The document defines key terms related to databases and database management systems. It provides definitions of common database concepts like DBMS, accuracy, correctness, currency and completeness. It also defines SQL injection and terms related to database validation like presence check and uniqueness check.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
88 views14 pages
IT Definitions
The document defines key terms related to databases and database management systems. It provides definitions of common database concepts like DBMS, accuracy, correctness, currency and completeness. It also defines SQL injection and terms related to database validation like presence check and uniqueness check.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14
Book
Term Section Definition Reference Grade
Software that manages and controls a database. This Database Management includes permissions, backup, referential integrity and System (DBMS) Databases access control. G11 TLU7 G11 Accuracy is the degree to which the stored value measures against the true value. For example, the number of decimal Accuracy Databases places for numeric data. G11 TLU7 G11 Data is correct if it conforms to an approved or conventional Correctness Databases standard or agreeing with fact, logic, or known truth. G11 TLU7 G11 Currency Databases Data is current if it is up-to-date or not outdated. G11 TLU7 G11 Completeness Databases Data is complete if all required data is known G11 TLU7 G11 A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. For example, view data that should not SQL Injection Databases be accessible. G11 TLU7 G11 Non-relational databases / NoSQL databases are unstructured, flexible and store data NoSQL Databases without having a predefined schema. G12 TLU4 G12 A data warehouse combines data from a variety of sources within an organisation for purposes of producing reports and analysis. These reports are created from complex queries within the data warehouse to make business Data Warehouse Databases decisions. G12 TLU4 G12 Big data is a massive volume of both structured and unstructured data that is so large that it is difficult to process Big Data Databases using traditional database and software techniques. G12 TLU4 G12 Data mining is a set of techniques for discovering hidden, Data Mining Databases valid and potentially useful patterns or trends in a data set. G12 TLU4 G12 The logical design of the database which includes the Schema Databases design of the tables and fields. G10 TLU12 G10 Field Databases Stores a single data item such as ID number or surname. G10 TLU12 G10 Record Databases A collection of fields. G10 TLU12 G10 Table Databases A collection of records. G10 TLU12 G10 Data verification ensures the user enters what they intended, to eliminate mistakes when data is inputted. For example, double entry of data (such as when creating a password or email) to prevent incorrect data Verification Databases input. G11 TLU7 G11 Validation is about checking the input data to ensure it conforms with the data requirements of the system to avoid data errors. For example, range check, format Validation Databases check, check digit etc. G11 TLU7 G11 Test to determine if the data for a field must be Presence Check Databases entered. G11 TLU7 G11 Test to determine if the data falls between a lower and Range Check Databases upper bound. G11 TLU7 G11 Uniqueness Check Databases Test to determine if the data value is not duplicated. G11 TLU7 G11 Test to determine if the data has a set number of Length Check Databases characters. G11 TLU7 G11 Test to determine if the data is of the correct type, Type Check Databases such as a String or real number. G11 TLU7 G11 Test to determine if the data is structured in Format Check Databases predetermined format. G11 TLU7 G11 Test to determine if the data is consistent for the scenario. For example, a student in a high school Logical Check Databases cannot be 30 years of age. G11 TLU7 G11 Test to determine if a digit in a number, satisfies a certain algorithm, usually based on existing digits in Check Digit Databases the number. G11 TLU7 G11 Test to verify data transfer by performing a calculation Check Sum Databases (such as a sum) on the bits transferred. G11 TLU7 G11 Test to verify data transfer by inserting a 9th bit after 8 Parity Databases bits to create an odd or even number of bits. G11 TLU7 G11 RAM (Random Access Primary short term memory that temporarily stores Memory ) Hardware programs and instructions currently loaded. It is volatile. G10 TLU2 G10 Permanent storage that stores all programs and data on the Secondary storage Hardware local computer. G10 TLU2 G10 A large circuit board that connects the most important components such as CPU, memory and connectors for Motherboard Hardware peripherals G10 TLU3 G10 CPU / Processor Hardware A component that processes instructions. G10 TLU3 G10 Serial Processing Hardware CPUs that can only process one instruction at a time. G11 TLU2 G11 A method of simultaneously breaking up and running program instructions on multiple CPUs. Simply put, a single problem can be broken into separate parts that can be executed at the same time on different processors - in Parallel Processing Hardware parallel. G11 TLU2 G11 A CPU has two sets of registers to allow for faster context switching between processes. The CPU APPEARS to Hyperthreading Hardware process processes simultaneously. Logical Cores. G11 TLU2 G11 More than one CPU on a CPU chip. Processes can be Multiprocessing Hardware processed simultaneously. Physical Cores. G11 TLU2 G11 Stores the next few instructions and data to be processed Processor Cache Hardware from slower RAM. Level 1 runs at the speed of the CPU. G11 TLU2 G11 Part of the CPU that performs arithmetic and logical Arithmetic Logic Unit (ALU) Hardware calculations.l G10 TLU3 G10 Part of the CPU that coordinates the processing of Control Unit (CU) Hardware instructions. G10 TLU3 G10 Fast RAM (SRAM) on the CPU that stores the current Registers Hardware instruction and its data. G11 TLU2 G11 Fast RAM located on or near the CPU without capacitors. It does not need to be refreshed, hence it is faster. Also Static RAM (SRAM) Hardware smaller and more expensive. G11 TLU2 G11 Basic Input Output System Non-volatile firmware used to initialize the computer. It is (BIOS) Hardware stored in ROM. G10 TLU3 G10 Motherboard components consisting of BIOS, RAM and Primary Storage Hardware ROM. G10 TLU3 G10 RAM that contains capacitors and needs to be constantly Dynamic RAM (DRAM) Hardware refreshed. G10 TLU3 G10 Latency Hardware The time taken for a component or device to respond. G11 TLU2 G11 ROM is a non-volatile memory chip that can be used to permanently store data in computers and other electronic devices, such as BIOS firmware, embedded operating Read Only Memory (ROM) Hardware systems and appliance/robotics controllers. G10 TLU3 G10 Electronically Erasable Programmable ROM (EEPROM) Hardware ROM that can be electronically changed using software. G10 TLU3 G10 Component Hardware Circuit chip placed directly on the motherboard G10 TLU3 G10 Input, output or storage devices connected to the Peripheral Hardware motherboard G10 TLU3 G10 Microchip on the motherboard that regulates the timing and System Clock Hardware speed of computer functions. G11 TLU2 G11 Overclocking is the practice of making computer components run at speeds faster than designed by changing the components frequencies. Overclocking is done in two ways: • per component - the CPU operates faster than the system clock by changing its own clock multiplication factor. • the whole system – the system clock is increased affecting all components that detect the system clock