0% found this document useful (0 votes)
88 views14 pages

IT Definitions

The document defines key terms related to databases and database management systems. It provides definitions of common database concepts like DBMS, accuracy, correctness, currency and completeness. It also defines SQL injection and terms related to database validation like presence check and uniqueness check.

Uploaded by

chayemba.che
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views14 pages

IT Definitions

The document defines key terms related to databases and database management systems. It provides definitions of common database concepts like DBMS, accuracy, correctness, currency and completeness. It also defines SQL injection and terms related to database validation like presence check and uniqueness check.

Uploaded by

chayemba.che
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Book

Term Section Definition Reference Grade


Software that manages and controls a database. This
Database Management includes permissions, backup, referential integrity and
System (DBMS) Databases access control. G11 TLU7 G11
Accuracy is the degree to which the stored value measures
against the true value. For example, the number of decimal
Accuracy Databases places for numeric data. G11 TLU7 G11
Data is correct if it conforms to an approved or conventional
Correctness Databases standard or agreeing with fact, logic, or known truth. G11 TLU7 G11
Currency Databases Data is current if it is up-to-date or not outdated. G11 TLU7 G11
Completeness Databases Data is complete if all required data is known G11 TLU7 G11
A web security vulnerability that allows an attacker to
interfere with the queries that an application makes to
its database. For example, view data that should not
SQL Injection Databases be accessible. G11 TLU7 G11
Non-relational databases / NoSQL databases are unstructured, flexible and store data
NoSQL Databases without having a predefined schema. G12 TLU4 G12
A data warehouse combines data from a variety of sources
within an organisation for purposes of producing reports
and analysis. These reports are created from complex
queries within the data warehouse to make business
Data Warehouse Databases decisions. G12 TLU4 G12
Big data is a massive volume of both structured and
unstructured data that is so large that it is difficult to process
Big Data Databases using traditional database and software techniques. G12 TLU4 G12
Data mining is a set of techniques for discovering hidden,
Data Mining Databases valid and potentially useful patterns or trends in a data set. G12 TLU4 G12
The logical design of the database which includes the
Schema Databases design of the tables and fields. G10 TLU12 G10
Field Databases Stores a single data item such as ID number or surname. G10 TLU12 G10
Record Databases A collection of fields. G10 TLU12 G10
Table Databases A collection of records. G10 TLU12 G10
Data verification ensures the user enters what they
intended, to eliminate mistakes when data is inputted.
For example, double entry of data (such as when
creating a password or email) to prevent incorrect data
Verification Databases input. G11 TLU7 G11
Validation is about checking the input data to ensure it
conforms with the data requirements of the system to
avoid data errors. For example, range check, format
Validation Databases check, check digit etc. G11 TLU7 G11
Test to determine if the data for a field must be
Presence Check Databases entered. G11 TLU7 G11
Test to determine if the data falls between a lower and
Range Check Databases upper bound. G11 TLU7 G11
Uniqueness Check Databases Test to determine if the data value is not duplicated. G11 TLU7 G11
Test to determine if the data has a set number of
Length Check Databases characters. G11 TLU7 G11
Test to determine if the data is of the correct type,
Type Check Databases such as a String or real number. G11 TLU7 G11
Test to determine if the data is structured in
Format Check Databases predetermined format. G11 TLU7 G11
Test to determine if the data is consistent for the
scenario. For example, a student in a high school
Logical Check Databases cannot be 30 years of age. G11 TLU7 G11
Test to determine if a digit in a number, satisfies a
certain algorithm, usually based on existing digits in
Check Digit Databases the number. G11 TLU7 G11
Test to verify data transfer by performing a calculation
Check Sum Databases (such as a sum) on the bits transferred. G11 TLU7 G11
Test to verify data transfer by inserting a 9th bit after 8
Parity Databases bits to create an odd or even number of bits. G11 TLU7 G11
RAM (Random Access Primary short term memory that temporarily stores
Memory ) Hardware programs and instructions currently loaded. It is volatile. G10 TLU2 G10
Permanent storage that stores all programs and data on the
Secondary storage Hardware local computer. G10 TLU2 G10
A large circuit board that connects the most important
components such as CPU, memory and connectors for
Motherboard Hardware peripherals G10 TLU3 G10
CPU / Processor Hardware A component that processes instructions. G10 TLU3 G10
Serial Processing Hardware CPUs that can only process one instruction at a time. G11 TLU2 G11
A method of simultaneously breaking up and running
program instructions on multiple CPUs. Simply put, a single
problem can be broken into separate parts that can be
executed at the same time on different processors - in
Parallel Processing Hardware parallel. G11 TLU2 G11
A CPU has two sets of registers to allow for faster context
switching between processes. The CPU APPEARS to
Hyperthreading Hardware process processes simultaneously. Logical Cores. G11 TLU2 G11
More than one CPU on a CPU chip. Processes can be
Multiprocessing Hardware processed simultaneously. Physical Cores. G11 TLU2 G11
Stores the next few instructions and data to be processed
Processor Cache Hardware from slower RAM. Level 1 runs at the speed of the CPU. G11 TLU2 G11
Part of the CPU that performs arithmetic and logical
Arithmetic Logic Unit (ALU) Hardware calculations.l G10 TLU3 G10
Part of the CPU that coordinates the processing of
Control Unit (CU) Hardware instructions. G10 TLU3 G10
Fast RAM (SRAM) on the CPU that stores the current
Registers Hardware instruction and its data. G11 TLU2 G11
Fast RAM located on or near the CPU without capacitors. It
does not need to be refreshed, hence it is faster. Also
Static RAM (SRAM) Hardware smaller and more expensive. G11 TLU2 G11
Basic Input Output System Non-volatile firmware used to initialize the computer. It is
(BIOS) Hardware stored in ROM. G10 TLU3 G10
Motherboard components consisting of BIOS, RAM and
Primary Storage Hardware ROM. G10 TLU3 G10
RAM that contains capacitors and needs to be constantly
Dynamic RAM (DRAM) Hardware refreshed. G10 TLU3 G10
Latency Hardware The time taken for a component or device to respond. G11 TLU2 G11
ROM is a non-volatile memory chip that can be used to
permanently store data in computers and other electronic
devices, such as BIOS firmware, embedded operating
Read Only Memory (ROM) Hardware systems and appliance/robotics controllers. G10 TLU3 G10
Electronically Erasable
Programmable ROM
(EEPROM) Hardware ROM that can be electronically changed using software. G10 TLU3 G10
Component Hardware Circuit chip placed directly on the motherboard G10 TLU3 G10
Input, output or storage devices connected to the
Peripheral Hardware motherboard G10 TLU3 G10
Microchip on the motherboard that regulates the timing and
System Clock Hardware speed of computer functions. G11 TLU2 G11
Overclocking is the practice of making computer
components run at speeds faster than designed by
changing the components frequencies. Overclocking is
done in two ways:
• per component - the CPU operates faster than the system
clock by changing its own clock multiplication factor.
