Definitions Computer Science - Caienotesofficial
Definitions Computer Science - Caienotesofficial
Abnormal data Data that is rejected by a Analysis Part of the program development life
program. cycle; a process of investigation, leading to the
specification of what a program is required to do.
Abstraction Keeps the key elements required
for the solution to the problem, discards any Anti-spyware Software that detects and
unnecessary details and information that is not removes spyware programs installed on a system;
required. the software is based on typical spyware rules or
known file structures.
Accelerometer A sensor that measures
acceleration and deceleration that can detect, for Antivirus software Software that quarantines
example, the orientation of a device. and deletes files or programs infected by a
computer virus; the software can run in the
Access levels Different levels of access in a
background or be initiated by the user.
computer system allowing a hierarchy of access
levels depending on the user’s level of security. Arithmetic and logic unit (ALU) The component
of the CPU that carries out all arithmetic and
Accumulator (ACC) Temporary general-purpose
logical operations.
register that stores numerical values at any part of
a given operation. Arithmetic operator An operator that is used to
perform calculations.
Acknowledgement A message sent to the
receiver indicating that data has been received Array A data structure containing several
correctly (used in ARQ error detection method). elements of the same data type; these elements
can be accessed using the same identifier name.
Active host Functioning software that a virus
can affect by attaching itself to the code or by Artificial intelligence (AI) A collection of
altering the code to allow the virus to carry out rules and data that gives a computer system the
its attack. ability to reason, learn and adapt to external
stimuli.
Actuator An output device that converts
electrical energy into mechanical movement. ASCII code A character set for all the characters
on a standard keyboard and control codes.
Adaptive cruise control The use of sensors,
actuators and microprocessors to ensure that Assembler A computer program that translates
a vehicle keeps a safe distance behind another programming code written in assembly language
vehicle. into machine code.
Address A label for a memory location used by Assembly language A programming language
CPU to track data. that is dependent on computer hardware, a program
written using an assembly language program needs
Address bus The system bus that carries the
to be translated into machine code before it is
addresses throughout the computer system.
executed.
Administrator A person responsible for the
Asymmetric encryption Encryption that uses
upkeep and maintenance of a computer system that
public keys and private keys to ensure data is
involves multi-user function.
It is illegal to photocopy this page
secure.
Adware A type of malware that attempts to flood
Attribute Something that defines the objects
the end user with unwanted advertising.
stored in a knowledge base.
Algorithm An ordered set of steps to solve a
Audio compression A method used to reduce the
problem.
size of a sound file using perceptual music shaping.
Analogue to digital converter (ADC) A device
Authentication The process of proving a user’s
that converts analogue data (for example, read
identity by using something they know, something
from sensors) into a form understood by a
they have or something unique to them.
computer.
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 1
Glossary
or 1, and is formed from the words Binary digit. Char A variable or constant that is a single
character.
Bit depth The number of bits used to represent
the smallest unit in a sound file. Character set A list of characters that have been
defined by computer hardware and software. The
Bit-map image An image made up of pixels. character set is necessary so that the computer can
Blockchain A decentralised database where all understand human characters.
transactions are stored; it consists of a number of Charge couple device (CCD) A light sensitive cell
interconnected computers but not a central server. made up of millions of tiny sensors acting as
Boolean algebra A form of algebra linked to logic photodiodes.
circuits and based on TRUE or FALSE.
2 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 3
Glossary
Data packet A small part of a message/data that Digital to analogue converter (DAC) A device
is transmitted over a network. After transmission, that converts digital data into electric currents
all the data packets are reassembled to form the that can drive motors, actuators and relays, for
original message/data. example.
Data redundancy The unnecessary storing of the Direct 3D printing A 3D printing technique
same data on several storage devices at the same in which the print head moves in the x, y and z
time. directions.
Data type A classification of how data is stored Disk thrashing (on HDD) A problem in a hard
and displayed, and of which operations that can be disk drive (HDD) caused by excessive swapping
performed on the stored value. in and out of data causing a high rate of head
movements during virtual memory operations.
Database A persistent structured collection of
data that allows people to extract information in a Distributed control system (DCS) A powerful
way that meets their needs. computer system programmed to monitor and
control a complex process without the need for
Debugging Finding errors in a computer program
human interaction.
by running or tracing the program.
