Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
69 Cards in this Set
- Front
- Back
Input Device
|
Device used to enter data into a device for processing.
|
|
Output Device
|
Device used to present information.
|
|
Storage Device
|
Device used to store data or processing later on.
|
|
SSD
|
A storage device with no moving parts. Not sensitive to movement. Useful for transporting data. Relatively expensive.
|
|
Magnetic Storage Device
|
A HDD. Has a high capacity of storage available. Sensitive to movement due to moving parts. Used as main storage for computers.
|
|
Optical Storage Device
|
A storage device read by a laser.
|
|
Binary
|
Can be a 0 or 1 used so that computers can be based on electronic logic circuits.
|
|
CPU
|
Performs processing on a computer. Fetches instructions from memory. Decodes instructions. Executes instructions.
|
|
Clock Speed
|
The higher the clock speed the faster the CPU will run. Represents the number of instructions the CPU can process in a given time.
|
|
RAM
|
Stores OS programs and data that are currently in uses. Volatile = all the contents are lost when the PC is turned off. More memory means programs will run faster due to less use of virtual memory.
|
|
ROM
|
Loads the start-up program used to boot up the computer when it is switched on. Loads the OS.
|
|
Virtual Memory
|
A section of the hard disk is used to act as RAM. Allows more programs to be loaded.
|
|
Anti-Virus
|
Regularly checks computer for programs designed to harm the system. Disables and deletes these programs.
|
|
Disk Defragment
|
Reorganizes files so that they are stored in blocks next to each other. Free's space.
|
|
Disk Cleanup
|
Searches for and deletes files which are no longer needed. Free's up space which can be used for other programs.
|
|
System Cleanup
|
Searches the computer for files/programs which are no longer needed.
|
|
System Update
|
Search on the internet for updated versions of the software on the computer and downloads/installs the updates.
|
|
Bespoke/Custom Software
|
Software created especially for a user. Useful if appropriate software may not exist.
|
|
Open Source Software
|
License-free source code is available for others to use. Large community of open source developers can see and comment on the code. Free. Can be modified.
|
|
Off the Shelf Software
|
Available to buy straight away. Less likely to contain bugs. Costs less. More support. May contain features which aren't needed. May not contain features required. Developer not available to make any adjustments if needed.
|
|
ASCII
|
Each character on a keyboard is given a numeric code. Code is then stored in binary. Each character takes 1 byte.
|
|
Bitmap Image
|
Picture split into pixels. Each pixel given a binary code.
|
|
Image Resolution
|
The concentration of pixels in an image.The higher the res the more pixels are needed.
|
|
DBMS
|
Database management system. Software used to manage the database. Allows database to be searched. Provides facilities for creating tables and inserting data.
|
|
Database Form
|
An input screen allowing chosen data items to be displayed and edited.
|
|
Database Report
|
An output of the data in a database.
|
|
Entity
|
A real world object which data is stored in a database.
|
|
Attribute
|
A field in a database. An attributes of an entity.
|
|
Primary Key
|
Unique identifier within a table that identifies a record.
|
|
Foreign Key
|
A primary key in one table that exists within another table.
|
|
Validation
|
Ensures data falls within predetermined rules/boundaries.
|
|
Verification
|
Ensuring data is entered correctly.
|
|
LAN
|
Local Area Network. A network which covers a small area like a house. Can share files and resources. Computers can be managed centrally. Users can communicate with each other. Security and access to data can be managed.
|
|
WAN
|
Wide Area Network. Covers wide geographical area. Spans across countries.
|
|
Peer - to - Peer
|
All computers have equal status/ no server controlling. To share data between each other. Manageable for networks with a small number of PC's attached. Cheaper to install
|
|
IP Address
|
Internet Protocol address. Unique address that is assigned to router attached to network.
|
|
MAC Address
|
Media Access Control address. A unique address fixed into a network interface card. Used to identify a device attached to a network.
|
|
Packet
|
Data transmitted across networks is broken up into smaller chunks called packets. Sent individually and reassembled at the receiving end.
|
|
Protocol
|
Set of rules that govern communications on a network.
|
|
Password
|
A string that allows access to a certain part of a system.
|
|
Encryption
|
Method of applying a mathematical algorithm to data in order to make it more secure.
|
|
Acceptable Use Policy
|
An agreement by a user on what they can and cannot do when using a computer network.
|
|
Backup
|
All data on a network is backed up according to a backup policy that states whose job it is to do the back ups how often they will be made and where it will be stored.
|
|
Archiving
|
Taking old backup/network data and storing it offline in a secure place.
|
|
Disaster Recovery
|
If a network is damaged or destroyed data can be restored quickly to ensure no down time for a business.
|
|
Modem
|
Converts digital signals to analogue signals and back again.
|
|
Router
|
Connects a LAN to a WAN (connects a network to the internet)
|
|
Server
|
Controls access to the network. Checks password entered on any computer. Allows files/resources to be shared. Controls the access of computers to the internet.
|
|
HTML
|
Hyper Text Mark-up Language. Text file containing the text to be displayed on a web page. Uses tags which indicate how to display data.
|
|
Compression
|
It reduces the size of the file which needs to be transmitted.
|
|
Lossy Compression
|
Data is uncompressed it is not exactly the same as the original but the difference is so small that it cant be noticed. (music files)
|
|
Lossless Compression
|
When data is uncompressed it is restored completely to the original status. (compressed text files)
|
|
High Level Code
|
Instructions use words eg. writeln. Designed to be read by human programmers. Portable/translated to use on different machines.
|
|
Machine Code
|
Instructions are in Binary code to be read/executed by the computer. Specific to a particular machine.
|
|
Translator
|
Translates one line of high level code at a time and executes it. Stops when it finds an error. Useful for debugging code.
|
|
Translator/Error Diagnostics
|
Tools built within an IDE that allow the programmer to check for errors. Tells you what the error is and where it is by underlining incorrect parts of the code. Allows you to enter the corrected code.
|
|
Selection
|
Executes code if the criteria is met. For example if statements and case statements.
|
|
Iteration
|
Keeps repeating the code until the criteria is met. For example repeat until loop.
|
|
Variable
|
An identifier which refers to a location in memory which stores a value which can be changed as the program is running.
|
|
Integer
|
A variable data type which is a whole number.
|
|
String
|
A variable data type that can only contain letters and/or numbers.
|
|
Boolean
|
A variable data type which can be set to either true or false.
|
|
Array
|
A group of variables of the same data type stored under one identifier. Each individual variable is given an index number by which it is referred to within the array.
|
|
Syntax Error
|
An error in the rules or a programming language.
|
|
Logic Error
|
When code compiles and runs but doesn't perform its intended task.
|
|
Test Data
|
Data that it used to test a new system.
|
|
Normal Test Data
|
Test data that falls within the bounds of the validation rules.
|
|
Extreme Test Data
|
Test data that is at the upper or lower limit of the validation rules.
|
|
Erroneous Test Data
|
Test data that will force an error on a validation rule. It is purposely incorrect.
|