Key Definitions Flashcards

1
Q

Flat File

A

A set of single tables with no links between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Relational)

database

A

A set of related tables with links between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Primary key

A

A field or combination of fields that uniquely identify a record in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Foreign key

A

A field that appears in a table that is the primary key of another table and is used to form a link between
the two tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Indexes

database

A

Indexes are separate data structures that are set up to improve access time to records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First normal form

A

This is a database where tables contain no repeating attributes or repeating groups of attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Second normal

form

A

This is a database where tables contain no repeating

attributes or repeating groups of attributes and no partial dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Third normal form

A

This is a database where tables contain no repeating

attributes or repeating groups of attributes, no partial dependencies and no transitive dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Redundant Data

A

Data that is stored repeatedly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inconsistent Data

A

Multiple copies of data which are supposed to be the same but are in fact different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Algorithm

A

A finite set of instructions designed to solve a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Procedure

A

A set of program instructions which perform a specific

task and can be called by another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Parameter

A

A variable that can be passed to or from a procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passing by

reference

A

The address of the variable is passed to the

procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Passing by Value

A

A local copy of the variable is created for the procedure and discarded afterwards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Recursive

Algorithm

A

An algorithm that calls itself and has a base case to allow it to terminate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Database
Management
System

A

A piece of software which controls access to the data in a database, acting as an interface between the data and the application programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data inconsistency

A

When two copies of the same data items (redundant

data) are supposed to be the same but aren’t e.g. if one has been updated and the other hasn’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Redundancy

A

When the same data is stored more than once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Program-data

dependence

A

When the structure of the data within a program is defined as part of the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Program-data

independence

A

When data is separate from the programs that use that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Dictionary

A

Holds data about the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Database

administrator

A

A database administrator is the person in a company who is responsible for the structure, security and management of the database system and the data in it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Record Locking

A

A process to prevent access by others to a record while it is being updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data Warehouse

A

A large collection of data collected together from a variety of locations for efficient analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data Mining

A

The analysis of a large amount of data in a data
warehouse to provide new information such as
analysing trends to find previously undiscovered
relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Distributed

systems

A

Data is be stored on different computers to maximise efficiency and the processing is shared by the different computers to allow processing to be carried out quickly and more complex processing to be possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data Structure

A

A group of related data items which can be managed as a single set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Queue

A

A first-in first-out data structure where items are added at the end and removed from the front.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Stack

A

A last-in first-out data structure where items are added and removed from the same end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Linked List

A

A set of data elements, where each element contains
 the data itself
 a pointer to the next element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Array

A

A set of data items of the same data type grouped

together using a single identifier. Each element can be accessed by the name and the subscript.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Record

A

A complete collection of data items relating to a single person or thing of interest which is treated as a single unit for processing. It is suitable for data when there
are different data types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Text-based

interface

A

Input to the computer is typed usually by via a

command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Graphical User

Interface

A

An interface where most communication is via screen elements such as windows, icons, menus, pointers etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Forms Dialogue

A

Computer prompts for input into specific fields on a screen dialogue form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Speech

recognition

A

Command and/or text input are given by human speech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Sound synthesis

A

The production of sounds resembling human speech by electronic methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Hand-writing

recognition

A

User ‘writes’ on a touch screen using a stylus, the handwriting is analysed, compared with samples already stored in the computer and converted into characters which are then stored in digital editable format on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Dedicated Key

A

This is a keystroke or a combination of keystrokes that can carry out a particular task. An example would be Ctrl-B to make some text bold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Soft key

A

A soft key is a software key which can be assigned a specific function so that when it is pressed it carries out that function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Pointing Device

A

A device that allows the user to control and provide data to the computer using physical gestures - the
movement of the device is echoed by movements of the cursor around the screen, and the user can use
the buttons on the device to move objects around the screen, select menu options, select icons, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Sign and

Magnitude

A

The most significant bit represents the sign (0 for +ve and 1 for –ve). The remaining bits give the magnitude of the number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Hexadecimal

Representation

A

Group the bits into groups of 4 (from the right) and convert each group to hexadecimal representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Twos complement

representation

A

The most significant bit is weighted a usual but represents the negative of that number. If the most significant bit is a 1, the number if negative. It is found by reversing the bits and adding 1 or by writing down all the bits from the right until the first 1, writing that down and then reversing the rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Floating Point

