IT Revision Flashcards

(366 cards)

1
Q

ASCII

A

American Standard Code for Information Interchange

the type of code that tells your keys which characters you are typing, offering 128 characters, with one bit per character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ADC

A

Analogue to Data Converter

creates digital sound signal in microphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analogue Input

A

converts a voltage level into a digital value that can be stored and processed in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Analogue Output

A

a continuous output from PLC to field devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

And

A

a conjunction

only when both statements are true can the end result be true

straight line one, likes 0s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ALU

A

Arithmetic Logic Unit

performs all the mathematical calculations and logical operations in the CPU. Makes logical decisions and returns the answers to a temporary stage register known as the accumulator. A number needs to be inputted to be processed and a code from the controller which gives the operation to be performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Arithmetic Shift Functions

A

multiplications of bit patterns, which involves moving the bits in a specified direction, either left or right, a number of places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backing Store

A

Retains data written on it after the computer is switched off

Includes hard disks, flash drives, removable disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS

A

Basic Input Output System

a chip that enables a computer to communicate with other devices (eg keyboard, disk drive, monitor) on start up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Binary Digits

A

Either a 1 or a 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nybble

A

4 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Byte

A

8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kilobyte (Kb)

A

1024 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Megabyte (MB)

A

1024 KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gigabyte (GB)

A

1024 MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Terabyte (TB)

A

1024 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Petabyte (PB)

A

1024 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exabyte (EB)

A

1024 PB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zettabyte (ZB)

A

1024 EB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Yotabyte (YB)

A

1024 ZB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Boolean

A

statements that can be true or false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Absorptive Law

A

allows complicated expressions to be simplified by absorbing terms

A+(A.B)=A, A(A+B)=A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Annulment Law

