0% found this document useful (0 votes)
44 views12 pages

Definitions Computer Science - Caienotesofficial

Igcse computer science igcse computer science notes of ch 8. Made by experience teachers as well as the students who got good grades find these notes helpful Igcse computer science igcse computer science notes of ch 8. Made by experience teachers as well as the students who got good grades find these notes helpful

Uploaded by

ashar.aliqasim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views12 pages

Definitions Computer Science - Caienotesofficial

Igcse computer science igcse computer science notes of ch 8. Made by experience teachers as well as the students who got good grades find these notes helpful Igcse computer science igcse computer science notes of ch 8. Made by experience teachers as well as the students who got good grades find these notes helpful

Uploaded by

ashar.aliqasim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Glossary

Abnormal data Data that is rejected by a Analysis Part of the program development life
program. cycle; a process of investigation, leading to the
specification of what a program is required to do.
Abstraction Keeps the key elements required
for the solution to the problem, discards any Anti-spyware Software that detects and
unnecessary details and information that is not removes spyware programs installed on a system;
required. the software is based on typical spyware rules or
known file structures.
Accelerometer A sensor that measures
acceleration and deceleration that can detect, for Antivirus software Software that quarantines
example, the orientation of a device. and deletes files or programs infected by a
computer virus; the software can run in the
Access levels Different levels of access in a
background or be initiated by the user.
computer system allowing a hierarchy of access
levels depending on the user’s level of security. Arithmetic and logic unit (ALU) The component
of the CPU that carries out all arithmetic and
Accumulator (ACC) Temporary general-purpose
logical operations.
register that stores numerical values at any part of
a given operation. Arithmetic operator An operator that is used to
perform calculations.
Acknowledgement A message sent to the
receiver indicating that data has been received Array A data structure containing several
correctly (used in ARQ error detection method). elements of the same data type; these elements
can be accessed using the same identifier name.
Active host Functioning software that a virus
can affect by attaching itself to the code or by Artificial intelligence (AI) A collection of
altering the code to allow the virus to carry out rules and data that gives a computer system the
its attack. ability to reason, learn and adapt to external
stimuli.
Actuator An output device that converts
electrical energy into mechanical movement. ASCII code A character set for all the characters
on a standard keyboard and control codes.
Adaptive cruise control The use of sensors,
actuators and microprocessors to ensure that Assembler A computer program that translates
a vehicle keeps a safe distance behind another programming code written in assembly language
vehicle. into machine code.
Address A label for a memory location used by Assembly language A programming language
CPU to track data. that is dependent on computer hardware, a program
written using an assembly language program needs
Address bus The system bus that carries the
to be translated into machine code before it is
addresses throughout the computer system.
executed.
Administrator A person responsible for the
Asymmetric encryption Encryption that uses
upkeep and maintenance of a computer system that
public keys and private keys to ensure data is
involves multi-user function.
It is illegal to photocopy this page

secure.
Adware A type of malware that attempts to flood
Attribute Something that defines the objects
the end user with unwanted advertising.
stored in a knowledge base.
Algorithm An ordered set of steps to solve a
Audio compression A method used to reduce the
problem.
size of a sound file using perceptual music shaping.
Analogue to digital converter (ADC) A device
Authentication The process of proving a user’s
that converts analogue data (for example, read
identity by using something they know, something
from sensors) into a form understood by a
they have or something unique to them.
computer.

Hodder & Stoughton Limited © David Watson and Helen Williams 2022 1
Glossary

Automated systems A combination of software Boolean operator An operator that is used