and multiply by Overclocking Hardware a factor. G11 TLU2 G11 Factor by which components multiply the system clock Clock Multiplication Hardware speed to achieve its own speed. G11 TLU2 G11 Internal Bus / Front Side Bus that connects CPU to RAM consists of the data bus, Bus (FSB) Hardware address bus and control bus G11 TLU2 G11 Data Bus Hardware Transfers instructions and data between RAM and the CPU G11 TLU2 G11 Transfers the address of instructions and data between Address Bus Hardware RAM and the CPU G11 TLU2 G11 Transfers signal between RAM and the CPU such as Read Control Bus Hardware From Memory (RFM) and Write To Memory (WTM) G11 TLU2 G11 External Bus Hardware Bus that connects motherboard to peripherals. G11 TLU2 G11 Connects graphics cards, RAID cards, Wi-Fi cards or SSD's (Solid-State Drives) to the motherboard. They number of PCI-express (PCIe) Bus Hardware PCIe slots and the size of the slots vary in motherboards. G11 TLU2 G11 Bus to connect mass storage devices such as hard drives (mechanical or solid state) to a computer motherboard. SATA Hardware Slower than PCIe. G11 TLU2 G11 Standardised serial bus to connect most types of Universal Serial Bus (USB) Hardware peripherals to the motherboard. It transfers data and power. G11 TLU2 G11 Use of RAM to speed up access to the slower hard drive. When data is read from the hard disk the data cached to Disk cache Hardware RAM for subsequent reads. G11 TLU2 G11 Storing previously accessed websites on your local computer. If the website is accessed again it will be loaded Browser cache Hardware from the local computer instead from a remote website. G11 TLU2 G11 Storing recently accessed websites on a server in a network. If another user accesses the same site it will be delivered from the network server. The website will still be Web cache Hardware cached in the user’s local browser cache. G11 TLU2 G11 Hard Disk Drive (HDD) Secondary storage device that stores programs and data Mechanical Drive Hardware magnetically and uses mechanical parts. G10 TLU3 G10 Secondary storage device that stores programs and data Solid State Drive (SSD) Hardware electronically in flash memory. G10 TLU3 G10 Secondary storage device that combines a mechanical Hybrid Drive Hardware HDD and a SSD. G10 TLU3 G10 Portable secondary storage that stores programs and using Flash Drive Hardware flash memory. G10 TLU3 G10 Secondary storage device that stores programs and data Optical Drives Hardware using lasers. G10 TLU3 G10 Secondary storage medium that stores programs but mostly SD Cards Hardware data and is small in size. G10 TLU3 G10 Input device that analyses an image and converts it to a file. Scanner Hardware OCR can be used to convert the image to editable text. G10 TLU3 G10 A barcode is a simple pattern of thin and wide lines that are Barcode Hardware decoded by the scanner to represent data. G10 TLU3 G10 Two-dimensional sets of different sized squares on a white background that are decoded by the scanner to represent QR Code Hardware data. QR Codes contain more data than barcodes. G10 TLU3 G10 Inputs human physical data such as fingerprints, voiceprints and retinal/iris scans, analyses the data to uniquely identify Biometric Device Hardware and individual. G10 TLU3 G10 A device that converts a real-world property into data that a computer can process by converting the physical parameter (for example: temperature, blood pressure, height, humidity, speed, etc.) into a signal which can be measured Sensors Hardware electrically. G10 TLU3 G10 An connection interface that can receive both video and HDMI Port Hardware audio input. G10 TLU3 G10 A computer can be assembled with different components to Modular Design Hardware suit a user’s requirements. G12 TLU2 G12 A hardware component embedded into a circuit board such Onboard Controller Hardware as the motherboard. G12 TLU2 G12 An expansion card is plugged into a slot on the motherboard (PCI, PCIe, Graphics card slots) will usually Expansion Card Hardware provide better functionality than the onboard counterpart. G12 TLU2 G12 An additional processor to the CPU to work in parallel with CPU that performs specific tasks e.g., GPU and FPU Co-processor Hardware (Maths co-processor). G12 TLU2 G12 A co-processor that accelerates applications running on the CPU by offloading the complex mathematical and geometric GPU Hardware calculations necessary for graphics rendering. G12 TLU2 G12 RAM that stores that data about each pixel, its colour and VRAM Hardware location on the screen to be used by the GPU. G12 TLU2 G12 instead of a separate GPU, the GPU is embedded into the CPU and instead of separate VRAM, the GPU shares Integrated Graphics Hardware system RAM. G12 TLU2 G12 A maths co-processor can help the ALU of the CPU Maths co-processor Hardware process complex calculations using numeric data. G12 TLU2 G12 M.2 is a form factor – it describes the shape and size of a M.2 Format Hardware hardware device. G12 TLU2 G12 Non-Volatile Memory A device interface specification for accessing a computer's express (NVMe) Hardware non-volatile storage media attached via PCI Express bus. G12 TLU2 G12 A powerful computer that provides services to a network Server Hardware such as a file server and print server G10 TLU5 G10 An internal or external device to provide regulated Power Supply Unit (PSU) Hardware power to the computer. G11 TLU7 G11 Static websites that did not allow users to interact with the Web 1.0 Internet content. G11 TLU6 G11 Dynamic websites that allow users to interact with the Web 2.0 Internet content. G11 TLU6 G11 Websites that provide users with a more personal Web 3.0 Internet experience by accessing browser history and location. G11 TLU6 G11 Web 4.0 is the mobile web that can adapt to its mobile surroundings. Web 4.0 connects all devices in the real and Web 4.0 Internet virtual world in real-time. G11 TLU6 G11 A script is a set of instructions. For web pages they are instructions either to the web browser (client-side scripting) Scripting Internet or to the server (server-side scripting). G11 TLU6 G11 Client-side scripting Internet Client-side scripts are interpreted by the client’s browser. G11 TLU6 G11 Scripts that run on the server to customise the HTML page Server-side scripting Internet to be sent to the client. G11 TLU6 G11 A small text file stored in a user's browser to store user’s Cookies Internet history and preferences. G11 TLU6 G11 A web-based (or browser-based) tool, application, program, or app is software that runs on your web browser. Browser- based applications only need an Internet connection and a Wed-based applications Internet web browser on your computer to function. G11 TLU6 G11 Applications that are downloaded and installed on a mobile device. An app can access content and data from the Internet, or it can download the content so that it can be Mobile Applications Internet accessed locally. G11 TLU6 G11 Application is written using the native development Native Mobile Application Internet language and tools specific to the platform of the device. G11 TLU6 G11 A blend of native and web solutions. The core of the application is written using cross platform web technologies (HTML, CSS, and JavaScript), which are then encapsulated Hybrid Mobile Application Internet inside a native application. G11 TLU6 G11 A small software module that provides customisation for a Browser extension Internet web browser. G11 TLU6 G11 Allows users to search for related images and text given an Reverse Image Lookup Internet image. G11 TLU6 G11 The process of receiving data from a central server to a Download Internet user's computer G11 TLU6 G11 Streaming is the process of delivering data continuously Streaming Internet