A

states that and always equals 1, and or always equals 0

A.0=0 A+1=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Associate Law

A

states that statements can be rearranged

A+(B+C)=(A+B)+C=A+B+C, A(B.C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Commutative Law
states the order of conjuctions/disjunctions does not matter A.B=B.A A+B=B+A
26
Complement Law
states that a term anded with its complement equals 0 and a term ored with its complement equals 1 A.NotA=1 A+NotA=0
27
Distributive Law
states that the order of brackets matter, however the contents of the brackets' order doesn't matter A(B+C)=A.B+A.C A+(B.C)=(A+B).(A+C)
28
Double Complement Laws
states that the double complement of a variable is always equal to the variable
29
Impotent Law
states that an input that is anded or ored with itself equals itself A+A=A A.A=A
30
Identity Law
states that if a term is ored with a 0 it will always be a 0/ if a term is anded with a 1 it will always be a 1 0.1 = 1 0+1=0
31
Bridge
A computer networking device that creates a single aggregate network from multiple communication networks or network segments
32
Brouter
Does the work of a bridge and a router
33
Bus
something that connects the processor to another part of the computer
34
Address Bus
where the address of the data is communicated to the main memory. The width defines the amount of physical memory that can be addressed
35
Control Bus
used to tell the memory or the device the operation that is to be formed
36
Data Bus
a series of processors that connects the processor the main memory (RAM) or cache memory. Can be used to read from or write to the memory.
37
Capacity
the quantity of data that a storage medium can hold
38
Central Processing Unit (CPU)
main processor that executes instructions in a computer
39
Clock Speed
the speed at which a processor operates
40
Overclocking
when the process is set to run faster than the original design and overheats
41
Underclocking
when the process is set to run slower than the original design
42
Cores
a term used to describe the processing components within the CPU. Multi-core processors therefore have many processing components within the same CPU. These can be dual-core or quad-core.
43
Dual-Core Processor
in theory, a processor that processes twice as fast as single-core
44
Quad-Core Processor
in theory, a processor that processes four times as fast as a single-core processor
45
Cache (Memory Type)
a fast access type of memory that is very expensive and is able to provide instructions and data to the CPU faster than memory systems
46
L1 Cache
Smallest and fastest cache
47
L2 Cache
Larger and slower than the L1 cache, instructions are searched for in here if not in L1
48
L3 Cache
Largest and slowest cache, instructions are searched for in here if not in L1 or L2
49
Cache (Disk Type)
a hard disk that is not part of the normal array
50
Character
single character, eg H
51
Colour Depth
the amount of red, green and blue in each pixel
52
Computer Port
hardware that interfaces between the computer and other computers in peripheral devices
53
Audio Port
connector to plug ANALOGUE audio signals into a computer
54
Digital Visual Interface
to connect a video source to a computer monitor
55
Ethernet
mainly used for network and internet connectivity, carries broadband signals between different wired internet-capable devices
56
HDMI
High-Definition Multimedia Interface used to transfer audio/visual data to compatible monitors/IDTV/video projectors
57
IEEE1934 Interface/Firewire
used for high-speed data transfer
58
PS/2 Connector
a six-pin connector used to connect mice and computers
59
Universal Serial Bus (USB)
allows high-speed connectivity with peripheral devices
60
Computer System
operates with hardware and software to create a functional solution
61
Controller
fetches instructions, translates and decodes them and then manages the execution of these instructions. Controls fetch-execute cycle
62
Control Unit
directs the flow of instructions and/or data or coordinates to other parts of the CPU, also generates clock ticks or controls the clock
63
Data
a set of raw facts and figures that have no apparent reasoning
64
Data Capture
the name given to the input of data into the system in a suitable format
65
Digital Input
detects if a voltage is above/below a specific threshold
66
Data Output
allows you to control a voltage with a computer
67
DNS
Domain Name System a distributed database that matches IP addresses to computer system resources, for example, to give a domain name Google instead of 173.194.34.191
68
Durability
how susceptible something is to damage
69
Dynamic Host Configuration Protocol Server
a server that allocates IP addresses
70
Embedded System
a combination of software and hardware that performs a specific task rather than a general-purpose computer that is designed to carry out multiple tasks. Often control real time events so must be completely reliable. They are embedded in firmware and stored in read-only memory. Most react to conditions such as temperature, weight, vibration and air quality, detecting external conditions and reacting to them by recording data, turning motors on or off, sounding an alarm or sending a message to the processor
71
Encryption
means that data can only be read by someone has the same decryption software on the other end (e.g. like on WhatsApp)
72
Fetch-Execute Cycle