Distributed denial-of-service (DDoS) attack
Declare Define the value and data type of a
A denial of service (dos) attack in which the fake
variable or constant.
requests come from many different computers,
Decomposition Breaks down a complex problem which makes it harder to stop.
into smaller parts, which can then be sub divided
DIV An arithmetic operator that returns the
into even smaller parts, that can be solved easily.
quotient (whole number part) of a division;
Defragmentation A process that reorganises different languages use different symbols for this
sectors on an HDD by rearranging blocks of data so operation.
that they are contiguous.
DNS cache poisoning Altering IP addresses on
Denial-of-service (DoS) attack A cyberattack a domain name server (DNS) with the intention
in which cybercriminals seek to disrupt the normal of redirecting a user’s browser to a fake website;
operation of a website by flooding it with requests; carried out by a pharmer (see pharming) or hacker
also used clog up a user’s mailbox by sending out (see hacking).
thousands of spam emails.
Domain name server (DNS) A server that looks
Descriptor A collection of information about a up domain names for websites (for example,
device plugged into a USB port; this can be www.hoddereducation.com) in order to find the
vendor ID (VID), product ID (PID) or serial number. IP addresses that a computer needs to locate the
Design Part of the program development life web servers (for example, 107.162.140.19).
cycle; uses the program specification from the Drone A flying robot that can be autonomous
analysis stage to show to how the program should or operated under remote control; a drone can be
be developed. used for reconnaissance or deliveries.
Device driver Software that communicates with Dual core A CPU containing two cores.
the operating system and translates data into a
Dual layering Using two recording layers in
format understood by the device.
storage media, such as DVDs and some Blu-ray
It is illegal to photocopy this page
4 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary
Echo check Data sent to a receiver and then Flip flop Electronic circuit with only two stable
immediately sent back to sender; sender then conditions.
checks if received data matches sent data.
Flowchart Shows diagrammatically the steps
EEPROM Electronically erasable programmable required for a task (sub-system) and the order that
ROM (chip). they are to be performed.
Embedded system A combination of hardware Format check A check that the characters
and software designed to carry out a specific set entered conform to a pre-defined pattern.
of functions.
Frame QR code A type of QR code that includes a
Encryption Makes use of encryption keys to make space for advertising.
data meaningless; without the correct decryption
FROM An SQL command that identifies the table
key the data cannot be decoded (unscrambled).
to use.
Encryption algorithm A complex piece of
software that takes plaintext and generates an Full-duplex Data that can be sent in both
encrypted string known as ciphertext. directions at the same time (simultaneously).
File management The part of an operating hardware, a program written in HLL needs to be
system that manages files in a computer (for translated into machine code before it is executed.
example the ability to create, delete, copy, open,
Hopping/hop number Number in a data packet
close and rename files).
header used to stop packets which never reach their
Firewall Software or hardware that sits between destination from “clogging up” the data paths/routes.
a computer and an external network (for example,
HTML Hypertext Mark-up Language is used in the
the internet); the firewall monitors and filters all
design of web pages and to write, for example,
incoming and outgoing traffic.
http(s) protocols; in the context of this chapter,
Firmware A program that provides low-level colours used in web pages are assigned a hexadecimal
control for devices. code based on red, green and blue colours.
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 5
Glossary
Human computer interface (HCI) An interface address to each device connected to the internet
supplied by the operating system to ‘hide’ the identifying their location.
complexities of the software and hardware from
Interpreter A computer program that analyses
the human user.
and executes a program written in a high-level
Hyperlink Highlighted text or an image that is language line by line.
activated by clicking a link which then links to
Interrupt A signal sent from a device or software
further text, images, web page or a website.
to a microprocessor requesting its attention; the
Hypertext transfer protocol secure (https) Http microprocessor suspends all operations until the
with extra security (such as SSL applied). interrupt has been serviced.
Image resolution The number of pixels in the X-Y Interrupt priority The priority assigned to an
direction of an image, for example, 4096 x 3192 interrupt so that the microprocessor knows which
pixels. one needs to be serviced first and which interrupts
are to be dealt with quickly.