• the whole system – the system clock is increased affecting
all components that detect the system clock and multiply by
Overclocking Hardware a factor. G11 TLU2 G11
Factor by which components multiply the system clock
Clock Multiplication Hardware speed to achieve its own speed. G11 TLU2 G11
Internal Bus / Front Side Bus that connects CPU to RAM consists of the data bus,
Bus (FSB) Hardware address bus and control bus G11 TLU2 G11
Data Bus Hardware Transfers instructions and data between RAM and the CPU G11 TLU2 G11
Transfers the address of instructions and data between
Address Bus Hardware RAM and the CPU G11 TLU2 G11
Transfers signal between RAM and the CPU such as Read
Control Bus Hardware From Memory (RFM) and Write To Memory (WTM) G11 TLU2 G11
External Bus Hardware Bus that connects motherboard to peripherals. G11 TLU2 G11
Connects graphics cards, RAID cards, Wi-Fi cards or SSD's
(Solid-State Drives) to the motherboard. They number of
PCI-express (PCIe) Bus Hardware PCIe slots and the size of the slots vary in motherboards. G11 TLU2 G11
Bus to connect mass storage devices such as hard drives
(mechanical or solid state) to a computer motherboard.
SATA Hardware Slower than PCIe. G11 TLU2 G11
Standardised serial bus to connect most types of
Universal Serial Bus (USB) Hardware peripherals to the motherboard. It transfers data and power. G11 TLU2 G11
Use of RAM to speed up access to the slower hard drive.
When data is read from the hard disk the data cached to
Disk cache Hardware RAM for subsequent reads. G11 TLU2 G11
Storing previously accessed websites on your local
computer. If the website is accessed again it will be loaded
Browser cache Hardware from the local computer instead from a remote website. G11 TLU2 G11
Storing recently accessed websites on a server in a
network. If another user accesses the same site it will be
delivered from the network server. The website will still be
Web cache Hardware cached in the user’s local browser cache. G11 TLU2 G11
Hard Disk Drive (HDD) Secondary storage device that stores programs and data
Mechanical Drive Hardware magnetically and uses mechanical parts. G10 TLU3 G10
Secondary storage device that stores programs and data
Solid State Drive (SSD) Hardware electronically in flash memory. G10 TLU3 G10
Secondary storage device that combines a mechanical
Hybrid Drive Hardware HDD and a SSD. G10 TLU3 G10
Portable secondary storage that stores programs and using
Flash Drive Hardware flash memory. G10 TLU3 G10
Secondary storage device that stores programs and data
Optical Drives Hardware using lasers. G10 TLU3 G10
Secondary storage medium that stores programs but mostly
SD Cards Hardware data and is small in size. G10 TLU3 G10
Input device that analyses an image and converts it to a file.
Scanner Hardware OCR can be used to convert the image to editable text. G10 TLU3 G10
A barcode is a simple pattern of thin and wide lines that are
Barcode Hardware decoded by the scanner to represent data. G10 TLU3 G10
Two-dimensional sets of different sized squares on a white
background that are decoded by the scanner to represent
QR Code Hardware data. QR Codes contain more data than barcodes. G10 TLU3 G10
Inputs human physical data such as fingerprints, voiceprints
and retinal/iris scans, analyses the data to uniquely identify
Biometric Device Hardware and individual. G10 TLU3 G10
A device that converts a real-world property into data that a
computer can process by converting the physical parameter
(for example: temperature, blood pressure, height, humidity,
speed, etc.) into a signal which can be measured
Sensors Hardware electrically. G10 TLU3 G10
An connection interface that can receive both video and
HDMI Port Hardware audio input. G10 TLU3 G10
A computer can be assembled with different components to
Modular Design Hardware suit a user’s requirements. G12 TLU2 G12
A hardware component embedded into a circuit board such
Onboard Controller Hardware as the motherboard. G12 TLU2 G12
An expansion card is plugged into a slot on the
motherboard (PCI, PCIe, Graphics card slots) will usually
Expansion Card Hardware provide better functionality than the onboard counterpart. G12 TLU2 G12
An additional processor to the CPU to work in parallel with
CPU that performs specific tasks e.g., GPU and FPU
Co-processor Hardware (Maths co-processor). G12 TLU2 G12
A co-processor that accelerates applications running on the
CPU by offloading the complex mathematical and geometric
GPU Hardware calculations necessary for graphics rendering. G12 TLU2 G12
RAM that stores that data about each pixel, its colour and
VRAM Hardware location on the screen to be used by the GPU. G12 TLU2 G12
instead of a separate GPU, the GPU is embedded into the
CPU and instead of separate VRAM, the GPU shares
Integrated Graphics Hardware system RAM. G12 TLU2 G12
A maths co-processor can help the ALU of the CPU
Maths co-processor Hardware process complex calculations using numeric data. G12 TLU2 G12
M.2 is a form factor – it describes the shape and size of a
M.2 Format Hardware hardware device. G12 TLU2 G12
Non-Volatile Memory A device interface specification for accessing a computer's
express (NVMe) Hardware non-volatile storage media attached via PCI Express bus. G12 TLU2 G12
A powerful computer that provides services to a network
Server Hardware such as a file server and print server G10 TLU5 G10
An internal or external device to provide regulated
Power Supply Unit (PSU) Hardware power to the computer. G11 TLU7 G11
Static websites that did not allow users to interact with the
Web 1.0 Internet content. G11 TLU6 G11
Dynamic websites that allow users to interact with the
Web 2.0 Internet content. G11 TLU6 G11
Websites that provide users with a more personal
Web 3.0 Internet experience by accessing browser history and location. G11 TLU6 G11
Web 4.0 is the mobile web that can adapt to its mobile
surroundings. Web 4.0 connects all devices in the real and
Web 4.0 Internet virtual world in real-time. G11 TLU6 G11
A script is a set of instructions. For web pages they are
instructions either to the web browser (client-side scripting)
Scripting Internet or to the server (server-side scripting). G11 TLU6 G11
Client-side scripting Internet Client-side scripts are interpreted by the client’s browser. G11 TLU6 G11
Scripts that run on the server to customise the HTML page
Server-side scripting Internet to be sent to the client. G11 TLU6 G11
A small text file stored in a user's browser to store user’s
Cookies Internet history and preferences. G11 TLU6 G11
A web-based (or browser-based) tool, application, program,
or app is software that runs on your web browser. Browser-
based applications only need an Internet connection and a
Wed-based applications Internet web browser on your computer to function. G11 TLU6 G11
Applications that are downloaded and installed on a mobile
device. An app can access content and data from the
Internet, or it can download the content so that it can be
Mobile Applications Internet accessed locally. G11 TLU6 G11
Application is written using the native development
Native Mobile Application Internet language and tools specific to the platform of the device. G11 TLU6 G11
A blend of native and web solutions. The core of the
application is written using cross platform web technologies
(HTML, CSS, and JavaScript), which are then encapsulated
Hybrid Mobile Application Internet inside a native application. G11 TLU6 G11
A small software module that provides customisation for a
Browser extension Internet web browser. G11 TLU6 G11
Allows users to search for related images and text given an