Fetch-Execute Cycle – made up of three steps for processing instructions by a currently running program: 1. The fetch cycle takes the address required from the memory, stores it in the instruction register, and moves the program counter on one so that it points at the next instruction. 2. The control unit checks the instruction in the instruction register. The instruction is decoded to determine the action that needs to be carried out. 3. That actual actions that happen during the execution cycle depend on the instruction itself.
73
Fibre Optic Cable
cables with many optical fibres inside plastic casing which transfer data in the form of light
74
a single keystroke
1B
75
a number from 1 to 255
1B
76
one line of text
70B
77
a short e-mail
1KB
78
a third of a page of text
1KB
79
a small picture
8KB
80
a basic webpage
30KB
81
maximum size for all elements of a webpage
100KB
82
a five page word document
500KB
83
a PDF for downloading
500KB
84
a minute of audio when stored as an MP3
1MB
85
a DVD film
5MB
86
an HD file
10MB
87
a Blu-Ray film
25MB
88
maximum amount of data on one CD-ROM
700MB
89
Full-Duplex
allows more than one person to transmit data at once
90
Half Duplex
only allows one person to transmit data at once (e.g. on walkie-talkies)
91
Gateway
a piece of networking hardware used in telecommunication networks that allows data to flow from one discreet network to another
92
Graphics
visual images produced by computer processing
93
Bitmap Image
a type of raster image that is composed of many tiny parts, called pixels, which are often many different colours. It is possible to edit each individual pixel
94
Raster Graphics
dot matrix data structures representing a grid of pixel which cannot scale up without loss of apparent quality. They tend to need a lot of storage
95
Vector Graphics
allows the graphic to resize without losing quality, unlike the other two. This is because they use geometrically primitive objects such as points, lines, curves, shapes or polygons which are based on mathematical expression to represent images
96
GPU
Graphics Processing Unit a microprocessor that performs the calculations needed to produce graphic images on screen. Initially the CPU performed these calculations, but as more complex applications were developed, such as 3D graphics and video quality animations, the GPU was introduced to offload those tasks from the CPU. GPUs can be integrated within the circuitry of the motherboard or provided on a dedicated graphics card.
97
Integrated GPU
uses the computer's RAM. Is cheaper than installing a dedicated GPU, it generates less heat and uses less power. They are perfect for general graphics processing such as watching or editing videos and word processing
98
Dedicated GPU
has its own video memory, used by people such as professional graphic designers and serious gamers, but use more sound and require a good cooling system
99
Sound Card
may be on the motherboard or designed to fit a PCI slot. Enable the computer to output sound through speakers, to record sound from a microphone and to manipulate sound stored or a disk. Sound cards convert analogue input signals into digital data and reverse this process for audio output.
100
Mono Card
a sound card that only allows one channel for multiple speakers
101
Stereo Card
a sound card that allows multiple channels for multiple speakers
102
Hardware
physical parts of a computer system, needed to gain a usable output from the system
103
Hub
node that broadcasts data to every computer or ethernet-based device on a network
104
HMI
Human Machine Interface the user interface that connects an operator to a controller for an industrial system
105
Implicaton
the relationship between two statements
106
Information
data which has been processed and is given a meaning
107
Input Device
where data is inputted into the system e.g. keyboard, mouse
108
Integer
whole number
109
IP Address
Internet Protocol Address an address allocated to a computer system on a network, used to uniquely identify systems on a network, allowing communication between them
110
Lossless Data
a way of compressing data without removing parts
111
Lossy Data
a way of compressing data by removing parts
112
MAC Address
Media Access Control Address a 12-digit hexadecimal number that is most often displayed with a colon or hyphen separating every two digits to make it easier to read. It is a unique identifier for network interfaces
113
Memory
the part of a computer where data or program instructions can be stored for future use
114
Cache Memory
a small memory store used directly by the CPU, holds copies of the most frequently used instructions and data, reduces access time and speeds up processing; is volatile; data can be changed; is very fast
115
Flash Memory
is solid state (adapted from EPROM), composed of a series of logic gates that hold data in a non-binary format, now often used to replace ROM chips, involved in read/write only devices. Is permanent. Can be very slow. Data can be changed.
116
RAM
Random Access Memory Allow multi-tasking so it is possible to have multiple programs running at once, holds data for programs currently being executed, editable, volatile
117
ROM
Read-Only Memory Memory that is uneditable, non-volatile and controls functions such as what the computer does on start up
118
Virtual Memory
incorporates paging and swapping and is a memory management technique that gives the illusion of a very large main memory by moving data out to slower media e.g. a disk when it is not being used. Is used when RAM is full, uses the hard drive to temporarily store RAM content, causes system to slow down and stores programs and data not currently in use and retrieves them when required.