and hardware designed and programmed to work with logical operators to form more complex
automatically without the need for any human expressions.
intervention. Boot up/bootstrap loader A small program
Automatic Repeat Request (ARQ) A method of that is used to load other programs to correctly
checking transmitted data for errors; it makes use start up a computer system.
of acknowledgement and timeout to automatically Boundary data The largest/smallest data
request re-sending of data if the time interval value that is accepted by a program and the
before positive acknowledgement is too long. corresponding smallest/largest rejected data
Autonomous Able to operate independently value.
without any human input. Browser (web) Software that connects to a
Back-up Make copies of files on another storage domain name server (DNS) to locate IP addresses; a
media in case the original file becomes corrupted browser interprets HTML web pages sent to a user’s
or is deleted. computer so that the user can read documents and
watch multimedia.
Backing store A secondary storage device (such
as HDD or SSD) used to store data permanently Brute force attack A ‘trial and error’ method
even when the computer is powered down. used by cybercriminals to crack passwords by
finding all possible combinations of letters,
Bandwidth The maximum rate of transfer of data numbers and symbols until the password is found.
across a network, measured in kilobits per second
(kbps) or megabits per second (Mbps). Bubble sort An algorithm that makes multiple
passes through a list comparing each element with
Barcode A series of dark and light lines of the next element and swapping them. This
varying thickness used to represent data; the code continues until there is a pass where no more
has to be scanned using laser or LED light source. swaps are made.
Basic Input/Output System (BIOS) A suite of Buffer A memory area used to store data
programs on firmware that are used to perform temporarily.
the initialisation of a computer system during the
boot-up process. Cache Temporary memory using static RAM to
hold frequently used data/ instructions by the CPU
Bidirectional Can travel in both directions; used thereby increasing CPU performance. More
to describe data movement. generally, cache means any area of storage used to
Binary system A number system based on 2 and quickly access frequently-used data, for example,
can only use the values 0 and 1. web cache, database cache, DNS cache.
Binder 3D printing A 3D printing method that Capacitive touchscreen A type of touchscreen
uses a two stage pass; first stage uses dry powder that uses the change in the screen’s capacitance
and second stage uses a binding agent. (the ability to store an electrical charge) when it is
touched by a finger or stylus.
Biometrics Type of authentication that uses a
unique human characteristic, such as fingerprints, Central processing unit (CPU) Responsible for
voice or retina blood vessel pattern. the execution or processing of all the instructions
and data in a computer.
Bit The basic computing element that is either 0
It is illegal to photocopy this page

or 1, and is formed from the words Binary digit. Char A variable or constant that is a single
character.
Bit depth The number of bits used to represent
the smallest unit in a sound file. Character set A list of characters that have been
defined by computer hardware and software. The
Bit-map image An image made up of pixels. character set is necessary so that the computer can
Blockchain A decentralised database where all understand human characters.
transactions are stored; it consists of a number of Charge couple device (CCD) A light sensitive cell
interconnected computers but not a central server. made up of millions of tiny sensors acting as
Boolean algebra A form of algebra linked to logic photodiodes.
circuits and based on TRUE or FALSE.

2 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary

Chatbots A pop-up robot on a website that printer or to produce blueprints of a microprocessor


appears to enter into a meaningful conversation design).
with a web user.
Constant A named data store than contains a
Check digit An additional digit appended to value that does not change during the execution of
a number to check if the entered number is a program.
error-free; check digit is a data entry check and not
Contiguous Items next to each other.
a data transmission check.
Control bus The system bus that carries signals
Checksum Verification method used to check
from the control unit to all other computer
if data transferred has been altered or corrupted;
components.
calculated from the block of data of data being
sent; the checksum value is sent after each data Control unit (CU) The component of a computer’s
block. CPU that ensures synchronisation of data flow and
programs throughout the computer by sending out
Ciphertext The result of putting a plaintext
control signals along the control bus.
message through an encryption algorithm.
Controller A microprocessor that is in control of
Clock cycle Clock speeds are measured in terms
a process.
of ghz; this is the vibrational frequency of the
system clock that sends out pulses along the Cookie A text file sent from a website to a user’s
control bus; for example, a 3.5ghz clock cycle browser; it is used to remember user preferences
means 3.5 billion clock cycles a second. each time they visit the website.
Cloud storage A method of data storage where Core A unit on a CPU made up of an ALU, control
data is stored on offsite servers; the physical unit and registers; a CPU may contain a number of
storage may be on hundreds of servers in many cores.
locations. COUNT An SQL command that counts the number
Coding Part of the program development life cycle; of records (rows) where the field (column) matches
the writing of the program or suite of programs. a specified condition. Used with SELECT.
Compression (file) Reduction of the size of a Counting Keeping a count of the number of times
file by removing repeated or redundant pieces of an action is performed.
data; this can be lossy or lossless. Cryptocurrency A form of digital currency that
Cognitive Relating to the mental processes of uses a chain of decentralised computers to control
the human brain involved in acquiring knowledge and monitor transactions.
and understanding through thought, experiences Cryptography The protection of data/information
and input from the five senses. by use of coding; it usually involves encryption and
Colour depth The number of bits used to decryption.
represent the colours of a pixel. Current Instruction Register (CIR) A register
Command line interface (CLI) An interface that stores the current instruction being decoded
which allows communication with the by typing in and executed.
commands using a keyboard. Cyclic redundancy check (CRC) An error checking
Compiler A computer program that translates a method in which all the 1-bits in the data packet
source program written in a high-level language to payload are added and the total is stored in the
It is illegal to photocopy this page