Reverse Image Lookup Internet image. G11 TLU6 G11
The process of receiving data from a central server to a
Download Internet user's computer G11 TLU6 G11
Streaming is the process of delivering data continuously
Streaming Internet from the Internet in real-time. G11 TLU6 G11
Video On Demand (VOD) VOD and AVOD are systems which allow users to select
or Audio and Video On and watch/listen to video or audio content whenever they
Demand (AVOD) Internet desire. G11 TLU6 G11
The communication systems used to deliver voice and
Voice over Internet multimedia data using the Internet Protocol (IP) networks,
Protocol (VoIP) Internet such as the Internet. G11 TLU6 G11
A podcast is usually a series of on-demand digital audio
Podcast Internet files that often focus on a topic or theme. G11 TLU6 G11
Encoding the data so that it can be transferred or stored
Compression Technology Internet using fewer bits than it originally contained. G11 TLU6 G11
Lossy compression reduces the number of bits of a file but
Lossy compression Internet when decompressed does not return to the original file size. G11 TLU6 G11
No information is lost in lossless compression, the size of
Lossless Compression Internet the original file and the restored file are the same. G11 TLU6 G11
Two non-identical keys are used to encrypt and decrypt the
Asymmetric Encryption Internet message called the public key and private key. G11 TLU7 G11
A user’s unique key that is available to all and is used to
encrypt/decrypt a user’s message. It is related to the user’s
private key. The message can be encrypted/decrypted
Public key Internet using the related private key. G11 TLU7 G11
A user’s unique key that is only known to the user and is
used to encrypt/decrypt a user’s message.The message
Private key Internet can be encrypted/decrypted using the related public key. G11 TLU7 G11
A user can "sign" a document by encrypting data with their
private key, if the document can be decrypted with the
matching public key, then the document can be proved to
Digital Signature Internet be sent by the user. G11 TLU7 G11
An encryption protocol for wireless LANs where each data
Temporal Key Integrity packet is encrypted using a 48-bit serial number that is
Protocol (TKIP) Internet incremented for each packet. G11 TLU7 G11
A firewall can monitor and block packets that are heading to
Port Filtering Internet a certain port or block packets based on their content. G11 TLU7 G11
When database data is changed, an audit trail records who,
Audit Trails Internet what and a timestamp of the change. G11 TLU7 G11
Process whereby the data between devices are kept
consistent. Any change to data stored on one device is
Synchronisation Networking replicated on the other device. G10 TLU2 G10
Node Networking Any device connected to a network and has an IP address. G10 TLU5 G10
LAN Networking A network within a small area such as a building or room. G10 TLU5 G10
Maximum amount of data that can be transferred at one
Bandwidth Networking time. Measured in bits per second (bps). G10 TLU5 G10
Bounded communication channels, consisting of physical
Bounded Media Networking cabling, commonly used for wired LANs. G10 TLU5 G10
Unshielded Twisted Pair Consists of several pairs of copper twisted wires in an outer
cabling Networking protective plastic cover. G10 TLU5 G10
Twisted pairs of copper wire enclosed
in protective foil. This type of cable is less affected than
Shielded Twisted Pair Networking UTP by interference and crosstalk. G10 TLU5 G10
Fibre optic cable consists of a central glass or plastic core
surrounded by several layers of protective materials. It
transmits light pulses rather than electronic signals,
Fibre optic cable Networking eliminating interference. G10 TLU5 G10
Attenuation Networking The signal loses strength over a distance. G10 TLU5 G10
Signals from other sources such as machinery can corrupt
Electro-Magnetic the
Interference Networking signals traveling in copper cables nearby. G10 TLU5 G10
Signals traveling along copper cables can be intercepted by
Eavesdropping Networking outsiders. G10 TLU5 G10
Signals in adjacent wires can interfere with each other as in
a crossed telephone
Crosstalk Networking conversation. G10 TLU5 G10
Transferring signals between nodes using no cables such
as Bluetooth, infrared beams, microwaves, satellites or
Unbounded media Networking laser light signals. G10 TLU5 G10
A MAN is made up of LANs interconnected using high-
MAN Networking speed connections across a city or metropolitan area. G10 TLU5 G10
A WAN is made up of interconnected LANs and/or MANs in
WAN Networking different cities or different countries. G10 TLU5 G10
GAN Networking A worldwide WAN such as the Internet is called a GAN. G10 TLU5 G10
The PAN is used by an individual for communicating
between devices such as a desktop computer, Laptop,
PAN Networking smartphone, smart wear and tablet. G10 TLU5 G10
A router is a small electronic device that joins computer
networks together using either wired or wireless
Router Networking connections. G10 TLU5 G10
Creates a Wi-Fi hotspot which enables all computers and
devices which have Wi-Fi capabilities to connect to the
Wi-Fi Router Networking router G10 TLU5 G10
A wireless technology standard for sending data over short
Bluetooth Networking distances, using short-wavelength radio transmissions G11 TLU4 G11
provides a wireless connection between two Provides a
wireless, two-way connection between two devices within
Near Field Communication close proximity. NFC is commonly used in contactless
(NFC) Networking payment systems, like those used in credit cards. G11 TLU4 G11
A communication channel that is shared by all the devices
Broadcast Networking in the network. Communication is not secure. G11 TLU4 G11
A point to point connection directly connects two nodes of a
Point to Point Networking network. G11 TLU4 G11
Topology Networking Physical layout of a network. Star, bus, ring and hybrid G11 TLU4 G11
Ethernet is a technology that connects nodes in a local area
network and enables them to communicate with each other
Ethernet Networking through a common protocol. G11 TLU4 G11
An Internet Protocol address (IP address) is a numerical
label assigned to each device connected to a computer
network so that the device can communicate on the
IP Address Networking Internet. (IPv4 32 bits vs IPv6 128 bits) G10 TLU7 G10
Media Access Control A hardware identification number that uniquely identifies
(MAC) address Networking each device on a network. G11 TLU4 G11
Address Resolution A protocol that links the device’s MAC address (frame) to its
Protocol (ARP) Networking IP address (packet). G11 TLU4 G11
Dynamic Host
Configuration Protocol Automatically assigns IP addresses to devices connected to
(DHCP) Networking the network using a client–server architecture. G11 TLU4 G11
Domain Name Servers
(DNS) Networking A directory of domain names and associated IP addresses. G11 TLU4 G11
TCP/IP is the communication protocol for the Internet, it
defines the rules computers must follow in order to
TCP/IP Protocol Networking communicate with each other over the Internet. G11 TLU4 G11
Network Interface Cards The physical interface or
(NIC) Networking connection between the computer and the network cable. G11 TLU4 G11
Network segment Networking A part of a larger LAN network. G11 TLU4 G11
Repeater Networking A network device that boosts the signal on a cable. G11 TLU4 G11
A bridge connects network segments, strengthens the
signals as they pass through it and looks at the MAC
addresses of the signals, only forwarding data packets to a