119
Metadata
data about data e.g. height and width of images
120
Microprocessor
an integrated circuit that contains all the functions of the CPU
121
Most Significant Bit
the bit that decides whether a number is positive or negative, where 0 is positive and 1 is negative
122
Motherboard
main circuit board of the computer. The CPU and ROM will be mounted on the mother board, which also provides RAM expansion slots, USB ports, PCI slots for expansion cards and controllers for devices such as the hard drive, DVD drive keyboard and mouse.
123
Negation
a unary argument i.e. it is not
124
Network Interface Card
provides a computer with a connection to a network
125
Network Protocols
allows computers on networks to communicate
126
Wi-Fi
wireless two common standards are Bluetooth and 801.11
127
TCP
Transmission Control Protocol popular communication protocol that is used for communicating over a network and divides any messages into a series of packets that are sent from source to destination where it gets reassembled
128
IP
Internet Protocol an addressing protocol and is often combined with TCP to use a series of packets
129
HTTP
Hyper Text Transfer Protocol allows webpages to be shared
130
HTTPS
Hyper Text Transfer Protocol Secure allows webpages to be shared securely
131
POP3
Post Office Protocol 3 most commonly used for receiving e-mails over the internet
132
SMTP
Simple Mail Transfer Protocol allows transmission of e-mails on a computer network
133
IMAP
Internet Message Access Protocol transfers messages between computer systems via the internet, generally used for retrieval and storage
134
Octet
a group of two digits in a MAC address
135
OSI Model
Open Systems Interconnection Model model that characterises and standardises the communication functions of a telecommunication or computing system regardless of its internal structure
136
Applications Layer
tells the computer how data is going to be used
137
Presentation Layer
tells the computer how to change data to a form that can be read
138
Session Layer
tells the computer how the data is exchanged (e.g. half or full duplex)
139
Transport Layer
tells the computer how the data is going to transported, broken up and put back together
140
Network Layer
tells the computer how things are sent across e.g. traffic control, uses internet protocol, keeps addresses of different computers to each computer, decides routes which data takes
141
Data Link Layer
tells the computer how data will be carried e.g. how quickly
142
Physical Layer
the raw bit that streams over a physical medium (e.g. Bluetooth, Ethernet, USB)
143
Operator
the part of computer instruction which specifies how the data is to be manipulated
144
Operand
the part of computer instruction which specifies what data is to be manipulated or operated on, whilst at the same time representing the data itself
145
Output Device
where information is presented in a logical form
146
Overflow
the result of an addition or shift process if the number it results in is too large to fit in the space avaliable
147
Underflow
the result of a subtraction or shift function where the number it results in is too small for the space avaliable
148
Packet
a collection of data that is transmitted over a packet-switched network. These are provided to a network for delivery to a specified location. Each packet of data is redirected by a computer system along the network until it arrives at its destination. Data may be split into several packets. When all packets have arrived, the data is a reassembled.
149
Packet Switching
the process of delivering packets from one computer system to another
150
Peripherals
devices not mounted on the motherboard, such as input and output devices
151
Pixels
Picture Elements small coloured dots that make up graphics
152
Portability
the ease with which a secondary storage medium can be connected from one device to another
153
Power Supply
used to convert Mains Alternating Current to low-voltage Direct Current for the various components of the system
154
Process
where data that is inputted is converted into a suitable format
155
Protocol
the agreed-upon format which allows two devices to communicate
156
Handshaking
where two devices establish their readiness to communicate, normally part of a protocol
157
Protocol Stacks
a set of network protocol layers that work together
158
Real Number
a number with or without a fraction
159
Register
a storage location found in the CPU where data or control information is stored temporarily. Usually much faster to access than internal memory
160
Accumulator
temporary state register that has data from the ALU sent to it
161
CIR
Current Instruction Register the part of a CPU's control unit that holds the information currently being executed
162
Internal Memory
the memory that is available within the CPU
163
Internal Register
one type of internal memory, used by the processor in conjunction with fetching information from the RAM
164
User Accessible Register
these are used within programmable instructions
165
MAR
Memory Address Register the CPU register that stores the memory address from which the data will be fetched to the CPU
166
MDR
Mobile Data Register used for holding information (either program words or data words) that is in the process of being transferred from the memory to the central processor, or vice versa
