Computer Science Definitions

?
Algorithms
A sequence of steps taken to solve a problem.
1 of 43
MTBF
Mean time between failures.
2 of 43
Hardware redundancy
Having more than one component that does the same job.
3 of 43
Disaster recovery
The use of backup data to restore a system within hours.
4 of 43
Phishing
Attempt to acquire sensitive information such as usernames, passwords and credit cards.
5 of 43
Hacker
A person who uses computers to gain unauthorised access to data.
6 of 43
Encryption
The most effective way to achieve data security. To read an encrypted file you must have access to a sector key or password that enables you to decrypt it.
7 of 43
Bitmap
An image stored as a series of values. The colours of each pixel is stored in a separate file.
8 of 43
Pixel
An individual picture element
9 of 43
Colour depth
The number of bits used to represent the colour of 1 pixel.
10 of 43
Resolution
The number of pixels in an image.
11 of 43
Meta data
Data about the image needed to represent an image i.e. resolution, colour depth and image dimensions.
12 of 43
Instruction set
The group of instructions available for a given processor to use. The number of instructions available depends on the number of bits used to store.
13 of 43
Op code
Operation code is the group of bits in an instruction that represents the operation.
14 of 43
Compiler
A piece of system software that converts a program written in a high level programming language into machine code.
15 of 43
Machine code
Binary representation of a program.
16 of 43
Analoge
Continuously changing sound waves such as natural sound.
17 of 43
Digital
Data that is made up of separate values i.e. how data is stored on a computer.
18 of 43
Sample rote
The number of times per second that the sound wave is measured. The higher the rate the more accurate the sound wave is represented.
19 of 43
Sample resolution
The number of bits used to store the value of each sample. The higher the bits the more accurate the value is stored.
20 of 43
ADC
Analoge to digital converter. Takes analogy sound and turns it into a binary representation.
21 of 43
CPU
Controls the main memory, the processor, main memory and cache.
22 of 43
Main memorie
Often referred to as RAM, used for temporarily storing programs while they are running.
23 of 43
Processor
Main component in the computer that fetches, decodes and execute instructions.
24 of 43
Cache
High speed memory that helps improve the processor speed.
25 of 43
Clock speed
The number of instructions the processor can execute per second measured in Hz.
26 of 43
System buses
The circuits that connect the processor and main memory.
27 of 43
Dual core
The number of processors per CPU that can independently run instructions.
28 of 43
Virtual memory
Memory programmed to look like main memory but is stored on a hard drive.
29 of 43
Volatile
Memory that is lost when the power is turned off.
30 of 43
Non-volatile
Memory does not require a power supply.
31 of 43
ROM
Read only memory, used to start up the computer. Data is not lost when power is turned off.
32 of 43
Boolean expression
An expression that is either true or false.
33 of 43
Truth table
A table that shows all possible outcomes of inputs and their logical output value.
34 of 43
WAN
Wide area network, which operates across multiple sites often spreading over a geographical area.
35 of 43
LAN
Local are network, a network spread our across a single network.
36 of 43
NIC
Network interface card is a card that goes into a computer to allow it to connect to a LAN.
37 of 43
MAC address
A unique hardware number given to every NIC. It is a 48 bit number usually written in hex.
38 of 43
Peer to peer
The organisation of devices are equal and can access resources on another computer.
39 of 43
Client to server
The organisation of devices on a network where some devices have specialised roles like the server.
40 of 43
Protocol
A set of rues that states how devices can communicate e.g. http
41 of 43
Packets
A fixed sized chunk of a message sent over a network.
42 of 43
DBMS
Database management system . The system that separates the data from the application and provides features that allow databases to be created and maintained.
43 of 43

Other cards in this set

Card 2

Front

Mean time between failures.

Back

MTBF

Card 3

Front

Having more than one component that does the same job.

Back

Preview of the back of card 3

Card 4

Front

The use of backup data to restore a system within hours.

Back

Preview of the back of card 4

Card 5

Front

Attempt to acquire sensitive information such as usernames, passwords and credit cards.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Definitions resources »