from the Internet in real-time. G11 TLU6 G11 Video On Demand (VOD) VOD and AVOD are systems which allow users to select or Audio and Video On and watch/listen to video or audio content whenever they Demand (AVOD) Internet desire. G11 TLU6 G11 The communication systems used to deliver voice and Voice over Internet multimedia data using the Internet Protocol (IP) networks, Protocol (VoIP) Internet such as the Internet. G11 TLU6 G11 A podcast is usually a series of on-demand digital audio Podcast Internet files that often focus on a topic or theme. G11 TLU6 G11 Encoding the data so that it can be transferred or stored Compression Technology Internet using fewer bits than it originally contained. G11 TLU6 G11 Lossy compression reduces the number of bits of a file but Lossy compression Internet when decompressed does not return to the original file size. G11 TLU6 G11 No information is lost in lossless compression, the size of Lossless Compression Internet the original file and the restored file are the same. G11 TLU6 G11 Two non-identical keys are used to encrypt and decrypt the Asymmetric Encryption Internet message called the public key and private key. G11 TLU7 G11 A user’s unique key that is available to all and is used to encrypt/decrypt a user’s message. It is related to the user’s private key. The message can be encrypted/decrypted Public key Internet using the related private key. G11 TLU7 G11 A user’s unique key that is only known to the user and is used to encrypt/decrypt a user’s message.The message Private key Internet can be encrypted/decrypted using the related public key. G11 TLU7 G11 A user can "sign" a document by encrypting data with their private key, if the document can be decrypted with the matching public key, then the document can be proved to Digital Signature Internet be sent by the user. G11 TLU7 G11 An encryption protocol for wireless LANs where each data Temporal Key Integrity packet is encrypted using a 48-bit serial number that is Protocol (TKIP) Internet incremented for each packet. G11 TLU7 G11 A firewall can monitor and block packets that are heading to Port Filtering Internet a certain port or block packets based on their content. G11 TLU7 G11 When database data is changed, an audit trail records who, Audit Trails Internet what and a timestamp of the change. G11 TLU7 G11 Process whereby the data between devices are kept consistent. Any change to data stored on one device is Synchronisation Networking replicated on the other device. G10 TLU2 G10 Node Networking Any device connected to a network and has an IP address. G10 TLU5 G10 LAN Networking A network within a small area such as a building or room. G10 TLU5 G10 Maximum amount of data that can be transferred at one Bandwidth Networking time. Measured in bits per second (bps). G10 TLU5 G10 Bounded communication channels, consisting of physical Bounded Media Networking cabling, commonly used for wired LANs. G10 TLU5 G10 Unshielded Twisted Pair Consists of several pairs of copper twisted wires in an outer cabling Networking protective plastic cover. G10 TLU5 G10 Twisted pairs of copper wire enclosed in protective foil. This type of cable is less affected than Shielded Twisted Pair Networking UTP by interference and crosstalk. G10 TLU5 G10 Fibre optic cable consists of a central glass or plastic core surrounded by several layers of protective materials. It transmits light pulses rather than electronic signals, Fibre optic cable Networking eliminating interference. G10 TLU5 G10 Attenuation Networking The signal loses strength over a distance. G10 TLU5 G10 Signals from other sources such as machinery can corrupt Electro-Magnetic the Interference Networking signals traveling in copper cables nearby. G10 TLU5 G10 Signals traveling along copper cables can be intercepted by Eavesdropping Networking outsiders. G10 TLU5 G10 Signals in adjacent wires can interfere with each other as in a crossed telephone Crosstalk Networking conversation. G10 TLU5 G10 Transferring signals between nodes using no cables such as Bluetooth, infrared beams, microwaves, satellites or Unbounded media Networking laser light signals. G10 TLU5 G10 A MAN is made up of LANs interconnected using high- MAN Networking speed connections across a city or metropolitan area. G10 TLU5 G10 A WAN is made up of interconnected LANs and/or MANs in WAN Networking different cities or different countries. G10 TLU5 G10 GAN Networking A worldwide WAN such as the Internet is called a GAN. G10 TLU5 G10 The PAN is used by an individual for communicating between devices such as a desktop computer, Laptop, PAN Networking smartphone, smart wear and tablet. G10 TLU5 G10 A router is a small electronic device that joins computer networks together using either wired or wireless Router Networking connections. G10 TLU5 G10 Creates a Wi-Fi hotspot which enables all computers and devices which have Wi-Fi capabilities to connect to the Wi-Fi Router Networking router G10 TLU5 G10 A wireless technology standard for sending data over short Bluetooth Networking distances, using short-wavelength radio transmissions G11 TLU4 G11 provides a wireless connection between two Provides a wireless, two-way connection between two devices within Near Field Communication close proximity. NFC is commonly used in contactless (NFC) Networking payment systems, like those used in credit cards. G11 TLU4 G11 A communication channel that is shared by all the devices Broadcast Networking in the network. Communication is not secure. G11 TLU4 G11 A point to point connection directly connects two nodes of a Point to Point Networking network. G11 TLU4 G11 Topology Networking Physical layout of a network. Star, bus, ring and hybrid G11 TLU4 G11 Ethernet is a technology that connects nodes in a local area network and enables them to communicate with each other Ethernet Networking through a common protocol. G11 TLU4 G11 An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network so that the device can communicate on the IP Address Networking Internet. (IPv4 32 bits vs IPv6 128 bits) G10 TLU7 G10 Media Access Control A hardware identification number that uniquely identifies (MAC) address Networking each device on a network. G11 TLU4 G11 Address Resolution A protocol that links the device’s MAC address (frame) to its Protocol (ARP) Networking IP address (packet). G11 TLU4 G11 Dynamic Host Configuration Protocol Automatically assigns IP addresses to devices connected to (DHCP) Networking the network using a client–server architecture. G11 TLU4 G11 Domain Name Servers (DNS) Networking A directory of domain names and associated IP addresses. G11 TLU4 G11 TCP/IP is the communication protocol for the Internet, it defines the rules computers must follow in order to TCP/IP Protocol Networking communicate with each other over the Internet. G11 TLU4 G11 Network Interface Cards The physical interface or (NIC) Networking connection between the computer and the network cable. G11 TLU4 G11 Network segment Networking A part of a larger LAN network. G11 TLU4 G11 Repeater Networking A network device that boosts the signal on a cable. G11 TLU4 G11 A bridge connects network segments, strengthens the signals as they pass through it and looks at the MAC addresses of the signals, only forwarding data packets to a different network segment if the MAC address is not in the segment from which the packet comes. A bridge reduces Bridge Networking network traffic. G11 TLU4 G11 Switch Networking A network device that connects nodes in a star topology. G11 TLU4 G11 A router boosts signals and uses nodes' IP addresses to determine the best path for data packets to travel along to reach their destinations. Routers connect networks with different