IT Revision Flashcards

1
Q

ASCII

A

American Standard Code for Information Interchange

the type of code that tells your keys which characters you are typing, offering 128 characters, with one bit per character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ADC

A

Analogue to Data Converter

creates digital sound signal in microphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analogue Input

A

converts a voltage level into a digital value that can be stored and processed in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Analogue Output

A

a continuous output from PLC to field devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

And

A

a conjunction

only when both statements are true can the end result be true

straight line one, likes 0s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ALU

A

Arithmetic Logic Unit

performs all the mathematical calculations and logical operations in the CPU. Makes logical decisions and returns the answers to a temporary stage register known as the accumulator. A number needs to be inputted to be processed and a code from the controller which gives the operation to be performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Arithmetic Shift Functions

A

multiplications of bit patterns, which involves moving the bits in a specified direction, either left or right, a number of places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backing Store

A

Retains data written on it after the computer is switched off

Includes hard disks, flash drives, removable disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS

A

Basic Input Output System

a chip that enables a computer to communicate with other devices (eg keyboard, disk drive, monitor) on start up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Binary Digits

A

Either a 1 or a 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nybble

A

4 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Byte

A

8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kilobyte (Kb)

A

1024 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Megabyte (MB)

A

1024 KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gigabyte (GB)

A

1024 MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Terabyte (TB)

A

1024 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Petabyte (PB)

A

1024 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exabyte (EB)

A

1024 PB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zettabyte (ZB)

A

1024 EB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Yotabyte (YB)

A

1024 ZB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Boolean

A

statements that can be true or false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Absorptive Law

A

allows complicated expressions to be simplified by absorbing terms

A+(A.B)=A, A(A+B)=A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Annulment Law

A

states that and always equals 1, and or always equals 0

A.0=0 A+1=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Associate Law

A

states that statements can be rearranged

A+(B+C)=(A+B)+C=A+B+C, A(B.C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Commutative Law

A

states the order of conjuctions/disjunctions does not matter

A.B=B.A A+B=B+A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Complement Law

A

states that a term anded with its complement equals 0 and a term ored with its complement equals 1

A.NotA=1 A+NotA=0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Distributive Law

A

states that the order of brackets matter, however the contents of the brackets’ order doesn’t matter

A(B+C)=A.B+A.C A+(B.C)=(A+B).(A+C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Double Complement Laws

A

states that the double complement of a variable is always equal to the variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Impotent Law

A

states that an input that is anded or ored with itself equals itself

A+A=A A.A=A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Identity Law

A

states that if a term is ored with a 0 it will always be a 0/ if a term is anded with a 1 it will always be a 1

0.1 = 1 0+1=0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Bridge

A

A computer networking device that creates a single aggregate network from multiple communication networks or network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Brouter

A

Does the work of a bridge and a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Bus

A

something that connects the processor to another part of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Address Bus

A

where the address of the data is communicated to the main memory. The width defines the amount of physical memory that can be addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Control Bus

A

used to tell the memory or the device the operation that is to be formed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data Bus

A

a series of processors that connects the processor the main memory (RAM) or cache memory. Can be used to read from or write to the memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Capacity

A

the quantity of data that a storage medium can hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Central Processing Unit (CPU)

A

main processor that executes instructions in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Clock Speed

A

the speed at which a processor operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Overclocking

A

when the process is set to run faster than the original design and overheats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Underclocking

A

when the process is set to run slower than the original design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Cores

A

a term used to describe the processing components within the CPU. Multi-core processors therefore have many processing components within the same CPU. These can be dual-core or quad-core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Dual-Core Processor

A

in theory, a processor that processes twice as fast as single-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Quad-Core Processor

A

in theory, a processor that processes four times as fast as a single-core processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Cache (Memory Type)

A

a fast access type of memory that is very expensive and is able to provide instructions and data to the CPU faster than memory systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

L1 Cache

A

Smallest and fastest cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

L2 Cache

A

Larger and slower than the L1 cache, instructions are searched for in here if not in L1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

L3 Cache

A

Largest and slowest cache, instructions are searched for in here if not in L1 or L2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Cache (Disk Type)

A

a hard disk that is not part of the normal array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Character

A

single character, eg H

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Colour Depth

A

the amount of red, green and blue in each pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Computer Port

A

hardware that interfaces between the computer and other computers in peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Audio Port

A

connector to plug ANALOGUE audio signals into a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Digital Visual Interface

