Glossary 2

?
Instruction set
The pattern of 0s and 1s that a particular processor recognises as commands, along with their associated meanings
1 of 190
Opcode
An operation code or instructions used in assembly language
2 of 190
Operand
A vale or memory address that forms part of an assembly language instruction
3 of 190
Addressing mode
The way in which the operand is interpreted
4 of 190
Assembly language
A way of programming using mnemonics
5 of 190
Mnemonics
Short codes that are used as instructions when programming e.g. LDR, ADD
6 of 190
Direct address
The operand is the datum
7 of 190
Immediate address
The operand is the memory address or register number
8 of 190
Data transfer operations
Operations within an instruction set that move data around between the registers and memory
9 of 190
Arithmetic operaions
Operation within an instruction set that performs basic maths e.g. add and subtract
10 of 190
Shift instructions
Operations within an instruction set that move bits within a register
11 of 190
Logical operations
Operations within an instruction set that move the bits around within the operand
12 of 190
Branch operations
Operations within an instruction set that allow you to move from one part of the program to another
13 of 190
Digital camera
A device for creating digital images of photographs, which can be printed or transferred onto a computer to be manipulated and stored
14 of 190
Charge coupled device (CCD)
In digital cameras it is a sensor that records the amount of light received and convert it into a digital value
15 of 190
Complementary metal oxide semiconductor (CMOS)
Is an alternative technology that performs the same functions as a CCD
16 of 190
RGB filter
Red, Green and blue filters that light passes through in order to create all other colours
17 of 190
Compression
The process of reducing the size of a file
18 of 190
Resolution
The number of pixels used to create an image
19 of 190
Barcode reader
A device that uses lasers or LEDs to read the black and white lines of a barcode
20 of 190
Radio frequency identification(RFID)
A microscopic device that stores data and transmits it using radio waves-usually used in tags to track items
21 of 190
Laser printer
A device that uses lasers and toner to create mono and colour printes
22 of 190
Hard disk (HDD)
A secondary storage device made up of metallic disks that stores data magnetically
23 of 190
Controller
In SSDs a controller is needed to organise data into blocks for storage purposes
24 of 190
Block
In data storage it is the concept of storing data into set groups of bits and bytes of a fixed length
25 of 190
Floating gate transistor
In SSDs it is a type of non-volatile transistor that stores data even without a power source
26 of 190
Unauthorised access
Where computer systems or data are used by people who are not the intended users
27 of 190
Code of conduct
A voluntary set of rules that define the way in which individuals and organisations will behave
28 of 190
Legal issue
Factors that have been made into laws by the government
29 of 190
Data misuse
Using data for purposes other than for which it was collected
30 of 190
Copyright
The legal ownership that applies to software, music, films and other content
31 of 190
Cultural issues
Factors that have an impact on the way in which we function as a society
32 of 190
Serial transmission
Data is transmitted one bit at a time down a single wire
33 of 190
Parellel transmission
Data is transmitted several bits at a time using multiple wires
34 of 190
Bandwidth
A measure of the capacity of the channel down which the data is being sent. Measure in hertz (Hz)
35 of 190
Latency
The time delay that occurs when transmitting data between devices
36 of 190
Asynchronous data transmission
Data is transmitted between two devices that do not share a common clock signal
37 of 190
Start bit
A bit used to indicate the start of a unit of data in asynchronous data transmission
38 of 190
Stop bit
A bit used to indicate the end of a unit of data in asynchronous data transmission
39 of 190
Parity bit
A method of checking binary codes by counting the number of 0s and 1s in the code
40 of 190
Synchronous data transmission
Data is transmitted where the pulse of the clock of the sending and receiving device are in time with each other. The devices may share a common clock
41 of 190
Protocols
Sets of rules
42 of 190
TCP/IP
A set of protocols(set of rules) for all TCP/IP network transmissions
43 of 190
HTTP(Hypertext transfer protocol)
The protocol (set of rules) to define the identification, request and transfer of multimedia content over the internet
44 of 190
FTP
A protocol(set of rules) for handling file uploads and downloads
45 of 190
Network
devices that are connected together to share data and resources
46 of 190
Network adapter/Network interface card(NIC)
A card that enables devices to connect to a network
47 of 190
Network topology
The layout of a network usually in terms of its conceptual layout rather than the physical layout
48 of 190
Local area network (LAN)
A network over a small geographical distance - usually on one site and typically used by one organisation
49 of 190
Wide area network (WAN)