Immediate Access Store (IAS) Memory that
holds all data and programs needed to be accessed Interrupt service routine (ISR) Software that
by the control unit. handles interrupt requests (for example, when the
printer runs out of paper) and sends a request to
Index Identifies the position of an element in
the CPU for processing.
an array.
Iteration A section of programming code can be
Inference engine A kind of search engine
repeated under certain conditions.
used in an expert system which examines the
knowledge base for information that matches JPEG From Joint Photographic Expert Group; a
the queries. form of lossy file compression used with image
files which relies on the inability of the human eye
Inference rules Rules used by the inference
to distinguish certain colour changes and hues.
engine in an expert system to draw conclusions
using IF statements. Key field The field that uniquely identifies a
record in a file.
Infra-red touchscreen A type of touchscreen
that uses infrared beams and sensors to detect Knowledge base A repository of facts which is a
where the screen has been touched. collection of objects and attributes.
Inputs The data used by the system that needs Latency The lag in a system; for example, the
to be entered while the system is active. time it takes to find a track on a hard disk, which
depends on the time it takes for the disk to rotate
Instruction set The complete set of
around to its read-write head.
machine code instructions used a particular
microprocessor. Length check A method used to check that the
data entered is a specific number of characters
Integer A positive or negative whole number that
long or that the number of characters is between
can be used with mathematical operators.
an upper value and a lower value.
Integrated circuit Usually a chip made from a
Lidar A contraction of light detection and
semi-conductor material which carries out the
ranging; the use of lasers to build up a 3D image of
same tasks as a larger circuit made from individual
the surroundings.
components.
It is illegal to photocopy this page
6 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary
Logical operator An operator that is used to MOD An arithmetic operator that returns the
decide the path to take through a program if the remainder of a division; different languages use
expression formed is true or false. different symbols for this operation.
Logical shift An operation that shifts bits to the MP3 A lossy file compression method used for
left or right in a register; any bits shifted out of a music files.
register are replaced with zeroes.
MP4 A lossy file compression method used for
Lossless (file compression) A file compression multimedia files.
method that allows the original file to be fully
Multitasking A function that allows a computer
restored during the decompression process (RLE).
to process more than one task/process at a time.
Lossy (file compression) A file compression
Nesting The inclusion of one type of code
method in which parts of the original file cannot
construct in another.
be recovered during the decompression process (for
example JPEG, MP3). Network interface card (NIC) A hardware
component (circuit board or chip) that is required
Loudspeaker An output device that converts
to allow a device to connect to a network, such as
electric current into sound.
the internet).
Low-level language (LLL) A programming
Node Stages in a network that can receive
language that is dependent on computer hardware,
and transmit data packets; routers are nodes in
both machine code and assembly language are
communication networks.
examples of LLLs.
Normal data Data that is accepted by a program.
Machine code A binary programming language,
a program written in machine code can be loaded Object An item stored in the knowledge base.
and executed without translation. Opcode Part of a machine code instruction that
Machine learning A subset of AI in which identifies what action the CPU has to perform.
algorithms are trained and learn from past Operand Part of a machine code instruction that
experiences and examples. identifies what data is to be used.
Malware Programs (such as viruses, worms Operating system Software that provides an
and Trojan horses) that are installed on a user’s environment in which applications can run and
computer with the aim of deleting, corrupting or also provides an interface between computer and
manipulating data illegally. human operator.
Media Access Control (MAC) address A unique Operator Special characters sort words in a
identifier which acts as a network address for a programming language that identifies an action to
device; it takes the form NN-NN-NN-DD-DD-DD, be performed.
where NN is the manufacturer code and DD is the
device code. Optical character recognition (OCR) Technology
that can convert hard copy text or images into a
Memory Address Register (MAR) A register that digital format to be stored in a computer memory.
stores the address of the memory location currently
being read from or written to. Optical mouse A pointing device that uses a red
LED to track the movement of the device and then
Memory Data Register (MDR) A register that relays back its coordinates to a computer.
stores data that has just been read from memory or
It is illegal to photocopy this page
data that is about to be written to memory. Optical storage A type of storage that uses laser
light to read and write data, and includes cds, dvds
Memory location A numbered place in memory and Blu-ray discs.
where values can be stored.
