COMPUTING KEYWORDS Flashcards

(44 cards)

1
Q

Secondary storage

A
  • Secondary storage refers to any storage device that stores date long term. The devices are non-volatile and retain data even when the device has no power.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defragmentation

A

A utility program that moves parts in a file together. Meaning quicker access speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(LAN)Local area network

A

A network on a small geographical, connected by own hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keylogger

A

A program that records keystrokes/processes on a computer. Then sends the data to the third party for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accumulator

A

(In the processor), stores all of the results of calculations /processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stake Holder

A

A person who may be involved either directly, or indirectly with an issue/problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual Network

A

A subset of computers connected together as part of a larger physical network. All communication should be encrypyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

A seris of instructions to solve a problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Procedure

A

A named self contained section of code that performs a specfic task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Function

A

A named self contained section of code that performs a specific task, it must return a value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Parameter

A

Parameters are the names of the information that are passed into a function or procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Arguement

A

The actual values that are passed into a function or procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Embedded system

A

A processor stored in a device that is designed for a fixed purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall

A

Prevents unauthorised access to a network, by examining traffic, and blocking any that don’t meet criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Casting

A

Changing the type of variable from one to another. Eg int(“34”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Interface card

A

Required to connect with a wire connection or wirelessly to any network enabled devie. It has a unique mac address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MAR(Memory Address register)

A

Holds the address location of the instruction/data to be fetched/stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Utility software

A

Software that helps users configure, analyse, optimise and maintain a computer.

19
Q

Von Neuman Architechure

A

Storing both data and programs in memory.

20
Q

WAN(Wide are network)

A

A collection of computers connected by a third party carrier usually spread over a large geographical area.

21
Q

Programming Constructs

A

Sequence, selection, iteration are all required to writer algorithms in code.

22
Q

Utility Software

A

Software that helps user configure, analyse and optimise and maintain a computer.

23
Q

Von Neuman Architechure

A

Storing both programs and data in memory

24
Q

Cache

A

A small amount of high speed memory which is part of the CPU. It is used to temporarily hold instructions and data that the CPU is likely to reuse.

25
MAC address
Every NIC has a unique MAC address which is required to connect to a network.
26
Ciphertext
Text that has been encrypted.
27
plaintext
The original message before it is encrypted.
28
router
A device for connecting computers to a network. IT forwards packets to the next destination according to defined rules.
29
Data packet
Messages are broke down into binary data packets before they are transferred. They contain other information such as Destination IP address and packet number.
30
Range check
Validation that checks that a value is between two values
31
Syntax error
Mistakes in the programming language has been written that prevent the code from running
32
HIgh level programming language
Programming language that reflects the normal language used. It needs to be translated into machine language.
33
operating system
Manages the computer's resources, such as providing a UI, peripheral management and file management.
34
Open source software.
It is licenced but is free and everyone can copy, modify, and share the product.
35
Prioprietry software
it remains the property of the group who created it. The owners control how it is licensed and they gold the copyright.
36
Creative commons license
The copyright owners define exactly what other people can and can't do with or into their work. Eg for only non-commercial use.
37
A database record
A collection of information about one thing
38
Peripheral
Any computer hardware that is not part of the CPU. eg mouse keyboard.
39
Plaintext
The orignal message before it has been encrypted.
40
Router
A device for connecting copmuters to a network. It forwards packets to the next distination according to defined rules.
41
Data packet
Messages a broken down into binary data packets before they are transferred. They contain other information such as destination IP address and the packet number.
42
Latency
A period of time delay in a computer system, for exmaple the time it takes to reciee data over a network.
43
STMP
Simple mail transfer protocal - Used to send emails between servers.
44
POP
Post office protocol: an email protocol that allows a user to download their emails from the mail serve to their computer, the messages are deleted from the server. - Remeber the emails are downloaded onto the computer and not held on the server anymore.