Key Terms Flashcards

1
Q

Abstraction

A

The removal of unwanted or unnecessary information from a task or problem to provide focus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accumulator

A

Temporarily stores the results of calculations carried out by the ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

A form of spyware designed to automatically open or generate advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithm

A

A sequence of step-by-step instructions to solve a problem or carry out a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Analogue

A

A continuous signal that cannot be directly processed by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-malware

A

Software designed to stop and remove malicious software from a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application software

A

Installed into an operating system to actually produce work or perform a task for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Arguments

A

The data used by a sub-routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALU

A

Arithmetic Logic Unit - The part of the CPU that carries out calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASCII

A

American Standard Code for Information Interchange - a common coding standard of 128 characters for computer manufacturers to share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assemblers

A

A programming translator, used to convert low level languages into machine code (computer instructions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assembly Language

A

A low level programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribution

A

The acknowledgement of an original creator of a piece of work when copying or using it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bandwidth

A

The amount of data that can pass between two network devices per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Base 10

A

Our standard decimal numbering system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Base 16

A

A number system with 16 characters of numbers and letters, also known as hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Binary

A

A base 2 number system using two digits: 1 and 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Binary Search

A

Looks for a specific value in an ordered list by comparing it to the others around it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Binary Shift

A

The movement of bits in a binary sequence left and right to represent multiplication and division.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIOS

A

Basic Input Output System

Computer start up software stored in ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bit-rate

A

The number of bits used per second to sample an audio file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Blocks

A

A storage area within a solid state drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Boolean operators

A

Use of AND, OR and NOT to connect and define relationships between data values or search terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Brute force attack

A

Repeatedly trying different usernames and passwords in an attempt to access a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bubble sort

A

Repeatedly compares adjacent pairs of values in a list and swaps until all items are in order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Bus

A

The connection and transfer of data between devices in a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cache

A

Quick to access memory stored within the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Casting

A

In programming, the conversion of one data type to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CPU

A

Central Processing Unit

The core of a computer system that processes and controls the flow of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Character

A

A single letter, number or symbol in a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Character sets

A

Alphanumeric characters and symbols, converted into a computer-readable binary equivalent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Check digit

A

Used for error detection in identification numbers; the last digit is checked against a criterion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Client

A

A computer or workstation that receives information from a central server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Clock speed

A

The rate in gigahertz per second at which instructions are processed by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cloud Computing

A

The remote storing and accessibility of files and applications via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Colour Depth

A

The number of bits per pixel in an electronic image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Compilers

A

Used to read high-level languages and convert programs as a whole into machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Concatenation

A

The adding together of two strings in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Constant

A

A value that cannot be changed or edited within a running program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Control Unit

A

The part of the CPU that controls the flow of data both in and around the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cookies

A

Small files stored on computers, accessible by web servers, that contain internet browsing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Copyrighted

A

The ownership rights of the original creator of any original content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Cores

A

The processing units found inside a CPU; each core can carry out a separate task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Cypher

A

A method of encrypting or decrypting text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

(Data) bottlenecks

A

A problem caused by the processor and bus data transfer running at different speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

(Data) compression

A

The process of reducing the file size of an electronic file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Data interception and theft

A

Intercepting and decoding a message containing sensitive information before it reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Databases

A

A system for storing large amounts of data, categorised and structured for ease of accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Decomposition

A

The process of breaking tasks into smaller tasks that are easier to understand and then solve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Defragmentation

A

Re-organising the data on a hard drive to speed up access and free up storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Denary

A

Also known as decimal, a base 10 number system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Denial of service attack

A

Flooding a website or network with data traffic to bring it to a halt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DNS

A

Domain Name Server; links the IP address of a computer on a network to a text based website address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Drivers

A

Small programs that control a particular device within a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Embedded system

A

A small computer system with a specific purpose that is built into a larger device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Encryption

A

The conversation of important data into a form that cannot be read without a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Erasable

A

The ability to remove stored data from a device or chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Erroneous (or invalid) data

A

Incorrect values that the program should not accept or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Error diagnostics

A

Also referred to as debugging tools, used to identify errors in particular lines of code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Extended ASCII

A

An extended version of the ASCII system, increasing it to an 8-bit 256-character set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Extreme (or boundary) data

A

Values at the limit of what a program should be able to handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Fields

A

A category within a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

File management

A

The organisation of files and documents to allow for easy access and retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Firewalls

A

Hardware or software designed to protect a system from unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Flat-file database

A

A database with a single table and no links to other tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Flow diagram

A

Visualises an algorithm and shows clearly the flow of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Full backup

A

The creation of an extract duplicate of a computer system for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Fucntions

A

A type of sub program designed to return a value that the program will use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

GPS

A

Global Positioning System; a satellite-based navigation system that provides with an exact geographical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

GUI

A

Graphical User Interface; A visual system, often cursor driven, that allows users to access and control a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Hexadecimal

A

A base 16 number system of sixteen characters: 0-9 and A-F.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

High-level languages

A

Programming languages, such as Python, containing keywords and syntax that programmers understand.