topologies and different technologies (Ethernet) but Router Networking MUST have the same protocol. G11 TLU4 G11 When a file or message is sent across the network, the data to be sent is usually broken into smaller more manageable Segment Networking parts called segments. G11 TLU4 G11 Packets are wrapped around segments and consist of a Packet Networking header, payload and trailer. A packet uses IP addresses. G11 TLU4 G11 Frames are wrapped around packets and use MAC addresses. A frame includes the MAC source and destination address, type, payload, CRC/FCS and inter Frame Networking frame gap. G11 TLU4 G11 Frame Check Sequence Frame Check Sequence (FCS) is used to detect if errors (FCS) Networking have occurred in the data transmission G11 TLU4 G11 A Virtual Local Area Network (VLAN) is a logical Virtual Local Area Network subnetwork which can group together collections of devices (VLAN) Networking in a LAN to create a new virtual LAN. G11 TLU4 G11 A wireless transceiver that broadcasts a signal within a limited area. Each access point connects nodes to a wired network so that users can communicate with other network Wireless Access Point Networking users or connect to the Internet. G11 TLU4 G11 A hotspot is a site that offers Internet access over a wireless local area network with the use of a router or Hotspot Networking wireless access point connected to a link to an ISP. G11 TLU4 G11 A network device that link network segments without a Wireless Bridge Networking cable. G11 TLU4 G11 A wireless router allows multiple nodes to join the same network wirelessly and provides access to the Internet. It can function as a switch and as an Internet router and WiFi/Home Router Networking access point. G11 TLU4 G11 A WMN comprises many wireless nodes with access points Wireless Mesh Network that communicate to transfer data and maintain a (WMN) Networking connection between the nodes across a large area. G11 TLU4 G11 A gateway is a device that connects network segments with Gateway Networking different topologies, technologies (Ethernet) AND protocols. G11 TLU5 G11 A microwave link is a communications system that uses a beam of radio waves in the microwave frequency range to transmit video, audio, or data between two locations, which can be from just a few metres apart to several kilometres Microwave Networking apart. G11 TLU5 G11 ADSL (old technology) uses telephone lines to transmit data along copper cables from your nearest telephone exchange ADSL Networking to your home or office. G11 TLU5 G11 Simple Mail Transfer An email protocol for delivering emails from an email client Protocol (SMTP) Networking to server. It is usually used for outgoing emails. G11 TLU5 G11 Post Office Protocol An email protocol which allows an email client to download (POP3) Networking an email from an email server. G11 TLU5 G11 An email protocol designed to allow users to keep their Internet Message Access email on the email server which is useful if you use many Protocol (IMAP) Networking devices to access the email. G11 TLU5 G11 HyperText Transfer The standard protocol for transferring web pages and their Protocol (HTTP) Networking content across the Internet. G11 TLU5 G11 HyperText Transfer A secure version of HTTP. HTTPS is used mainly on web Protocol over Secure pages that ask you to provide personal or sensitive Socket layer (HTTPS) Networking information, such as a password or your credit card details. G11 TLU5 G11 File Transfer Protocol (FTP) Networking This protocol is used to transfer files across the Internet. G11 TLU5 G11 WebDAV is an extension of the HTTP protocol and allows for downloading, editing and managing files on remote WebDAV Networking servers. G11 TLU5 G11 A desktop terminal with no hard drive and little processing Thin Client Networking power. It relies on a networked server for resources. G12 TLU3 G12 A networked computer where most application software is stored locally. It has sufficient processing power to process Fat client Networking its own applications. G12 TLU3 G12 A networked computer that stores most of their data remotely on the Internet but uses the processing power and Smart Client Networking other resources of the local device. G12 TLU3 G12 Every computer becomes a server (peer) and is capable of Peer to Peer File sharing Networking downloading files to other computers. G12 TLU3 G12 Only one networked computer stores the files and all Client Server File sharing Networking downloads are done through this central server. G12 TLU3 G12 A peer-to-peer protocol, in which multiple peers can transfer data between each other. Files are split into smaller parts to increase upload and download speeds. Once a peer has the complete file, it becomes a seed that other peers can Bit Torrent Networking use. G12 TLU3 G12 Remote access is the ability to access a computer or device Remote Access Networking from a remote location using the Internet. G12 TLU3 G12 Connects remote computers to a private internal network Virtual Private Network using the Internet, unlike remote access which will give you (VPN) Networking control of an entire computer. G12 TLU3 G12 IoT is a system of related computing devices, mechanical and digital machines, objects, animals or people who are provided with unique identifiers and the ability to transfer Internet of Things (IoT) Networking data without the need for human interaction. G12 TLU3 G12 Is the part of the World Wide Web that is indexed by search engines and hence searchable with standard web search Surface Web Networking engines. G12 TLU3 G12 The deep web is made of up of non-indexed pages and hence cannot be accessed by a search engine. Deep web content includes anything behind a paywall or requires sign- in credentials or any content that is blocked to indexing by Deep Web Networking web crawlers. G12 TLU3 G12 The dark web is also a part of the Internet that is not indexed by search engines. The dark web is intentionally hidden from search engines, uses masked IP addresses, Dark Web Networking and is accessible only with a special web browser. G12 TLU3 G12 Onion routing provides anonymous communication over a computer network. Messages are surrounded in layers of encryption making web browsing safer and more secure for Onion Router Networking users. G12 TLU3 G12 Global Positioning System GPS is a real-time satellite-based navigation system which (GPS) Networking can be sent to any device. G12 TLU3 G12 LBS are services which use the geographical position of a Location-Based Services device to provide contextual information like the nearest (LBS) Networking ATM, restaurant or retail store. G12 TLU3 G12 Cloud computing is the use of on-demand computer services over the Internet. These services include the use of remote servers, storage, databases, networking, Cloud computing Networking applications, and processing power. G12 TLU3 G12 Cloud storage involves storing data on hardware in a remote physical location, which can be accessed from any Cloud Storage Networking device via the Internet. G10 TLU7 G10 A commonly-used protocol for managing the security when Secure Sockets Layer transmitting data on the Internet. It has been replaced with (SSL) Networking Transport Layer Security (TLS) certificates. G12 TLU3 G12 Encryption Networking Convert plain text to unreadable ciphertext. G12 TLU3 G12 A data file issued by a Certificate Authority (CA) to an organisation to prove the identity of the organisation. It cryptographically binds an entity's public key to specific Digital Certificate Networking attributes relating to its identity. G12 TLU3 G12 The core technology that relies on the use of the two related Public Key Infrastructure public and private keys to manage identity