chec

262
Q

Transistor

A

Transistor: Tiny nano-scale switches by wiring transistors
together you can form logic gates. Transistors are the basis
of all modern electronic technology.

263
Q

Translator

A

Translator A program that converts source code into machine
code. Compilers and Interpreters are both translators. See
also: Assembler

264
Q

Transport Layer

A

Transport Layer The second layer from the TCP/IP protocols.
Divides files into packets, adds error checking codes in the
footer, sends requests for packet resends.

265
Q

Trojan

A

Trojan: A large malware program that pretends to be a
legitimate piece of software in the hope that the user
installs it onto their computer. May install ransomware, key
loggers, adware or other destructive software on any computer
that does not have anti-malware installed.

266
Q

Tunneling

A

Tunneling: A method of data transmission used in VPNs, where
the data packet is placed inside an outer wrapper so only
computers connected to the VPN can access it.

267
Q

UNICODE

A

UNICODE: When it became clear that ASCII couldn’t contain
enough character codes for foreign language characters and
emojis, they developed a 16-bit character set called UNICODE.
A more developed version is UTF-32, which uses 32 bits…

268
Q

User and Permissions Manager

A

User and Permissions Manager: One of the four managers
contained within the operating system. Controls user access
to files and settings. Working with the file manager, it
managers user accounts and who can view, open, edit and
delete files.

269
Q

URL

A

URL: Universal Resource Locator: An address that allows the
user to access a resource on a WAN. Typically of the form:
https://www.bbc.co.uk/news
URLs contain the application layer protocol, the domain name
and a path.

270
Q

Utility System Software

A

Utility System Software: Part of the Operating System. Helps
maintain and optimise the smooth running of the computer.
Includes the defragmentation tool, anti-malware, compression
tools, firewalls, backup and encryption software.

271
Q

Validation

A

Validation: Checking that entered data is sensible and
matches input criteria.

272
Q

Valid Data Test

A

Valid Data Test: When completing a Dry Run using a Trace
Table, the programmer will insert valid data (i.e data that
the program is expecting to receive) in order to check that the program correctly handles it. See also: Boundary Test,
Erroneous Test

273
Q

Variable

A

Variable: A named memory location used to store a value in a
program

274
Q

Virtual memory

A

Virtual memory: See: Swap file

275
Q

Virus

A

Virus: A type of malware that infects a computer without the
user’s permission. Needs a host program to replicate itself
and spread across a network to computers without sufficient
anti-malware protection. May corrupt data, delete files or
provide a hacker with back-door access.

276
Q

VLAN

A

VLAN: Virtual Local Area Network: A virtual LAN created
within a physical LAN; allows a school’s network
infrastructure to be split into different networks for pupils
and staff and provide different permissions for different
user groups.

277
Q

Volatile

A

Volatile: A type of memory that can only function when it
receives electrical power. Then the power is switched off,
the data is lost.

278
Q

VOIP

A

VOIP: Voice Over Internet Protocol: An application layer
protocol used for voice calls, e.g. Skype. The connection may
experience poor quality due to the nature of packet switching
data transmission and poor bandwidth

279
Q

VPN

A

VPN: Virtual Private Network: A connection through a WAN to a
LAN to make it seem as though a client is located within the
LAN. Allows for remote working and is an alternative to using
the cloud. VPNs are also used by pupils to bypass school
firewalls and access questionable websites. See also:
tunnelling

280
Q

WAN

A

WAN: Wide Area Network. A network of LANs, typically over a
large geographical area. The Internet is the world’s largest
WAN

281
Q

WAP

A

WAP: Wireless Access Point: A hardware device that allows
wireless connections to a LAN. See also: Interference

282
Q

Website

A

Website: A collection of World Wide Web pages hosted on a
server, accessible through the internet. Websites are
accessed by typing URLs into a web browser which begin with
the application layer protocol http(s)

283
Q

White-hat Hacker

A

White-hat Hacker: A hacker who is employed by companies to
perform penetration testing on their networks, to seek out
vulnerabilities and report back any ways to improve security White hat hackers are often black hat hackers who turned away
from the dark side.

284
Q

WiFi

A

WiFi: Wireless Fidelity: wireless communication across a
network. Usually the last stage of data transmission. Small
bandwidth and often prone to interference. WAPs transmit and
receive WiFi data packets on radio frequency channels.

285
Q

Wildcard

A

Wildcard When using an SQL Command, to select all the fields
about an entry use an asterisk *
e.g. SELECT * FROM carTable WHERE price < 5000

286
Q

Wireless

A

Wireless: A way of connecting to a LAN without cables. Allows
devices to be mobile, but susceptible to interference.

287
Q

Worm

A

Worm: a piece of malware larger than a virus- it is a self-
contained program that can replicate itself, spread across a
network and infect other computers that do not have anti-
malware installed. Often slows computers down as it uses up
resources for malicious purposes. See also: Zombie computers

288
Q

Zombie Computer:

A

Zombie Computer: A device infected with malware, often set up
to perform tasks for the hacker such as brute force attacks
or DDoS attacks.