73
Q

Hosting

A

The storing of a website, or a similar file system, on a network computer accessible via the internet.

74
Q

Identifier

A

The name given to a variable so it can be identified in a program.

75
Q

Immersive

A

A system designed to engage the user completely in an experience, often using three-dimensional headset technology.

76
Q

Incremental backup

A

Making a copy of only the files and documents that have changed since the last backup was made.

77
Q

Input devices

A

Devices that provide an input signal into a computer system.

78
Q

Insertion sort

A

Repeatedly comparing each item in a list with the previous item and inserting it into the correct position.

79
Q

Integer

A

A whole number in a program with no decimal point

80
Q

IP

A

Internet Protocol; A unique identification address assigned to network devices to facilitate Internet connectivity.

81
Q

Interpreters

A

Software that converts a high-level language file one line at a time into compatible machine code.

82
Q

Iteration

A

Repeating a task until a certain condition is met.

83
Q

Iterative testing

A

The program cycle of design, development and testing.

84
Q

LAN

A

Local Area Network; computers are connected with the ability to share information in a local area.

85
Q

Layers

A

A set of network protocols grouped together with a specific purpose.

86
Q

Linear Search

A

Compares each value in a list, one at a time, to a required value until a match is made.

87
Q

Logic Diagrams

A

Graphical representations of simple Boolean operations using gates.

88
Q

Logic Diagrams

A

Graphical representations of simple Boolean operations using gates.

89
Q

Logic error

A

A fault in the structure or design of a program.

90
Q

Lossless compression

A

The use of an algorithm to compress data but then reconstruct it without data loss.

91
Q

Lossy compression

A

File size reduction by permanently removing data such as duplicated data elements.

92
Q

Low level languages

A

Programming languages that are closer to direct instructions that a computer can understand.

93
Q

Machine Code

A

A low level programming language that can execute commands directly without any translation.

94
Q

Malware

A

Short for malicious software: designed to cause damage or to steal information from the user.

95
Q

Media access control

A

A hardwired address assigned to all network devices during manufacture.

96
Q

MAR

A

Memory Address Register; The location address in memory of the next piece of data or instruction that the CPU needs.

97
Q

MDR

A

Memory Data Register; A CPU register that stores instructions or pieces of data.

98
Q

Merge sort

A

Data is repeatedly split into halves until single items remain, and is then reassembled in order.

99
Q

Mesh Network

A

A network topology in which every device within the network is connected to every other device.

100
Q

Metadata

A

Additional file property data stored within a file, such as the date a photo was taken.

101
Q

Modulus

A

A pseudocode arithmetic operator that returns the remainder after a division.

102
Q

Multimedia

A

The combination of multiple media elements: text, sound, video, graphics and user interactivity.

103
Q

Network forensics

A

Monitors and records network traffic to make sure that any attacks can be analysed.

104
Q

Network policies

A

A set of practical rules that all users should follow within a network environment.

105
Q

Network storage

A

A secondary storage device that is accessed via network connectivity.

106
Q

Nibble

A

4 bits, half an 8 bit binary sequence.

107
Q

Non-volatile

A

Memory that retains its contents even after power is switched off.

108
Q

Normal Data

A

Acceptable data a program is likely to accept and process.

109
Q

One-dimensional array

A

A single list in a program of common elements.

110
Q

Open source

A

Software created to be shared openly online at no cost or with no limits on how it can be used.

111
Q

Operating system

A

Software designed to manage a computer system, control hardware and allow applications to be run.

112
Q

Output devices

A

Devices that receive instructions or commands from a computer system and carry them out.

113
Q

Overflow error

A

Occurs when a computer tries to process more bits than it is designed to handle.

114
Q

Overwritten

A

Replacing the contents of a file with new data.

115
Q

Packet Switching

A

Transmitting data packets across multiple networks and reassembling them at the destination.

116
Q

Parameters

A

The variables used

117
Q

Pattern Recognition

A

The identification of repeating elements or data similarities that can be built into an algorithm.

118
Q

Penetration testing

A

The search for vulnerabilities within a system that could be exploited for criminal purposes.

119
Q

Permissions

A

Individually set user access rights on a network

120
Q

Pharming

A

Redirecting a user’s website request to a fraudulent site, by modifying their DNS entries.

121
Q

Phishing

A

Impersonating an organisation and asking users to confirm or divulge personal details.

122
Q

Private Key

A

Required to open an encrypted message

123
Q

Primary Key

A

A unique identifiable field within a database that cannot be repeated.

124
Q

Procedure

A

A type of sub-program: a set of instructions grouped together and assigned a name.