machine code. packet trailer; the same calculation is repeated at


the receiving station.
Complementary metal oxide semi-conductor
(CMOS) A chip that generates an electric current Data bus The system bus that allows data to be
(or pulses) when light falls on its surface. carried from CPU to memory (and vice versa) or to
and from input/output devices.
Computed Tomographic (CT) scanner Technology
that can create a 3D image of a solid object by Data interception An attempt to eavesdrop
slicing up the object into thin layers (tomography). on a wired or wireless network transmission; the
cybercriminal often uses packet sniffing or access
Computer-aided design (CAD) Software used
point mapping / war driving to intercept data.
to create drawings (for example, to send to a 3D

Hodder & Stoughton Limited © David Watson and Helen Williams 2022 3
Glossary

Data packet A small part of a message/data that Digital to analogue converter (DAC) A device
is transmitted over a network. After transmission, that converts digital data into electric currents
all the data packets are reassembled to form the that can drive motors, actuators and relays, for
original message/data. example.
Data redundancy The unnecessary storing of the Direct 3D printing A 3D printing technique
same data on several storage devices at the same in which the print head moves in the x, y and z
time. directions.
Data type A classification of how data is stored Disk thrashing (on HDD) A problem in a hard
and displayed, and of which operations that can be disk drive (HDD) caused by excessive swapping
performed on the stored value. in and out of data causing a high rate of head
movements during virtual memory operations.
Database A persistent structured collection of
data that allows people to extract information in a Distributed control system (DCS) A powerful
way that meets their needs. computer system programmed to monitor and
control a complex process without the need for
Debugging Finding errors in a computer program
human interaction.
by running or tracing the program.
Distributed denial-of-service (DDoS) attack
Declare Define the value and data type of a
A denial of service (dos) attack in which the fake
variable or constant.
requests come from many different computers,
Decomposition Breaks down a complex problem which makes it harder to stop.
into smaller parts, which can then be sub divided
DIV An arithmetic operator that returns the
into even smaller parts, that can be solved easily.
quotient (whole number part) of a division;
Defragmentation A process that reorganises different languages use different symbols for this
sectors on an HDD by rearranging blocks of data so operation.
that they are contiguous.
DNS cache poisoning Altering IP addresses on
Denial-of-service (DoS) attack A cyberattack a domain name server (DNS) with the intention
in which cybercriminals seek to disrupt the normal of redirecting a user’s browser to a fake website;
operation of a website by flooding it with requests; carried out by a pharmer (see pharming) or hacker
also used clog up a user’s mailbox by sending out (see hacking).
thousands of spam emails.
Domain name server (DNS) A server that looks
Descriptor A collection of information about a up domain names for websites (for example,
device plugged into a USB port; this can be www.hoddereducation.com) in order to find the
vendor ID (VID), product ID (PID) or serial number. IP addresses that a computer needs to locate the
Design Part of the program development life web servers (for example, 107.162.140.19).
cycle; uses the program specification from the Drone A flying robot that can be autonomous
analysis stage to show to how the program should or operated under remote control; a drone can be
be developed. used for reconnaissance or deliveries.
Device driver Software that communicates with Dual core A CPU containing two cores.
the operating system and translates data into a
Dual layering Using two recording layers in
format understood by the device.
storage media, such as DVDs and some Blu-ray
It is illegal to photocopy this page

Digital currency Currency (a system of money) discs.


that exists in electronic form only; it has no
Dynamic Host Configuration Protocol (DHCP)
physical form and is essentially data on a database.
A server that automatically provides and assigns an
Digital Micrometer Device (DMD) A chip that IP address.
uses millions of tiny mirrors on its surface to
Dynamic IP address A temporary IP address
create a video display.
assigned to a device each time it logs onto the
Digital Signal Processor (DSP) A processor internet.
that calculates, for example, the coordinates of a
Dynamic RAM (DRAM) A type of RAM chip that
pointing device based on the pulses of electricity
needs to be constantly refreshed.
received.

4 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary

Echo check Data sent to a receiver and then Flip flop Electronic circuit with only two stable
immediately sent back to sender; sender then conditions.
checks if received data matches sent data.
Flowchart Shows diagrammatically the steps
EEPROM Electronically erasable programmable required for a task (sub-system) and the order that
ROM (chip). they are to be performed.
Embedded system A combination of hardware Format check A check that the characters
and software designed to carry out a specific set entered conform to a pre-defined pattern.
of functions.
Frame QR code A type of QR code that includes a
Encryption Makes use of encryption keys to make space for advertising.
data meaningless; without the correct decryption
FROM An SQL command that identifies the table
key the data cannot be decoded (unscrambled).
to use.
Encryption algorithm A complex piece of
software that takes plaintext and generates an Full-duplex Data that can be sent in both
encrypted string known as ciphertext. directions at the same time (simultaneously).