different network segment if the MAC address is not in the
segment from which the packet comes. A bridge reduces
Bridge Networking network traffic. G11 TLU4 G11
Switch Networking A network device that connects nodes in a star topology. G11 TLU4 G11
A router boosts signals and uses nodes' IP addresses to
determine the best path for data packets to travel along to
reach their destinations. Routers connect networks with
different topologies and different technologies (Ethernet) but
Router Networking MUST have the same protocol. G11 TLU4 G11
When a file or message is sent across the network, the data
to be sent is usually broken into smaller more manageable
Segment Networking parts called segments. G11 TLU4 G11
Packets are wrapped around segments and consist of a
Packet Networking header, payload and trailer. A packet uses IP addresses. G11 TLU4 G11
Frames are wrapped around packets and use MAC
addresses. A frame includes the MAC source and
destination address, type, payload, CRC/FCS and inter
Frame Networking frame gap. G11 TLU4 G11
Frame Check Sequence Frame Check Sequence (FCS) is used to detect if errors
(FCS) Networking have occurred in the data transmission G11 TLU4 G11
A Virtual Local Area Network (VLAN) is a logical
Virtual Local Area Network subnetwork which can group together collections of devices
(VLAN) Networking in a LAN to create a new virtual LAN. G11 TLU4 G11
A wireless transceiver that broadcasts a signal within a
limited area. Each access point connects nodes to a wired
network so that users can communicate with other network
Wireless Access Point Networking users or connect to the Internet. G11 TLU4 G11
A hotspot is a site that offers Internet access over a
wireless local area network with the use of a router or
Hotspot Networking wireless access point connected to a link to an ISP. G11 TLU4 G11
A network device that link network segments without a
Wireless Bridge Networking cable. G11 TLU4 G11
A wireless router allows multiple nodes to join the same
network wirelessly and provides access to the Internet. It
can function as a switch and as an Internet router and
WiFi/Home Router Networking access point. G11 TLU4 G11
A WMN comprises many wireless nodes with access points
Wireless Mesh Network that communicate to transfer data and maintain a
(WMN) Networking connection between the nodes across a large area. G11 TLU4 G11
A gateway is a device that connects network segments with
Gateway Networking different topologies, technologies (Ethernet) AND protocols. G11 TLU5 G11
A microwave link is a communications system that uses a
beam of radio waves in the microwave frequency range to
transmit video, audio, or data between two locations, which
can be from just a few metres apart to several kilometres
Microwave Networking apart. G11 TLU5 G11
ADSL (old technology) uses telephone lines to transmit data
along copper cables from your nearest telephone exchange
ADSL Networking to your home or office. G11 TLU5 G11
Simple Mail Transfer An email protocol for delivering emails from an email client
Protocol (SMTP) Networking to server. It is usually used for outgoing emails. G11 TLU5 G11
Post Office Protocol An email protocol which allows an email client to download
(POP3) Networking an email from an email server. G11 TLU5 G11
An email protocol designed to allow users to keep their
Internet Message Access email on the email server which is useful if you use many
Protocol (IMAP) Networking devices to access the email. G11 TLU5 G11
HyperText Transfer The standard protocol for transferring web pages and their
Protocol (HTTP) Networking content across the Internet. G11 TLU5 G11
HyperText Transfer A secure version of HTTP. HTTPS is used mainly on web
Protocol over Secure pages that ask you to provide personal or sensitive
Socket layer (HTTPS) Networking information, such as a password or your credit card details. G11 TLU5 G11
File Transfer Protocol
(FTP) Networking This protocol is used to transfer files across the Internet. G11 TLU5 G11
WebDAV is an extension of the HTTP protocol and allows
for downloading, editing and managing files on remote
WebDAV Networking servers. G11 TLU5 G11
A desktop terminal with no hard drive and little processing
Thin Client Networking power. It relies on a networked server for resources. G12 TLU3 G12
A networked computer where most application software is
stored locally. It has sufficient processing power to process
Fat client Networking its own applications. G12 TLU3 G12
A networked computer that stores most of their data
remotely on the Internet but uses the processing power and
Smart Client Networking other resources of the local device. G12 TLU3 G12
Every computer becomes a server (peer) and is capable of
Peer to Peer File sharing Networking downloading files to other computers. G12 TLU3 G12
Only one networked computer stores the files and all
Client Server File sharing Networking downloads are done through this central server. G12 TLU3 G12
A peer-to-peer protocol, in which multiple peers can transfer
data between each other. Files are split into smaller parts to
increase upload and download speeds. Once a peer has
the complete file, it becomes a seed that other peers can
Bit Torrent Networking use. G12 TLU3 G12
Remote access is the ability to access a computer or device
Remote Access Networking from a remote location using the Internet. G12 TLU3 G12
Connects remote computers to a private internal network
Virtual Private Network using the Internet, unlike remote access which will give you
(VPN) Networking control of an entire computer. G12 TLU3 G12
IoT is a system of related computing devices, mechanical
and digital machines, objects, animals or people who are
provided with unique identifiers and the ability to transfer
Internet of Things (IoT) Networking data without the need for human interaction. G12 TLU3 G12
Is the part of the World Wide Web that is indexed by search
engines and hence searchable with standard web search
Surface Web Networking engines. G12 TLU3 G12
The deep web is made of up of non-indexed pages and
hence cannot be accessed by a search engine. Deep web
content includes anything behind a paywall or requires sign-
in credentials or any content that is blocked to indexing by
Deep Web Networking web crawlers. G12 TLU3 G12
The dark web is also a part of the Internet that is not
indexed by search engines. The dark web is intentionally
hidden from search engines, uses masked IP addresses,
Dark Web Networking and is accessible only with a special web browser. G12 TLU3 G12
Onion routing provides anonymous communication over a
computer network. Messages are surrounded in layers of
encryption making web browsing safer and more secure for
Onion Router Networking users. G12 TLU3 G12
Global Positioning System GPS is a real-time satellite-based navigation system which
(GPS) Networking can be sent to any device. G12 TLU3 G12
LBS are services which use the geographical position of a
Location-Based Services device to provide contextual information like the nearest
(LBS) Networking ATM, restaurant or retail store. G12 TLU3 G12
Cloud computing is the use of on-demand computer
services over the Internet. These services include the use
of remote servers, storage, databases, networking,
Cloud computing Networking applications, and processing power. G12 TLU3 G12
Cloud storage involves storing data on hardware in a
remote physical location, which can be accessed from any
Cloud Storage Networking device via the Internet. G10 TLU7 G10
A commonly-used protocol for managing the security when
Secure Sockets Layer transmitting data on the Internet. It has been replaced with
