Edexcel IGCSE Computer Science Glossary

Ace your homework & exams now with Quizwiz!

constant

a 'container' that holds a value that never changes. Like variables, constant have unique identifiers.

hexadecimal

a base-16 number system. There are 16 digits and the place values increase in powers of 16.

code vulnerability

a computer program ( the code ) that has been written in such a way that it creates a security issue that may be taken advantage of to gain access to the computer system or data within it

debugger

a computer program that assists in the detection and correction of errors in other computer programs

agent

a computer system that can interpret its environment ( through its sensors ). It can act autonomously upon that environment ( through its effectors )

back-up

a copy of files in another location so that they are still available if the original copy is damaged or lost. Backing up is the process of making a back-up copy.

function

a function is a subprogram that performs a specific task and can be used at any point in the program. High-level programming languages have a number of useful built-in functions. You can also create your own or use functions available in online libraries

bus

a group of connections between devices in a computer

block of code

a grouping of two or more code statements

assembly language

a low-level language written using mnemonics

gigaertz (GHz)

a measure of frequency equivalent to 1000 million cycles per second

function machine

a metaphor or diagram that represents a machine that takes an input. It applies a rule such as a set of operations and delivers the answer as an output.

client-server network

a network that has at least one server to provide services to the client computers

developer

a person whose job is to create new software

algorithm

a precise method for solving a problem. All instructions given to a computer must be unambiguous or it won't know what to do.

dual-core processor

a processor with two processor cores

high-level programming language

a programming language that is similar to natural human language

Bluetooth

a protocol for the short-range wireless interconnection of mobile phones, computers, and other electronic devices

audit trail

a record of activities that have taken place on a computer system. This record is generated automatically and will record what has happened and who or what made the change.

ethics

a set of moral principles that govern a person's behaviour

construction

a smaller part from which something is built, Letters and numbers (i.e A to Z and 0 to 9 ) are the constructs we use to build our language and convey meaning. Bricks and cement are the basic constructs of a building

checksum

a technique for finding errors. A mathematical formula is applied to the date and the resulting number value is tansmitted with the date. The recipient computer applies the same formula to the received data. It then compares the checksum sent with the date to the calculated checksum. If the checksums don't match, the data is likely to have been corrupted. So, the recipient computer requests the data again.

cache

a temporary data store so that the data can be accessed very quickly when needed

compiler

a translator that converts high-level language source code into object code, often machine code. The source code is translated all at once and saved to be executed later.

heuristic

a type of algorithm capable of finding a solution to a problem quickly and easily. This is done through trial and error and educated guesswork to cut corners and remove less likely alternatives. Heuristic algorithms don't always find the best solution, but they will usually find one that works

identifier

a unique name given to a variable or a constant. Using descriptive names for variables makes code much easier to read

firewall

a utility that controls program access to the network, both incoming and outgoing

defragmenter

a utility that moves file clusters on a disk so they are closer to each other in order to speed up disk access

global variables

a variable that can be accessed from anywhere in the program, including inside subprograms

disk trashing

a very high rate of hard disk access

brute force

an algorithm design that does not include any techniques to improve performance, but instead relies on computing power to try all possibilities until the solution to a problem is found

divide and conquer

an algorithm design that works by dividing a problem into smaller and smaller sub-problems, until they are easy to solve. The solutions to these are then combined to give a solution to the complete problem

Denial of Service ( DoS )

an attack on a network that attempts to prevent legitimate users from accessing its services

clock

an electronic device inside a CPU that 'ticks' at regular intervals and is used to synchronise the actions of the other parts of the CPU

bug

an error or flaw in a computer program

field

an individual element in a record

binary shift

an operation done on all the bits of a binary value in which they are moved by a specific number of places to either left or right

arithmetic operator

an operator that performs calculation on two numbers

Creative Commons

an organisation that allows people to set copyright terms for their intellectual property. One use of a Creative Commons license is to allow people to copy material as long as it is not used commercially.

data structure

an organised collection of related elements, Arrays and records are two common data structures used in programming.

array

an organized collection of related values that share a single identifier

e-waste

any form of discarded electronic equipment, including computing technology

cyber attack

any kind of malicious attack on a network connected device

decomposition

breaking a problem down into smaller, more manageable parts, which are then easier to solve

compression

changing the format of a data file so that the size of the file becomes smaller

entanglement

co-dependence of the quantum states of pairs or groups of particles

application programming interface ( API )

code that allows two programs to communicate each other

DNA

deoxyribonucleic acid. It is a self-replicating material which is present in nearly all living organisms as the main constituent of chromosomes. It is carrier of genetic information.

ciphertext

encrypted plaintext

digital inclusion

ensuring that everyone has affordable access to computing technology and the necessary skills to take advantage of it

Hypertext Markup Language ( HTML )

essentially a text document that contains any text to be displayed along with: -details of how the text should be formatted (e.g. font, size, colour, etc. ) -details of any hyperlinks and where they link to using a URL -details of any objects such as pictures or videos that should be shown within the web-page when it is displayed

built-in functions

functions that are provided in most high-level programming languages to perform common tasks

central processing unit ( CPU )

hardware device that carries out the processing in a computer

emulator

hardware or software that allows one type of computer system to behave like another

eavesdrop

having unauthorised sight of data being sent from one computer to another over a network

digital

information represented by certain fixed values ( e.g. high, medium or low ). Any signal between these values would be meaningless and not used. Sending and receiving systems do not have to be as accurate as for analogue communication.