and security in (PKI) Networking Internet communications G12 TLU3 G12 A blockchain is a decentralised, distributed and public digital ledger to create trust. Blockchains act as a shared database, distributed across large peer-to-peer networks Blockchain Networking with no single point of failure. G12 TLU3 G12 A combination of strategies to increase the amount of Search Engine visitors to a website by obtaining a high-ranking placement Optimisation (SEO) Networking in the Search Engine Page Results (SERP). G12 TLU3 G12 A Denial of Service attack attempts to make a server or Denial of Service (DOS) Networking network resource unavailable to its users and visitors. G12 TLU3 G12 Distributed Denial of A DOS that originates from multiple coordinated devices Service (DDOS) Networking (bots). G12 TLU3 G12 A vast number of Internet connected computers that have been set up to forward transmissions (including spam or viruses) to other computers on the Internet without the Botnet Networking knowledge of their owners often used in a DDOS. G12 TLU3 G12 Use of radio signals to transfer data from a tag attached to an object. The tag usually contains simple identification data that is sensed by a receiving device RFID Networking like a bar-code scanner. G11 TLU7 G11 One or more fields that uniquely identifies a record in a Primary Key Normalisation table G12 TLU1 G12 A combination of fields in a table which uniquely identify Super Key Normalisation each row G12 TLU1 G12 Candidate Key Normalisation Minimal super key G12 TLU1 G12 Composite Key Normalisation A combination of fields to form a primary key. G12 TLU1 G12 Attribute / Property / Field Normalisation Same as a field G12 TLU1 G12 When repeating groups are removed as a result of first Data Redundancy Normalisation normal form producing unnecessary repetition of data. G12 TLU1 G12 Process of creating separate linked tables by removing data Normalisation Normalisation redundancy, anomalies and complex SQL queries. G12 TLU1 G12 When two fields have the same value. This is NOT data redundancy and must not be removed through normalisation. For example. Two people have the same Duplicate Data Normalisation colour car. G12 TLU1 G12 Derived Data Normalisation When one field can be calculated from another field G12 TLU1 G12 Dependencies Normalisation When one field is related to another field G12 TLU1 G12 Atomic Data Normalisation A single value within a field G12 TLU1 G12 Multiple values in one field, or when a field contains more Non-Atomic Data Normalisation than one value. e.g. (Name + Surname) G12 TLU1 G12 When we need to update the same data in more than one Update Anomaly Normalisation place G12 TLU1 G12 Unnecessary loss of data as a result of a deletion of a Deletion Anomaly Normalisation record. G12 TLU1 G12 When a record is added that does not satisfy the primary Insertion Anomaly Normalisation key requirements G12 TLU1 G12 Is when a field’s value is dependent on only part of a Partial Dependency Normalisation composite key G12 TLU1 G12 Transitive Dependency Normalisation Is when a field’s value is dependent on a non key field. G12 TLU1 G12 Foreign Key Normalisation A field in a table that is a primary key in another table G12 TLU1 G12 Referential Integrity Normalisation One record cannot refer to a record that does not exist G12 TLU1 G12 Repeating Groups Normalisation Is a one-to-many relationship within the same table. G12 TLU1 G12 Generates primary key No repeating groups No empty fields 1 NF Normalisation Causes duplicated data G12 TLU1 G12 Table in 1NF 2 NF Normalisation Removes Partial Dependencies G12 TLU1 G12 Table in 2NF 3 NF Normalisation Removes transitive dependencies G12 TLU1 G12 A class is a template from which objects can be created and combines fields and methods into a single unit. In Java is Class Programming also an application program. G10 JLU1 G10 The properties of a class which are variables that contain Fields / Properties Programming data values. G10 JLU1 G10 Methods / Behaviours Programming A block of code that is run when called. G10 JLU1 G10 End User Programming The person who runs the program. G10 JLU1 G10 The window where you as a programmer type in the Java Code Window Programming Program. G10 JLU1 G10 Output Window Programming The output window displays what the end user sees. G10 JLU1 G10 Constructor Programming Assigns values to an object’s fields. G10 JLU1 G10 Parameter Programming Values sent to a method. G10 JLU1 G10 Source code cannot compile due to errors in the code such Syntax error Programming as spelling errors, missing brackets etc. G10 JLU1 G10 Program compiles and runs but produces unexpected Logical error Programming results. G10 JLU1 G10 Occurs when a program compiles but halts unexpectedly Run time error Programming when the program is running G10 JLU2 G10 Source code Programming Original code written by the programmer. E.g. code.java. G10 JLU1 G10 Bytecode Programming The compiled version of the source code. E.g. code.class. G10 JLU1 G10 Method or field belongs to the class and is called with the class name. No copies of fields are made each time an Static Programming object is instantiated. G11 JLU1 G11 Method or field belongs to the object and is called with the object name. A copy of the field is made each time the Non-static Programming object is instantiated. G11 JLU1 G11 Void method Programming Method does not return a value. G11 JLU1 G11 Type method Programming Method returns a single value as a primitive or object. G11 JLU1 G11 Value of the variable is stored in the variable location in memory. Relational operators > < >= <= == and != can be used to compare primitives. Primitives are declared and Primitive type Programming assigned. G11 JLU1 G11 Combining fields and methods into a single unit and instantiated from a class. Relational operators cannot be Object Programming used to compare primitives. Use .equals() method instead. G11 JLU1 G11 Declare Programming A variable is assigned a type. E.g. int x; or Gogga bug.; G11 JLU1 G11 A variable is given its first value. Int x = 5. (x is declared and Initialise Programming initialized in one statement) G11 JLU1 G11 An object is created using the operator new. Gogga bug = Instantiate Programming new Gogga(1,2); G11 JLU1 G11 Assign Programming A variable is given a value. x = 3; G11 JLU1 G11 Object is declared (given a type). String name; or Gogga bug; A NullPointerException is generated if a method is Null Programming applied to the object. E.g. bug.move(); G11 JLU1 G11 A string that is declared and assigned/instantiated with no characters assigned. E.g. String name = “”; No error will Empty string Programming occur from the code System.out.println(name); G11 JLU1 G11 An exception is an event that alters the flow of a program. Exception Programming In most cases they are errors. G11 JLU1 G11 A whitespace character can be a blank, a tab character, a Whitespace Programming carriage return, or the end of the file. G11 JLU2 G11 A token is a series of characters that ends with a delimiter. Token Programming A delimiter is by default whitespace. G11 JLU2 G11 Delimiter Programming Separates tokens in the Scanner class. G11 JLU2 G11 Data structure that stores unstructured text data Text file Programming permanently. G11 JLU2 G11 Append Programming Add to the end of an existing file. G11 JLU2 G11 Constructor Programming Assigns values to private fields of an object. G11 JLU4 G11 Accessor method Programming Returns values of private fields of an object. G11 JLU4 G11 Mutator method Programming Changes the values of private fields of an object. G11 JLU4 G11 Combines and returns the values of private fields of an toString method Programming object as a string. G11 