(SSL) Networking Transport Layer Security (TLS) certificates. G12 TLU3 G12
Encryption Networking Convert plain text to unreadable ciphertext. G12 TLU3 G12
A data file issued by a Certificate Authority (CA) to an
organisation to prove the identity of the organisation. It
cryptographically binds an entity's public key to specific
Digital Certificate Networking attributes relating to its identity. G12 TLU3 G12
The core technology that relies on the use of the two related
Public Key Infrastructure public and private keys to manage identity and security in
(PKI) Networking Internet communications G12 TLU3 G12
A blockchain is a decentralised, distributed and public
digital ledger to create trust. Blockchains act as a shared
database, distributed across large peer-to-peer networks
Blockchain Networking with no single point of failure. G12 TLU3 G12
A combination of strategies to increase the amount of
Search Engine visitors to a website by obtaining a high-ranking placement
Optimisation (SEO) Networking in the Search Engine Page Results (SERP). G12 TLU3 G12
A Denial of Service attack attempts to make a server or
Denial of Service (DOS) Networking network resource unavailable to its users and visitors. G12 TLU3 G12
Distributed Denial of A DOS that originates from multiple coordinated devices
Service (DDOS) Networking (bots). G12 TLU3 G12
A vast number of Internet connected computers that have
been set up to forward transmissions (including spam or
viruses) to other computers on the Internet without the
Botnet Networking knowledge of their owners often used in a DDOS. G12 TLU3 G12
Use of radio signals to transfer data from a tag
attached to an object. The tag usually contains simple
identification data that is sensed by a receiving device
RFID Networking like a bar-code scanner. G11 TLU7 G11
One or more fields that uniquely identifies a record in a
Primary Key Normalisation table G12 TLU1 G12
A combination of fields in a table which uniquely identify
Super Key Normalisation each row G12 TLU1 G12
Candidate Key Normalisation Minimal super key G12 TLU1 G12
Composite Key Normalisation A combination of fields to form a primary key. G12 TLU1 G12
Attribute / Property / Field Normalisation Same as a field G12 TLU1 G12
When repeating groups are removed as a result of first
Data Redundancy Normalisation normal form producing unnecessary repetition of data. G12 TLU1 G12
Process of creating separate linked tables by removing data
Normalisation Normalisation redundancy, anomalies and complex SQL queries. G12 TLU1 G12
When two fields have the same value. This is NOT data
redundancy and must not be removed through
normalisation. For example. Two people have the same
Duplicate Data Normalisation colour car. G12 TLU1 G12
Derived Data Normalisation When one field can be calculated from another field G12 TLU1 G12
Dependencies Normalisation When one field is related to another field G12 TLU1 G12
Atomic Data Normalisation A single value within a field G12 TLU1 G12
Multiple values in one field, or when a field contains more
Non-Atomic Data Normalisation than one value. e.g. (Name + Surname) G12 TLU1 G12
When we need to update the same data in more than one
Update Anomaly Normalisation place G12 TLU1 G12
Unnecessary loss of data as a result of a deletion of a
Deletion Anomaly Normalisation record. G12 TLU1 G12
When a record is added that does not satisfy the primary
Insertion Anomaly Normalisation key requirements G12 TLU1 G12
Is when a field’s value is dependent on only part of a
Partial Dependency Normalisation composite key G12 TLU1 G12
Transitive Dependency Normalisation Is when a field’s value is dependent on a non key field. G12 TLU1 G12
Foreign Key Normalisation A field in a table that is a primary key in another table G12 TLU1 G12
Referential Integrity Normalisation One record cannot refer to a record that does not exist G12 TLU1 G12
Repeating Groups Normalisation Is a one-to-many relationship within the same table. G12 TLU1 G12
Generates primary key
No repeating groups
No empty fields
1 NF Normalisation Causes duplicated data G12 TLU1 G12
Table in 1NF
2 NF Normalisation Removes Partial Dependencies G12 TLU1 G12
Table in 2NF
3 NF Normalisation Removes transitive dependencies G12 TLU1 G12
A class is a template from which objects can be created and
combines fields and methods into a single unit. In Java is
Class Programming also an application program. G10 JLU1 G10
The properties of a class which are variables that contain
Fields / Properties Programming data values. G10 JLU1 G10
Methods / Behaviours Programming A block of code that is run when called. G10 JLU1 G10
End User Programming The person who runs the program. G10 JLU1 G10
The window where you as a programmer type in the Java
Code Window Programming Program. G10 JLU1 G10
Output Window Programming The output window displays what the end user sees. G10 JLU1 G10
Constructor Programming Assigns values to an object’s fields. G10 JLU1 G10
Parameter Programming Values sent to a method. G10 JLU1 G10
Source code cannot compile due to errors in the code such
Syntax error Programming as spelling errors, missing brackets etc. G10 JLU1 G10
Program compiles and runs but produces unexpected
Logical error Programming results. G10 JLU1 G10
Occurs when a program compiles but halts unexpectedly
Run time error Programming when the program is running G10 JLU2 G10
Source code Programming Original code written by the programmer. E.g. code.java. G10 JLU1 G10
Bytecode Programming The compiled version of the source code. E.g. code.class. G10 JLU1 G10
Method or field belongs to the class and is called with the
class name. No copies of fields are made each time an
Static Programming object is instantiated. G11 JLU1 G11
Method or field belongs to the object and is called with the
object name. A copy of the field is made each time the
Non-static Programming object is instantiated. G11 JLU1 G11
Void method Programming Method does not return a value. G11 JLU1 G11
Type method Programming Method returns a single value as a primitive or object. G11 JLU1 G11
Value of the variable is stored in the variable location in
memory. Relational operators > < >= <= == and != can be
used to compare primitives. Primitives are declared and
Primitive type Programming assigned. G11 JLU1 G11
Combining fields and methods into a single unit and
instantiated from a class. Relational operators cannot be
Object Programming used to compare primitives. Use .equals() method instead. G11 JLU1 G11
Declare Programming A variable is assigned a type. E.g. int x; or Gogga bug.; G11 JLU1 G11
A variable is given its first value. Int x = 5. (x is declared and
Initialise Programming initialized in one statement) G11 JLU1 G11
An object is created using the operator new. Gogga bug =
Instantiate Programming new Gogga(1,2); G11 JLU1 G11
Assign Programming A variable is given a value. x = 3; G11 JLU1 G11
Object is declared (given a type). String name; or Gogga
bug; A NullPointerException is generated if a method is
Null Programming applied to the object. E.g. bug.move(); G11 JLU1 G11
A string that is declared and assigned/instantiated with no
characters assigned. E.g. String name = “”; No error will
Empty string Programming occur from the code System.out.println(name); G11 JLU1 G11
An exception is an event that alters the flow of a program.
Exception Programming In most cases they are errors. G11 JLU1 G11
A whitespace character can be a blank, a tab character, a
Whitespace Programming carriage return, or the end of the file. G11 JLU2 G11
A token is a series of characters that ends with a delimiter.