binary

information represented by only two values ( e.g. voltage or no voltage ; on or off ). There are no communication errors or misunderstandings because there are no small differences

cache memory

memory used to make up for the difference in speed between two internal components

decimal prefix

multiplies a unit by powers of 10

binary prefix

multiplies a unit by powers of 2

concurrent

processes that run at the same time are described as being concurrent

cloud storage

secondary storage, often belonging to a third party, that is accessed via a network, usually the internet, and so is not in the same physical place as the machine's RAM/ROM. Files stored "in the cloud" can be accessed from anywhere via an Internet connection

autonomous

self-directed and acts without requiring any help or guidance. Can choose its own goal and uses its experience to achieve it.

fetch-decode-execute cycle

sequence of steps carried out repeatedly by a CPU

flowchart

shows an algorithm as a diagram. Each step in the algorithm is represented by a symbol. Symbols are linked together with arrows showing the order in which steps are completed.

application software

software that performs a task that would otherwise be done by hand, perhaps a pen and paper

Boolean

something that can take only the values True or False ; named after English Mathematician George Boole

effectors

something that produces an effect by carrying out an action

IF...THEN...ELSE statement

the IF...THEN...ELSE statement allows a choice to be made between two alternatives based on whether or not a condition is met ( e.g. IF it is cold THEN wear a jumper ELSE wear a T-shirt )

assignment statement

the SET .. TO command is used to initialise variables in pseudocode

hacking

the act of gaining unauthorised access to a computer system and the data it contains

carbon footprint

the amount of carbon dioxide an individual or organization produces as a result of the energy they consume

bandwidth

the amount of data that can be carried on a network in a given period of time

byte

the basic combination of bits used to represent an item of information. A byte typically consists of 8 bits

character set

the defined list of characters recognised by a computer's hardware and software

digital divide

the gap between people who are technology-empowered and those who are technology-excluded

concatenation

the linking together of two or more items of information

communication media

the means by which data is transmitted between devices on a network. Coaxial cable, fibre-optic and microwaves are all forms of communication media.

colour depth

the number of bits used to encode the colour of each pixel

bit depth

the number of bits used to encode the information from each sample. Increasing the number of bits used increases the amount of detail contained in each sample.

bus width

the number of wires that make up a bus. This determines the range of binary numbers that can be communicated

control unit

the part of CPU that organises the actions of the other parts of the CPU

arithmetic/logic unit ( ALU )

the part of the CPU that performs calculations and logic operations

execution

the process by which a computer carries out the instructions of a computer program

authentication

the process of providing to a computer system who you are ( e.g. using a username and password )

abstraction

the process of removing or hiding unnecessary detail so that only the important points remain

encryption

the process of turning information ( e.g. a message ) into a form that only the intended recipient can decode , or decrypt and read. The message is encoded using an agreed method or algorithm. This is called the key. The encrypted is called a cipher.

fidelity

the relationship between the original sound and the recording. The greater the fidelity, the greater the similarity between them. Very high accuracy is called hi-fidelity or just hi-fi.

binary digit ( bits )

the smallest unit of data that is represented in a computer. It has a single binary value , either 1 or 0.

identity theft

the stealing of someone's personal details, such as their bank account number, sort code or passport number, for the purpose of making purchases and running up debts in their name

computational thinking

the thought processes involved in formulation problems and their solutions so that the solutions are represented in a form that can be effectively carried out by a computer

access control

this decides which users have access to which data, and what they are allowed to do with it

descending order

this is arranging items from largest to smallest ( e.g. 6,5,4,3,2,1, or f,e,d,c,b,a )

ascending order

this is arranging items from smallest to largest ( e.g. 1, 2 ,3 ,4, 5, 6, 7, or a, b, c, d )

domain name

this is part of the URL for a resource on the Internet. When the domain name is used, it will be converted to the correct IP address by the domain name service ( DNS ) and the contact will take place

definite iteration

this is used when the number of iterations, or 'turns of the loop', is known in advance. It can be set to as many turns as you want. This sort of loop is said to be "count controlled"

assembler

translates the mnemonics of assembly language programs into machine language instructions for the microprocessor to carry out

arithmetic shift

used for signed binary numbers. When performing a right shift, the bits at the left are replaced by copies of the most significant bit

analogue

using signals or information represented by a quantity ( e.g. an electric voltage or current ) that is continuously variable. Changes in the information being represented are indicated by changes in voltage. This method requires very accurate sending and receiving systems.

cache miss

when the data requested for processing by a component or application is not found in the cache memory


Related study sets

Chapter 22: Nursing Care of the Child With a Neuromuscular Disorder

View Set

Writing Workshop: Compare-Contrast Essay

View Set

The American Frontier & Industrial North Quiz

View Set

Art Appreciation Quiz #7 - Themes

View Set

Cognition, Perception, and Emotion-PSYCH

View Set

Chapter 2-2 (Economic Conditions Change)

View Set

Chapter 12 - Managing Workforce Flow

View Set

Gero midterm CH4 (21,1,2)// CH8//

View Set

Taxes, Retirement, and Other Insurance Concepts Quizzes

View Set

Corporate Finance MGMT 332 Chapter 16

View Set