167
PC
Program Counter a processor register that indicates where a computer is in its program sequence
168
Reliability
how likely something is to fail through continuous use
169
Router
a networking device that forwards packets between computer networks and performs the traffic direction functions on the internet
170
Routing
the name given to the method of selecting paths along which packets are sent on a computer network
171
Static Routing
where the data travels to its destination along a pre-set path. This is straightforward to implement, but may take longer
172
Dynamic Routing
where data travels to its destination where data packets can take different routes. This is complicated to implement but quicker than static routing
173
Sampling Rate
the number of samples taken per second from the analogue input to create a digital signal. The higher the sample rate the larger the file size
174
Sampling Resolution
the number of bits used to store each sample. The larger the number of bits used, the larger the file size
175
Searching algorithms
used by computers to search for a value in a given list
176
Binary Search
a more efficient way of soring that only works on sorted lists which starts by finding the middle item and comparing it to the value it is searching for; if the middle value is smaller than the value it is searching for then the first half of the list is removed, including the middle value. If the new middle value is larger than the value it is searching for then the top half of the list is removed, including the middle value. This process is repeated until the value is found.
177
Linear Search
goes through each item in an algorithm one by one until it finds the one it is looking for, then it stops the search after potentially going through every item in the list
178
Secondary Storage
non-volatile, long-term storage
179
Optical Devices
uses technology such as lasers
180
Blu-Ray Disk
laser beams are projected onto the disk and if they are reflected back the data is recorded as a 1, if not, a 0. Blu-ray has more storage than CD or DVD.
181
CD
Compact Disk laser beams are projected onto the disk and if they are reflected back the data is recorded as a 1, if not, a 0. CDs have less storage than DVDs or Blu-ray disks.
182
DVD
Digital Versatile Disk laser beams are projected onto the disk and if they are reflected back, the data is recorded as a 1, if not, a 0. DVDs have more storage than CDs, but less than Blu-ray disks.
183
Magnetic Devices
uses technology stored in magnetic mediums (e.g. external hard drive, magnetic hard drive, magnetic tape)
184
Solid State Devices
Called solid state as it does not have any moving parts, unlike the other two. This is increasingly being used to replace but optical and magnetic devices, especially in mobile phones, where its low power consumption and speed is advantageous (e.g. flash memory, solid state drives)
185
Solid State Drives
an electronic storage unit built on solid state architecture
186
Storage in the Cloud
a contemporary storage facility that allows users to store their data on third-party servers. They can then access that data from many computing devices.
187
Speed
the access time to transfer data onto the secondary storage medium
188
Software
actual programs that make the computer run
189
Sorting Algorithms
something a computer uses to set unordered lists and values
190
Bubble Sort
works by working through a list, comparing pairs and values and swapping them if they are in the wrong order. Is simple to implement but is very inefficient.
191
Merge Sort
works by splitting the lists into individual values and gradually merging them to form bigger lists until they are all in one sorted list. Is one of the most efficient when used with both big and small lists.
192
Standards
manufactured following sets of rules, agreed amounts of data loss
193
String
more than one character
194
Switch
similar to a hub, but is able to tell which devices to broadcast traffic to
195
Truth Table
a diagram that shows all possible logical inputs and their associated outputs
196
Unicode
a sixteen-bit character set with 65536 characters available, allowing it enough characters for any writing system. This is the standard character set and is used by all major web browsers and applications. It uses more storage than ASCII, with two bits per character.
197
Wireless Access Point
an access point is a device that creates a wireless local area network. These are normally wireless.
198
Topology
a way in which network devices are arranged
199
Star Topology
where computers are connected separately to one hub or switch in the middle
200
Bus Topology
where computers are connected in a line, also known as daisy chain
201
Ring Topology
where computers are connected in a ring
202
Hybrid Topology
where each computer has more than one route for data to take, most common form of topology
203
Xor
For when conditions are exclusive
204
RISC Processor
Reduced Instruction Set Computer Processes a limited range of simple instructions and needs to break down complex commands into simpler ones to carry them out, but runs cooler, uses less power and are cheaper.
205
8-bit Colour Depth
256 colours
206
Assignment
The process of setting the value stored in a variable
207
Decomposition
breaking a problem down into a number of sub-problems
208
Selection
where a value is assigned a variable, normally in If, Then, Else statements
209
Data Type
defines the range of values a variable may take
210