Token Programming A delimiter is by default whitespace. G11 JLU2 G11
Delimiter Programming Separates tokens in the Scanner class. G11 JLU2 G11
Data structure that stores unstructured text data
Text file Programming permanently. G11 JLU2 G11
Append Programming Add to the end of an existing file. G11 JLU2 G11
Constructor Programming Assigns values to private fields of an object. G11 JLU4 G11
Accessor method Programming Returns values of private fields of an object. G11 JLU4 G11
Mutator method Programming Changes the values of private fields of an object. G11 JLU4 G11
Combines and returns the values of private fields of an
toString method Programming object as a string. G11 JLU4 G11
Argument or Actual Value or variable in a call statement sent to a method
parameter Programming header. G11 JLU4 G11
Variable in a method header that receives a value from the
Formal parameter Programming argument/actual parameter G11 JLU4 G11
Variable declared in a block of code and only exists within
Local variable Programming the block of code. G11 JLU4 G11
Scope Programming Where a variable/field can be accessed in a program. G11 JLU7 G11
The extend to which a variable remains in memory during
Lifetime Programming the execution of a program. G11 JLU7 G11
When a subclass is extended from an existing superclass
Inheritance Programming and adds fields and/or methods. G12 JLU2 G12
Method with the same name but different parameters in the
Overloading Programming same class. G12 JLU2 G12
Methods with the same name and same parameters in
Overriding Programming inherited classes. G12 JLU2 G12
A field or method is available to classes in the same
Protected Programming package. G12 JLU2 G12
The object that called the method and is prefixed by this. in
Implicit parameter Programming the class. G12 JLU2 G12
The ability of an object declared as a superclass to be
instantiated as an object of the super or sub class in an
Polymorphism Programming inheritance hierarchy using the relevant constructor. G12 JLU3 G12
The appropriate method is used in an inheritance hierarchy
depending on the class the object was instantiated from and
Dynamic method lookup Programming the constructor used to create the object. G12 JLU3 G12
The ability of an object to be bound to the appropriate
Dynamic binding Programming overridden method in an inheritance hierarchy at run-time. G12 JLU3 G12
There is a has-a relationship between two objects. One
Composition Programming object is a field of another object. G12 JLU3 G12
An email sent to entice users to click on a link to a
fraudulent website to gain confidential information such
Phishing Security as banking details. G11 TLU7 G11
Creating a fraudulent website or email that appears to
Spoofing Security be legitimate. G11 TLU7 G11
A Trojan horse is a seemingly harmless program that
Trojan Horse Security when activated, causes harm to a computer system. G11 TLU7 G11
Stealing a user’s identity to access their resources or
Identity Theft Security obtain credit and other benefits in that person's name. G11 TLU7 G11
An attack intended to redirect a website's traffic to
Pharming Security another, bogus site. G11 TLU7 G11
Preventing or limiting a user or organisation from
accessing their resources such as a website or file
Ransomware Security server until they have paid a ransom. G11 TLU7 G11
A Denial of Service attack attempts to make a server
or network resource unavailable to its users and
visitors usually by interrupting or suspending a host
service connected to the Internet temporarily or
Denial of Service (DOS) Security indefinitely. G11 TLU7 G11
DDoS attack is a Distributed Denial of Service attack
Distributed Denial of that uses more than one computer distributed
Service (DDOS) Security worldwide to put a heavy burden on a service. G11 TLU7 G11
A botnet (also known as a zombie army) is several
Internet computers that have been set up to forward
transmissions (including spam or viruses) to other
computers on the Internet without the knowledge of
Botnet/Zombie Army Security their owners. G11 TLU7 G11
RAID protects against hard drive failure by using two
Redundant Array of or more hard disks so that if one hard drive fails the
Inexpensive Disks other hard drive(s) on the server will contain a copy of
(RAID) Security the data providing reliable hard drive storage. G11 TLU7 G11
RAID level 1 uses mirroring in which all data is stored
on two hard disks simultaneously (the one being a
mirror image of the other), but data is only accessed
from one main hard disk with the second kept as a
RAID Level 1 (Mirroring) Security backup. G11 TLU7 G11
RAID level 5 uses disk striping with parity which
requires a minimum of three hard disks. Data is written
in "stripes" across the three hard drives with no one
disk having the same data. The parity is usually an
extra byte added to every 8 bytes of data for error
correction. If one disk fails, the parity data is used to
RAID Level 5 (Striping) Security reconstruct the disk that failed. G11 TLU7 G11
A UPS is an electrical device that provides emergency
Uninterruptible Power power to electrical equipment when the normal power
Supply (UPS) Security source fails. G11 TLU7 G11
A redundant power supply is when a single piece of
computer equipment operates using two or more
Redundant Power Supply Security physical power supplies. G11 TLU7 G11
Green computing is the environmentally responsible and
eco-friendly use of computers and their resources. In other
words, it is defined as the study of designing, engineering,
manufacturing, using and disposing of computing devices in
Green Computing Social Implications a way that reduces their environmental impact. G12 TLU5 G12
The computer-generated simulation of a three-dimensional
image or environment that can be interacted with in a real
or physical way by a person using special electronic
equipment, such as a helmet with a screen inside or gloves
Virtual Reality Social Implications fitted with sensors. G12 TLU5 G12
Augmented reality is a technology that places interactive
Augmented Reality Social Implications digital content on real scenes. G12 TLU5 G12
Digital materials such as texts, databases, still and moving
images, audio, emails, software, and web pages that should
be protected and preserved for current and future
Digital Heritage Social Implications generations. G12 TLU5 G12
Cyberbullying includes sending, posting, or sharing
negative, harmful, false, or mean content about someone
Cyberbullying Social Implications else using digital devices. G12 TLU5 G12
Child pornography, images of children involved in sexual
activities, is traded on the Internet, often using the dark
Child Pornography Social Implications web. G12 TLU5 G12
A control system is a device, or set of devices, that
manages, commands, directs or regulates the behaviour of
Control Systems Social Implications other devices or systems. G12 TLU5 G12
An AUP is a set of rules drawn up by the management
Acceptable User Policy of a company to protect the company, the network the
(AUP) Social Implications company's devices and data from misuse. G11 TLU8 G11
A mobile office is a temporary or movable
configuration of equipment and services that allows a
person to function as if they are working from a
Mobile Offices Social Implications permanent office G11 TLU8 G11
A virtual office is a flexible workspace that provides
businesses with any combination of services, space
and/or technology, without owning or leasing a
Virtual Offices Social Implications traditional office. G11 TLU8 G11
Robots are complex machines that perform
dangerous, repetitive or distasteful jobs that are boring
Robotics Social Implications or risky for human workers. G11 TLU8 G11
Artificial Intelligence (AI) is a branch of science which
deals with helping machines find solutions to complex
Artificial intelligence (AI) Social Implications problems in a more human-like manner. G11 TLU8 G11
An Unmanned Aerial Vehicle (UAV) is a type of aircraft
that operates without a human pilot on board, the most
Unmanned Aerial Vehicles Social Implications common example being a drone. G11 TLU8 G11
Social engineering is defined as the act of
manipulating people into divulging confidential
information with a view to committing some sort of
Social Engineering Social Implications computer fraud or gain unauthorised computer access. G11 TLU8 G11
Shoulder surfing is where the attacker uses
observational techniques, such as looking over
someone's shoulder, to get information while the user
Shoulder Surfing Social Implications is inputting sensitive data like a password. G11 TLU8 G11
Raiding dumpsters to obtain discarded data such as
company phone records, organisational charts,
company policy manuals, calendars of events,
printouts of sensitive data, company letterhead and
Dumpster Diving Social Implications outdated hardware into public dumpsters G11 TLU8 G11
An attack in which an attacker convinces the target
Reverse Social that he has a problem or might have a certain problem
Engineering or Role in the future and that the attacker is ready to help solve
Playing Social Implications the problem. G11 TLU8 G11
White hat hackers are non-malicious hackers, like
company employees who test the security of the firm's
White hat hackers Social Implications own computer system by trying to break into it. G11 TLU8 G11
Black hat hackers/crackers are malicious hackers, also
known as crackers, who hack into systems with the
Black hat hackers/crackers Social Implications intent to steal or vandalise. G11 TLU8 G11
Grey hat hackers lie in between the white hat and the
black hat hacker, grey hats sometimes act illegally.
