Key Terms Flashcards

1
Q

Abstraction

A

The removal of unwanted or unnecessary information from a task or problem to provide focus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accumulator

A

Temporarily stores the results of calculations carried out by the ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

A form of spyware designed to automatically open or generate advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithm

A

A sequence of step-by-step instructions to solve a problem or carry out a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Analogue

A

A continuous signal that cannot be directly processed by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-malware

A

Software designed to stop and remove malicious software from a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application software

A

Installed into an operating system to actually produce work or perform a task for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Arguments

A

The data used by a sub-routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALU

A

Arithmetic Logic Unit - The part of the CPU that carries out calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASCII

A

American Standard Code for Information Interchange - a common coding standard of 128 characters for computer manufacturers to share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assemblers

A

A programming translator, used to convert low level languages into machine code (computer instructions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assembly Language

A

A low level programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribution

A

The acknowledgement of an original creator of a piece of work when copying or using it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bandwidth

A

The amount of data that can pass between two network devices per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Base 10

A

Our standard decimal numbering system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Base 16

A

A number system with 16 characters of numbers and letters, also known as hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Binary

A

A base 2 number system using two digits: 1 and 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Binary Search

A

Looks for a specific value in an ordered list by comparing it to the others around it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Binary Shift

A

The movement of bits in a binary sequence left and right to represent multiplication and division.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIOS

A

Basic Input Output System

Computer start up software stored in ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bit-rate

A

The number of bits used per second to sample an audio file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Blocks

A

A storage area within a solid state drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Boolean operators

A

Use of AND, OR and NOT to connect and define relationships between data values or search terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Brute force attack