ORDER BY An SQL command that sorts the
Memory management The part of an operating results from a query by a given column either
system that controls main memory. alphabetically or numerically.
Memory (primary) The devices within the ORGANIC light emitting diode (OLED) A
computer that are directly accessible by the light-emitting diode that uses the movement
CPU; there are two types of memory – RAM and of electrons between cathode and an anode to
ROM; memory is different to hard drive disks, for produce an on-screen image; it generates its own
example, which are examples of storage devices. light so no backlighting is required.
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 7
Glossary
Outputs Information that needs to be displayed parity (even number of 1-bits) or odd parity (odd
or printed for the users of the system. number of 1-bits).
Overclocking Changing the clock speed of a Patch An update for software that is developed
system clock to a value higher than the factory/ to improve the security and features of software
recommended setting. and/or to remove any known bugs.
Overflow error The result of carrying a Payload The actual data being carried in a data
calculation that produces a value that is too large packet.
for the computer’s allocated word size (8-bit,
Persistent cookie A cookie that is stored on the
16-bit, 32-bit and so on).
user’s hard drive and only deleted when the expiry
Packet header The part of the data packet date is reached or the cookie is deleted by the
that contains the IP addresses of sender and user.
receiver, and includes the packet number to allow
Pharming Redirecting a user to a fake website
reassembly of the data packets.
in order to illegally obtain personal data about
Packet sniffing A method used by a the user without their knowledge; unlike phishing,
cybercriminal to examine data packets being sent pharming is initiated without needing any action
over a network and to find the contents of the data by the user.
packet, which are sent back to the cybercriminal.
Phenotyping The process of observing physical
Packet switching Method of transmission where characteristics of a plant to assess its health and
a message is broken into many data packets which growth.
can then be sent along pathways independently of
Phishing Sending out legitimate-looking emails
each other.
designed to trick the recipient into giving their
Packet trailer The part of a data packet that personal details to the sender of the email.
indicates the end of the data packet and cyclic
Piezoelectric crystal A crystal located in an
redundancy check (CRC) error check.
ink reservoir within an inkjet printer; the crystal
Paging This is part of memory management and vibrates and forces ink out onto paper.
is essential to virtual memory implementation;
Pixel Derived from the term a ‘picture element’,
paging is where data is retrieved from memory in
this is the smallest element used to make up an
data blocks that are all the same size (known as
image on a display.
pages).
Pixel density Number of pixels per square inch.
Parallel data transmission Data sent down
several channels/wires several bits at a time Pixelated (image) This is the result of zooming
(usually one byte). into a bitmap image; on zooming out the pixel
density can be diminished to such a degree that
Parameters The variables in a procedure or
the actual pixels themselves can be seen.
function declaration that store the values of the
arguments passed from the main program to a Plaintext The original text/message before it is
procedure or function. put through an encryption algorithm.
Parity bit Bit added to a byte of data in the Pointing device An input device that allows
most significant bit position; this ensures that the the user to control the movement of an on-screen
byte follows the correct even parity or odd parity cursor or to allow on-screen selection by clicking a
It is illegal to photocopy this page
8 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary
Primary key A field in a database that uniquely Read-only memory (ROM) Primary memory that
identifies a record. cannot be changed or written to; ROM can only be
read.
Privacy settings Controls available on social
networking and other websites which allow users to Real (number) A positive or negative number
limit who can access their profile or what they are with a fractional part. Real numbers can be used
allowed to see. with mathematical operators.
Procedure A set of programming statements Real-time streaming The transmission of data
grouped together under a single name that can be over a network for live events where the data is
called to perform a task in a program, rather than sent as soon as it is received or generated.
including a copy of the code every time the task is
Record A collection of fields that describe one
performed.
item.
Processes The tasks that need to be performed
Refresh Recharge every few seconds in order to
using the input data and data and any other
maintain charge; for example, with a device such
previously stored data.
as a capacitor.
Program Counter (PC) A register that stores the
Register A temporary component in the CPU that
address where the next instruction to be read can
can be general or specific in its use; it holds data
be found.
or instructions as part of the Fetch-decode-execute
Prompt A message stating the input required. cycle.