A

to connect a video source to a computer monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Ethernet

A

mainly used for network and internet connectivity, carries broadband signals between different wired internet-capable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

HDMI

A

High-Definition Multimedia Interface

used to transfer audio/visual data to compatible monitors/IDTV/video projectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IEEE1934 Interface/Firewire

A

used for high-speed data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

PS/2 Connector

A

a six-pin connector used to connect mice and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Universal Serial Bus (USB)

A

allows high-speed connectivity with peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Computer System

A

operates with hardware and software to create a functional solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Controller

A

fetches instructions, translates and decodes them and then manages the execution of these instructions. Controls fetch-execute cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Control Unit

A

directs the flow of instructions and/or data or coordinates to other parts of the CPU, also generates clock ticks or controls the clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Data

A

a set of raw facts and figures that have no apparent reasoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Data Capture

A

the name given to the input of data into the system in a suitable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Digital Input

A

detects if a voltage is above/below a specific threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Data Output

A

allows you to control a voltage with a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

DNS

A

Domain Name System

a distributed database that matches IP addresses to computer system resources, for example, to give a domain name Google instead of 173.194.34.191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Durability

A

how susceptible something is to damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Dynamic Host Configuration Protocol Server

A

a server that allocates IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Embedded System

A

a combination of software and hardware that performs a specific task rather than a general-purpose computer that is designed to carry out multiple tasks. Often control real time events so must be completely reliable. They are embedded in firmware and stored in read-only memory. Most react to conditions such as temperature, weight, vibration and air quality, detecting external conditions and reacting to them by recording data, turning motors on or off, sounding an alarm or sending a message to the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Encryption

A

means that data can only be read by someone has the same decryption software on the other end (e.g. like on WhatsApp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Fetch-Execute Cycle

A

Fetch-Execute Cycle – made up of three steps for processing instructions by a currently running program:
1. The fetch cycle takes the address required from the memory, stores it in the instruction register, and moves the program counter on one so that it points at the next instruction.
2. The control unit checks the instruction in the instruction register. The instruction is decoded to determine the action that needs to be carried out.
3. That actual actions that happen during the execution cycle depend on the instruction itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Fibre Optic Cable

A

cables with many optical fibres inside plastic casing which transfer data in the form of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

a single keystroke

A

1B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

a number from 1 to 255

A

1B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

one line of text

A

70B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

a short e-mail

A

1KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

a third of a page of text

A

1KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

a small picture

A

8KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

a basic webpage

A

30KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

maximum size for all elements of a webpage

A

100KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

a five page word document

A

500KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

a PDF for downloading

A

500KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

a minute of audio when stored as an MP3

A

1MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

a DVD film

A

5MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

an HD file

A

10MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

a Blu-Ray film

A

25MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

maximum amount of data on one CD-ROM

A

700MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Full-Duplex

A

allows more than one person to transmit data at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Half Duplex

A

only allows one person to transmit data at once (e.g. on walkie-talkies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Gateway

A

a piece of networking hardware used in telecommunication networks that allows data to flow from one discreet network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Graphics

A

visual images produced by computer processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Bitmap Image

A

a type of raster image that is composed of many tiny parts, called pixels, which are often many different colours. It is possible to edit each individual pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Raster Graphics

A

dot matrix data structures representing a grid of pixel which cannot scale up without loss of apparent quality. They tend to need a lot of storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Vector Graphics

A

allows the graphic to resize without losing quality, unlike the other two. This is because they use geometrically primitive objects such as points, lines, curves, shapes or polygons which are based on mathematical expression to represent images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

GPU

A

Graphics Processing Unit

a microprocessor that performs the calculations needed to produce graphic images on screen. Initially the CPU performed these calculations, but as more complex applications were developed, such as 3D graphics and video quality animations, the GPU was introduced to offload those tasks from the CPU. GPUs can be integrated within the circuitry of the motherboard or provided on a dedicated graphics card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Integrated GPU

A

uses the computer’s RAM. Is cheaper than installing a dedicated GPU, it generates less heat and uses less power. They are perfect for general graphics processing such as watching or editing videos and word processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Dedicated GPU

A

has its own video memory, used by people such as professional graphic designers and serious gamers, but use more sound and require a good cooling system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Sound Card

A

may be on the motherboard or designed to fit a PCI slot. Enable the computer to output sound through speakers, to record sound from a microphone and to manipulate sound stored or a disk. Sound cards convert analogue input signals into digital data and reverse this process for audio output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Mono Card

A

a sound card that only allows one channel for multiple speakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Stereo Card

A

a sound card that allows multiple channels for multiple speakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Hardware

A

physical parts of a computer system, needed to gain a usable output from the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Hub

A

node that broadcasts data to every computer or ethernet-based device on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

HMI

A

Human Machine Interface

the user interface that connects an operator to a controller for an industrial system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Implicaton

A

the relationship between two statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Information

A

data which has been processed and is given a meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Input Device

A

where data is inputted into the system e.g. keyboard, mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Integer

A

whole number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

IP Address

A

Internet Protocol Address

an address allocated to a computer system on a network, used to uniquely identify systems on a network, allowing communication between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Lossless Data

A

a way of compressing data without removing parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Lossy Data

A

a way of compressing data by removing parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

MAC Address

A

Media Access Control Address

a 12-digit hexadecimal number that is most often displayed with a colon or hyphen separating every two digits to make it easier to read. It is a unique identifier for network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Memory

A

the part of a computer where data or program instructions can be stored for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Cache Memory

A

a small memory store used directly by the CPU, holds copies of the most frequently used instructions and data, reduces access time and speeds up processing; is volatile; data can be changed; is very fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Flash Memory

A

is solid state (adapted from EPROM), composed of a series of logic gates that hold data in a non-binary format, now often used to replace ROM chips, involved in read/write only devices. Is permanent. Can be very slow. Data can be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

RAM

A

Random Access Memory

Allow multi-tasking so it is possible to have multiple programs running at once, holds data for programs currently being executed, editable, volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

ROM

A

Read-Only Memory

Memory that is uneditable, non-volatile and controls functions such as what the computer does on start up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Virtual Memory

A

incorporates paging and swapping and is a memory management technique that gives the illusion of a very large main memory by moving data out to slower media e.g. a disk when it is not being used. Is used when RAM is full, uses the hard drive to temporarily store RAM content, causes system to slow down and stores programs and data not currently in use and retrieves them when required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Metadata

A

data about data e.g. height and width of images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Microprocessor

A

an integrated circuit that contains all the functions of the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Most Significant Bit

A

the bit that decides whether a number is positive or negative, where 0 is positive and 1 is negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Motherboard

A

main circuit board of the computer. The CPU and ROM will be mounted on the mother board, which also provides RAM expansion slots, USB ports, PCI slots for expansion cards and controllers for devices such as the hard drive, DVD drive keyboard and mouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Negation

A

a unary argument i.e. it is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Network Interface Card

A

provides a computer with a connection to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Network Protocols

A

allows computers on networks to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Wi-Fi

A

wireless

two common standards are Bluetooth and 801.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

TCP

A

Transmission Control Protocol

popular communication protocol that is used for communicating over a network and divides any messages into a series of packets that are sent from source to destination where it gets reassembled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

IP

A

Internet Protocol

an addressing protocol and is often combined with TCP to use a series of packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

HTTP

A

Hyper Text Transfer Protocol

allows webpages to be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

HTTPS

A

Hyper Text Transfer Protocol Secure

allows webpages to be shared securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

POP3

A

Post Office Protocol 3

most commonly used for receiving e-mails over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

SMTP

A

Simple Mail Transfer Protocol

allows transmission of e-mails on a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

IMAP

A

Internet Message Access Protocol

transfers messages between computer systems via the internet, generally used for retrieval and storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Octet

A

a group of two digits in a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

OSI Model

A

Open Systems Interconnection Model

model that characterises and standardises the communication functions of a telecommunication or computing system regardless of its internal structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Applications Layer

A

tells the computer how data is going to be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Presentation Layer

A

tells the computer how to change data to a form that can be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Session Layer

A

tells the computer how the data is exchanged (e.g. half or full duplex)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Transport Layer

A

tells the computer how the data is going to transported, broken up and put back together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Network Layer

A

tells the computer how things are sent across e.g. traffic control, uses internet protocol, keeps addresses of different computers to each computer, decides routes which data takes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Data Link Layer

A

tells the computer how data will be carried e.g. how quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Physical Layer

A

the raw bit that streams over a physical medium (e.g. Bluetooth, Ethernet, USB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Operator

A

the part of computer instruction which specifies how the data is to be manipulated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Operand

A

the part of computer instruction which specifies what data is to be manipulated or operated on, whilst at the same time representing the data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Output Device

A

where information is presented in a logical form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Overflow

A

the result of an addition or shift process if the number it results in is too large to fit in the space avaliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Underflow

A

the result of a subtraction or shift function where the number it results in is too small for the space avaliable

148
Q

Packet

A

a collection of data that is transmitted over a packet-switched network. These are provided to a network for delivery to a specified location. Each packet of data is redirected by a computer system along the network until it arrives at its destination. Data may be split into several packets. When all packets have arrived, the data is a reassembled.

149
Q

Packet Switching

A

the process of delivering packets from one computer system to another

150
Q

Peripherals

A

devices not mounted on the motherboard, such as input and output devices

151
Q

Pixels

A

Picture Elements

small coloured dots that make up graphics

152
Q

Portability

A

the ease with which a secondary storage medium can be connected from one device to another

153
Q

Power Supply

A

used to convert Mains Alternating Current to low-voltage Direct Current for the various components of the system

154
Q

Process

A

where data that is inputted is converted into a suitable format

155
Q

Protocol

A

the agreed-upon format which allows two devices to communicate

156
Q

Handshaking

A

where two devices establish their readiness to communicate, normally part of a protocol

157
Q

Protocol Stacks

A

a set of network protocol layers that work together

158
Q

Real Number

A

a number with or without a fraction

159
Q

Register

A

a storage location found in the CPU where data or control information is stored temporarily. Usually much faster to access than internal memory

160
Q

Accumulator

A

temporary state register that has data from the ALU sent to it

161
Q

CIR

A

Current Instruction Register

the part of a CPU’s control unit that holds the information currently being executed

162
Q

Internal Memory

A

the memory that is available within the CPU

163
Q

Internal Register

A

one type of internal memory, used by the processor in conjunction with fetching information from the RAM

164
Q

User Accessible Register

A

these are used within programmable instructions

165
Q

MAR

A

Memory Address Register

the CPU register that stores the memory address from which the data will be fetched to the CPU

166
Q

MDR

A

Mobile Data Register

used for holding information (either program words or data words) that is in the process of being transferred from the memory to the central processor, or vice versa

167
Q

PC

A

Program Counter

a processor register that indicates where a computer is in its program sequence

168
Q

Reliability

A

how likely something is to fail through continuous use

169
Q

Router

A

a networking device that forwards packets between computer networks and performs the traffic direction functions on the internet

170
Q

Routing

A

the name given to the method of selecting paths along which packets are sent on a computer network

171
Q

Static Routing

A

where the data travels to its destination along a pre-set path. This is straightforward to implement, but may take longer

172
Q

Dynamic Routing

A

where data travels to its destination where data packets can take different routes. This is complicated to implement but quicker than static routing

173
Q

Sampling Rate

A

the number of samples taken per second from the analogue input to create a digital signal. The higher the sample rate the larger the file size

174
Q

Sampling Resolution

A

the number of bits used to store each sample. The larger the number of bits used, the larger the file size

175
Q

Searching algorithms

A

used by computers to search for a value in a given list

176
Q

Binary Search

A

a more efficient way of soring that only works on sorted lists which starts by finding the middle item and comparing it to the value it is searching for; if the middle value is smaller than the value it is searching for then the first half of the list is removed, including the middle value. If the new middle value is larger than the value it is searching for then the top half of the list is removed, including the middle value. This process is repeated until the value is found.

177
Q

Linear Search

A

goes through each item in an algorithm one by one until it finds the one it is looking for, then it stops the search after potentially going through every item in the list

178
Q

Secondary Storage

A

non-volatile, long-term storage

179
Q

Optical Devices

A

uses technology such as lasers

180
Q

Blu-Ray Disk

A

laser beams are projected onto the disk and if they are reflected back the data is recorded as a 1, if not, a 0. Blu-ray has more storage than CD or DVD.

181
Q

CD

A

Compact Disk

laser beams are projected onto the disk and if they are reflected back the data is recorded as a 1, if not, a 0. CDs have less storage than DVDs or Blu-ray disks.

182
Q

DVD

A

Digital Versatile Disk

laser beams are projected onto the disk and if they are reflected back, the data is recorded as a 1, if not, a 0. DVDs have more storage than CDs, but less than Blu-ray disks.

183
Q

Magnetic Devices

A

uses technology stored in magnetic mediums (e.g. external hard drive, magnetic hard drive, magnetic tape)

184
Q

Solid State Devices

A

Called solid state as it does not have any moving parts, unlike the other two. This is increasingly being used to replace but optical and magnetic devices, especially in mobile phones, where its low power consumption and speed is advantageous (e.g. flash memory, solid state drives)

185
Q

Solid State Drives

A

an electronic storage unit built on solid state architecture

186
Q

Storage in the Cloud

A

a contemporary storage facility that allows users to store their data on third-party servers. They can then access that data from many computing devices.

187
Q

Speed

A

the access time to transfer data onto the secondary storage medium

188
Q

Software

A

actual programs that make the computer run

189
Q

Sorting Algorithms

A

something a computer uses to set unordered lists and values

190
Q

Bubble Sort

A

works by working through a list, comparing pairs and values and swapping them if they are in the wrong order. Is simple to implement but is very inefficient.

191
Q

Merge Sort

A

works by splitting the lists into individual values and gradually merging them to form bigger lists until they are all in one sorted list. Is one of the most efficient when used with both big and small lists.

192
Q

Standards

A

manufactured following sets of rules, agreed amounts of data loss

193
Q

String

A

more than one character

194
Q

Switch

A

similar to a hub, but is able to tell which devices to broadcast traffic to

195
Q

Truth Table

A

a diagram that shows all possible logical inputs and their associated outputs

196
Q

Unicode

A

a sixteen-bit character set with 65536 characters available, allowing it enough characters for any writing system. This is the standard character set and is used by all major web browsers and applications. It uses more storage than ASCII, with two bits per character.

197
Q

Wireless Access Point

A

an access point is a device that creates a wireless local area network. These are normally wireless.

198
Q

Topology

A

a way in which network devices are arranged

199
Q

Star Topology

A

where computers are connected separately to one hub or switch in the middle

200
Q

Bus Topology

A

where computers are connected in a line, also known as daisy chain

201
Q

Ring Topology

A

where computers are connected in a ring

202
Q

Hybrid Topology

A

where each computer has more than one route for data to take, most common form of topology

203
Q

Xor

A

For when conditions are exclusive

204
Q

RISC Processor

A

Reduced Instruction Set Computer

Processes a limited range of simple instructions and needs to break down complex commands into simpler ones to carry them out, but runs cooler, uses less power and are cheaper.

205
Q

8-bit Colour Depth

A

256 colours

206
Q

Assignment

A

The process of setting the value stored in a variable

207
Q

Decomposition

A

breaking a problem down into a number of sub-problems

208
Q

Selection

A

where a value is assigned a variable, normally in If, Then, Else statements

209
Q

Data Type

A

defines the range of values a variable may take

210
Q

Concatenating

A

joining variables together

211
Q

Define subroutine

A

Declare CapitalLetterOfName
End Subroutine

212
Q

Call a routine

A

call SubroutineNeeded

213
Q

Declare and use arrays

A

myarray[99]

214
Q

Literal outputs

A

output “Please enter a number”

215
Q

Variable names

A

myvariable

216
Q

Define variable data type

A

myvariable is integer

217
Q

Data types

A

integer, character, string, boolean

218
Q

Assignment

A

set counter = 0

219
Q

Selection

A

if … else … end if

220
Q

Comments in Java

A

/** Comments for Java */

221
Q

Repetition

A

for i … next i
repeat … until
do … loop
do … while
while … repeat

222
Q

Flowchart

A

a way of designing an algorithm that uses different shapes to represent different types of instruction

223
Q

Pseudocode

A

a way of designing an algorithm in programming-type statements that are not specific to any programming language

224
Q

Oval (in flowchart)

A

start/stop

used to show where the beginning and end of our flowchart is

225
Q

Parallelogram (in flowchart)

A

input/output

used to demonstrate where a flowchart will take in an input, or provide an output

226
Q

Rectangle (in flowchart)

A

Process

used to show any processes or calculations that are happening in our flowchart

227
Q

Diamond (in flowchart)

A

Decision

used to demonstrate a decision or choice that needs to be taken in our flowchart, which will have a ‘yes’ and a ‘no’ path from the decision symbol

228
Q

Arrow (in flowchart)

A

Arrow

used to show the flow of data through our flowchart

229
Q

Circle

A

Connector

used to connect parts of the same flowchart that are drawn in different places, such as on different pages

230
Q

Condition

A

a feature in an algorithm that can be met or not met, causing a different action to be taken

231
Q

Loop

A

a sequence of instructions that is continually repeated a set number of times or until a condition is met

232
Q

Sequence

A

the order in which a set of instructions is carried out in an algorithm

233
Q

Selection

A

a way of creating multiple paths and decisions in an algorithm

234
Q

Variable

A

a named storage location that contains a value that can change during the execution of a program

235
Q

CamelCase

A

wayOfwritingVariables

236
Q

Repetition

A

a way of repeating a set of instructions in an algorithm

237
Q

Count Variable

A

a variable containing an integer that counts how many times a loop has run

238
Q

Self-Documenting Identifier

A

any name that you give to a subroutine or a variable that makes it clear what that subroutine or variable is for

239
Q

Annotation

A

comments written in plain English that are ignored by the compiler and are there to help a programmer and other people who read the code understand it

240
Q

Object

A

a representation of a real-world thing

e.g a library program may contain millions ‘book’ objects

241
Q

Classes

A

a template for an object, specifying attributes and methods that belong to each object

e.g the library program would only contain one book class, using which many book objects would be created

242
Q

Methods

A

subroutines that belong to a particular class, that can be run on any object created from that class

e.g. the book class, for example, might have a method called ‘borrow’

243
Q

Attributes

A

variables that belong to a particular class

e.g. attributes in a book class would include author, title, number of pages, date of publication

244
Q

Subroutine

A

a named set of instructions that can be called to run from elsewhere in the program, such as procedures and functions

245
Q

Local Variable

A

a variable that is declared within a function or procedure and can therefore only be used within that function or procedure

246
Q

Global Variable

A

a variable that is visible throughout the whole of the program

247
Q

Normal Data

A

typical data that a computer program would be expected to accept

248
Q

Erroneous Data

A

deliberately invalid data entered to check that the program does not crash, and that error messages display correctly

249
Q

Boundary Data

A

test data that is on the very edge of a range of valid data

250
Q

Validation

A

process to check whether something is correct or not

251
Q

Verification

A

process to check whether user entries are correct

252
Q

Data Handling

A

collecting and presenting data

253
Q

Data Processing

A

the collection and manipulation of data to produce meaningful information

254
Q

Authentication

A

verifying that something is correct

255
Q

Range Checks

A

checks that data is between two endpoints, a minimum and a maximum value

256
Q

Presence Checks

A

checks that something has been entered

257
Q

Lookup Table

A

reduces error, used in situations such as to select a title from a menu

258
Q

Check Digit

A

checks if an error has occurred by doing some sort of mathematical function, normally with one or two digits

259
Q

Length Check

A

restricts how many characters can be entered into a text box

260
Q

Format Check

A

checks the format of something, e.g. that a postcode or vehicle registration number is inputted correctly

261
Q

Double Entry

A

used in situations where the same piece of data needs to be entered twice, identically, eg when changing a password

262
Q

Mutable

A

Data that can be changed

263
Q

Assembler

A

a computer program that will take the mnemonics used in assembly language and covert them into machine code so they can be processed by the computer. This is done by converting one word assembly instructions into opcode, and allocating memory to variables, often resulting in an operand

264
Q

Compiler

A

takes code written in high-level language and translates it into machine code all at once, before any execution takes place

265
Q

Interpreter

A

takes code written in high-level language and translates it into machine code one line at a time

266
Q

Translator

A

tool that translates source code into object code. There are three types: assemblers, compilers and interpreters

267
Q

Opcode

A

an instruction like and or not

268
Q

Source Code

A

code which you type

269
Q

Object Code

A

code which is executed

270
Q

Lexical Analysis

A

takes the sequence of characters you wrote and translates it into a series of tokens, removing any white space, allowing the computer to see the collection of typed words

271
Q

Symbol Table Construction

A

created to store variable names and subroutines, checking that variables have been declared properly

272
Q

Syntax Analysis

A

checks to ensure the code conforms to the rules of that particular language, eg for missing semi-colons

273
Q

Semantic Analysis

A

checks to ensure the program makes sense, eg checking that variables have been given suitable types and have been declared before use

274
Q

Code Generation

A

the tokens are translated into object code

275
Q

Guido van Rossum

A

the man who invented Python in 1991, naming it after Monty Python’s Flying Circus

276
Q

IDE

A

Integrated Development Environment

a piece of software designed to help programmers write, test and edit their code, including compiling tools that format and translate the language the code into a language the computer can understand

277
Q

IDLE

A

Integrated Development and Learning Environment

simple IDEs designed for people who are learning to code, with a shell window and an editing window

278
Q

Shell Window

A

part of an IDLE that shows the output of the program

279
Q

Editor Window

A

part of an IDE and IDLE used for typing in, editing and saving your code

280
Q

Auto-indentation

A

where the editor automatically indents lines that need to be indented, such as those ending in colons

281
Q

Syntax Errors

A

An error that occurs when a command does not follow the expected syntax of the language, e.g., when something is spelled incorrectly

282
Q

Logic Errors

A

An error that causes a program to output an incorrect answer (does not necessarily crash the program)

283
Q

Upper Camel Case

A

UpperCamelCase

284
Q

Lower Camel Case

A

lowerCamelCase

285
Q

Snake Case

A

Snake_Case

286
Q

Runtime/Execution Error

A

An error that only occurs when the program is running and is difficult to foresee before a program is compiled and run, such as when a program requests more memory when none is available, so the program crashes

287
Q

Linking Errors

A

An error that occurs when a programmer calls a function within a program and the correct library has not been linked to that program, such as when the square root of a function is used and the library that calculates the square root has not been given to the program

288
Q

Rounding Error

A

Rounding is when a number is approximated to nearest whole number/tenth/hundredth etc, such as if 3.45 rounded to the nearest whole number is 35, an error of +0.5

289
Q

Truncation Error

A

Truncating is when a number is approximated to a whole number/tenth/hundredth etc, nearer zero, such as if 34.9 truncated to whole number is 34, an error of -0.9

290
Q

Str

A

shortened version of string

291
Q

Bool

A

shortened version of boolean

292
Q

Casting

A

converting to a particular data type

293
Q

Exponentiation

A

raising to a power in python

294
Q

DIV

A

integer division or quotient, which returns the whole number part after the division

295
Q

MOD

A

returns only the remainder after division

296
Q

Rational Operators

A

needed to compare two values or expressions, eg, comparing answers from two different users

297
Q

Index

A

automatically assigns a numerical value to each character’s position in a string

298
Q

==

A

exactly equal to

299
Q

!=

A

not equal to

300
Q

<

A

less than

301
Q

>

A

greater than

302
Q

<=

A

less than or equal to

303
Q

> =

A

greater than or equal to

304
Q

String handling

A

using tools to process strings

305
Q

String handling

A

using tools to process strings

306
Q

Selection Block

A

part of programming giving all the options and outputs that should be given for each one

307
Q

Indent

A

gap at the start of a line of code

308
Q

Nesting

A

occurs when one programming construct is used within another, allowing simpler codes

309
Q

Iteration

A

the process of repeating an instruction

310
Q

For Loops

A

repeats instructions a certain number of times

311
Q

Inner Loop

A

loop inside another loop

312
Q

Outer Loop

A

loop containing other loops

313
Q

Indefinite Loop

A

also known as a condition-controlled loop, a loop that continues until a specific condition is met or broken

314
Q

Break

A

a command within a loop that gets the loop to stop

315
Q

Alphanumeric Characters

A

letters and numbers

316
Q

Brute Force Attack

A

where hackers have multiple guesses in quick succession at your password until they eventually guess it correctly

317
Q

Cyphertext

A

text that has been encrypted and cannot be decrypted without a decryption key

318
Q

Digital Footprint

A

the record that is kept of everything you have done online

319
Q

Nonalphanumeric Data

A

characters such as punctuation marks

320
Q

Password

A

used to prove a person’s identity to a computer system, thus allowing them access to relevant data. These should be easy for the user to remember, but hard for other people to guess, can be guessed using formula:

Attempts = Number of charactersPassword length

321
Q

User Access Levels

A

allowing different users to have access to different data, such as giving some people Read Only access, or allowing some people to access more data than others

322
Q

Compression

A

process that reduces a file’s size for efficient storage and transmission

323
Q

MP3

A

uses lossy compression to reduce the size of an audio file by removing background noise and any sounds that would not be heard by the human ear from the track, meaning it is difficult to tell when listening that anything has changed

324
Q

Arithmetic Operations

A

used to manipulate numbers

325
Q

Boolean Operations

A

can be used to join conditional statements together to form ‘complex conditions’

326
Q

Complex Conditions

A

created by boolean expressions, such as and, or, not or xor

327
Q

Virus

A

programs that can replicated themselves sand be spread from one system to another by attaching themselves to host files, used to modify or corrupt information on a targeted computer system