End-effector An attachment to a robot arm that Function A set of programming statements


allows it to carry out a specific task, such as spray grouped together under a single name that can be
painting. called to perform a task in a program rather than
including a copy of the code every time; just like
Error code An error message generated by the a procedure except a function will return a value
computer. back to the main program.
Error-handling routine A routine in a program Graphical user interface (GUI) An interface that
or operating system that recognises and recovers uses icons to represent apps and tasks which can
a system from abnormal inputs or hardware faults be selected/launched by clicking on a mouse or
(for example, recovery from an attempt to divide using a touchscreen.
by zero).
Hacking The act of gaining illegal access to a
Expert system A form of AI that has been computer system without the owner’s permission.
developed to mimic a human’s knowledge and
expertise. Half-duplex Data that can be sent in both
directions but not at the same time.
Explanation system Part of an expert system
which informs the user of the reasoning behind its Hardware management The part of an operating
conclusions and recommendations. system that controls all input and output devices;
it is made up of sub-systems such as printer
Extreme data The largest/smallest data value management.
that is accepted by a program.
Heuristic checking Checking software for
Fetch-Decode-Execute cycle A cycle in which behaviour that could indicate a possible virus.
instructions and data are fetched from memory,
decoded and finally executed. Hexadecimal number system A number system
based on the value 16 (uses denary digits 0 to 9
Field A column in a data table. and letters A to F).
File A collection of data stored by a computer High-level language (HLL) A programming
program to be used again. language that is independent of computer
It is illegal to photocopy this page

File management The part of an operating hardware, a program written in HLL needs to be
system that manages files in a computer (for translated into machine code before it is executed.
example the ability to create, delete, copy, open,
Hopping/hop number Number in a data packet
close and rename files).
header used to stop packets which never reach their
Firewall Software or hardware that sits between destination from “clogging up” the data paths/routes.
a computer and an external network (for example,
HTML Hypertext Mark-up Language is used in the
the internet); the firewall monitors and filters all
design of web pages and to write, for example,
incoming and outgoing traffic.
http(s) protocols; in the context of this chapter,
Firmware A program that provides low-level colours used in web pages are assigned a hexadecimal
control for devices. code based on red, green and blue colours.

Hodder & Stoughton Limited © David Watson and Helen Williams 2022 5
Glossary

Human computer interface (HCI) An interface address to each device connected to the internet
supplied by the operating system to ‘hide’ the identifying their location.
complexities of the software and hardware from
Interpreter A computer program that analyses
the human user.
and executes a program written in a high-level
Hyperlink Highlighted text or an image that is language line by line.
activated by clicking a link which then links to
Interrupt A signal sent from a device or software
further text, images, web page or a website.
to a microprocessor requesting its attention; the
Hypertext transfer protocol secure (https) Http microprocessor suspends all operations until the
with extra security (such as SSL applied). interrupt has been serviced.
Image resolution The number of pixels in the X-Y Interrupt priority The priority assigned to an
direction of an image, for example, 4096 x 3192 interrupt so that the microprocessor knows which
pixels. one needs to be serviced first and which interrupts
are to be dealt with quickly.
Immediate Access Store (IAS) Memory that
holds all data and programs needed to be accessed Interrupt service routine (ISR) Software that
by the control unit. handles interrupt requests (for example, when the
printer runs out of paper) and sends a request to
Index Identifies the position of an element in
the CPU for processing.
an array.
Iteration A section of programming code can be
Inference engine A kind of search engine
repeated under certain conditions.
used in an expert system which examines the
knowledge base for information that matches JPEG From Joint Photographic Expert Group; a
the queries. form of lossy file compression used with image
files which relies on the inability of the human eye
Inference rules Rules used by the inference
to distinguish certain colour changes and hues.
engine in an expert system to draw conclusions
using IF statements. Key field The field that uniquely identifies a
record in a file.
Infra-red touchscreen A type of touchscreen
that uses infrared beams and sensors to detect Knowledge base A repository of facts which is a
where the screen has been touched. collection of objects and attributes.
Inputs The data used by the system that needs Latency The lag in a system; for example, the
to be entered while the system is active. time it takes to find a track on a hard disk, which
depends on the time it takes for the disk to rotate
Instruction set The complete set of
around to its read-write head.
machine code instructions used a particular
microprocessor. Length check A method used to check that the
data entered is a specific number of characters
Integer A positive or negative whole number that
long or that the number of characters is between
can be used with mathematical operators.
an upper value and a lower value.
Integrated circuit Usually a chip made from a
Lidar A contraction of light detection and
semi-conductor material which carries out the
ranging; the use of lasers to build up a 3D image of
same tasks as a larger circuit made from individual
the surroundings.
components.
It is illegal to photocopy this page