A network spread over a large geographical distance
50 of 190
Star topology
A way of connecting devices in a network where each workstation has a dedicated cable to a central computer or switch
51 of 190
Bus topology
A network layout that uses one main data cable as a backbone to transmit data
52 of 190
Physical topology
The way in which devices in a network are physically connected
53 of 190
Logical topology
The conceptual way in which data is transmitted around a network
54 of 190
Client server
A network methodology where one computer has the main processing power and storage and the other computers act as clients requesting services from the server
55 of 190
Peer-Peer
A network methodology where all devices in a network share resources between them rather than having a server
56 of 190
Wireless wide area network (WWAN)
A WAN that does not use cables, but send data using radio waves
57 of 190
Media access control (MAC)
A unique code that identifies a particular device on a network
58 of 190
Wi-Fi
A standard method for connecting devices wirelessly to a network and to the internet
59 of 190
Wireless local area network (WLAN)
A LAN that does not use cables but connect using radio waves
60 of 190
Request to send//clear to send (RTS/CTS)
A protocol to ensure data does not collide when being transmitted on wireless networks
61 of 190
Service set identifier(SSID)
A locally unique 32-character code that identifies a device on a wireless network
62 of 190
WiFi protected access (WPA/WPA2)
A protocol for encrypting data and ensuring security on WiFi networks
63 of 190
Internet
A global network of networks
64 of 190
Uniform resource locator (URL)
A method for identifying the location of resources e.g. webisites on the internet
65 of 190
Domain name system (DNS)
The recognisable name of a domain on the internet
66 of 190
Domain name server (DNS)
Internet protocol (IP) address
67 of 190
Port
Used to identify a particular process of application on a network
68 of 190
POP3
A protocol for receiving emails
69 of 190
Secure shell (SSH) protocol
A protocol for remote access to computers
70 of 190
Port forwarding
A method of routing data through additional ports
71 of 190
Socket
An endpoint of a communication flow across a computer network
72 of 190
Subnet masking
A method of dividing a network into multiple smaller networks
73 of 190
Gateway
A node on a network that acts a connection point to another network with different protocols
74 of 190
Dynamic host configuration protocol (DHCP)
A set of rules for allocating locally unique IP addresses to devices as they connect to a network
75 of 190
Internet registries
Organisations who allocate and administer domain names and IP addresses
76 of 190
Regional internet registry (RIR)
One of five large organisations that allocates and administer domain names and IP addresses in different parts of the world
77 of 190
Packet
A block of data being transmitteed
78 of 190
Routing
The process of directing packets of data between networks
79 of 190
Packet switching
A method for transmitting packets of data via the quickest route on a network
80 of 190
Checksum
A method of checking the integrity of data by calculating a sum based on the data being sent
81 of 190
Firewall
Hardware or software for protecting against unauthorised access to a network
82 of 190
Packet filtering
A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
83 of 190
Stateful inspection
A technique for examining the contents of packets on a network and rejecting them if they do not form part of a recognised communication
84 of 190
Symmetric encryption
Where the sender and receiver both use the same key to encrypt and decrypt data
85 of 190
Asymmetric encryption
Where a public and private key are used to encrypt and decrypt data
86 of 190
Private key
A code used to encrypt/decrypt data that is only known by one user but is mathematically linked to corresponding public key
87 of 190
Digital certificate
A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification authority
88 of 190
Certification authority
A trusted organisation that provides digital certificates and signatures
89 of 190
Digital signature
A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a certification authority
90 of 190
Trojan
Malware that is hidden within another file on your computer
91 of 190
Virus
A generic term for malware where the program attaches itself to another file in order to infect a computer
92 of 190
Worm
Malware or a type of virus that replicates itself and spreads around a computer system, it does not need to be attached to another file in order to infect a computer
93 of 190
TCP/IP
A set of protocols for all TCP/IP network transmissions
94 of 190
SMTP
A protocol for sending emails
95 of 190
Secure shell (SSH) protocol
A protocol for remote access to computers
96 of 190
FTP
a protocol for handling file uploads and downloads
97 of 190
Email server
A dedicated computer on a network for handling email
98 of 190
Web server
A dedicated computer on a network for handling web content
99 of 190
Web browser
An application for viewing web pages
100 of 190
Application program interface (API)
A set of subroutines that enable one program to interface with another program