328
Q

Worms

A

self-replicating programs that identify vulnerabilities in operating systems and enable remote control of the infected computer

329
Q

Spyware

A

installed by opening attachments or downloading infected software, used to collect stored data without the user’s knowledge

330
Q

Trojan Horse

A

a program that appears to perform a useful function, but also provides a ‘backdoor’ that allows data to be stolen

331
Q

Cyberattacks

A

attacks on computers or networks that use various types of malware

332
Q

Malware

A

malicious software, a broad term used describe software used to disrupt computer operation

333
Q

Backdoor

A

built into a computer program that allows someone to bypass any security to get into it

334
Q

Key Loggers

A

a type of software that can be used ot track keystrokes and capture passwords, accout numbers, fraudulent use or people’s online activity

335
Q

Adware

A

not dangerous in its own right, but may contain links to other malware, such as viruses and key loggers

336
Q

Phishing

A

fruad where an internet user is tricked, often by e-mail, into revealing personal or confidential information, eg bank details which can be used fraudulently

337
Q

Social Engineering

A

psychological manipulation of people into revealing personal of confidential information, eg bank details which can be used fraudulently

338
Q

Spear Phishing

A

a type of phishing with a specific target, where the person doing it has gathered information about their target to effectively fool them

339
Q

Blagging

A

the act of convincing someone that you are someone else to make them directly give away information such as passwords

340
Q

The Scheme

A

the first part of the URL, either HTTP or HTTPS

341
Q

Subdomain

A

the second part of the URL, after the HTTP or HTTPS

342
Q

Second Level Domain

A

the third part of the URL, before the .com

343
Q

Top Level Domain

A

the fourth part of the URL, such as .com, .co.uk, .net, .gov

344
Q

Sub Directory

A

the fifth part of the URL after the .com

345
Q

Human Error

A

the biggest threat to any kind of cyber security

346
Q

Shouldering

A

an attack designed to steal a victim’s password or other sensitive data, involving the attacker watching the user input information, for example, over their shoulder, and is often done at PIN machines

347
Q

Name Generator Attack

A

attacks in which the victim is asked on an app or social media to put in personal details about themselves, often to produce a name, allowing attackers to find out key pieces of information about you to help them answer security questions that protect people’s accounts

348
Q

Smishing

A

a form of phishing that is done through SMS

349
Q

Acceptable Use Policy

A

a document that stipulates what users of a network may or may not do with that network

350
Q

Anti-Malware

A

software that detects and removes harmful software, such as viruses, from a computer

351
Q

Disaster Recovery Policy

A

a document that describes how a company would aim to recover from catastrophic damage to hardware, software or data

352
Q

Fraud

A

the crime in which you purposefully deceive someone for monetary gain

353
Q

Penetration Testing

A

where a company’s system is attacked and the results are reported back to the company

354
Q

Cookie

A

a text file stored on your computer that contains details about a website that you have visited

355
Q

Parity Checking

A

the most straightforward method of detecting errors, using a parity bit

356
Q

Signature

A

all viruses have a unique signature that anti-virus software scans for

357
Q

Anti-Virus

A

a program that can be loaded into memory when the computer is running that monitors activity on a computer system for the signs of virus infection that scans for a virus’s signature

358
Q

Firewall

A

a security system that controls incoming and outgoing network traffic, that analyses packets of data to determine whether they should be allowed through or not, its function is to monitor where data has come from and where it is going and to determine if this communication is allowed by checking a list of pre-determined rules, not to stop viruses

359
Q

SQL Injection

A

a technique where malicious user can inject SQL commands into SQL statement, via web page input, which can alter SQL statements and compromise the security of information held in a database

360
Q

SQL

A

Structured Query Language

a set of commands that allow you to get information

361
Q

DoS Attack

A

Denial of Service Attack, attempt to make your website and servers unavailable to legitimate users by swamping a system with fake requests, usually in an attempt to exhaust server resources, not to break system security, involving a single internet connection

362
Q

Two’s Complement

A

an operation done on binary numbers, to turn them into the inverse i.e. turning a positive sign to negative

363
Q

Radix Complement

A

methods of manipulating binary numbers, e.g. two’s complement

364
Q

Hashing

A

performing an algorithm on a password which allows entered passwords to be checked, without allowing the actual password to be viewed

365
Q

Archive

A

long-term storage of files no longer in use

366
Q

FTP

A

File Transfer Protocol

used for uploading files