Proof-of-work The algorithm used in blockchain Repetitive strain injury (RSI) Pain felt in the
networks to confirm a transaction and to produce muscles, nerves and tendons caused by a repetitive
new blocks to add to the chain; special users, action (for example, excessive clicking of a mouse
called miners, complete and monitor transactions button over a period of time).
on the network for a reward.
Report window A separate window in the runtime
Proxy server A server that acts as an environment of the IDE that shows the contents of
intermediary server through which internet variables during the execution of a program.
requests are processed; it often make use of cache
Resistive touchscreen A type of touchscreen
memory to speed up web page access.
that uses two conductive layers which make
Pseudocode A simple method of showing an contact where the screen has been touched.
algorithm. It describes what the algorithm does
Robot A mechanical device that can carry out
by using English key words that are very similar to
tasks normally done by humans.
those used in a high-level programming language
but without the strict syntax rules. Robotics The branch of (computer) science
that encompasses the design, construction and
Quad core A CPU containing four cores.
operation of robots.
Quarantine To isolate (in order to later delete)
ROUND A library routine that rounds a value to a
a file or program identified by antivirus as being
given number of decimal places.
infected by a virus.
Router A device that enables data packets to be
Quick response (QR) code A matrix of dark and
moved between different networks; for example, to
light squares which represent data; the pattern can
join a LAN to a WAN.
be read and interpreted using a smartphone camera
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 9
Glossary
Screensaver Software that supplies a still or SQL script A list of SQL commands that perform a
moving image on a monitor if a computer has been given task, often stored in a file so the script can
inactive for a period of time. be reused.
Secure sockets layer (SSL) A security protocol SSD endurance The total guaranteed number of
used when sending data over a network (such as times data can be written to or read from a
the internet). solid-state device (SSD) in its usable life cycle.
Security management The part of an operating SSL certificates A form of digital certificate
system that ensures the integrity, confidentiality which is used to authenticate a website; providing
and availability of data. the SSL certificate can be authenticated, any
communication or data exchange between browser
SELECT An SQL command that fetches specified
and website is secure.
fields (columns) from a table.
Static IP address An IP address that doesn’t
Selection Allowing the selection of different
change.
paths through the steps of a program.
Static RAM (SRAM) A type of RAM chip that
Sequence The order that steps in a program are
uses flip flops and doesn’t need to be constantly
executed.
refreshed.
Serial data transmission Data sent down one
Storage Data that needs to be stored in files on
channel/wire one bit at a time.
an appropriate media for use in the future.
Service (an interrupt) When an interrupt is
String A variable or constant that is several
received, some action needs to be taken by the
characters in length. Strings vary in length and
processor depending on what caused the interrupt;
may even have no characters (an empty string); the
until this is resolved (that is, it is serviced), the
characters can be letters and/or digits and/or any
interrupt cannot be removed to allow the processor
other printable symbol.
to continue.
Structure diagram Shows the design of a
Session cookie A cookie that is stored
computer system in a hierarchical way, with each
temporarily on a computer; it is deleted when the
level giving a more detailed breakdown of the
browser is closed or the website session ends.
system into sub-systems.
Set of test data All the items of data required to
Structured Query Language (SQL) The standard
work through a solution.
query language for writing scripts to obtain useful
Simplex Data which can be sent on one direction information from a relational database.
only.
SUM An SQL command that returns the sum of all
Single-table database A database that contains the values in a field (column). Used with SELECT.
only one table.
Switch These connect devices on a network
Skewed data Data which arrives at the together; switches use packet switching to send or
destination with the bits no longer synchronised. receive data packets via routers; within a network,
Social engineering Manipulating people into a switch sends data only to the intended device
breaking normal security procedures (such as (recognised by its MAC and IP addresses).
giving away their password) in order to gain illegal Symmetric encryption Encryption in which
access to computer systems or to place malware on the same (encryption) key is used to encrypt and
It is illegal to photocopy this page
10 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
Glossary
Testing Part of the program development life Type check A check that the data entered is of a
cycle; the testing of the program to make sure that specific type.
it works under all conditions.