Format

A
The number is stored in two parts
a. The Mantissa (the magnitude)
b. The exponent (the power of 2 that
multiplies the mantissa)
FPF numbers always begin 01 or 10.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Truncation

A

When a number is truncated to a certain number of decimal the least significant digits beyond that number of places are omitted. The number is approximated to the whole number, tenth, hundredth etc nearer zero.
e.g. 26.76 is truncated to 26.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Rounding

A

When a number is round to a certain number of decimal places it is approximated to the nearest whole number, tenth, hundredth etc.
e.g. 26.76 is rounded to 26.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Overflow

A

Occurs when the result of a computation is too large to be represented in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Underflow

A

Occurs when an answer is too close to zero to be represented satisfactorily by the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Logical Shift Left

A

A logical shift left causes the most significant bit to be shifted into the carry bit and a zero moved into the vacant space.
Each left shift multiplies the number by 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Logical Shift Right

A

A logical shift right causes the least significant bit to be shifted into the carry bit and a zero moved into the vacant space.
If the number is negative, the sign is not preserved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Arithmetic Shift

Left

A

An arithmetic shift left causes the most significant bit to be shifted into the carry bit and a zero moved into the vacant space.
The effect of an arithmetic shift left by one space is to multiply the number by 2 (2 places multiplies by 4 etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Arithmetic Shift

Right

A

An arithmetic shift right causes the least significant bit to be shifted into the carry bit. To preserve the numerical value of the number, the vacant space is filled by whatever is in the sign bit. (1 if negative, 0 if
positive).
The effect of an arithmetic shift right by one place is to divide the number by 2. (Ignoring remainders)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Standard

Character sets

A

These allow computers to communicate as the binary strings will be interpreted the same way by different systems. An example is ASCII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

NOT

A

Gives 1 if 0 and 0 if 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

AND

A

Gives 1 if both are 1’s and 0 otherwise

58
Q

OR

A

Gives 1 if one or both are 1s, 0 only if both are 0s

59
Q

XOR

A

Gives 1 if only one of the bits is a 1, if both or neither are 1s then gives 0.

60
Q

Masking

A

Uses AND. Turns off bits when 0 is used and lets them through unchanged if 1 is used

61
Q

Half duplex

A

Where data transmission is two-way, but only one direction at a time

62
Q

Multiplexing

A

Where data from several independent sources are combined to be sent along a single route to a single destination.

63
Q

Parallel data

transmission

A

Where the bits for a character are sent

simultaneously along separate data transmission lines

64
Q

Duplex

A

Two-way data transmission, and data can be both transmitted and received at the same time

65
Q

Serial data

transmission

A

Where the bits for a character are sent one after another along the same data transmission line from source to destination

66
Q

Simplex

A

Where data transmission is one-way only.

67
Q

Switching

A

Switching is a method of data transmission where a message is sent only to its intended recipient rather than being broadcast to all the stations on the network

68
Q

Sequential File

A

A file where records are stored in key field order

69
Q

Index

A

Contains the key field and the record address on disc

70
Q

Indexed

Sequential File

A

A file where records are stored in key field order and an index is used to allow records to be accessed directly.

71
Q

Three-level index

A

There is a main index which contains the location of the next index. This in turn will contain the location of a second index, which contains the location of the last index containing the physical address of the record.

72
Q

Multi-level index

A

In a multi- level index , the above process continues for the appropriate number of levels of index before you reach the last index which contains the physical address of the record

73
Q

Random Access

file

A

Random access files use a hashing algorithm and an overflow area

74
Q

Hashing Algorithm

A

A hashing algorithm takes the key field as an input to an algorithm which calculates the disc address. The address generated is called the home block

75
Q

Overflow area

A

If there is no room in the home block the record is placed in the overflow area and a pointer is left in the home block to indicate that an overflow has occurred.

76
Q

Biometric

A

A biometric is a unique physical characteristic of an individual that can be checked automatically by a computer.

77
Q

Encryption

A

Encryption means converting data from plain text into secret code. Data encryption/decryption involves using an algorithm and key (i.e. numeric code). To
decrypt the data an authorised user needs the key and then applies the same algorithm to reverse the encryption.

78
Q

Generations of

files

A

Every time a master file is updated, the original file is copied together with any changes (held on the transaction file) to a new master file. A generation file backup system involves storage of the most recent
master files with the transaction files so that if the current version of the master file becomes corrupted it can be restored

79
Q

Transaction Log

A

Transactions logs are used in real-time transaction processing systems. They keep a record of all the transactions that have taken place since the backup was made (usually the previous night). If the file becomes corrupted the previous backup is used and
the transactions stored in the transaction log are applied to automatically update the file to the state immediately before failure. That way no transactions are lost

80
Q

Record Locking

A

In any real-time transaction processing system, if a record is accessed for update it is locked so that two users cannot update it at the same time. This prevents errors such as double bookings or the same item of stock being sold twice

81
Q

Archive File

A

An archive file contains data no longer in use but is stored securely for historical purposes. For example for tax purposes, legal reasons or for the auditors

82
Q

Batch system

A

A system where the process continues from

beginning to end without user Interaction

83
Q
Single user (standalone)
system
A

A system where the computer is not connected to others by a network and cannot share other devices

84
Q

Multi-programming

system

A

A system which allows more than one program to be held in memory at the same time and apparently processed simultaneous. This requires the memory to
be partitioned and the different tasks to be scheduled to allow them to run

85
Q

Multi-user (multiaccess)

system

A

A system which allows several users to work on the same computer at the same time

86
Q

Multi-tasking

system

A

This allows several different tasks or applications to be available to a user at the same time.

87
Q

Partitioning

A

The operating system splits the memory into chunks and allocates each process a chunk to reside in. The partitions are usually variable so each process can be
given a suitable amount of RAM. When the process is finished the chunk of memory is released

88
Q

Paging

A

Conveniently manageable fixed-sized blocks of memory. Programs are split into virtual pages and they are pages in and out (swapped between physical memory (in RAM) or virtual memory (on disc – if not being currently used) as required by the operating system

89
Q

Buffering

A

An area in main memory used to temporarily hold the data as it is transferred between the CPU and a slower peripheral to compensate for the difference in operating speeds.

90
Q

Double buffering

A

Double buffering is an advanced form of buffering in which two buffers are used, so that one may be filled while the other is being emptied. This speeds up the process. It is suitable for e.g. a printer queue where
there tends to be lots of data transferred. A single buffer is adequate for a keyboard.

91
Q

Interface

A

The hardware and associated software needed for communication between processors and peripheral devices which compensates for the differences in operating speed, voltages etc.

92
Q

Time-slice

A

A time-slice is a finite maximum amount of processor time that a process is allowed to run for in a multiprogramming
system

93
Q

Ready task

A

A ready task is one waiting for processor time. (not running because another task is currently being run)

94
Q

Running task

A

A running task is one that is currently being executed by the CPU

95
Q

Blocked Task

A

A blocked task is one that is waiting for an event e.g Input or output operation

96
Q

Polling

A

Polling is the when each process is asked whether it requires a time-slice

97
Q

Interrupt

A

An interrupt is a signal generated by a device or software requesting attention

98
Q

Scheduling

A

This is the process of deciding which job is to be processed next (may be prioritised) (done by the scheduler)

99
Q

Link Editor

A

The software tool that allows already compiled object code files or modules to be combined with the completed program and then converted directly into an executable file.

100
Q

Loader

A

Copies compiled object code from backing store into main memory ready to be run

101
Q

Link Loader

A

The software tool which combines already compiled modules/subprograms into the executable program (at run time)

102
Q

Editor

A

A program that allows the input and amendment of programming source code

103
Q

Translation

program

A

A program that translates a program into machine code

104
Q

Compiler

A

Program that translates an entire high-level language source program into machine code all at once to form an independent executable file

105
Q

Interpreter

A

Program that translates a high-level language into machine code one instruction at a time. Each instruction is executed before moving onto the next one

106
Q

Assembler

A

A program that translates assembly language programs into machine code.

107
Q

Debugger

A

Programs that provide a large range of facilities enabling the programmer to investigate conditions when errors occur

108
Q

Program design

language checkers

A

Software that checks for obvious errors in program designs written in PDL (special language used to design programs)

109
Q

Application

generators

A

An application generator is a software tool which is used to assist and speed-up the creation of a system.
It provides a complete environment to support the programmer often as part of an integrated development environment and usually creates code automatically. It may also include an interface generator and debugging tools.

110
Q

CASE Tools

A

Software application that provides a number of functions which can assist with software development

111
Q

Standard Modules

A

Modules perform standard or commonly used tasks which are used by more than one program such as Input validation, sort routines

112
Q

Relocatable Code

A

Code in which the instructions may occupy different memory locations as determined by the operating system every time they are loaded

113
Q

Subprogram

Library

A

A collection of well-tested precompiled routines to perform common tasks that a programmer can use to speed up development time as no need to write them
again and less likely to contain errors.

114
Q

Parallel processing

A

The simultaneous use of several processors to perform a single job. Job split up into tasks which can be performed by any available processor

115
Q

Translation Error

A

These are errors detected during compilation and are usually syntax errors for example not having the correct number of brackets

116
Q

Linking Errors

A

Linking errors happen when the compiled program is linked to a library routine, for example, if the wrong number of parameters has been passed or the routine is not present in the library

117
Q

Execution Errors

A

These are errors detected during the actual running of the program. They can be caused by mistakes in the processing algorithm or the effects of unusual data not being catered for in the program. Examples are overflow errors or division by zero errors.

118
Q

Program Trace

Facilities

A

These are a position within the program where the program is halted as an aid to debugging

119
Q

Program Break

Point

A

This allows the programmer to step through the program one statement at a time and see the path taken through the program.

120
Q

Store Dump

A

This is the output of an area of memory to a file or the screen usually showing the information in binary or hexadecimal numbers. It can be printed or listed to
the screen

121
Q

Variable Watch

A

These display or list the value of the chosen
variable(s) while the program is running. It can be used while the program is being traced to investigate the changing value of key variables so they can be compared to their expected values.

122
Q

Error Diagnostics

A

These are messages provided by the application diagnostic programs which attempt to detect, locate and log errors and additional information needed to solve the problem which can be investigated, acted
on or passed onto technical support services if necessary.

123
Q

Backus Naur Form

A

This unambiguously defines the syntax of a computer programming language.

124
Q

Procedural

language

A

One in which the programmer specifies the steps required to perform the task using programming statements, declarations and control structures. They also allow programming statements can be grouped
together into smaller self-contained units called procedures or subroutines

125
Q

Declarative or Non
Procedural
Languages

A

These are non-procedural languages, i.e. the
programmer states what has to be done but not how to do it. The program is made up of a set of facts and rules, the order of which is not important. E.g. Prolog

126
Q

Object oriented
programming
Languages

A

An approach where both data, and the code for the operations that are applied to the data, are combined into programming structures called objects

127
Q

Object

A

A collection of data fields (properties or attributes), together with the procedures and functions (methods) that operate on those fields

128
Q

Class

A

A set of objects that share a common data structure and common behaviour.

129
Q

Encapsulation

A

The fact that objects are self-contained and therefore they are easy to import into another program.

130
Q

Inheritance

A

We can create sub-classes of a class with subclass (derived class) inheriting all the properties and methods from a parent class (base class). Additional properties and methods can then be added to the subclass. This can really speed up development time

131
Q

Special Purpose

Languages

A

Sometimes languages are developed to solve a particular problem or provide the functionality for a specific situation or need.

132
Q

VLE

A

A virtual learning environment (VLE) is a software system designed to help teachers in the management and use of learning material.

133
Q

Ecommerce

A

Ecommerce is the use of computer technology (particularly the Internet) for commercial operations like sales from businesses to customers or from business to other businesses

134
Q

Web log

A

A web log is a set of entries or diary on the world wide web / internet which is accessible to other web users

135
Q

Instant Messaging

A

IM is an application that allows people to

communicate in real time on the Internet using text based messages

136
Q

Search engine

A

A Search engine is a tool accessed over the Internet, which can be used to search for web sites on a particular topic

137
Q

Internet

A

Internet is a world-wide networked information and communication system freely available via any connected computer/device

138
Q

Extranet

A

If a company allows some access from outside its
intranet, it becomes an extranet. Access would normally be through a firewall to allow only the permitted users to access the data

139
Q

Protocol

A

A set of rules used to ensure the proper transfer of data between devices specifying, for example the data formats and the signals that start, control and end the transfer.

140
Q

Router

A

A device in a network which holds information about the addresses of computers in the network or other
networks and can send data to the correct destination computer or network.

141
Q

Data Collision

A

When two sets of data are detected on the network simultaneously