GCSE Computer Science Key words A-C

HideShow resource information
  • Created by: DSD
  • Created on: 29-12-17 20:29
Abstraction
Picking out the important bits of information.
1 of 66
Accumulator
The part of the ALU that stores the intermediate results when doing a calculation.
2 of 66
Active attack (networks)
A network attack where the hacker attempts to change data or introduce malware
3 of 66
Algorithmic thinking
Coming up with an algorithm to solve a problem.
4 of 66
Algorithm
A step-by»step set of rules or instructions.
5 of 66
Alphanumeric
The collective name for letters, digits and symbols.
6 of 66
Analogue signal
A continuous signal which can’t be processed by a computer.
7 of 66
AND operator
One of the Boolean operators. 0∧0=0 1∧0=0 1∧0=0 1∧1=1
8 of 66
Anti-malware software
Software designed to stop malware from damaging a computer or network.
9 of 66
Application
A piece of software written to help users do various tasks, often through a graphical user interface with menus and toolbars.
10 of 66
Architecture
Describes how the CPU works and interacts with the other parts of the computer system.
11 of 66
Argument
A value that a parameter of a sub program actually takes.
12 of 66
Arithmetic logic unit (ALU)
The part of the CPU that carries out arithmetic and Boolean operations.
13 of 66
Arithmetic operator
An operator that programs use to carry out simple mathematical operations.
14 of 66
Array
A data structure where all the data is stored and defined under one variable name.
15 of 66
ASCII
A 7-bit character set consisting of 128 characters.
16 of 66
Assembler
A program that turns assembly language into machine code.
17 of 66
Assembly language
A low-level language.
18 of 66
Assignment operator
(=) Assigns the value on the right hand side to the name on the left hand side.
19 of 66
Authentication
A process for checking the identity of the user.
20 of 66
Backdoor
A vulnerability in a computer or network’s security that a hacker could exploit.
21 of 66
Bandwidth
The amount of data that can be transferred on a network in a given time.
22 of 66
Binary
A counting system using base-2 consisting of Us and is.
23 of 66
Binary shift
Moving the bits in a binary number left or right and filling the gaps with 0's
24 of 66
BIOS (Basic Input Output System)
Software stored in ROM responsible for booting up a computer system.
25 of 66
Bitmap image
A graphic that is made up of pixels.
26 of 66
Bit
A binary digit, either 0 or 1.
27 of 66
Bit rate
The number of bits used per second of sampled audio.
28 of 66
Boolean
A logical system using the operators OR, AND and NOT. The Boolean data can take one of two values, either true or false.
29 of 66
Breakpoint
A programming tool used to halt a program at a specific place.
30 of 66
Brute force attack
A network attack which uses software to crack security passwords through trial and error.
31 of 66
Bus topology
A network topology in which all devices are connected to a single backbone cable.
32 of 66
Byte
8 bits
33 of 66
Cache (CPU)
Quick access memory inside the CPU.
34 of 66
Casting
A way of changing from one data type to another.
35 of 66
Cat 5 / Cat 6 cable
Standards for copper Ethernet cables used on LANs.
36 of 66
Censorship
The control lusually by a government or organisation! of what information other people can access.
37 of 66
Channel (Wi-Fiw)
A small range of Wi-Fi‘ frequencies.
38 of 66
Character
A single alphanumeric symbol.
39 of 66
Character set
A group of characters that a computer recognises from their binary representation.
40 of 66
Check digit
A digit added to a string of digits which is used to check if all the digits have been entered and read correctly.
41 of 66
Checksum
A number used to check if a packet of data sent between networks has been received correctly.
42 of 66
Client
A device which requests data from a server.
43 of 66
Client-server network
A type of network managed by a server, which takes requests from client devices.
44 of 66
Clock speed
The number of instructions a processor can carry out each second.
45 of 66
Cloud computing
The use of the Internet to store files and provide software. Also known as the cloud.
46 of 66
Code editor
Part of an IDE where you write and edit your source code.
47 of 66
Colour depth
The number of bits used for each pixel in an image file.
48 of 66
Command-line interface
A text-based user interface where the user types in commands.
49 of 66
Comment
A note added to source code to say what part of a program does.
50 of 66
Comparison operator
Compares two values and outputs either true or false.
51 of 66
Compiled code
An executable file created by a compiler.
52 of 66
Compiler
A programming tool to translate source code into machine code.
53 of 66
Compression
The process of making the size of a file smaller.
54 of 66
Computational thinking
Tackling a problem through decomposition, abstraction and algorithmic thinking.
55 of 66
Concatenation
Joining strings together.
56 of 66
Condition-controlled loop
An iteration statement that repeats a set of instructions until a condition is met.
57 of 66
Constant
A named value which cannot be altered as the program is running.
58 of 66
Control unit (CU)
The part of the CPU that controls the flow of data.
59 of 66
Copyright
A legal right that prevents others from copying or modifying your work without permission.
60 of 66
Core (CPU)
A processing unit found inside the CPU.
61 of 66
Count-controlled loop
An iteration statement that repeats a set of instructions a given number of times.
62 of 66
CPU (or processor)
The part of the computer system that processes the data. It contains the control unit, ALU and cache.
63 of 66
Creative Commons licence
Permits sharing of a creative work as long as certain requests from the original creator are upheld.
64 of 66
Cultural issue
An issue which affects a particular religious, ethnic, national or other group.
65 of 66
Cyberbullying
Using social media to deliberately harm someone else.
66 of 66

Other cards in this set

Card 2

Front

The part of the ALU that stores the intermediate results when doing a calculation.

Back

Accumulator

Card 3

Front

A network attack where the hacker attempts to change data or introduce malware

Back

Preview of the back of card 3

Card 4

Front

Coming up with an algorithm to solve a problem.

Back

Preview of the back of card 4

Card 5

Front

A step-by»step set of rules or instructions.

Back

Preview of the back of card 5
View more cards

Comments

ChandlerAnthony

Report

Good.

Lleyton Williams

Report

Good.

Max Elkin

Report

Good.

ChandlerAnthony

Report

Amazing.

Lleyton Williams

Report

Amazing.

c.hutchinson13

Report

Good.

p.bukov12

Report

Bad !

Oscar_Harte

Report

  • stuff.
harry edensor

Report

Great!

Lleyton Williams

Report

Superb.!

j.gulliver13

Report

bukov what you saying these are the bomb

Max Elkin

Report

AMAZING

CallumHogan

Report

SO GOOD :D

Max Elkin

Report

GOOD THEN...

panhead

Report

NOICE

panhead

Report

Similar Computing resources:

See all Computing resources »See all Glossary of words A-C resources »