Typo squatting The use by cybercriminals of
Thermal bubble Inkjet printer technology subtle spelling errors in website addresses used to
whereby tiny resistors create heat and form an ink trick users into visiting their fake websites.
bubble which is ejected onto paper in an inkjet
Unicode A character set which represents all the
printer.
languages of the world (the first 128 characters are
Thrash point The point at which the execution the same as ASCII code).
of a program comes to a halt because the system is
Unidirectional Can travel in one direction only;
so busy moving data in and out of memory rather
used to describe data movement.
than actually executing the program.
Uniform resource locator (URL) A text-based
Timeout The time interval allowed to elapse
address for a web page.
before an acknowledgement is received (in the ARQ
error detection method). Universal serial bus A type of serial data
transmission which has become the industry
Timestamp A digital record of the date and time
standard for connecting computers to devices via a
that a data block is created in blockchain networks.
USB port.
Top-down design The breaking down of a
User account An agreement that allows an
computer system into a set of sub-systems, then
individual to use a computer; the user needs a
breaking each sub-system down into a set of
username and password to enter their area.
smaller sub-systems, until each sub-system just
performs a single action. User preferences Settings or options stored in
cookies that can remember customised web pages
Totalling Keeping a total that values are added
or indicate browsing history to target adverts.
to.
Utility programs (utilities) Part of an operating
Touchscreen A screen that allows the user to
system which carries out certain functions such as
select or manipulate a screen image using the
virus checking, defragmentation and screensaver.
touch of a finger or stylus; touchscreens most
frequently use capacitive, infrared or resistive Validation Automated checks carried out by
technology. a program that data is reasonable before it is
accepted into a computer system.
Translator Converts a program written in a
high-level language into machine code. Variable A named data store than contains a
value that may change during the execution of a
Trojan horse A type of malware that is designed
program.
to look like legitimate software but contains
malicious code that can cause damage to a Verification Checking that data has been
computer system. accurately copied from another source and input
into a computer or transferred from one part of a
Truth table A method of checking the output
computer system to another.
from a logic circuit; a truth table lists all the
possible binary input combinations and their Virtual keyboard An on-screen keyboard which
associated outputs; the number of outputs will uses the features of the touchscreen to emulate a
depend on the number of inputs; for example, two physical keyboard.
It is illegal to photocopy this page
inputs have 22 (4) possible binary combinations, Virtual memory A memory management
three inputs will have 23 (8) possible binary system that makes use of RAM, secondary
combinations, and so on. storage and software to enable a computer to
Two-step verification A type of authentication compensate for the shortage of actual physical
that requires two methods of verification to prove RAM memory.
the identity of a user. Virtual shopping basket/cart An area of
Two’s complement A method of representing memory in a website where items a user wishes
negative numbers in binary; when applied to an to purchase are temporarily stored; items remain
8-bit system, the left-most bit (most significant in the basket until payment is made or the
bit) is given the value −128. session has ended.
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 11
Glossary
Virus Program or program code that replicates Windows, icons, menu and pointing device
itself with the intention of deleting or corrupting (WIMP) An interface that uses a pointing device
files or by causing the computer system to such as a mouse to select options from screen
malfunction. icons or a menu.
Volatile Describes memory that loses its contents Wired Equivalency Privacy (WEP) encryption
when the power is turned off. protocol An algorithm for wireless networks to
protect them against data interception.
Von Neumann architecture A type of computer
architecture which introduced the concept of the Word A group of bits used by a computer to
stored program in the 1940s. represent a single unit; for example, modern
computers often use 64-bit word lengths.
War driving Using a laptop, antenna, GPS
device and software to intercept Wi-Fi signals and Word list Text file containing a collection of
illegally obtain data; sometimes called access point words used in a brute force attack.
mapping.
World Wide Web (WWW) A massive collection
Web scraping A method of obtaining data from of web pages and is based on hypertext transfer
websites. protocols (http and https).
Web crawler/search bot A software robot Worm A stand-alone type of malware that can
that roams the internet scanning websites and self-replicate; unlike viruses, worms don’t need an
categorising them; often used by search engines. active host; they can spread throughout a network
without the need for any action by an end user.
WHERE An SQL command to include only those
records (rows) in a query that match a given
condition.
It is illegal to photocopy this page
12 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition