Computing Key Words

?
Abstraction
The removal of unwanted or unnecessary information from a task or problem to provide focus
1 of 187
Accumulator
Temporarily stores the results of calculations carried out by the ALU
2 of 187
Adware
A form of spyware designed to automatically open or generate ads
3 of 187
Algorithm
A sequence of step-by-step instructions to solve a problem or carry out a task
4 of 187
Analogue
A continuous signal that cannot be directly processed by a computer
5 of 187
Anti-malware
Software designed to stop and remove malicious software from a system
6 of 187
Application Software
Installed into an operating system to actually produce work
7 of 187
Arguments
The data used by a sub-program
8 of 187
Arithmetic Logic Unit (ALU)
The part of the CPU that carries out calculations
9 of 187
ASCII
A common coding standard of 128 characters for computer manufacturers to share
10 of 187
Assemblers
A programming translator, used to convert low-level computer languages into computer instructions
11 of 187
Assembly language
A low-level programming language
12 of 187
Attribution
The acknowledgement of an original creator of a piece of work when copying or using it
13 of 187
Bandwidth
The amount of data than can pass between two network devices per second
14 of 187
Base 10
Our standard decimal numbering system
15 of 187
Base 16
A number system with 16 characters of numbers and letters, also known as hexidecimal
16 of 187
Binary
A base 2 number system using 2 digits: 1 and 0
17 of 187
Binary Search
Looks for a specific value in an ordered list by comparing it to the others around it
18 of 187
Binary Shift
The movement of bits in a binary sequence left and right to represent multiplication and division
19 of 187
BIOS
Basic input/output system; computer start-up software stored in ROM
20 of 187
Bit-rate
The number of bits per second to sample an audio file
21 of 187
Blagging
The act of using believable scenarios to trick people into giving up personal information
22 of 187
Blocks
A storage area within a solid-state drive
23 of 187
Blogs
Websites based around the creation of chronological entries or posts
24 of 187
Boolean operators
Use of AND, OR and NOT to connect and define relationships between data values or search terms
25 of 187
Brute force attack
Repeatedly trying different usernames and passwords in an attempt to access a system
26 of 187
Bubble Sort
Repeatedly compares adjacent pairs of values in a list and swaps until all items are in order
27 of 187
Bus
The connection and transfer of data between devices in a computer system
28 of 187
C Family
A group of high-level programming languages
29 of 187
Cache
Quick-to-access memory stored within the CPU
30 of 187
Casting
In programming, the conversion of one data type into another
31 of 187
Central Processing Unit
The core of a computer system that processes and controls the flow of data
32 of 187
Character
A single letter, number or symbol in a program
33 of 187
Character Sets
Alphanumeric characters and symbols, converted into a computer-readable binary equivalent
34 of 187
Check Digit
Used for error detection in indentification numbers; the last digit it checked against a criterion
35 of 187
Client
A computer or workstation that recieves information from a central server
36 of 187
Clock speed
The rate in gigahertz per second at which instructions are processed by the CPU
37 of 187
Cloud computing
The remote storing and accessibility of files and applications via the Internet
38 of 187
Colour Depth
The number of bits per pixel in an electronic image
39 of 187
Compliers
Used to read high-level languages and convert progrmas as a whole into machine code
40 of 187
Concatenation
The adding together of two strings in a program
41 of 187
Constant
A value that cannot be changed or edited within a running program
42 of 187
Control Unit
The part of the CPU that contros the flow of data both in and around the CPU
43 of 187
Cookies
Small files stored on computers, accessible by web servers, that contain internet browsing data
44 of 187
Copyrighted
The ownership rights of the original creator of any original content
45 of 187
Cores
The processing units found inside a CPU; each core can carry out a seperate task
46 of 187
Cypher
A method of encrypting or decrypting text
47 of 187
Data Bottlenecks
A problem caused by the processor and bus data transfer running at different speeds
48 of 187
Data Compression
The process of reducing the file size of an electronic file
49 of 187
Data Interception and Theft
Intercepting and decoding a message containing sensitive information before it reaches its destination
50 of 187
Databases
A system for storing large amounts of data, categorized and structured for ease of accessibility
51 of 187