101 of 190
Websocket protocol
A set of rules that creates a persistent connection between two computers on a network to enable real-tie collaboration
102 of 190
Message
The name given to a packet of data being transmitted using the websocket protocol
103 of 190
CRUD
An acronym that explains the main functions of a database: create, read, update, delete
104 of 190
SQL (Structured query language)
A programming language uses to manage data within a relational database
105 of 190
REST (representational state transfer)
A methodology for implementing a networked database
106 of 190
JSON
(Javascript object notation) A standard format for transmitting data
107 of 190
XML (Extensible markup language)
A method of defining data formats for data that will be transmitted around a network
108 of 190
Client-server database
A way of implementing a database where the database is put into a server and various users can access it from their workstations. The processing, e.g. running a query, will take place on the server
109 of 190
Thin client
In a network where one computer contains the majority of resources, processing power and storage capacity, which it distributes to other clients
110 of 190
Thick client
In a network where resources, processing power and storage capacity are distributed between the server and the client computers
111 of 190
Terminal
A computer that has little or no processing power or storage capacity used as a client in a thin client network
112 of 190
Relational database
A method of creating a database using tables of related data, with relationships between the tables
113 of 190
Table
A method for implementing on entity and attributes as a group of related data
114 of 190
Entity
An object about which data will be stored
115 of 190
attribute
A characteristic or piece of information about an entity, which would be stored asa field in a relationship database
116 of 190
Entity relationship diagram
A visual method of describing relationships between entities
117 of 190
Primary key
An attribute that can be used to uniquely identify every record within a table
118 of 190
Entity identifier
An attribute which can uniquely identify each instance of an entity
119 of 190
Foreign key
An attribute in a table that is a primary key in another table and is used to link tables together
120 of 190
Normalisation
The process of ensuring that a relational database is structured efficently
121 of 190
Structured query language (SQL)
A specialised programming language for manipulating databases
122 of 190
Table
A method for implementing an entity and attributes as a group of related data
123 of 190
Entity
An object about which data will be stored
124 of 190
Attribute
A characteristic or piece of information about an entity, which would be stored as a field in a relationship database
125 of 190
Entity relationship diagram
A visual method of describing relationships between entities
126 of 190
Foreign key
An attribute in a table that is a primary key in another table and is used to link tables together
127 of 190
Normalisation
The process of ensuring that a relational database is structured efficiently
128 of 190
Structured query language (SQL)
A specialised programming language for manipulating databases
129 of 190
Query
A search of sort carried out on data that retrieves the answer to a question
130 of 190
Database management system
Software that enables the management of all aspects of a database including adding, updating and querying data
131 of 190
Record locks
A technique to ensure that only one transaction at a time is executed from multiple users on a database
132 of 190
Serialisation
A technique to ensure that only one transaction at a time is executed from multiple users on a database
133 of 190
Timestamp ordering
A technique to ensure multiple users can execute commands on a shared database based on the timestamp of when the data was last written to or read from
134 of 190
Commitment ordering
A technique to ensure concurrent transactions on a shared database are executed based on the timestamp of when the request is made and also the precedence the request takes over other simultaneous request
135 of 190
Big data
A generic term for large complex datasets that are different to store and analyse
136 of 190
Latency
The time delay that occurs when transmitting data between devices
137 of 190
Structured data
Data that fit into a standard database structure of columns and rows (fields and records)
138 of 190
Unstructured data
Data that do not fit into a standard database structure of columns and rows (fields and records)
139 of 190
Modelling
Recreating a real-life situation on a computer
140 of 190
Graph schema (database)
A method of defining, a database in terms of nodes, edges and properties
141 of 190
Node / properties
In database modelling, it is an entity
142 of 190
Edge
In a database graph schema, it refers to the link and relationship between two nodes
143 of 190
Distributed processing/ computing
The principle of spreading large and complex tasks over a number of computer and servers
144 of 190
Distributed program
A program specifically written to be used in a distributed processing environment