A

Repeatedly trying different usernames and passwords in an attempt to access a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bubble sort
Repeatedly compares adjacent pairs of values in a list and swaps until all items are in order.
26
Bus
The connection and transfer of data between devices in a computer system
27
Cache
Quick to access memory stored within the CPU
28
Casting
In programming, the conversion of one data type to another.
29
CPU
Central Processing Unit | The core of a computer system that processes and controls the flow of data.
30
Character
A single letter, number or symbol in a program.
31
Character sets
Alphanumeric characters and symbols, converted into a computer-readable binary equivalent.
32
Check digit
Used for error detection in identification numbers; the last digit is checked against a criterion.
33
Client
A computer or workstation that receives information from a central server.
34
Clock speed
The rate in gigahertz per second at which instructions are processed by the CPU.
35
Cloud Computing
The remote storing and accessibility of files and applications via the Internet.
36
Colour Depth
The number of bits per pixel in an electronic image.
37
Compilers
Used to read high-level languages and convert programs as a whole into machine code.
38
Concatenation
The adding together of two strings in a program
39
Constant
A value that cannot be changed or edited within a running program.
40
Control Unit
The part of the CPU that controls the flow of data both in and around the CPU.
41
Cookies
Small files stored on computers, accessible by web servers, that contain internet browsing data.
42
Copyrighted
The ownership rights of the original creator of any original content.
43
Cores
The processing units found inside a CPU; each core can carry out a separate task.
44
Cypher
A method of encrypting or decrypting text.
45
(Data) bottlenecks
A problem caused by the processor and bus data transfer running at different speeds.
46
(Data) compression
The process of reducing the file size of an electronic file.
47
Data interception and theft
Intercepting and decoding a message containing sensitive information before it reaches its destination.
48
Databases
A system for storing large amounts of data, categorised and structured for ease of accessibility.
49
Decomposition
The process of breaking tasks into smaller tasks that are easier to understand and then solve.
50
Defragmentation
Re-organising the data on a hard drive to speed up access and free up storage space.
51
Denary
Also known as decimal, a base 10 number system.
52
Denial of service attack
Flooding a website or network with data traffic to bring it to a halt.
53
DNS
Domain Name Server; links the IP address of a computer on a network to a text based website address.
54
Drivers
Small programs that control a particular device within a computer system.
55
Embedded system
A small computer system with a specific purpose that is built into a larger device.
56
Encryption
The conversation of important data into a form that cannot be read without a key.
57
Erasable
The ability to remove stored data from a device or chip
58
Erroneous (or invalid) data
Incorrect values that the program should not accept or process.
59
Error diagnostics
Also referred to as debugging tools, used to identify errors in particular lines of code.
60
Extended ASCII
An extended version of the ASCII system, increasing it to an 8-bit 256-character set.
61
Extreme (or boundary) data
Values at the limit of what a program should be able to handle.
62
Fields
A category within a database.
63
File management
The organisation of files and documents to allow for easy access and retrieval.
64
Firewalls
Hardware or software designed to protect a system from unauthorised access.
65
Flat-file database
A database with a single table and no links to other tables.
66
Flow diagram
Visualises an algorithm and shows clearly the flow of information.
67
Full backup
The creation of an extract duplicate of a computer system for security purposes.
68
Fucntions
A type of sub program designed to return a value that the program will use.
69
GPS
Global Positioning System; a satellite-based navigation system that provides with an exact geographical location.
70
GUI
Graphical User Interface; A visual system, often cursor driven, that allows users to access and control a computer system.
71
Hexadecimal
A base 16 number system of sixteen characters: 0-9 and A-F.
72
High-level languages
Programming languages, such as Python, containing keywords and syntax that programmers understand.
73
Hosting
The storing of a website, or a similar file system, on a network computer accessible via the internet.
74
Identifier
The name given to a variable so it can be identified in a program.
75
Immersive
A system designed to engage the user completely in an experience, often using three-dimensional headset technology.
76
Incremental backup
Making a copy of only the files and documents that have changed since the last backup was made.
77
Input devices
Devices that provide an input signal into a computer system.
78
Insertion sort
Repeatedly comparing each item in a list with the previous item and inserting it into the correct position.
79
Integer
A whole number in a program with no decimal point
80
IP
Internet Protocol; A unique identification address assigned to network devices to facilitate Internet connectivity.
81
Interpreters
Software that converts a high-level language file one line at a time into compatible machine code.
82
Iteration
Repeating a task until a certain condition is met.
83
Iterative testing
The program cycle of design, development and testing.
84
LAN
Local Area Network; computers are connected with the ability to share information in a local area.
85
Layers
A set of network protocols grouped together with a specific purpose.
86
Linear Search
Compares each value in a list, one at a time, to a required value until a match is made.
87
Logic Diagrams
Graphical representations of simple Boolean operations using gates.
88
Logic Diagrams
Graphical representations of simple Boolean operations using gates.
89
Logic error
A fault in the structure or design of a program.
90
Lossless compression
The use of an algorithm to compress data but then reconstruct it without data loss.
91
Lossy compression
File size reduction by permanently removing data such as duplicated data elements.
92
Low level languages
Programming languages that are closer to direct instructions that a computer can understand.
93
Machine Code
A low level programming language that can execute commands directly without any translation.
94
Malware
Short for malicious software: designed to cause damage or to steal information from the user.
95
Media access control
A hardwired address assigned to all network devices during manufacture.
96
MAR
Memory Address Register; The location address in memory of the next piece of data or instruction that the CPU needs.
97
MDR
Memory Data Register; A CPU register that stores instructions or pieces of data.
98
Merge sort
Data is repeatedly split into halves until single items remain, and is then reassembled in order.
99
Mesh Network
A network topology in which every device within the network is connected to every other device.
100
Metadata
Additional file property data stored within a file, such as the date a photo was taken.
101
Modulus
A pseudocode arithmetic operator that returns the remainder after a division.
102
Multimedia
