GCSE Computer Science Key words Q-Z

  • Created by: DSD
  • Created on: 30-12-17 12:12
Query
A request to retrieve data that meets certain conditions from a database.
1 of 80
RAM
The main memory of a computer. (Volatile)
2 of 80
Ransomware
A type of malware that uses encryption to lock the user out of their files.
3 of 80
Real (data type)
A numerical data type for decimal numbers.
4 of 80
Record
A data structure used to store multiple items of data about one ’thing’ together. A row in a database table
5 of 80
Register
A temporary data store inside a CPU.
6 of 80
Repetitive strain injury (RSI)
A health problem caused by doing repeated movements over a long period of time.
7 of 80
Resolution
The density of pixels in an image, often measured in dpi.
8 of 80
Ring topology
A network topology where the devices are connected in a ring, with data moving in one direction.
9 of 80
ROM (Read only memory)
Memory that can be read but not written to.
10 of 80
Router
A piece of hardware responsible for transmitting data between networks.
11 of 80
Run-time environment
Allows code to be run and tested from within an IDE.
12 of 80
Sample size (Audio)
The number of bits available for each audio sample .
13 of 80
Sampling frequency (Audio)
The number of audio samples that are taken per second.
14 of 80
Sampling intervals (Audio)
The time between each sample.
15 of 80
Sanitisation (programming)
Removing unwanted characters from an input.
16 of 80
Scareware
A type of malware that creates false messages to trick the user into following malicious links.
17 of 80
Script
A simple program, often run on command-line interfaces to automate tasks.
18 of 80
Search algorithm
A set of instructions that you can follow to find an item in a list.
19 of 80
Secondary storage
External data storage used to store data so that the computer can be switched off.
20 of 80
Selection statement
A statement which causes the program to make a choice and flow in a given direction — e.g. IF and SWITCH»CASE statements.
21 of 80
Server
A device which provides services for other devices (clients), e.g. file storage / web pages / primer access.
22 of 80
Sharing economy
Where people make money from things they already own.
23 of 80
Single—user
When an operating system only allows one user to use it at any one time.
24 of 80
SMTP (Simple Mail Transfer Protocol)
Used to send emails and transfer emails between servers.
25 of 80
Social engineering
A way of gaining illegal access to data or networks by influencing people.
26 of 80
Social media
Web applications which allow people to communicate and share content with others online.
27 of 80
Software
Programs or applications that can be run on a computer system.
28 of 80
Software licence
A legal agreement that states how software can be used and distributed.
29 of 80
Solid state drive (SSD)
Alternative to a traditional magnetic hard disk drive that uses flash memory.
30 of 80
Sorting algorithm - Bubble, Merge, Insertion etc
A set of instructions that you can follow to order a list of items.
31 of 80
Source code
The actual written code of a program.
32 of 80
Spoof website
A fake website that tricks users into thinking it’s another well known website.
33 of 80
Spyware
A type of malware which secretly monitors and records user actions.
34 of 80
SQL (Structured Query Language)
A programming language used to manage and search databases.
35 of 80
SQL injection
A piece of SQL code which can be typed into an input box to try and attack the SQL database.
36 of 80
Stakeholder
Somebody who has an interest in or is affected by the decisions of an organisation.
37 of 80
Star topology
A type of network topology where all devices are connected to a central switch or server which controls the network.
38 of 80
Static IP address
A permanent IP address.
39 of 80
Storage device
A device used to read and write data to a storage medium.
40 of 80
Storage medium
A thing that holds data. It can be part of the storage device (e.g. magnetic disks inside a hard drive) or separate (like a CD).
41 of 80
String
A data type for text.
42 of 80
Sub program
A set of code within a program that can be called at any time from the main program.
43 of 80
Surveillance
The act of monitoring what people are accessing on the Internet
44 of 80
SWITCH-CASE statement
A type of selection statement.
45 of 80
Switch (network)
Connects devices together on a LAN and directs frames of data to the correct device.
46 of 80
Syntax error
An error in the code where the rules or grammar of the programming language have been broken.
47 of 80
System software
Software designed to run or maintain a computer system. Also known as utility software.
48 of 80
TCP/IP
A set of protocols which dictate how data is sent over the Internet. Made up of Transmission Control Protocol.
49 of 80
Terabyte
1000 gigabytes.
50 of 80
Tertiary storage
High-capacity external storage used mainly for back ups.
51 of 80
Test data
Inputs that are chosen to see if a program is behaving as intended.
52 of 80
Testing
A way of checking if a program functions correctly and meets certain requirements.
53 of 80
Test plan
A detailed plan of how a program is going to be tested including what test data will be used.
54 of 80
Topology (networks)
How the devices in a network are connected together.
55 of 80
Traffic (networks)
The amount of data travelling on a network.
56 of 80
Translator
A program that turns a programming language into machine code.
57 of 80
Trojans
A type of malware which is disguised as legitimate software.
58 of 80
Trolling
The act of trying to provoke public arguments online.
59 of 80
Truth table
A table listing all possible binary inputs through a logic circuit, with the corresponding outputs.
60 of 80
Unicode
A large character set that attempts to include all possible characters.
61 of 80
URL (Uniform Resource locator)
An address used to access web servers and resources on them.
62 of 80
User access levels
Controls what files or areas of the network different groups of users can access.
63 of 80
User interface
Provides a way for the user to interact with the computer.
64 of 80
Utility software
Software designed to help maintain a computer system.
65 of 80
Validation
Checking that an input meets certain criteria.
66 of 80
Variable
A named value which can be changed as the program is running.
67 of 80
Viral
Content on the Internet which has spread rapidly via social media.
68 of 80
Virtual memory
Area of secondary storage used by the OS as extra RAM.
69 of 80
Virtual network
A software-based network that exists between devices on a physical network.
70 of 80
Virtual server
A software-based server. 45 virus A type of malware which spreads by attaching itself to files.
71 of 80
Volatile memory
Memory that loses its contents when it has no power.
72 of 80
Von Neumann
A type of CPU architecture.
73 of 80
WAN (Wide Area Network)
A network which connects networks in different geographical locations.
74 of 80
WHILE loop
Type of iteration statement.
75 of 80
Wi-fi
The standard used for wireless connections between devices.
76 of 80
WIMP
A GUI based on windows, icons, menus and pointers.
77 of 80
Wireless access point (WAP)
A piece of hardware that allows devices to connect wirelessly.
78 of 80
World wide web (www)
The collection of websites hosted on the Internet.
79 of 80
Worms
A type of malware which replicates itself.
80 of 80

Other cards in this set

Card 2

Front

The main memory of a computer. (Volatile)

Back

RAM

Card 3

Front

A type of malware that uses encryption to lock the user out of their files.

Back

Preview of the back of card 3

Card 4

Front

A numerical data type for decimal numbers.

Back

Preview of the back of card 4

Card 5

Front

A data structure used to store multiple items of data about one ’thing’ together. A row in a database table

Back

Preview of the back of card 5
View more cards

Comments

panhead

Report

first

Great_Western_Railway

Report

Bob was here!

panhead

Report

repetitive strain injury shoulkdnt be on there by the way

Great_Western_Railway

Report

The answer to all these questions are magic

Similar Computing resources:

See all Computing resources »See all Computer Science Key words Q-Z resources »