Concatenating
joining variables together
211
Define subroutine
Declare CapitalLetterOfName End Subroutine
212
Call a routine
call SubroutineNeeded
213
Declare and use arrays
myarray[99]
214
Literal outputs
output "Please enter a number"
215
Variable names
myvariable
216
Define variable data type
myvariable is integer
217
Data types
integer, character, string, boolean
218
Assignment
set counter = 0
219
Selection
if ... else ... end if
220
Comments in Java
/** Comments for Java */
221
Repetition
for i ... next i repeat ... until do ... loop do ... while while ... repeat
222
Flowchart
a way of designing an algorithm that uses different shapes to represent different types of instruction
223
Pseudocode
a way of designing an algorithm in programming-type statements that are not specific to any programming language
224
Oval (in flowchart)
start/stop used to show where the beginning and end of our flowchart is
225
Parallelogram (in flowchart)
input/output used to demonstrate where a flowchart will take in an input, or provide an output
226
Rectangle (in flowchart)
Process used to show any processes or calculations that are happening in our flowchart
227
Diamond (in flowchart)
Decision used to demonstrate a decision or choice that needs to be taken in our flowchart, which will have a 'yes' and a 'no' path from the decision symbol
228
Arrow (in flowchart)
Arrow used to show the flow of data through our flowchart
229
Circle
Connector used to connect parts of the same flowchart that are drawn in different places, such as on different pages
230
Condition
a feature in an algorithm that can be met or not met, causing a different action to be taken
231
Loop
a sequence of instructions that is continually repeated a set number of times or until a condition is met
232
Sequence
the order in which a set of instructions is carried out in an algorithm
233
Selection
a way of creating multiple paths and decisions in an algorithm
234
Variable
a named storage location that contains a value that can change during the execution of a program
235
CamelCase
wayOfwritingVariables
236
Repetition
a way of repeating a set of instructions in an algorithm
237
Count Variable
a variable containing an integer that counts how many times a loop has run
238
Self-Documenting Identifier
any name that you give to a subroutine or a variable that makes it clear what that subroutine or variable is for
239
Annotation
comments written in plain English that are ignored by the compiler and are there to help a programmer and other people who read the code understand it
240
Object
a representation of a real-world thing e.g a library program may contain millions 'book' objects
241
Classes
a template for an object, specifying attributes and methods that belong to each object e.g the library program would only contain one book class, using which many book objects would be created
242
Methods
subroutines that belong to a particular class, that can be run on any object created from that class e.g. the book class, for example, might have a method called 'borrow'
243
Attributes
variables that belong to a particular class e.g. attributes in a book class would include author, title, number of pages, date of publication
244
Subroutine
a named set of instructions that can be called to run from elsewhere in the program, such as procedures and functions
245
Local Variable
a variable that is declared within a function or procedure and can therefore only be used within that function or procedure
246
Global Variable
a variable that is visible throughout the whole of the program
247
Normal Data
typical data that a computer program would be expected to accept
248
Erroneous Data
deliberately invalid data entered to check that the program does not crash, and that error messages display correctly
249
Boundary Data
test data that is on the very edge of a range of valid data
250
Validation
process to check whether something is correct or not
251
Verification
process to check whether user entries are correct
252
Data Handling
collecting and presenting data
253
Data Processing
the collection and manipulation of data to produce meaningful information
254
Authentication
verifying that something is correct
255
Range Checks
checks that data is between two endpoints, a minimum and a maximum value
256
Presence Checks
checks that something has been entered
257
Lookup Table
reduces error, used in situations such as to select a title from a menu
258
Check Digit
checks if an error has occurred by doing some sort of mathematical function, normally with one or two digits
259
Length Check
restricts how many characters can be entered into a text box
260
Format Check
checks the format of something, e.g. that a postcode or vehicle registration number is inputted correctly
261
Double Entry
used in situations where the same piece of data needs to be entered twice, identically, eg when changing a password
262
Mutable
Data that can be changed
263
Assembler
a computer program that will take the mnemonics used in assembly language and covert them into machine code so they can be processed by the computer. This is done by converting one word assembly instructions into opcode, and allocating memory to variables, often resulting in an operand
264
Compiler
takes code written in high-level language and translates it into machine code all at once, before any execution takes place
265
Interpreter
takes code written in high-level language and translates it into machine code one line at a time
266