125
Q

PC

A

Program Counter: Continuously provides the CPU with the memory address of the next instruction to be carried out.

126
Q

Proprietary

A

Owned by the individual or company who created it; permission is usually through a purchased licence.

127
Q

Protocol

A

Sets of rules devised for network-compatible devices to allow for effective communication.

128
Q

Pseudocode

A

A shared programming language using simple English terms to plan programs.

129
Q

Public encryption key

A

Used to encrypt a message to prevent interception; can only be opened with the private key.

130
Q

DIV (Quotient)

A

An arithmetic operator that divides but returns only a whole number or integer.

131
Q

RAM

A

Random Access Memory: is a temporary area that a computer uses to store data in current use.

132
Q

Ransomware

A

Software designed to lock out user access to their system until a ransom is paid to unlock it.

133
Q

Real (float)

A

A data type; all numbers with a decimal point

134
Q

Records

A

A single row or entry of related data in a database.

135
Q

Relational database

A

Multiple databases, linked together by a common key field.

136
Q

Resolution

A

The number of pixels used to represent an electronic image.

137
Q

ROM

A

Read Only Memory; provides a computer system with important instructions that do not change.

138
Q

Routers

A

Devices that connect networks together and allow communication between them

139
Q

IDE

A

Integrated Development Environment; Allows programs to be run and tested. Often contain tools to aid programmers.

140
Q

Sampling

A

The process of converting analogue into digital

141
Q

Sampling frequency

A

The number of audio samples taken per second when converting analogue into digital.

142
Q

Secondary Storage

A

Refers to the devices used to store programs, documents and files.

143
Q

Selection

A

A decision that needs to be made before the next step can be carried out.

144
Q

Sequence

A

Carrying out tasks or instructions in a step by step sequence

145
Q

Server

A

A dedicated device or software system to provide services or functionality to devices connected to it.

146
Q

Shouldering

A

The technique of watching a user at an ATM (cash) machine and recording their PIN details.

147
Q

Social engineering

A

Describes a range of methods used by con artists or criminals to access personal information.

148
Q

Spyware

A

Malware specifically designed to secretly pass on user information to a third party.

149
Q

SQL Injection

A

The use of a common database programming language to access and steal information.

150
Q

Star network

A

A network topology with a server at the centre and computers with network devices connected around it.

151
Q

Storage capacities

A

The amount of data a device can store.

152
Q

Steaming services

A

Internet-accessed multimedia content, presented to the user in real time as a constant data stream.

153
Q

String

A

A collection of alphanumeric data characters and symbols, usually enclosed in quotation marks.

154
Q

SQL

A

Structured Query Language; a programming language designed to create, edit and search databases.

155
Q

Sub-program

A

A program section that can be called at any time during a larger program to save time/avoid repetition.

156
Q

Switches

A

Devices that provide network connectivity between other devices

157
Q

Syntax error

A

A error within a program that breaks the rules or grammar of the language in which it is written.

158
Q

Test plan

A

A written plan of program tests, the results and how any errors might be resolved.

159
Q

Third party applications

A

Applications made by an external organisation not connected with the operating system or hardware.

160
Q

Topology

A

The logical arrangement or physical structure of computers and network devices.

161
Q

Transistors

A

Semiconducting devices used to amplify or switch electronic flow in a circuit.

162
Q

Translators

A

Software designed to convert a programming language into machine code.

163
Q

Trojan

A

Malware disguised as legitimate software, designed to cause damage or provide access to criminals.

164
Q

Truth Table

A

The representation of potential inputs and outputs (1s and 0s) in a logic diagram.

165
Q

Two-dimensional array

A

An array within which each element contains its own array or list of lists.

166
Q

Unicode

A

A character set designed to contain all possible characters from all known languages.

167
Q

User access levels

A

Individual permissions for users to limit the information they can access, read or edit.

168
Q

User management

A

The management of users on a single computer within the same operating system.

169
Q

Utility software

A

Used to carry out specific tasks to support an operating system.

170
Q

Variable

A

Part of a program that has been assigned a specific value by the programmer.

171
Q

Virtual memory

A

Created by the CPU on the hard drive if RAM becomes full.

172
Q

Virtual Network

A

A software-managed network created within an existing physical network.

173
Q

Virus

A

Malware hidden within another program or file, designed to cause damage to file systems.

174
Q

Volatile

A

Memory that loses all data stored when power is switched off (eg, RAM)

175
Q

Von Neumann architecture

A

A ‘stored program’ computer system containing both the computer program and the data it processes.

176
Q

WAN

A

Wide Area Network; created by connecting one LAN to another across a geographical space.

177
Q

Wi-Fi certified

A

An international standard for devices meeting industry-agreed network standards.

178
Q

Worm

A

Malware with the ability to independently replicate itself and spread throughout a system.

179
Q

Write

A

A file handling mode enabling a new file to be created or an existing file to be overwritten.