JLU4 G11 Argument or Actual Value or variable in a call statement sent to a method parameter Programming header. G11 JLU4 G11 Variable in a method header that receives a value from the Formal parameter Programming argument/actual parameter G11 JLU4 G11 Variable declared in a block of code and only exists within Local variable Programming the block of code. G11 JLU4 G11 Scope Programming Where a variable/field can be accessed in a program. G11 JLU7 G11 The extend to which a variable remains in memory during Lifetime Programming the execution of a program. G11 JLU7 G11 When a subclass is extended from an existing superclass Inheritance Programming and adds fields and/or methods. G12 JLU2 G12 Method with the same name but different parameters in the Overloading Programming same class. G12 JLU2 G12 Methods with the same name and same parameters in Overriding Programming inherited classes. G12 JLU2 G12 A field or method is available to classes in the same Protected Programming package. G12 JLU2 G12 The object that called the method and is prefixed by this. in Implicit parameter Programming the class. G12 JLU2 G12 The ability of an object declared as a superclass to be instantiated as an object of the super or sub class in an Polymorphism Programming inheritance hierarchy using the relevant constructor. G12 JLU3 G12 The appropriate method is used in an inheritance hierarchy depending on the class the object was instantiated from and Dynamic method lookup Programming the constructor used to create the object. G12 JLU3 G12 The ability of an object to be bound to the appropriate Dynamic binding Programming overridden method in an inheritance hierarchy at run-time. G12 JLU3 G12 There is a has-a relationship between two objects. One Composition Programming object is a field of another object. G12 JLU3 G12 An email sent to entice users to click on a link to a fraudulent website to gain confidential information such Phishing Security as banking details. G11 TLU7 G11 Creating a fraudulent website or email that appears to Spoofing Security be legitimate. G11 TLU7 G11 A Trojan horse is a seemingly harmless program that Trojan Horse Security when activated, causes harm to a computer system. G11 TLU7 G11 Stealing a user’s identity to access their resources or Identity Theft Security obtain credit and other benefits in that person's name. G11 TLU7 G11 An attack intended to redirect a website's traffic to Pharming Security another, bogus site. G11 TLU7 G11 Preventing or limiting a user or organisation from accessing their resources such as a website or file Ransomware Security server until they have paid a ransom. G11 TLU7 G11 A Denial of Service attack attempts to make a server or network resource unavailable to its users and visitors usually by interrupting or suspending a host service connected to the Internet temporarily or Denial of Service (DOS) Security indefinitely. G11 TLU7 G11 DDoS attack is a Distributed Denial of Service attack Distributed Denial of that uses more than one computer distributed Service (DDOS) Security worldwide to put a heavy burden on a service. G11 TLU7 G11 A botnet (also known as a zombie army) is several Internet computers that have been set up to forward transmissions (including spam or viruses) to other computers on the Internet without the knowledge of Botnet/Zombie Army Security their owners. G11 TLU7 G11 RAID protects against hard drive failure by using two Redundant Array of or more hard disks so that if one hard drive fails the Inexpensive Disks other hard drive(s) on the server will contain a copy of (RAID) Security the data providing reliable hard drive storage. G11 TLU7 G11 RAID level 1 uses mirroring in which all data is stored on two hard disks simultaneously (the one being a mirror image of the other), but data is only accessed from one main hard disk with the second kept as a RAID Level 1 (Mirroring) Security backup. G11 TLU7 G11 RAID level 5 uses disk striping with parity which requires a minimum of three hard disks. Data is written in "stripes" across the three hard drives with no one disk having the same data. The parity is usually an extra byte added to every 8 bytes of data for error correction. If one disk fails, the parity data is used to RAID Level 5 (Striping) Security reconstruct the disk that failed. G11 TLU7 G11 A UPS is an electrical device that provides emergency Uninterruptible Power power to electrical equipment when the normal power Supply (UPS) Security source fails. G11 TLU7 G11 A redundant power supply is when a single piece of computer equipment operates using two or more Redundant Power Supply Security physical power supplies. G11 TLU7 G11 Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In other words, it is defined as the study of designing, engineering, manufacturing, using and disposing of computing devices in Green Computing Social Implications a way that reduces their environmental impact. G12 TLU5 G12 The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves Virtual Reality Social Implications fitted with sensors. G12 TLU5 G12 Augmented reality is a technology that places interactive Augmented Reality Social Implications digital content on real scenes. G12 TLU5 G12 Digital materials such as texts, databases, still and moving images, audio, emails, software, and web pages that should be protected and preserved for current and future Digital Heritage Social Implications generations. G12 TLU5 G12 Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone Cyberbullying Social Implications else using digital devices. G12 TLU5 G12 Child pornography, images of children involved in sexual activities, is traded on the Internet, often using the dark Child Pornography Social Implications web. G12 TLU5 G12 A control system is a device, or set of devices, that manages, commands, directs or regulates the behaviour of Control Systems Social Implications other devices or systems. G12 TLU5 G12 An AUP is a set of rules drawn up by the management Acceptable User Policy of a company to protect the company, the network the (AUP) Social Implications company's devices and data from misuse. G11 TLU8 G11 A mobile office is a temporary or movable configuration of equipment and services that allows a person to function as if they are working from a Mobile Offices Social Implications permanent office G11 TLU8 G11 A virtual office is a flexible workspace that provides businesses with any combination of services, space and/or technology, without owning or leasing a Virtual Offices Social Implications traditional office. G11 TLU8 G11 Robots are complex machines that perform dangerous, repetitive or distasteful jobs that are boring Robotics Social Implications or risky for human workers. G11 TLU8 G11 Artificial Intelligence (AI) is a branch of science which deals with helping machines find solutions to complex Artificial intelligence (AI) Social Implications problems in a more human-like manner. G11 TLU8 G11 An Unmanned Aerial Vehicle (UAV) is a type of aircraft that operates without a human pilot on board, the most Unmanned Aerial Vehicles Social Implications common example being a drone. G11 TLU8 G11 Social engineering is defined as the act of manipulating people into divulging confidential information with a view to committing some sort of Social Engineering Social Implications computer fraud or gain unauthorised computer access. G11 TLU8 G11 Shoulder surfing is where the attacker uses observational techniques, such as looking over someone's shoulder, to get information while the user Shoulder Surfing Social Implications is inputting sensitive data like a password. G11 TLU8 G11 Raiding dumpsters to obtain discarded data such as company phone records, organisational