145 of 190
Functional programming
A programming paradigm that uses functions to create programs
146 of 190
Variable
A data item whose value will change as the program is run
147 of 190
Mutable
Changeable
148 of 190
State
In programming it refers to the state that the variables are in i.e the value that is currently stored
149 of 190
Side effects
In programming it refers to the fact that the value contained within a variable will change as the program is run, which has implications for other parts of the program
150 of 190
Imperative language
A language based on giving the computer commands or procedures to follow
151 of 190
Object-oriented language
A programming paradigm that encapsulates instructions and data together into objects
152 of 190
Function
A subroutine that returns a single value
153 of 190
Concurrent
the concept of two users trying to access the same data at the same time
154 of 190
Functional programming paradigm
A language where each line of code is made up of call to a function, which in turn may be made up of other functions, or result in a value
155 of 190
Declarative programming languages
Languages that declare or specify what properties a result should have e.g. results will be based on functions
156 of 190
Procedural programming languages
Languages where the programmer specifies the steps that must be carried out in order to achieve a result
157 of 190
Function type
Refers to the way in which the expression is created e.g integer of the domain and codomain where f: A→B is the type of function
158 of 190
Domain
A set of data of the same type which are the inputs of a function
159 of 190
Codomain
The set of values from which the outputs of a function must be drawn
160 of 190
First-class object
Any object that can be used as an argument or result of a function call
161 of 190
Higher order function
A function that takes a function as its inputs or creates a function as its output
162 of 190
Map function
A function that generates an output list from an input list by applying a function to each element in the input list
163 of 190
Filter function
A method of creating a subset based on specified criteria
164 of 190
Reduce/fold function
A method of reducing a list to a single element by combining the elements using a functions
165 of 190
List
A collection of data tiems of the same type
166 of 190
Identifier
The name of a list
167 of 190
Tail
Every element in a list apart from the head
168 of 190
Head
The first element in a list
169 of 190
Empty list
A list with no elements in it
170 of 190
Analysis
The first stage of system development where the problem is identified, researched and alternative solution proposed
171 of 190
Feasibility study
An analysis of whether it is possible or desirable to create a system
172 of 190
Design
The second stage of system development where the algorithms, data and interface are designed
173 of 190
Top-down design
Related to the modular approach, this tarts with the main system at the top and breaks it down into smaller and smaller units a bit like a family tree
174 of 190
Modular design
A method of system design that breaks a whole system down into smaller units, or modules
175 of 190
Data flow diagram (DFD)
A visual method of showing how data passes around a system
176 of 190
Data dictionary
A list of all the data being used in the system including name, length, data types and validation
177 of 190
Variables table
A list of all the variables that a program will use, including names and data types
178 of 190
Implementation
The third stage of system development where the actual code and and data structures are created
179 of 190
Prototype
A stripped own version of a whole system built at the design stage to test whether the concept works
180 of 190
Testing
The fourth stage of system development that includes a range of tests using a variety of data
181 of 190
Normal test data
Test data that is within the expected range for the system and should therefore produce the correct result
182 of 190
Boundary test data
Test data on or close to the boundary of the acceptable range
183 of 190
Erroneous test data
Test data that is clearly incorrect and should produce an error
184 of 190
Development testing
Testing that takes place during the devlopment of the program
185 of 190
Black box testing
Using test data to test for an expected outcome
186 of 190
White box testing
Checking all pathways through the code, looking inside it and potentially adding extra commands to check what is happening
187 of 190
Unit testing
Testing carried out on the system once it has been completed
188 of 190
System testing
A range of tests carried out on the system once it has been completed
189 of 190
Evaluation
The final stage of development where the system is judged according to certain criteria
190 of 190

Other cards in this set

Card 2

Front

Opcode

Back

An operation code or instructions used in assembly language

Card 3

Front

Operand

Back

Preview of the front of card 3

Card 4

Front

Addressing mode

Back

Preview of the front of card 4

Card 5

Front

Assembly language

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Glossary 2 on from 389 resources »