They will for example break through a system without
authorisation in order to put vulnerabilities on show
Grey hat hackers Social Implications and then charge the owner a fee to repair it. G11 TLU8 G11
Software theft means the unauthorised or illegal
copying, sharing or usage of copyright-protected
Software Theft Social Implications software programs. G11 TLU8 G11
The illegal copying or storage of any information that is
confidential, personal, or financial in nature, including
Information Theft Social Implications passwords, software code, algorithms or databases. G11 TLU8 G11
Stealing wireless bandwidth is connecting to the
Internet through a wireless Internet router which does
not belong to you or you do not have permission to
use. Those who pay for their wireless service expect it
to function optimally, but suffer from slower
performance or intermittent disconnection due to
Bandwidth Theft Social Implications bandwidth theft. G11 TLU8 G11
Fake news is news, stories or hoaxes created to
Fake News Social Implications deliberately misinform or deceive readers. G11 TLU8 G11
Optical Character Recognition (OCR) is software that can
Optical Character analyse an image that contains text and convert the text
Recognition (OCR) Software into UNICODE. G10 TLU3 G10
A set of programs that manages hardware and runs
Operating System (OS) Software applications. G10 TLU2 G10
The kernel is the core of the operating system that is always
Kernel Software in RAM to control the computer. G10 TLU2 G10
A GUI includes Windows, Icons, Mouse Control and pull-
Graphical User INterface down menus (WIMP) where a user can interact with the
(GUI) Software computer with a pointing device to select icons. G10 TLU4 G10
Early operating systems, such as MS DOS, used a text-
Command Line Interface based interface, with commands being typed at the
(CLI)) Software command prompt. G10 TLU4 G10
Software that is part of the OS that communicates with a
device by converting data into a format understandable by
Driver Software the device. Each device must have a driver. G10 TLU4 G10
IDE (Integrated Software for the development of computer programs. They
Development convert source code to an executable version and provide
Environment) Software tools to aid the programmer. G10 TLU4 G10
Source code is the original code written by the programmer.
Source Code Software For example Program.java. G10 TLU4 G10
Source code is compiled to object code. In Java this code
Object Code Software has the .class extension. A .class file cannot be executed. G10 TLU4 G10
Code that can be run by the processor. For example .exe or
Executable code Software .jar files. G10 TLU4 G10
Rearranges fragmented data on a mechanical hard disk so
your data can be loaded and saved more efficiently. It
Disk Defragmenter Software reduces latency of the harddisk drive. G10 TLU4 G10
Software cannot be freely used or copied. The source code
is not available only the executable code. Software is
Proprietary Licence Software licenced through product or activation keys. G10 TLU4 G10
The source is available and can be changed. For copyleft
Free and Open Source licence any changes to the source code requires the user to
Licences Software release the source code. G10 TLU4 G10
Allows you to keep the copyright of your work but still allows
Creative Commons people to copy and distribute your work (documents, source
License Software code) on condition they acknowledge your work. G10 TLU4 G10
Freeware software is software that is copyrighted but given
away by the author without any cost for a user to use, but
not to resell. The author still retains the copyright, which
means that you cannot alter it as you are not given the
Freeware Software source code. G10 TLU4 G10
Freemium software is a variant of freeware where limited
functions are provided free at no cost, but additional or
Freemium Software Software more advanced features incur a cost. G10 TLU4 G10
The process of reducing the size of files, so they take up
less storage space or can be transferred more quickly over
Compression Software the Internet. G10 TLU4 G10
Remove files and store them in a compressed separate
Archive Software location for space saving and later use. G10 TLU4 G10
Backup the copying of files or folders in case of data loss to
Backup Software usually a separate location. G10 TLU4 G10
A utility in the operating system you to run programs
automatically at specified times with specified conditions,
allowing the system to update and/or process configurations
Scheduler Software in the background while you are running the computer G10 TLU4 G10
A firewall is hardware and software designed to permit or
deny network transmissions based upon a set of rules and
Firewall Software is used to protect networks from unauthorised access. G10 TLU4 G10
Malware Software Malicious software that is harmful to the computer. G10 TLU4 G10
Viruses are programs, illegally loaded onto a computer, that
Virus Software cause damage to the system. A virus is part of Malware. G10 TLU4 G10
Spyware is computer software that is installed
surreptitiously on a computer to intercept data without the
user's informed consent. For example, a keystroke-logging
Spyware Software program. Spyware is part of Malware. G10 TLU4 G10
Adware is unwanted and annoying software that
automatically displays or downloads to a computer usually
Adware Software when browsing the Internet. G10 TLU4 G10
Anti-malware are programs necessary to safeguards a
Anti-Malware Software computer from malicious threats. G10 TLU4 G10
Anti-virus software that detects malicious software and
takes action such as delete and quarantine based on the
Anti-Virus Software program's behavior (signature). G10 TLU4 G10
Power On Self Test A routine executed by the BIOS to check the computer’s
(POST) Software hardware using the list of installed devices from CMOS. G11 TLU3 G11
CMOS is a battery-backed, volatile memory that stores:
Complementary Metal- • hardware settings - the types of hardware installed on
Oxide-Semiconductor your computer such as the disk drive;
(CMOS) Software • user settings - the current date and time. G11 TLU3 G11
The MBR is responsible for loading and executing the
operating system kernel, which continues with the start-up
Master Boot Record (MBR) Software procedure. G11 TLU3 G11
UEFI replaces BIOS and resides in the computer’s startup
firmware. It checks to see what hardware components the
computing device has, wakes the components up and
Unified Extended Firmware hands them over to the operating system.UEFI replaces the
Interface (UEFI). Software traditional BIOS on PCs. G11 TLU3 G11
A signal sent to the CPU from hardware or software
Interrupt Software indicating the need for the CPU's attention. G11 TLU3 G11
Software interrupts are generated from programs and sent
to the CPU. For example, dividing by zero, square rooting a
Software Interrupt Software negative number or when an Input / Output (I/O) is required. G11 TLU3 G11
A hardware interrupt is a signal sent from a device to the
CPU, such as the keyboard indicating that a key has been
Hardware Interrupt Software pressed, or a printer indicating that it has run out of paper. G11 TLU3 G11
Interrupt Request Number A unique number for each device which the CPU uses to
(IRQ) Software identify which device is interrupting it. G11 TLU3 G11
A temporary storage area in RAM, used to speed up a slow
IO Range / Buffer Software input/output device. G11 TLU3 G11
A technique used by the operating system where several
different programs appear to run simultaneously. True
multitasking is achieved if the CPU has more than one core
(multiprocessing). For example compiling a program and
Multitasking Software listening to music. G11 TLU3 G11
One program with several different threads (parts of a
program that run independently) running at the same time.