charts, company policy manuals, calendars of events, printouts of sensitive data, company letterhead and Dumpster Diving Social Implications outdated hardware into public dumpsters G11 TLU8 G11 An attack in which an attacker convinces the target Reverse Social that he has a problem or might have a certain problem Engineering or Role in the future and that the attacker is ready to help solve Playing Social Implications the problem. G11 TLU8 G11 White hat hackers are non-malicious hackers, like company employees who test the security of the firm's White hat hackers Social Implications own computer system by trying to break into it. G11 TLU8 G11 Black hat hackers/crackers are malicious hackers, also known as crackers, who hack into systems with the Black hat hackers/crackers Social Implications intent to steal or vandalise. G11 TLU8 G11 Grey hat hackers lie in between the white hat and the black hat hacker, grey hats sometimes act illegally. They will for example break through a system without authorisation in order to put vulnerabilities on show Grey hat hackers Social Implications and then charge the owner a fee to repair it. G11 TLU8 G11 Software theft means the unauthorised or illegal copying, sharing or usage of copyright-protected Software Theft Social Implications software programs. G11 TLU8 G11 The illegal copying or storage of any information that is confidential, personal, or financial in nature, including Information Theft Social Implications passwords, software code, algorithms or databases. G11 TLU8 G11 Stealing wireless bandwidth is connecting to the Internet through a wireless Internet router which does not belong to you or you do not have permission to use. Those who pay for their wireless service expect it to function optimally, but suffer from slower performance or intermittent disconnection due to Bandwidth Theft Social Implications bandwidth theft. G11 TLU8 G11 Fake news is news, stories or hoaxes created to Fake News Social Implications deliberately misinform or deceive readers. G11 TLU8 G11 Optical Character Recognition (OCR) is software that can Optical Character analyse an image that contains text and convert the text Recognition (OCR) Software into UNICODE. G10 TLU3 G10 A set of programs that manages hardware and runs Operating System (OS) Software applications. G10 TLU2 G10 The kernel is the core of the operating system that is always Kernel Software in RAM to control the computer. G10 TLU2 G10 A GUI includes Windows, Icons, Mouse Control and pull- Graphical User INterface down menus (WIMP) where a user can interact with the (GUI) Software computer with a pointing device to select icons. G10 TLU4 G10 Early operating systems, such as MS DOS, used a text- Command Line Interface based interface, with commands being typed at the (CLI)) Software command prompt. G10 TLU4 G10 Software that is part of the OS that communicates with a device by converting data into a format understandable by Driver Software the device. Each device must have a driver. G10 TLU4 G10 IDE (Integrated Software for the development of computer programs. They Development convert source code to an executable version and provide Environment) Software tools to aid the programmer. G10 TLU4 G10 Source code is the original code written by the programmer. Source Code Software For example Program.java. G10 TLU4 G10 Source code is compiled to object code. In Java this code Object Code Software has the .class extension. A .class file cannot be executed. G10 TLU4 G10 Code that can be run by the processor. For example .exe or Executable code Software .jar files. G10 TLU4 G10 Rearranges fragmented data on a mechanical hard disk so your data can be loaded and saved more efficiently. It Disk Defragmenter Software reduces latency of the harddisk drive. G10 TLU4 G10 Software cannot be freely used or copied. The source code is not available only the executable code. Software is Proprietary Licence Software licenced through product or activation keys. G10 TLU4 G10 The source is available and can be changed. For copyleft Free and Open Source licence any changes to the source code requires the user to Licences Software release the source code. G10 TLU4 G10 Allows you to keep the copyright of your work but still allows Creative Commons people to copy and distribute your work (documents, source License Software code) on condition they acknowledge your work. G10 TLU4 G10 Freeware software is software that is copyrighted but given away by the author without any cost for a user to use, but not to resell. The author still retains the copyright, which means that you cannot alter it as you are not given the Freeware Software source code. G10 TLU4 G10 Freemium software is a variant of freeware where limited functions are provided free at no cost, but additional or Freemium Software Software more advanced features incur a cost. G10 TLU4 G10 The process of reducing the size of files, so they take up less storage space or can be transferred more quickly over Compression Software the Internet. G10 TLU4 G10 Remove files and store them in a compressed separate Archive Software location for space saving and later use. G10 TLU4 G10 Backup the copying of files or folders in case of data loss to Backup Software usually a separate location. G10 TLU4 G10 A utility in the operating system you to run programs automatically at specified times with specified conditions, allowing the system to update and/or process configurations Scheduler Software in the background while you are running the computer G10 TLU4 G10 A firewall is hardware and software designed to permit or deny network transmissions based upon a set of rules and Firewall Software is used to protect networks from unauthorised access. G10 TLU4 G10 Malware Software Malicious software that is harmful to the computer. G10 TLU4 G10 Viruses are programs, illegally loaded onto a computer, that Virus Software cause damage to the system. A virus is part of Malware. G10 TLU4 G10 Spyware is computer software that is installed surreptitiously on a computer to intercept data without the user's informed consent. For example, a keystroke-logging Spyware Software program. Spyware is part of Malware. G10 TLU4 G10 Adware is unwanted and annoying software that automatically displays or downloads to a computer usually Adware Software when browsing the Internet. G10 TLU4 G10 Anti-malware are programs necessary to safeguards a Anti-Malware Software computer from malicious threats. G10 TLU4 G10 Anti-virus software that detects malicious software and takes action such as delete and quarantine based on the Anti-Virus Software program's behavior (signature). G10 TLU4 G10 Power On Self Test A routine executed by the BIOS to check the computer’s (POST) Software hardware using the list of installed devices from CMOS. G11 TLU3 G11 CMOS is a battery-backed, volatile memory that stores: Complementary Metal- • hardware settings - the types of hardware installed on Oxide-Semiconductor your computer such as the disk drive; (CMOS) Software • user settings - the current date and time. G11 TLU3 G11 The MBR is responsible for loading and executing the operating system kernel, which continues with the start-up Master Boot Record (MBR) Software procedure. G11 TLU3 G11 UEFI replaces BIOS and resides in the computer’s startup firmware. It checks to see what hardware components the computing device has, wakes the components up and Unified Extended Firmware hands them over to the operating system.UEFI replaces the Interface (UEFI). Software traditional BIOS on PCs. G11 TLU3 G11 A signal sent to the CPU from hardware or software Interrupt Software indicating the need for the CPU's attention. G11 TLU3 G11 Software interrupts are