Linear search Inspects each item in a list in turn


Integrated Development Environment (IDE)
to see if the item matches the value searched for.
A suite of programs used to write and test
a computer program written in a high-level Logic circuit These are formed from a
programming language. combination of logic gates and designed to carry
out a particular task; the output from a logic
Internet The worldwide interconnection of
circuit will be 0 or 1.
networks; the internet makes use of TCP and IP
protocols. Logic gate An electronic circuit which relies on
‘on/of’ logic; the most common gates are NOT, AND,
Internet Protocol (IP) address Internet Protocol
OR, NAND, NOR and XOR.
identified either as ipv4 or ipv6; it gives a unique

6 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary

Logical operator An operator that is used to MOD An arithmetic operator that returns the
decide the path to take through a program if the remainder of a division; different languages use
expression formed is true or false. different symbols for this operation.
Logical shift An operation that shifts bits to the MP3 A lossy file compression method used for
left or right in a register; any bits shifted out of a music files.
register are replaced with zeroes.
MP4 A lossy file compression method used for
Lossless (file compression) A file compression multimedia files.
method that allows the original file to be fully
Multitasking A function that allows a computer
restored during the decompression process (RLE).
to process more than one task/process at a time.
Lossy (file compression) A file compression
Nesting The inclusion of one type of code
method in which parts of the original file cannot
construct in another.
be recovered during the decompression process (for
example JPEG, MP3). Network interface card (NIC) A hardware
component (circuit board or chip) that is required
Loudspeaker An output device that converts
to allow a device to connect to a network, such as
electric current into sound.
the internet).
Low-level language (LLL) A programming
Node Stages in a network that can receive
language that is dependent on computer hardware,
and transmit data packets; routers are nodes in
both machine code and assembly language are
communication networks.
examples of LLLs.
Normal data Data that is accepted by a program.
Machine code A binary programming language,
a program written in machine code can be loaded Object An item stored in the knowledge base.
and executed without translation. Opcode Part of a machine code instruction that
Machine learning A subset of AI in which identifies what action the CPU has to perform.
algorithms are trained and learn from past Operand Part of a machine code instruction that
experiences and examples. identifies what data is to be used.
Malware Programs (such as viruses, worms Operating system Software that provides an
and Trojan horses) that are installed on a user’s environment in which applications can run and
computer with the aim of deleting, corrupting or also provides an interface between computer and
manipulating data illegally. human operator.
Media Access Control (MAC) address A unique Operator Special characters sort words in a
identifier which acts as a network address for a programming language that identifies an action to
device; it takes the form NN-NN-NN-DD-DD-DD, be performed.
where NN is the manufacturer code and DD is the
device code. Optical character recognition (OCR) Technology
that can convert hard copy text or images into a
Memory Address Register (MAR) A register that digital format to be stored in a computer memory.
stores the address of the memory location currently
being read from or written to. Optical mouse A pointing device that uses a red
LED to track the movement of the device and then
Memory Data Register (MDR) A register that relays back its coordinates to a computer.
stores data that has just been read from memory or
It is illegal to photocopy this page

data that is about to be written to memory. Optical storage A type of storage that uses laser
light to read and write data, and includes cds, dvds
Memory location A numbered place in memory and Blu-ray discs.
where values can be stored.
ORDER BY An SQL command that sorts the
Memory management The part of an operating results from a query by a given column either
system that controls main memory. alphabetically or numerically.
Memory (primary) The devices within the ORGANIC light emitting diode (OLED) A
computer that are directly accessible by the light-emitting diode that uses the movement
CPU; there are two types of memory – RAM and of electrons between cathode and an anode to
ROM; memory is different to hard drive disks, for produce an on-screen image; it generates its own
example, which are examples of storage devices. light so no backlighting is required.