Translator
tool that translates source code into object code. There are three types: assemblers, compilers and interpreters
267
Opcode
an instruction like and or not
268
Source Code
code which you type
269
Object Code
code which is executed
270
Lexical Analysis
takes the sequence of characters you wrote and translates it into a series of tokens, removing any white space, allowing the computer to see the collection of typed words
271
Symbol Table Construction
created to store variable names and subroutines, checking that variables have been declared properly
272
Syntax Analysis
checks to ensure the code conforms to the rules of that particular language, eg for missing semi-colons
273
Semantic Analysis
checks to ensure the program makes sense, eg checking that variables have been given suitable types and have been declared before use
274
Code Generation
the tokens are translated into object code
275
Guido van Rossum
the man who invented Python in 1991, naming it after Monty Python's Flying Circus
276
IDE
Integrated Development Environment a piece of software designed to help programmers write, test and edit their code, including compiling tools that format and translate the language the code into a language the computer can understand
277
IDLE
Integrated Development and Learning Environment simple IDEs designed for people who are learning to code, with a shell window and an editing window
278
Shell Window
part of an IDLE that shows the output of the program
279
Editor Window
part of an IDE and IDLE used for typing in, editing and saving your code
280
Auto-indentation
where the editor automatically indents lines that need to be indented, such as those ending in colons
281
Syntax Errors
An error that occurs when a command does not follow the expected syntax of the language, e.g., when something is spelled incorrectly
282
Logic Errors
An error that causes a program to output an incorrect answer (does not necessarily crash the program)
283
Upper Camel Case
UpperCamelCase
284
Lower Camel Case
lowerCamelCase
285
Snake Case
Snake_Case
286
Runtime/Execution Error
An error that only occurs when the program is running and is difficult to foresee before a program is compiled and run, such as when a program requests more memory when none is available, so the program crashes
287
Linking Errors
An error that occurs when a programmer calls a function within a program and the correct library has not been linked to that program, such as when the square root of a function is used and the library that calculates the square root has not been given to the program
288
Rounding Error
Rounding is when a number is approximated to nearest whole number/tenth/hundredth etc, such as if 3.45 rounded to the nearest whole number is 35, an error of +0.5
289
Truncation Error
Truncating is when a number is approximated to a whole number/tenth/hundredth etc, nearer zero, such as if 34.9 truncated to whole number is 34, an error of -0.9
290
Str
shortened version of string
291
Bool
shortened version of boolean
292
Casting
converting to a particular data type
293
Exponentiation
raising to a power in python
294
DIV
integer division or quotient, which returns the whole number part after the division
295
MOD
returns only the remainder after division
296
Rational Operators
needed to compare two values or expressions, eg, comparing answers from two different users
297
Index
automatically assigns a numerical value to each character's position in a string
298
==
exactly equal to
299
!=
not equal to
300
<
less than
301
>
greater than
302
<=
less than or equal to
303
>=
greater than or equal to
304
String handling
using tools to process strings
305
String handling
using tools to process strings
306
Selection Block
part of programming giving all the options and outputs that should be given for each one
307
Indent
gap at the start of a line of code
308
Nesting
occurs when one programming construct is used within another, allowing simpler codes
309
Iteration
the process of repeating an instruction
310
For Loops
repeats instructions a certain number of times
311
Inner Loop
loop inside another loop
312
Outer Loop
loop containing other loops
313
Indefinite Loop
also known as a condition-controlled loop, a loop that continues until a specific condition is met or broken
314
Break
a command within a loop that gets the loop to stop
315
Alphanumeric Characters
letters and numbers
316
Brute Force Attack
where hackers have multiple guesses in quick succession at your password until they eventually guess it correctly
317
Cyphertext
text that has been encrypted and cannot be decrypted without a decryption key
318
Digital Footprint
the record that is kept of everything you have done online
319
Nonalphanumeric Data
characters such as punctuation marks
320
Password
used to prove a person’s identity to a computer system, thus allowing them access to relevant data. These should be easy for the user to remember, but hard for other people to guess, can be guessed using formula: Attempts = Number of charactersPassword length
321
User Access Levels
allowing different users to have access to different data, such as giving some people Read Only access, or allowing some people to access more data than others
322
Compression
process that reduces a file's size for efficient storage and transmission
323
MP3
uses lossy compression to reduce the size of an audio file by removing background noise and any sounds that would not be heard by the human ear from the track, meaning it is difficult to tell when listening that anything has changed
