GCSE Computer Science Key words A-C
3.5 / 5 based on 9 ratings
- Created by: DSD
- Created on: 29-12-17 20:29
Abstraction
Picking out the important bits of information.
1 of 66
Accumulator
The part of the ALU that stores the intermediate results when doing a calculation.
2 of 66
Active attack (networks)
A network attack where the hacker attempts to change data or introduce malware
3 of 66
Algorithmic thinking
Coming up with an algorithm to solve a problem.
4 of 66
Algorithm
A step-by»step set of rules or instructions.
5 of 66
Alphanumeric
The collective name for letters, digits and symbols.
6 of 66
Analogue signal
A continuous signal which can’t be processed by a computer.
7 of 66
AND operator
One of the Boolean operators. 0∧0=0 1∧0=0 1∧0=0 1∧1=1
8 of 66
Anti-malware software
Software designed to stop malware from damaging a computer or network.
9 of 66
Application
A piece of software written to help users do various tasks, often through a graphical user interface with menus and toolbars.
10 of 66
Architecture
Describes how the CPU works and interacts with the other parts of the computer system.
11 of 66
Argument
A value that a parameter of a sub program actually takes.
12 of 66
Arithmetic logic unit (ALU)
The part of the CPU that carries out arithmetic and Boolean operations.
13 of 66
Arithmetic operator
An operator that programs use to carry out simple mathematical operations.
14 of 66
Array
A data structure where all the data is stored and defined under one variable name.
15 of 66
ASCII
A 7-bit character set consisting of 128 characters.
16 of 66
Assembler
A program that turns assembly language into machine code.
17 of 66
Assembly language
A low-level language.
18 of 66
Assignment operator
(=) Assigns the value on the right hand side to the name on the left hand side.
19 of 66
Authentication
A process for checking the identity of the user.
20 of 66
Backdoor
A vulnerability in a computer or network’s security that a hacker could exploit.
21 of 66
Bandwidth
The amount of data that can be transferred on a network in a given time.
22 of 66
Binary
A counting system using base-2 consisting of Us and is.
23 of 66
Binary shift
Moving the bits in a binary number left or right and filling the gaps with 0's
24 of 66
BIOS (Basic Input Output System)
Software stored in ROM responsible for booting up a computer system.
25 of 66
Bitmap image
A graphic that is made up of pixels.
26 of 66
Bit
A binary digit, either 0 or 1.
27 of 66
Bit rate
The number of bits used per second of sampled audio.
28 of 66
Boolean
A logical system using the operators OR, AND and NOT. The Boolean data can take one of two values, either true or false.
29 of 66
Breakpoint
A programming tool used to halt a program at a specific place.
30 of 66
Brute force attack
A network attack which uses software to crack security passwords through trial and error.
31 of 66
Bus topology
A network topology in which all devices are connected to a single backbone cable.
32 of 66
Byte
8 bits
33 of 66
Cache (CPU)
Quick access memory inside the CPU.
34 of 66
Casting
A way of changing from one data type to another.
35 of 66
Cat 5 / Cat 6 cable
Standards for copper Ethernet cables used on LANs.
36 of 66
Censorship
The control lusually by a government or organisation! of what information other people can access.
37 of 66
Channel (Wi-Fiw)
A small range of Wi-Fi‘ frequencies.
38 of 66
Character
A single alphanumeric symbol.
39 of 66
Character set
A group of characters that a computer recognises from their binary representation.
40 of 66
Check digit
A digit added to a string of digits which is used to check if all the digits have been entered and read correctly.
41 of 66
Checksum
A number used to check if a packet of data sent between networks has been received correctly.
42 of 66
Client
A device which requests data from a server.
43 of 66
Client-server network
A type of network managed by a server, which takes requests from client devices.
44 of 66
Clock speed
The number of instructions a processor can carry out each second.
45 of 66
Cloud computing
The use of the Internet to store files and provide software. Also known as the cloud.
46 of 66
Code editor
Part of an IDE where you write and edit your source code.
47 of 66
Colour depth
The number of bits used for each pixel in an image file.
48 of 66
Command-line interface
A text-based user interface where the user types in commands.
49 of 66
Comment
A note added to source code to say what part of a program does.
50 of 66
Comparison operator
Compares two values and outputs either true or false.
51 of 66
Compiled code
An executable file created by a compiler.
52 of 66
Compiler
A programming tool to translate source code into machine code.
53 of 66
Compression
The process of making the size of a file smaller.
54 of 66
Computational thinking
Tackling a problem through decomposition, abstraction and algorithmic thinking.
55 of 66
Concatenation
Joining strings together.
56 of 66
Condition-controlled loop
An iteration statement that repeats a set of instructions until a condition is met.
57 of 66
Constant
A named value which cannot be altered as the program is running.
58 of 66
Control unit (CU)
The part of the CPU that controls the flow of data.
59 of 66
Copyright
A legal right that prevents others from copying or modifying your work without permission.
60 of 66
Core (CPU)
A processing unit found inside the CPU.
61 of 66
Count-controlled loop
An iteration statement that repeats a set of instructions a given number of times.
62 of 66
CPU (or processor)
The part of the computer system that processes the data. It contains the control unit, ALU and cache.
63 of 66
Creative Commons licence
Permits sharing of a creative work as long as certain requests from the original creator are upheld.
64 of 66
Cultural issue
An issue which affects a particular religious, ethnic, national or other group.
65 of 66
Cyberbullying
Using social media to deliberately harm someone else.
66 of 66
Other cards in this set
Card 2
Front
The part of the ALU that stores the intermediate results when doing a calculation.
Back
Accumulator
Card 3
Front
A network attack where the hacker attempts to change data or introduce malware
Back
Card 4
Front
Coming up with an algorithm to solve a problem.
Back
Card 5
Front
A step-by»step set of rules or instructions.
Back
Similar Computing resources:
0.0 / 5
4.0 / 5 based on 1 rating
3.5 / 5 based on 4 ratings
5.0 / 5 based on 4 ratings
5.0 / 5 based on 1 rating
4.0 / 5 based on 5 ratings
3.0 / 5 based on 11 ratings
0.0 / 5
0.0 / 5
Comments
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report
Report