Decomposition
The process of breaking tasks into smaller tasks which are easier to understand and then solve
52 of 187
Defragmentation
Re-organising the data on a hard drive to speed up access and free up storage space
53 of 187
Denary
Also known as decimal, a base 10 number system
54 of 187
Denial of Service attack
Flooding a website or network with data traffic to bring it to a halt
55 of 187
DNS
Domain Name Server; links the IP address of a computer on a network to a text-based website address
56 of 187
Drivers
Small programs that control a particular device within a computer system
57 of 187
Embedded System
A small computer system with a specific purposed that is built into a larger device
58 of 187
Encryption
The conversion of important data into a form that cannot be read without a key
59 of 187
Erasable
The ability to remobe stored data from a device or chip
60 of 187
Erroneous data
Incorrect values that the program should not accept or process
61 of 187
Error diagnostics
Also referred to as debugging tools, used to identify errors in particular lines of code
62 of 187
Exponentiation
A pseudocode arithmetic operator that assigns one value to the power of another
63 of 187
Extended ASCII
An extended version of the ASCII system, increasing it to an 8-bit 256-character set
64 of 187
Extreme Data
Values at the limit of what a program should be able to handle
65 of 187
Fields
A category within a database
66 of 187
File Management
The organisation of files and documents to allow for easy access and retrieval
67 of 187
Firewalls
Hardware or software designed to protect a system from unauthorized access
68 of 187
Flat-file database
A database with a single table and no links to other tables
69 of 187
Flow Diagram
Visualizes an algorithm and shows clearly the flow of information
70 of 187
Full Backup
The creation of an exact duplicate of a computer system for security purposes
71 of 187
Functions
A type of sub-program designed to return a value that the program will use
72 of 187
GPS
Global Positioning System; a satelite-based navigation system that provides devices with an exact geographical location
73 of 187
GPS location
A user's current position on the earth calculated using latitude and longitude coordinates
74 of 187
Graphical User Interface
A visual system, often cursor driven, that allows users to access and control a computer system
75 of 187
Hexadecimal
A base 16 number system of 16 characters: 0-9 and A-F
76 of 187
High Level Languages
Programming languages, such as Python, containing key words and syntax that programmers understand
77 of 187
Hosting
The storing of a website, or similar file system, on a network computer accessible via the internet
78 of 187
Identifier
The name given to a variable so it can be identified in a program
79 of 187
Immersive
A system designed to engage the user completely in an experience, often using 3D headset technology
80 of 187
Incremental Backup
Making a copy of only the files and documents that have changed since the last backup was made
81 of 187
Input Devices
Devices that proves an input signal into a computer system
82 of 187
Insertion Sort
Repeatedly comparing each item in a list with the previous item and inserting it into the correct position
83 of 187
Integer
A whole number in a program with no decimal point
84 of 187
Internet Protocol
A unique identification address assigned to network devices to facilitate internet connectivity
85 of 187
Interpreters
Software that converts high-level language files one line at a time into compatible machine code
86 of 187
Iteration
Repeating a task until a certain condition is met
87 of 187
Iterative Testing
The program cycle of design, development and testing
88 of 187
Java
A high level programming language
89 of 187
LAN
Local area network; computers are connected with the ability to share information in a local area
90 of 187
Layers
A set of network protocols grouped together with a specific purpose
91 of 187
Linear Search
Compares each value in a list, one at a time, to a required value until a match is made
92 of 187
Logic Diagrams
Graphical representations of simple Boolean operations using gates
93 of 187
Logic Error
A fault in the structure or design of a program
94 of 187
Lossy Compression
File size reduction by permanently removing data such as duplicated data elements
95 of 187
Lossless Compression
The use of an algorithm to compress data but then reconstruct it without data loss
96 of 187
Low-Level Languages
Programming languages that are closer to direct instructions that a computer can understand
97 of 187
Machine Code
A low-level programming language that can execute commands directly without any translation
98 of 187
Malware
