GCSE Computer Science Key words N-P

HideShow resource information
Nested IF statement
A selection statement made up of multiple lF statements inside each other.
1 of 44
Network forensics
Investigations that organisations undertake to find the cause of attacks on their network
2 of 44
Network interface controller (NIC)
An internal piece of hardware that allows a device to connect to a network.
3 of 44
Network policy
A set of rules and procedures an organisation will follow to ensure their network is protected against attacks.
4 of 44
Network security
Protection against network attacks.
5 of 44
Nibble
4 bits.
6 of 44
Non-volatile memory
Memory that retains its contents when it has no power.
7 of 44
Normal data
A type of test data that simulates the inputs that users are likely to enter.
8 of 44
NOT
One of the Boolean operators. logic gate. 0¬ =1 1¬ =0
9 of 44
Open source (software)
Software that can be modified and shared by anyone.
10 of 44
Operating system
A piece of software responsible for running the computer, managing hardware, applications, users and resources.
11 of 44
Operator
A special symbol like +, ‘, =, AND, ==, that carries out a particular function.
12 of 44
Optical disc
CD, DVD or BIu-Ray disc that is read / written to with lasers.
13 of 44
Optical drive
Device used to read and write to optical discs.
14 of 44
0R
One of the Boolean logic gate operators. 0∨0=0 1∨0=1 0∨1=1 1∨1=1
15 of 44
Overclocking
Running a CPU at a higher clock speed than was intended.
16 of 44
Overflow error
An error that occurs when the computer attempts to process a number that has too many bits for it to handle.
17 of 44
Packets (networks)
Small, equal-sized units of data used to transfer files over networks.
18 of 44
Packet switching
The process of directing data packets on a network using routers and the IP protocol.
19 of 44
Parameter
A variable that a sub program requires in order to run — it’s only defined within the sub program.
20 of 44
Parity bit
A bit placed at the end of binary data to show if it’s been received correctly.
21 of 44
Passive attack (networks)
Where a hacker monitors data travelling on a network.
22 of 44
Password
A string of characters that allows access to certain parts of a computer or program.
23 of 44
Patent
A licence that protects new inventions, ideas and concepts
24 of 44
Payload (network packets)
The part of a packet with the actual data.
25 of 44
Peer-Io-peer (P2P) network
A network in which all devices are equal and connect directly to each other.
26 of 44
Pentesting (penetration testing)
The process of simulating attacks on a network to identify weaknesses.
27 of 44
Peripherals
External hardware connected to a computer.
28 of 44
Petabyte
1000 terabytes.
29 of 44
Phishing
When criminals send emails or texts to someone claiming to be a well- known business.
30 of 44
Pixels
Small dots that make up a bitmap image.
31 of 44
Platform
A computer system that other applications can run on.
32 of 44
POP3
A protocol used to retrieve emails from a server.
33 of 44
Power supply
A piece of hardware that gives the other pieces of hardware the energy they need to run.
34 of 44
Primary storage
Memory that can be accessed directly by the CPU.
35 of 44
Procedure
A sub program that carries out a list of instructions.
36 of 44
Processing
The execution of program instructions by the CPU.
37 of 44
Program counter (PC)
Holds the memory address of the next CPU instruction.
38 of 44
Program flow
The order in which statements are executed in a program (controlled with selection and iteration statements).
39 of 44
Program
A set of instructions that can be executed on a computer: programming
40 of 44
Proprietary software
Software where modifying and sharing is not permitted.
41 of 44
Protocols (networks)
A set of rules for how devices communicate over a network.
42 of 44
Pseudocode
A set of instructions in the style of a programming language but using plain English.
43 of 44
Public domain
Describes content which has no copyright attached to it.
44 of 44

Other cards in this set

Card 2

Front

Investigations that organisations undertake to find the cause of attacks on their network

Back

Network forensics

Card 3

Front

An internal piece of hardware that allows a device to connect to a network.

Back

Preview of the back of card 3

Card 4

Front

A set of rules and procedures an organisation will follow to ensure their network is protected against attacks.

Back

Preview of the back of card 4

Card 5

Front

Protection against network attacks.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all GCSE Computer Science Key words N-P resources »