Each thread can be allocated to a separate core if the CPU
is more than one core (multiprocessing). For example, spell
Multithreading Software checking a document while printing another document. G11 TLU3 G11
When the hard drive is used as an extension to RAM. Data
in memory is divided into pages which are swopped into
Virtual Memory Software RAM from the hard drive when needed. G11 TLU3 G11
Software that converts source code to object code or
Translators Software executable code. G11 TLU3 G11
High-level languages contain a high level of abstraction
where the underlying workings of the computer are hidden
High-Level Languages Software from the programmer and are closer to human languages. G11 TLU3 G11
Low level languages are used to write programs that relate
to the specific architecture and hardware of a particular type
Low-Level Languages Software of computer (machine language). G11 TLU3 G11
Machine
Language/Machine Code Software A low-level language that consists of 0s and 1s. G11 TLU3 G11
A low-level language are translated into machine code by
an assembler. Each assembly language instruction
corresponds to one machine language instruction but is
Assembly Language Software more understandable that machine code. G11 TLU3 G11
An interpreter reads the source code line by line, checks for
syntax errors, converts it to machine code, and executes it;
with no object file being created. It is a form of translator. E.
Interpreter Software g. Python and Javascript. G11 TLU3 G11
A compiler checks the source code for syntax errors and
converts it to object code only if there are no syntax errors
Compiler (One Stage) Software found. The object code (.exe file) is executed. E.g. Delphi G11 TLU3 G11
A compiler checks the source code for syntax errors and
converts it to object code (bytecode) only if there are no
syntax errors found. The bytecode is interpreted and
Compiler (Two Stage) Software executed. E.g. Java G11 TLU3 G11
The steps for a program instruction to be executed by the
CPU. Consists of FETCH, DECODE, EXECUTE and
Machine Cycle Software STORE. G11 TLU3 G11
Data Software Raw unprocessed information G10 TLU2 G10
Data that is processed to create meaning. E.g, sorting data,
Information Software finding the average. G10 TLU2 G10
Operating systems designed to run on mobile devices with
Mobile Operating System Software limited resources. G10 TLU2 G10
Software or hardware that is required for a program to run.
Resources Software E.g., CPU, RAM, driver. G10 TLU2 G10
Software that carries out specific tasks for the user. All
Application software (apps) Software application software requires an operating system. G10 TLU2 G10
Applications that do not require any networking hardware or
Stand-alone Applications Software software resources. G10 TLU2 G10
Applications that run on multiple computers and use
Network Applications Software network resources. G10 TLU2 G10
Hardware G10 Book Reference
Term Section Definition Book Reference Grade G11 TLU7
RAM (Random Access Memory ) Hardware Primary short term memory that temporarily stores programs and instructions currently
G10 TLU2loaded. It is volatile. G10 G12 TLU4
Secondary storage Hardware Permanent storage that stores all programs and data on the local computer. G10 TLU2 G10 G10 TLU12
Motherboard Hardware A large circuit board that connects the most important components such as CPU,G10
memory
TLU3and connectors for peripherals
G10 G10 TLU2
CPU / Processor Hardware A component that processes instructions. G10 TLU3 G10 G10 TLU3
Arithmetic Logic Unit (ALU) Hardware Part of the CPU that performs arithmetic and logical calculations.l G10 TLU3 G10 G11 TLU2
Control Unit (CU) Hardware Part of the CPU that coordinates the processing of instructions. G10 TLU3 G10 G12 TLU2
Basic Input Output System (BIOS) Hardware Non-volatile firmware used to initialize the computer. It is stored in ROM. G10 TLU3 G10 G10 TLU5
Primary Storage Hardware Motherboard components consisting of BIOS, RAM and ROM. G10 TLU3 G10 G11 TLU6
Dynamic RAM (DRAM) Hardware RAM that contains capacitors and needs to be constantly refreshed. G10 TLU3 G10 G11 TLU4
Read Only Memory (ROM) Hardware ROM is a non-volatile memory chip that can be used to permanently store data inG10
computers
TLU3 and other electronic devices,
G10such as BIOS firmware, embedded operating systems
G10 and
TLU7appliance/robotics controllers.
Electronically Erasable Programmable ROM
Hardware
(EEPROM) ROM that can be electronically changed using software. G10 TLU3 G10 G11 TLU5
Component Hardware Circuit chip placed directly on the motherboard G10 TLU3 G10 G12 TLU3
Peripheral Hardware Input, output or storage devices connected to the motherboard G10 TLU3 G10 G12 TLU1
Hard Disk Drive (HDD) Mechanical Drive Hardware Secondary storage device that stores programs and data magnetically and uses G10
mechanical
TLU3 parts. G10 G10 JLU1
Solid State Drive (SSD) Hardware Secondary storage device that stores programs and data electronically in flash memory.
G10 TLU3 G10 G10 JLU2
Hybrid Drive Hardware Secondary storage device that combines a mechanical HDD and a SSD. G10 TLU3 G10 G11 JLU1
Flash Drive Hardware Portable secondary storage that stores programs and using flash memory. G10 TLU3 G10 G11 JLU2
Optical Drives Hardware Secondary storage device that stores programs and data using lasers. G10 TLU3 G10 G11 JLU4
SD Cards Hardware Secondary storage medium that stores programs but mostly data and is small in G10
size.TLU3 G10 G11 JLU7
Scanner Hardware Input device that analyses an image and converts it to a file. OCR can be used toG10
convert
TLU3the image to editable text. G10 G12 JLU2
Barcode Hardware A barcode is a simple pattern of thin and wide lines that are decoded by the scanner
G10 to
TLU3
represent data. G10 G12 JLU3
QR Code Hardware Two-dimensional sets of different sized squares on a white background that are decoded
G10 TLU3by the scanner to represent data.
G10QR Codes contain more data than barcodes. G12 TLU5
Biometric Device Hardware Inputs human physical data such as fingerprints, voiceprints and retinal/iris scans,
G10analyses
TLU3 the data to uniquely identify G10
and individual. G11 TLU8
Sensors Hardware A device that converts a real-world property into data that a computer can process
G10by TLU3
converting the physical parameterG10
(for example: temperature, blood pressure, height, humidity,
G10 TLU4 speed, etc.) into a signal which can be measured elec
HDMI Port Hardware An connection interface that can receive both video and audio input. G10 TLU3 G10 G11 TLU3
Server Hardware A powerful computer that provides services to a network such as a file server andG10
printTLU5
server G10

You might also like