Hodder & Stoughton Limited © David Watson and Helen Williams 2022 7
Glossary

Outputs Information that needs to be displayed parity (even number of 1-bits) or odd parity (odd
or printed for the users of the system. number of 1-bits).
Overclocking Changing the clock speed of a Patch An update for software that is developed
system clock to a value higher than the factory/ to improve the security and features of software
recommended setting. and/or to remove any known bugs.
Overflow error The result of carrying a Payload The actual data being carried in a data
calculation that produces a value that is too large packet.
for the computer’s allocated word size (8-bit,
Persistent cookie A cookie that is stored on the
16-bit, 32-bit and so on).
user’s hard drive and only deleted when the expiry
Packet header The part of the data packet date is reached or the cookie is deleted by the
that contains the IP addresses of sender and user.
receiver, and includes the packet number to allow
Pharming Redirecting a user to a fake website
reassembly of the data packets.
in order to illegally obtain personal data about
Packet sniffing A method used by a the user without their knowledge; unlike phishing,
cybercriminal to examine data packets being sent pharming is initiated without needing any action
over a network and to find the contents of the data by the user.
packet, which are sent back to the cybercriminal.
Phenotyping The process of observing physical
Packet switching Method of transmission where characteristics of a plant to assess its health and
a message is broken into many data packets which growth.
can then be sent along pathways independently of
Phishing Sending out legitimate-looking emails
each other.
designed to trick the recipient into giving their
Packet trailer The part of a data packet that personal details to the sender of the email.
indicates the end of the data packet and cyclic
Piezoelectric crystal A crystal located in an
redundancy check (CRC) error check.
ink reservoir within an inkjet printer; the crystal
Paging This is part of memory management and vibrates and forces ink out onto paper.
is essential to virtual memory implementation;
Pixel Derived from the term a ‘picture element’,
paging is where data is retrieved from memory in
this is the smallest element used to make up an
data blocks that are all the same size (known as
image on a display.
pages).
Pixel density Number of pixels per square inch.
Parallel data transmission Data sent down
several channels/wires several bits at a time Pixelated (image) This is the result of zooming
(usually one byte). into a bitmap image; on zooming out the pixel
density can be diminished to such a degree that
Parameters The variables in a procedure or
the actual pixels themselves can be seen.
function declaration that store the values of the
arguments passed from the main program to a Plaintext The original text/message before it is
procedure or function. put through an encryption algorithm.
Parity bit Bit added to a byte of data in the Pointing device An input device that allows
most significant bit position; this ensures that the the user to control the movement of an on-screen
byte follows the correct even parity or odd parity cursor or to allow on-screen selection by clicking a
It is illegal to photocopy this page

protocol. button on the device.


Parity block Horizontal and vertical parity check Post-WIMP A modern touchscreen interface
on a block of data being transmitted. system that allows actions such as pinching or
rotating.
Parity byte Extra byte of data sent at the end
of a parity block; it is composed of the parity bits Presence check Check that a data item has been
generated from a vertical parity check of the data entered.
block. Prettyprinting Displaying or printing well set
Parity check Method used to check if data has out and formatted source code, making it easier to
been transferred correctly; makes use of even read and understand.

8 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary

Primary key A field in a database that uniquely Read-only memory (ROM) Primary memory that
identifies a record. cannot be changed or written to; ROM can only be
read.
Privacy settings Controls available on social
networking and other websites which allow users to Real (number) A positive or negative number
limit who can access their profile or what they are with a fractional part. Real numbers can be used
allowed to see. with mathematical operators.
Procedure A set of programming statements Real-time streaming The transmission of data
grouped together under a single name that can be over a network for live events where the data is
called to perform a task in a program, rather than sent as soon as it is received or generated.
including a copy of the code every time the task is
Record A collection of fields that describe one
performed.
item.
Processes The tasks that need to be performed
Refresh Recharge every few seconds in order to
using the input data and data and any other
maintain charge; for example, with a device such
previously stored data.
as a capacitor.
Program Counter (PC) A register that stores the
Register A temporary component in the CPU that
address where the next instruction to be read can
can be general or specific in its use; it holds data
be found.
or instructions as part of the Fetch-decode-execute
Prompt A message stating the input required. cycle.
Proof-of-work The algorithm used in blockchain Repetitive strain injury (RSI) Pain felt in the
networks to confirm a transaction and to produce muscles, nerves and tendons caused by a repetitive
new blocks to add to the chain; special users, action (for example, excessive clicking of a mouse
called miners, complete and monitor transactions button over a period of time).
on the network for a reward.
Report window A separate window in the runtime
Proxy server A server that acts as an environment of the IDE that shows the contents of
intermediary server through which internet variables during the execution of a program.
requests are processed; it often make use of cache
Resistive touchscreen A type of touchscreen
memory to speed up web page access.
that uses two conductive layers which make
Pseudocode A simple method of showing an contact where the screen has been touched.
algorithm. It describes what the algorithm does
Robot A mechanical device that can carry out
by using English key words that are very similar to
tasks normally done by humans.
those used in a high-level programming language
but without the strict syntax rules. Robotics The branch of (computer) science
that encompasses the design, construction and
Quad core A CPU containing four cores.
operation of robots.
Quarantine To isolate (in order to later delete)
ROUND A library routine that rounds a value to a
a file or program identified by antivirus as being
given number of decimal places.
infected by a virus.
Router A device that enables data packets to be
Quick response (QR) code A matrix of dark and
moved between different networks; for example, to
light squares which represent data; the pattern can
join a LAN to a WAN.
be read and interpreted using a smartphone camera
It is illegal to photocopy this page

