• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

69 Cards in this Set

  • Front
  • Back
Input Device
Device used to enter data into a device for processing.
Output Device
Device used to present information.
Storage Device
Device used to store data or processing later on.
A storage device with no moving parts. Not sensitive to movement. Useful for transporting data. Relatively expensive.
Magnetic Storage Device
A HDD. Has a high capacity of storage available. Sensitive to movement due to moving parts. Used as main storage for computers.
Optical Storage Device
A storage device read by a laser.
Can be a 0 or 1 used so that computers can be based on electronic logic circuits.
Performs processing on a computer. Fetches instructions from memory. Decodes instructions. Executes instructions.
Clock Speed
The higher the clock speed the faster the CPU will run. Represents the number of instructions the CPU can process in a given time.
Stores OS programs and data that are currently in uses. Volatile = all the contents are lost when the PC is turned off. More memory means programs will run faster due to less use of virtual memory.
Loads the start-up program used to boot up the computer when it is switched on. Loads the OS.
Virtual Memory
A section of the hard disk is used to act as RAM. Allows more programs to be loaded.
Regularly checks computer for programs designed to harm the system. Disables and deletes these programs.
Disk Defragment
Reorganizes files so that they are stored in blocks next to each other. Free's space.
Disk Cleanup
Searches for and deletes files which are no longer needed. Free's up space which can be used for other programs.
System Cleanup
Searches the computer for files/programs which are no longer needed.
System Update
Search on the internet for updated versions of the software on the computer and downloads/installs the updates.
Bespoke/Custom Software
Software created especially for a user. Useful if appropriate software may not exist.
Open Source Software
License-free source code is available for others to use. Large community of open source developers can see and comment on the code. Free. Can be modified.
Off the Shelf Software
Available to buy straight away. Less likely to contain bugs. Costs less. More support. May contain features which aren't needed. May not contain features required. Developer not available to make any adjustments if needed.
Each character on a keyboard is given a numeric code. Code is then stored in binary. Each character takes 1 byte.
Bitmap Image
Picture split into pixels. Each pixel given a binary code.
Image Resolution
The concentration of pixels in an image.The higher the res the more pixels are needed.
Database management system. Software used to manage the database. Allows database to be searched. Provides facilities for creating tables and inserting data.
Database Form
An input screen allowing chosen data items to be displayed and edited.
Database Report
An output of the data in a database.
A real world object which data is stored in a database.
A field in a database. An attributes of an entity.
Primary Key
Unique identifier within a table that identifies a record.
Foreign Key
A primary key in one table that exists within another table.
Ensures data falls within predetermined rules/boundaries.
Ensuring data is entered correctly.
Local Area Network. A network which covers a small area like a house. Can share files and resources. Computers can be managed centrally. Users can communicate with each other. Security and access to data can be managed.
Wide Area Network. Covers wide geographical area. Spans across countries.
Peer - to - Peer
All computers have equal status/ no server controlling. To share data between each other. Manageable for networks with a small number of PC's attached. Cheaper to install
IP Address
Internet Protocol address. Unique address that is assigned to router attached to network.
MAC Address
Media Access Control address. A unique address fixed into a network interface card. Used to identify a device attached to a network.
Data transmitted across networks is broken up into smaller chunks called packets. Sent individually and reassembled at the receiving end.
Set of rules that govern communications on a network.
A string that allows access to a certain part of a system.
Method of applying a mathematical algorithm to data in order to make it more secure.
Acceptable Use Policy
An agreement by a user on what they can and cannot do when using a computer network.
All data on a network is backed up according to a backup policy that states whose job it is to do the back ups how often they will be made and where it will be stored.
Taking old backup/network data and storing it offline in a secure place.
Disaster Recovery
If a network is damaged or destroyed data can be restored quickly to ensure no down time for a business.
Converts digital signals to analogue signals and back again.
Connects a LAN to a WAN (connects a network to the internet)
Controls access to the network. Checks password entered on any computer. Allows files/resources to be shared. Controls the access of computers to the internet.
Hyper Text Mark-up Language. Text file containing the text to be displayed on a web page. Uses tags which indicate how to display data.
It reduces the size of the file which needs to be transmitted.
Lossy Compression
Data is uncompressed it is not exactly the same as the original but the difference is so small that it cant be noticed. (music files)
Lossless Compression
When data is uncompressed it is restored completely to the original status. (compressed text files)
High Level Code
Instructions use words eg. writeln. Designed to be read by human programmers. Portable/translated to use on different machines.
Machine Code
Instructions are in Binary code to be read/executed by the computer. Specific to a particular machine.
Translates one line of high level code at a time and executes it. Stops when it finds an error. Useful for debugging code.
Translator/Error Diagnostics
Tools built within an IDE that allow the programmer to check for errors. Tells you what the error is and where it is by underlining incorrect parts of the code. Allows you to enter the corrected code.
Executes code if the criteria is met. For example if statements and case statements.
Keeps repeating the code until the criteria is met. For example repeat until loop.
An identifier which refers to a location in memory which stores a value which can be changed as the program is running.
A variable data type which is a whole number.
A variable data type that can only contain letters and/or numbers.
A variable data type which can be set to either true or false.
A group of variables of the same data type stored under one identifier. Each individual variable is given an index number by which it is referred to within the array.
Syntax Error
An error in the rules or a programming language.
Logic Error
When code compiles and runs but doesn't perform its intended task.
Test Data
Data that it used to test a new system.
Normal Test Data
Test data that falls within the bounds of the validation rules.
Extreme Test Data
Test data that is at the upper or lower limit of the validation rules.
Erroneous Test Data
Test data that will force an error on a validation rule. It is purposely incorrect.