The combination of multiple media elements: text, sound, video, graphics and user interactivity.
103
Network forensics
Monitors and records network traffic to make sure that any attacks can be analysed.
104
Network policies
A set of practical rules that all users should follow within a network environment.
105
Network storage
A secondary storage device that is accessed via network connectivity.
106
Nibble
4 bits, half an 8 bit binary sequence.
107
Non-volatile
Memory that retains its contents even after power is switched off.
108
Normal Data
Acceptable data a program is likely to accept and process.
109
One-dimensional array
A single list in a program of common elements.
110
Open source
Software created to be shared openly online at no cost or with no limits on how it can be used.
111
Operating system
Software designed to manage a computer system, control hardware and allow applications to be run.
112
Output devices
Devices that receive instructions or commands from a computer system and carry them out.
113
Overflow error
Occurs when a computer tries to process more bits than it is designed to handle.
114
Overwritten
Replacing the contents of a file with new data.
115
Packet Switching
Transmitting data packets across multiple networks and reassembling them at the destination.
116
Parameters
The variables used
117
Pattern Recognition
The identification of repeating elements or data similarities that can be built into an algorithm.
118
Penetration testing
The search for vulnerabilities within a system that could be exploited for criminal purposes.
119
Permissions
Individually set user access rights on a network
120
Pharming
Redirecting a user’s website request to a fraudulent site, by modifying their DNS entries.
121
Phishing
Impersonating an organisation and asking users to confirm or divulge personal details.
122
Private Key
Required to open an encrypted message
123
Primary Key
A unique identifiable field within a database that cannot be repeated.
124
Procedure
A type of sub-program: a set of instructions grouped together and assigned a name.
125
PC
Program Counter: Continuously provides the CPU with the memory address of the next instruction to be carried out.
126
Proprietary
Owned by the individual or company who created it; permission is usually through a purchased licence.
127
Protocol
Sets of rules devised for network-compatible devices to allow for effective communication.
128
Pseudocode
A shared programming language using simple English terms to plan programs.
129
Public encryption key
Used to encrypt a message to prevent interception; can only be opened with the private key.
130
DIV (Quotient)
An arithmetic operator that divides but returns only a whole number or integer.
131
RAM
Random Access Memory: is a temporary area that a computer uses to store data in current use.
132
Ransomware
Software designed to lock out user access to their system until a ransom is paid to unlock it.
133
Real (float)
A data type; all numbers with a decimal point
134
Records
A single row or entry of related data in a database.
135
Relational database
Multiple databases, linked together by a common key field.
136
Resolution
The number of pixels used to represent an electronic image.
137
ROM
Read Only Memory; provides a computer system with important instructions that do not change.
138
Routers
Devices that connect networks together and allow communication between them
139
IDE
Integrated Development Environment; Allows programs to be run and tested. Often contain tools to aid programmers.
140
Sampling
The process of converting analogue into digital
141
Sampling frequency
The number of audio samples taken per second when converting analogue into digital.
142
Secondary Storage
Refers to the devices used to store programs, documents and files.
143
Selection
A decision that needs to be made before the next step can be carried out.
144
Sequence
Carrying out tasks or instructions in a step by step sequence
145
Server
A dedicated device or software system to provide services or functionality to devices connected to it.
146
Shouldering
The technique of watching a user at an ATM (cash) machine and recording their PIN details.
147
Social engineering
Describes a range of methods used by con artists or criminals to access personal information.
148
Spyware
Malware specifically designed to secretly pass on user information to a third party.
149
SQL Injection
The use of a common database programming language to access and steal information.
150
Star network
A network topology with a server at the centre and computers with network devices connected around it.
151
Storage capacities
The amount of data a device can store.
152
Steaming services
Internet-accessed multimedia content, presented to the user in real time as a constant data stream.
153
String
A collection of alphanumeric data characters and symbols, usually enclosed in quotation marks.
154
SQL
Structured Query Language; a programming language designed to create, edit and search databases.
155
Sub-program
A program section that can be called at any time during a larger program to save time/avoid repetition.
156
Switches
Devices that provide network connectivity between other devices
157
Syntax error
A error within a program that breaks the rules or grammar of the language in which it is written.
158
Test plan
A written plan of program tests, the results and how any errors might be resolved.
159
Third party applications
Applications made by an external organisation not connected with the operating system or hardware.
160
Topology
The logical arrangement or physical structure of computers and network devices.
161
Transistors
Semiconducting devices used to amplify or switch electronic flow in a circuit.
162
Translators
Software designed to convert a programming language into machine code.
163
Trojan
Malware disguised as legitimate software, designed to cause damage or provide access to criminals.
164
Truth Table
The representation of potential inputs and outputs (1s and 0s) in a logic diagram.
165
Two-dimensional array
An array within which each element contains its own array or list of lists.
166
Unicode
A character set designed to contain all possible characters from all known languages.
167
User access levels
Individual permissions for users to limit the information they can access, read or edit.
168
User management
The management of users on a single computer within the same operating system.
169
Utility software
Used to carry out specific tasks to support an operating system.
170
Variable
Part of a program that has been assigned a specific value by the programmer.
171
Virtual memory
Created by the CPU on the hard drive if RAM becomes full.
172
Virtual Network
A software-managed network created within an existing physical network.
173
Virus
Malware hidden within another program or file, designed to cause damage to file systems.
174
Volatile
Memory that loses all data stored when power is switched off (eg, RAM)
175
Von Neumann architecture
A ‘stored program’ computer system containing both the computer program and the data it processes.
176
WAN
Wide Area Network; created by connecting one LAN to another across a geographical space.
177
Wi-Fi certified
An international standard for devices meeting industry-agreed network standards.
178
Worm
Malware with the ability to independently replicate itself and spread throughout a system.
179
Write
A file handling mode enabling a new file to be created or an existing file to be overwritten.