324
Arithmetic Operations
used to manipulate numbers
325
Boolean Operations
can be used to join conditional statements together to form 'complex conditions'
326
Complex Conditions
created by boolean expressions, such as and, or, not or xor
327
Virus
programs that can replicated themselves sand be spread from one system to another by attaching themselves to host files, used to modify or corrupt information on a targeted computer system
328
Worms
self-replicating programs that identify vulnerabilities in operating systems and enable remote control of the infected computer
329
Spyware
installed by opening attachments or downloading infected software, used to collect stored data without the user's knowledge
330
Trojan Horse
a program that appears to perform a useful function, but also provides a 'backdoor' that allows data to be stolen
331
Cyberattacks
attacks on computers or networks that use various types of malware
332
Malware
malicious software, a broad term used describe software used to disrupt computer operation
333
Backdoor
built into a computer program that allows someone to bypass any security to get into it
334
Key Loggers
a type of software that can be used ot track keystrokes and capture passwords, accout numbers, fraudulent use or people's online activity
335
Adware
not dangerous in its own right, but may contain links to other malware, such as viruses and key loggers
336
Phishing
fruad where an internet user is tricked, often by e-mail, into revealing personal or confidential information, eg bank details which can be used fraudulently
337
Social Engineering
psychological manipulation of people into revealing personal of confidential information, eg bank details which can be used fraudulently
338
Spear Phishing
a type of phishing with a specific target, where the person doing it has gathered information about their target to effectively fool them
339
Blagging
the act of convincing someone that you are someone else to make them directly give away information such as passwords
340
The Scheme
the first part of the URL, either HTTP or HTTPS
341
Subdomain
the second part of the URL, after the HTTP or HTTPS
342
Second Level Domain
the third part of the URL, before the .com
343
Top Level Domain
the fourth part of the URL, such as .com, .co.uk, .net, .gov
344
Sub Directory
the fifth part of the URL after the .com
345
Human Error
the biggest threat to any kind of cyber security
346
Shouldering
an attack designed to steal a victim’s password or other sensitive data, involving the attacker watching the user input information, for example, over their shoulder, and is often done at PIN machines
347
Name Generator Attack
attacks in which the victim is asked on an app or social media to put in personal details about themselves, often to produce a name, allowing attackers to find out key pieces of information about you to help them answer security questions that protect people’s accounts
348
Smishing
a form of phishing that is done through SMS
349
Acceptable Use Policy
a document that stipulates what users of a network may or may not do with that network
350
Anti-Malware
software that detects and removes harmful software, such as viruses, from a computer
351
Disaster Recovery Policy
a document that describes how a company would aim to recover from catastrophic damage to hardware, software or data
352
Fraud
the crime in which you purposefully deceive someone for monetary gain
353
Penetration Testing
where a company’s system is attacked and the results are reported back to the company
354
Cookie
a text file stored on your computer that contains details about a website that you have visited
355
Parity Checking
the most straightforward method of detecting errors, using a parity bit
356
Signature
all viruses have a unique signature that anti-virus software scans for
357
Anti-Virus
a program that can be loaded into memory when the computer is running that monitors activity on a computer system for the signs of virus infection that scans for a virus’s signature
358
Firewall
a security system that controls incoming and outgoing network traffic, that analyses packets of data to determine whether they should be allowed through or not, its function is to monitor where data has come from and where it is going and to determine if this communication is allowed by checking a list of pre-determined rules, not to stop viruses
359
SQL Injection
a technique where malicious user can inject SQL commands into SQL statement, via web page input, which can alter SQL statements and compromise the security of information held in a database
360
SQL
Structured Query Language a set of commands that allow you to get information
361
DoS Attack
Denial of Service Attack, attempt to make your website and servers unavailable to legitimate users by swamping a system with fake requests, usually in an attempt to exhaust server resources, not to break system security, involving a single internet connection
362
Two's Complement
an operation done on binary numbers, to turn them into the inverse i.e. turning a positive sign to negative
363
Radix Complement
methods of manipulating binary numbers, e.g. two’s complement
364
Hashing
performing an algorithm on a password which allows entered passwords to be checked, without allowing the actual password to be viewed
365
Archive
long-term storage of files no longer in use
366
FTP
File Transfer Protocol used for uploading files