and QR App. Rules base A collection of inference rules used


to draw conclusions.
RANDOM A library routine that generates a
random number. Run length encoding (RLE) A lossless file
compression technique used to reduce the size of
Random access memory (RAM) Primary memory
text and photo files in particular.
that can be written to or read from.
Sampling rate The number of sound samples
Range check A check that the value of a number
taken per second in digital sound recording.
is between an upper value and a lower value.
Sampling resolution The number of bits used
Ransomware A type of malware that encrypts
to represent sound amplitude in digital sound
data on a user’s computer and ‘holds the data
recording (also known as bit depth).
hostage’ until a ransom is paid.

Hodder & Stoughton Limited © David Watson and Helen Williams 2022 9
Glossary

Screensaver Software that supplies a still or SQL script A list of SQL commands that perform a
moving image on a monitor if a computer has been given task, often stored in a file so the script can
inactive for a period of time. be reused.
Secure sockets layer (SSL) A security protocol SSD endurance The total guaranteed number of
used when sending data over a network (such as times data can be written to or read from a
the internet). solid-state device (SSD) in its usable life cycle.
Security management The part of an operating SSL certificates A form of digital certificate
system that ensures the integrity, confidentiality which is used to authenticate a website; providing
and availability of data. the SSL certificate can be authenticated, any
communication or data exchange between browser
SELECT An SQL command that fetches specified
and website is secure.
fields (columns) from a table.
Static IP address An IP address that doesn’t
Selection Allowing the selection of different
change.
paths through the steps of a program.
Static RAM (SRAM) A type of RAM chip that
Sequence The order that steps in a program are
uses flip flops and doesn’t need to be constantly
executed.
refreshed.
Serial data transmission Data sent down one
Storage Data that needs to be stored in files on
channel/wire one bit at a time.
an appropriate media for use in the future.
Service (an interrupt) When an interrupt is
String A variable or constant that is several
received, some action needs to be taken by the
characters in length. Strings vary in length and
processor depending on what caused the interrupt;
may even have no characters (an empty string); the
until this is resolved (that is, it is serviced), the
characters can be letters and/or digits and/or any
interrupt cannot be removed to allow the processor
other printable symbol.
to continue.
Structure diagram Shows the design of a
Session cookie A cookie that is stored
computer system in a hierarchical way, with each
temporarily on a computer; it is deleted when the
level giving a more detailed breakdown of the
browser is closed or the website session ends.
system into sub-systems.
Set of test data All the items of data required to
Structured Query Language (SQL) The standard
work through a solution.
query language for writing scripts to obtain useful
Simplex Data which can be sent on one direction information from a relational database.
only.
SUM An SQL command that returns the sum of all
Single-table database A database that contains the values in a field (column). Used with SELECT.
only one table.
Switch These connect devices on a network
Skewed data Data which arrives at the together; switches use packet switching to send or
destination with the bits no longer synchronised. receive data packets via routers; within a network,
Social engineering Manipulating people into a switch sends data only to the intended device
breaking normal security procedures (such as (recognised by its MAC and IP addresses).
giving away their password) in order to gain illegal Symmetric encryption Encryption in which
access to computer systems or to place malware on the same (encryption) key is used to encrypt and
It is illegal to photocopy this page

their computer. decrypt a message.


Spam Unsolicited emails sent to a user’s mailbox. System buses A connection between major
Spear phishing Similar to phishing but targeting components in a computer that can carry data,
specific people or organisations rather than a addresses or control signals.
blanket attack. System clock Produces timing signals on the
Spyware A type of malware that gathers control bus to ensure synchronisation takes
information by monitoring a user’s activities on a place.
computer and sends the gathered information back Table A collection of related records in a
to the cybercriminal who sent out the spyware. database.