generated from programs and sent to the CPU. For example, dividing by zero, square rooting a Software Interrupt Software negative number or when an Input / Output (I/O) is required. G11 TLU3 G11 A hardware interrupt is a signal sent from a device to the CPU, such as the keyboard indicating that a key has been Hardware Interrupt Software pressed, or a printer indicating that it has run out of paper. G11 TLU3 G11 Interrupt Request Number A unique number for each device which the CPU uses to (IRQ) Software identify which device is interrupting it. G11 TLU3 G11 A temporary storage area in RAM, used to speed up a slow IO Range / Buffer Software input/output device. G11 TLU3 G11 A technique used by the operating system where several different programs appear to run simultaneously. True multitasking is achieved if the CPU has more than one core (multiprocessing). For example compiling a program and Multitasking Software listening to music. G11 TLU3 G11 One program with several different threads (parts of a program that run independently) running at the same time. Each thread can be allocated to a separate core if the CPU is more than one core (multiprocessing). For example, spell Multithreading Software checking a document while printing another document. G11 TLU3 G11 When the hard drive is used as an extension to RAM. Data in memory is divided into pages which are swopped into Virtual Memory Software RAM from the hard drive when needed. G11 TLU3 G11 Software that converts source code to object code or Translators Software executable code. G11 TLU3 G11 High-level languages contain a high level of abstraction where the underlying workings of the computer are hidden High-Level Languages Software from the programmer and are closer to human languages. G11 TLU3 G11 Low level languages are used to write programs that relate to the specific architecture and hardware of a particular type Low-Level Languages Software of computer (machine language). G11 TLU3 G11 Machine Language/Machine Code Software A low-level language that consists of 0s and 1s. G11 TLU3 G11 A low-level language are translated into machine code by an assembler. Each assembly language instruction corresponds to one machine language instruction but is Assembly Language Software more understandable that machine code. G11 TLU3 G11 An interpreter reads the source code line by line, checks for syntax errors, converts it to machine code, and executes it; with no object file being created. It is a form of translator. E. Interpreter Software g. Python and Javascript. G11 TLU3 G11 A compiler checks the source code for syntax errors and converts it to object code only if there are no syntax errors Compiler (One Stage) Software found. The object code (.exe file) is executed. E.g. Delphi G11 TLU3 G11 A compiler checks the source code for syntax errors and converts it to object code (bytecode) only if there are no syntax errors found. The bytecode is interpreted and Compiler (Two Stage) Software executed. E.g. Java G11 TLU3 G11 The steps for a program instruction to be executed by the CPU. Consists of FETCH, DECODE, EXECUTE and Machine Cycle Software STORE. G11 TLU3 G11 Data Software Raw unprocessed information G10 TLU2 G10 Data that is processed to create meaning. E.g, sorting data, Information Software finding the average. G10 TLU2 G10 Operating systems designed to run on mobile devices with Mobile Operating System Software limited resources. G10 TLU2 G10 Software or hardware that is required for a program to run. Resources Software E.g., CPU, RAM, driver. G10 TLU2 G10 Software that carries out specific tasks for the user. All Application software (apps) Software application software requires an operating system. G10 TLU2 G10 Applications that do not require any networking hardware or Stand-alone Applications Software software resources. G10 TLU2 G10 Applications that run on multiple computers and use Network Applications Software network resources. G10 TLU2 G10 Hardware G10 Book Reference Term Section Definition Book Reference Grade G11 TLU7 RAM (Random Access Memory ) Hardware Primary short term memory that temporarily stores programs and instructions currently G10 TLU2loaded. It is volatile. G10 G12 TLU4 Secondary storage Hardware Permanent storage that stores all programs and data on the local computer. G10 TLU2 G10 G10 TLU12 Motherboard Hardware A large circuit board that connects the most important components such as CPU,G10 memory TLU3and connectors for peripherals G10 G10 TLU2 CPU / Processor Hardware A component that processes instructions. G10 TLU3 G10 G10 TLU3 Arithmetic Logic Unit (ALU) Hardware Part of the CPU that performs arithmetic and logical calculations.l G10 TLU3 G10 G11 TLU2 Control Unit (CU) Hardware Part of the CPU that coordinates the processing of instructions. G10 TLU3 G10 G12 TLU2 Basic Input Output System (BIOS) Hardware Non-volatile firmware used to initialize the computer. It is stored in ROM. G10 TLU3 G10 G10 TLU5 Primary Storage Hardware Motherboard components consisting of BIOS, RAM and ROM. G10 TLU3 G10 G11 TLU6 Dynamic RAM (DRAM) Hardware RAM that contains capacitors and needs to be constantly refreshed. G10 TLU3 G10 G11 TLU4 Read Only Memory (ROM) Hardware ROM is a non-volatile memory chip that can be used to permanently store data inG10 computers TLU3 and other electronic devices, G10such as BIOS firmware, embedded operating systems G10 and TLU7appliance/robotics controllers. Electronically Erasable Programmable ROM Hardware (EEPROM) ROM that can be electronically changed using software. G10 TLU3 G10 G11 TLU5 Component Hardware Circuit chip placed directly on the motherboard G10 TLU3 G10 G12 TLU3 Peripheral Hardware Input, output or storage devices connected to the motherboard G10 TLU3 G10 G12 TLU1 Hard Disk Drive (HDD) Mechanical Drive Hardware Secondary storage device that stores programs and data magnetically and uses G10 mechanical TLU3 parts. G10 G10 JLU1 Solid State Drive (SSD) Hardware Secondary storage device that stores programs and data electronically in flash memory. G10 TLU3 G10 G10 JLU2 Hybrid Drive Hardware Secondary storage device that combines a mechanical HDD and a SSD. G10 TLU3 G10 G11 JLU1 Flash Drive Hardware Portable secondary storage that stores programs and using flash memory. G10 TLU3 G10 G11 JLU2 Optical Drives Hardware Secondary storage device that stores programs and data using lasers. G10 TLU3 G10 G11 JLU4 SD Cards Hardware Secondary storage medium that stores programs but mostly data and is small in G10 size.TLU3 G10 G11 JLU7 Scanner Hardware Input device that analyses an image and converts it to a file. OCR can be used toG10 convert TLU3the image to editable text. G10 G12 JLU2 Barcode Hardware A barcode is a simple pattern of thin and wide lines that are decoded by the scanner G10 to TLU3 represent data. G10 G12 JLU3 QR Code Hardware Two-dimensional sets of different sized squares on a white background that are decoded G10 TLU3by the scanner to represent data. G10QR Codes contain more data than barcodes. G12 TLU5 Biometric Device Hardware Inputs human physical data such as fingerprints, voiceprints and retinal/iris scans, G10analyses TLU3 the data to uniquely identify G10 and individual. G11 TLU8 Sensors Hardware A device that converts a real-world property into data that a computer can process G10by TLU3 converting the physical parameterG10 (for example: temperature, blood pressure, height, humidity, G10 TLU4 speed, etc.) into a signal which can be measured elec HDMI Port Hardware An connection interface that can receive both video and audio input. G10 TLU3 G10 G11 TLU3 Server Hardware A powerful computer that provides services to a network such as a file server andG10 printTLU5 server G10