Short for malicious software: designed to cause damage or steal information from the user
99 of 187
Media Access Control
A hardwired address assigned to all network devices during manufacture
100 of 187
Memory Address Register
The location address in memory of the next piece of data or instruction that the CPU needs
101 of 187
Memory Data Register
A CPU register that stores instructions or pieces of data
102 of 187
Merge Sort
Data is repeatedly split into halves until single items remain, and then in reassembled in order
103 of 187
Mesh Network
A network topology in which every device within the network in connected to every other device
104 of 187
Metadata
Additional file property data stored within a file, such as the date a photo was taken
105 of 187
Modulus
A pseudocode arithmetic operator that returns the remainder after a division
106 of 187
Multimedia
The combination of multiple media elements: text, sound, video graphics and user interactivity
107 of 187
Network Forensics
Monitors and records network traffic to make sure that any attacks can be analysed
108 of 187
Network Policies
A set of practical rules that all users should follow within a network environment
109 of 187
Network Storage
A secondary storage device that is accessed via network connectivity
110 of 187
Nibble
4-bits, half an 8-bit binary sequence
111 of 187
Non-Volatile
Memory that retains its contents even after power is switched off
112 of 187
Normal Data
Acceptable data a program is likely to accept and process
113 of 187
One-dimensional Array
A single list in a program of common elements
114 of 187
Open Source
Software created to be shared openly online at no cost or with no limits on how it can be used
115 of 187
Operating System
Software designed to manage a computer system, control hardware and allow applications to be run
116 of 187
Output devices
Devices that receive instructions or commands from a computer system and carry them out
117 of 187
Overflow error
Occurs when a computer tries to process more bits than it is designed to handle
118 of 187
Overwritten
Replacing the contents of a file with new data
119 of 187
Packet switching
Transmitting data packets across multiple networks and reassembling them at the destination
120 of 187
Parameters
The variables used within a sub-program
121 of 187
Passwords
Strings of characters, numbers, letters and symbols that allow access to a computer system
122 of 187
Patten Recognition
The identification of repeating elements or data similarities that can be built into an algorithm
123 of 187
Penetration Testing
The search for vulnerabilities within a system that could be exploited for criminal purposes
124 of 187
Permissions
Individually set user access rights on a network
125 of 187
Pharming
Redirecting a user's website request to a fraudulent site, by modifying their DNS entries
126 of 187
Phishing
Impersonating an organization and asking users to confirm or divulge personal details
127 of 187
Primary Key
A unique identifiable field withing a database that cannot be repeated
128 of 187
Private Key
Required to open an encrypted message
129 of 187
Procedure
A type of sub-program: a set of instructions grouped together and assigned a name
130 of 187
Program Counter
Continuously provides the CPU with the memory address of the next instruction to be carried out
131 of 187
Proprietary
Owned by the individual or company who created it; permission is usually through a purchased licence
132 of 187
Protocols
Sets of rules devised for network-compatible devices to allow for effective communication
133 of 187
Psuedocode
A shared programming language using simple English terms to plan programs
134 of 187
Public Encryption Key
Used to encrypt a message to prevent interception; can only be opened with the private key
135 of 187
Python
A high-level programming language
136 of 187
Quotient
A pseudocode arithmetic operator that divides but returns only a whole number or integer
137 of 187
RAM
Random access memory is a temporary area that a computer uses to store data in current use
138 of 187
Ransomware
Software designed to lock out user access to their system until a ransom is paid to unlock it
139 of 187
Real/Float
A program data type; all numbers, including those with a decimal point
140 of 187
Records
A single row or entry of related data in a database
141 of 187
Relational Database
Multiple databases, linked together by a common key field
142 of 187
Resolution
The numer of pixels used to represent an electronic image
143 of 187
ROM
Read-only memory provides a computer system with important instructions that do not change
144 of 187
Routers
Devices that connect networks together and allow communication between them
145 of 187
Run-time Environment
Allows a program to be run and tested within an integrated development environment (IDE)