10 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary

Testing Part of the program development life Type check A check that the data entered is of a
cycle; the testing of the program to make sure that specific type.
it works under all conditions.
Typo squatting The use by cybercriminals of
Thermal bubble Inkjet printer technology subtle spelling errors in website addresses used to
whereby tiny resistors create heat and form an ink trick users into visiting their fake websites.
bubble which is ejected onto paper in an inkjet
Unicode A character set which represents all the
printer.
languages of the world (the first 128 characters are
Thrash point The point at which the execution the same as ASCII code).
of a program comes to a halt because the system is
Unidirectional Can travel in one direction only;
so busy moving data in and out of memory rather
used to describe data movement.
than actually executing the program.
Uniform resource locator (URL) A text-based
Timeout The time interval allowed to elapse
address for a web page.
before an acknowledgement is received (in the ARQ
error detection method). Universal serial bus A type of serial data
transmission which has become the industry
Timestamp A digital record of the date and time
standard for connecting computers to devices via a
that a data block is created in blockchain networks.
USB port.
Top-down design The breaking down of a
User account An agreement that allows an
computer system into a set of sub-systems, then
individual to use a computer; the user needs a
breaking each sub-system down into a set of
username and password to enter their area.
smaller sub-systems, until each sub-system just
performs a single action. User preferences Settings or options stored in
cookies that can remember customised web pages
Totalling Keeping a total that values are added
or indicate browsing history to target adverts.
to.
Utility programs (utilities) Part of an operating
Touchscreen A screen that allows the user to
system which carries out certain functions such as
select or manipulate a screen image using the
virus checking, defragmentation and screensaver.
touch of a finger or stylus; touchscreens most
frequently use capacitive, infrared or resistive Validation Automated checks carried out by
technology. a program that data is reasonable before it is
accepted into a computer system.
Translator Converts a program written in a
high-level language into machine code. Variable A named data store than contains a
value that may change during the execution of a
Trojan horse A type of malware that is designed
program.
to look like legitimate software but contains
malicious code that can cause damage to a Verification Checking that data has been
computer system. accurately copied from another source and input
into a computer or transferred from one part of a
Truth table A method of checking the output
computer system to another.
from a logic circuit; a truth table lists all the
possible binary input combinations and their Virtual keyboard An on-screen keyboard which
associated outputs; the number of outputs will uses the features of the touchscreen to emulate a
depend on the number of inputs; for example, two physical keyboard.
It is illegal to photocopy this page

inputs have 22 (4) possible binary combinations, Virtual memory A memory management
three inputs will have 23 (8) possible binary system that makes use of RAM, secondary
combinations, and so on. storage and software to enable a computer to
Two-step verification A type of authentication compensate for the shortage of actual physical
that requires two methods of verification to prove RAM memory.
the identity of a user. Virtual shopping basket/cart An area of
Two’s complement A method of representing memory in a website where items a user wishes
negative numbers in binary; when applied to an to purchase are temporarily stored; items remain
8-bit system, the left-most bit (most significant in the basket until payment is made or the
bit) is given the value −128. session has ended.

Hodder & Stoughton Limited © David Watson and Helen Williams 2022 11
Glossary

Virus Program or program code that replicates Windows, icons, menu and pointing device
itself with the intention of deleting or corrupting (WIMP) An interface that uses a pointing device
files or by causing the computer system to such as a mouse to select options from screen
malfunction. icons or a menu.
Volatile Describes memory that loses its contents Wired Equivalency Privacy (WEP) encryption
when the power is turned off. protocol An algorithm for wireless networks to
protect them against data interception.
Von Neumann architecture A type of computer
architecture which introduced the concept of the Word A group of bits used by a computer to
stored program in the 1940s. represent a single unit; for example, modern
computers often use 64-bit word lengths.
War driving Using a laptop, antenna, GPS
device and software to intercept Wi-Fi signals and Word list Text file containing a collection of
illegally obtain data; sometimes called access point words used in a brute force attack.
mapping.
World Wide Web (WWW) A massive collection
Web scraping A method of obtaining data from of web pages and is based on hypertext transfer
websites. protocols (http and https).
Web crawler/search bot A software robot Worm A stand-alone type of malware that can
that roams the internet scanning websites and self-replicate; unlike viruses, worms don’t need an
categorising them; often used by search engines. active host; they can spread throughout a network
without the need for any action by an end user.
WHERE An SQL command to include only those
records (rows) in a query that match a given
condition.
It is illegal to photocopy this page

12 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition

You might also like