146 of 187
Sampling
The process of converting analouge into digital
147 of 187
Sampling Frequency
The number of audio samples taken per second when converting analouge into digital
148 of 187
Secondary Storage
Refers to the devices used to store programs, documents and files
149 of 187
Selection
A decision that needs to be made before the next sequence can be carried out
150 of 187
Sequence
Carrying out tasks in a step-by-step sequence
151 of 187
Server
A dedicated device or software system to provide services or functionality to devices connected to it
152 of 187
Shouldering
The technique of watching a user at an ATM abd recording their pin details
153 of 187
Social Engineering
A range of methods used by con artists or criminals to access personal information
154 of 187
Spyware
Malware specifically designed to secretly pass on user information to a third party
155 of 187
SQL Injection
The use of a common database programming language to access and steal information
156 of 187
Star Network
A network topology with a server at the centre and computers with network devices connected around it
157 of 187
Storage Capacities
The amount of data a device can store
158 of 187
Streaming Services
Internet accessed multimedia content, presented to the use in real time as a constant data stream
159 of 187
String
A collection of alphanumeric data characters and symbols, usually enclosed in quotation marks
160 of 187
Structured Query Language
A programming language designed to create, edit and search databases
161 of 187
Sub-program
A program section that can be called at any time during a larger program to save time/avoid repetition
162 of 187
Switches
Devices that provise network connectivity between other devices
163 of 187
Syntax Error
An error within a program that breaks the rules or grammar of the language in which it is written
164 of 187
Test Plan
A written plan of program tests, the results and how any errors might be resolved
165 of 187
Third-Party Applications
Applications made by an exteral organisation not connected with the OS or hardware
166 of 187
Topology
The logical arrangement or physical structure of computers and network devices
167 of 187
Transistors
Semiconducting devices used to amplify or switch electronic flow in a circuit
168 of 187
Translators
Software designed to convert a programming language into machine code
169 of 187
Trojan
Malware disguised as legitimate software, desinged to cause damage or provide access to criminals
170 of 187
Truth Table
The representation of potential inputs and outputs in a logic diagram
171 of 187
Two-dimensional Array
An array within which each element contains its own array or list of lists
172 of 187
Unicode
A character set designed to contain all possible characters from all known languages
173 of 187
User Access Levels
Individual permissions for users to limit the information they can access, read or edit
174 of 187
User Management
The management of users on a single computer within the same OS
175 of 187
Utility Software
Used to carry out specific tasks to support an OS
176 of 187
Variable
Part of a program that has been assigned a specific value by the programmer
177 of 187
Virtual Memory
Created by the CPU on the hard drive if RAM becomes full
178 of 187
Virtual Network
A software-managed network created within an existing physical network
179 of 187
Virus
Malware hidden within another program or filw, designed to cause damage to file systems
180 of 187
Visual Basic
A high-level programming language
181 of 187
Volatile
Memory that loses all data stored when the power is switched off
182 of 187
von Nuemann Architecture
A 'stored program' computer system containing both the computer program and the data it processes
183 of 187
WAN
Wide area network; created by connecting one LAN to another across a geographical space
184 of 187
Wi-Fi Certified
An international standard for devices meeting industry-agreed network standards
185 of 187
Worm
Malware with the ability to independently replicate itself and spread throughout a system
186 of 187
Write
A file handling mode enabling a new file to be created or an existing file to be overwritten
187 of 187

Other cards in this set

Card 2

Front

Temporarily stores the results of calculations carried out by the ALU

Back

Accumulator

Card 3

Front

A form of spyware designed to automatically open or generate ads

Back

Preview of the back of card 3

Card 4

Front

A sequence of step-by-step instructions to solve a problem or carry out a task

Back

Preview of the back of card 4

Card 5

Front

A continuous signal that cannot be directly processed by a computer

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Key Words resources »