Computing Terms
Computing Terms
1
A patent protects new inventions. It gives the inventor the right
to stop others from making or selling their invention for a
certain time.
Example: You invent a water-saving tap. With a patent, others
can’t copy or sell it without your permission.
™ Trademark
A trademark protects brand names, logos, and slogans. It helps
people know which products come from which company.
Example: The Nike "swoosh" and slogan "Just Do It" are
trademarks.
☠
Piracy
Piracy is when someone copies or uses copyrighted material
without permission—like downloading movies or software
illegally.
Example: Watching a movie from a website that didn’t pay for it
is piracy.
⚠ Copyright Infringement
This means breaking copyright rules—using someone’s creative
work without their permission.
Example: Copying and posting someone else’s story online
without asking them.
Virtual Learning Environment (VLE)
A Virtual Learning Environment is an online platform where
teachers and students learn and work together using the
internet.
Example: Google Classroom, Moodle, or Microsoft Teams for
Education.
You can do things like:
Submit assignments
Watch lessons
Add images
Test it
Abstraction
3
Abstraction means focusing on the important parts and
ignoring the details.
Example:
When driving a car, you only care about the steering wheel and
pedals—not how the engine works.
In coding, abstraction helps us write simple, clear programs by
hiding complex code behind simple commands.
Control Structure
A control structure is a way to control the flow of a program. It
tells the computer what to do next.
There are 3 main types:
Sequence (do things in order)
Sequence
Sequence means doing steps in order, one after another.
Example:
1. Wake up
2. Brush teeth
3. Eat breakfast
In coding (Python), it’s like:
print("Hello")
print("How are you?")
Selection
Selection means making a decision—you choose what to do
based on a condition (like an if statement).
Example:
In coding (Python), it’s like:
if it_is_raining:
4
take_umbrella()
else:
wear_sunglasses()
Iteration
Iteration means repeating steps (a loop).
Example:
"Do this 5 times" or "Keep doing this until you finish."
In coding (Python), it’s like:
for i in range(5):
print("Hello")
Machine Learning (ML)
Machine Learning is when computers learn from data and
improve over time without being directly programmed.
Example: A spam filter learns which emails are junk based on
examples.
Artificial Neural Networks (ANNs)
Artificial Neural Networks are a type of machine learning that
works like a simplified human brain.
They are made of “neurons” connected together to recognize
patterns.
Example: An ANN can help a computer recognize faces in
photos.
5
Augmented Reality adds computer images or info to the real
world using your phone or special glasses.
Example: Pokémon GO – you see Pokémon on your phone
screen as if they are in your real environment.
Mixed Reality (MR)
Mixed Reality combines both real and virtual worlds—you can
interact with digital objects as if they were real.
Example: Wearing MR glasses to move a 3D model on your
table with your hands.
Gamification
Gamification means adding game elements (like points, levels,
or rewards) to non-game activities to make them more fun.
Example: Earning stars and badges for finishing school
assignments online.
6
Example: Solving problems in seconds that a normal computer
would take years to solve.
Sycamore
Sycamore is the name of Google’s quantum computer.
It made history by solving a problem in 200 seconds that would
take a supercomputer 10,000 years!
Adaptive Technologies
These are tools that help people with special needs learn or
work better by adapting to their situation.
Example: A keyboard with larger keys for someone with poor
vision.
Assistive Technologies
These are devices or software that support people with
disabilities to live, learn, or work.
Example: Screen readers for blind users or speech-to-text
software for those who can’t type.
Note: Assistive technology is a type of adaptive technology, but
assistive focuses more on disabilities.
Portable Computing
This means using small, easy-to-carry computing devices.
Example: Laptops, tablets, smart phones — you can use them
anywhere, not just at a desk.
Constants
A constant is a value that does not change while a program
runs.
Example:
In coding (Python), it’s like:
PI = 3.14 #This value stays the same
Variables
7
A variable is a storage place for a value that can change during
the program.
Example:
In coding (Python), it’s like:
score = 10 #You can change the value later
score = score + 5
➕ Expressions
An expression is a combination of values, variables, and
operators that produces a result.
Example:
In coding (Python), it’s like:
a + b * 2
Statements / Instructions
A statement is a complete instruction that tells the computer to
do something.
Example:
In coding (Python), it’s like:
print("Hello") # This is a statement
Logical Operators
Used to make decisions based on conditions. They return True
or False.
and – both must be true
Example:
In coding (Python), it’s like:
age > 18 and has_ticket
Arithmetic Operators
Used for math calculations.
+ (add)
8
- (subtract)
* (multiply)
/ (divide)
% (modulus/remainder)
Example:
In coding (Python), it’s like:
total = price * quantity
Operator Precedence
Operator precedence tells the computer which operation to do
first when there are many in one line.
Order (from highest to lowest):
1. Parentheses ()
2. Exponents **
3. Multiply *, Divide /, Modulus %
4. Add +, Subtract -
Example:
In coding (Python), it’s like:
result = 2 + 3 * 4 #Answer is 14 (not 20)
# Because 3 * 4 is done first
Artificial Neural Networks (ANNs)
These are computer systems that copy how the brain works.
They help machines recognize patterns and learn from data.
Example: Used in face recognition, speech-to-text, or predicting
what you’ll watch next on Netflix.
Perceptual Computing
This allows computers to understand and react to human
actions like gestures, speech, or facial expressions.
Example: A laptop that unlocks when it sees your face or turns
pages when you wave your hand.
Wearable Displays
9
These are small screens you can wear, often built into glasses or
headsets.
Example: Smart glasses that show directions or fitness stats as
you walk.
Network
A network connects two or more computers so they can share
information, files, or resources (like printers).
Example: Wi-Fi at school or home that connects your phone,
laptop, and TV.
Cloud Storage Systems
These allow you to store files online instead of on your device.
You can access your files from anywhere with the internet.
Example: Google Drive, iCloud, OneDrive.
Smart Cards
These are plastic cards with a microchip that stores and
processes data. They are used for security and payments.
Example: ATM cards, SIM cards, or student ID cards with login
access.
Holographic Storage
A future type of storage that uses laser light to store data in 3D
inside a disk or crystal. It can hold massive amounts of data.
Example: Still under development, but it could store an entire
library in something the size of a coin.
Home Servers
A home server is a small computer in your house that stores
files, backups, or media. It serves data to other devices in your
home.
Example: A home server can store family photos, movies, and
documents that everyone in the house can access.
Media Servers
10
These are devices or software that store and stream movies,
music, and videos to TVs, phones, or computers.
Example: Plex or Kodi – you store your videos on a media
server and watch them on any device in the house.
Device Drivers
A device driver is a small program that helps your computer
communicate with hardware like a printer, mouse, or speaker.
Example: You install a printer driver so your computer knows
how to send documents to print.
Plug-and-Play Devices
These are devices that work automatically when you plug them
in—no need to install anything.
Example: A USB mouse or flash drive — just plugs it in, and it’s
ready to use.
Screenshot
A screenshot is a picture of your entire screen.
How to take one:
On Windows: Press PrtSc or Windows + PrtSc
Screen Clipping
A screen clipping lets you capture just a part of the screen, not
the whole thing.
Example: You can use tools like Snipping Tool or Snip & Sketch
(Windows) to select only a small area.
Print Screen
"Print Screen" is the button (PrtSc) that takes a screenshot of
the whole screen.
It doesn’t actually print—it just copies the screen to your
clipboard or saves it as a file.
11
SmartArt
SmartArt is a tool in Microsoft Office (Word, PowerPoint, etc.)
that helps you make diagrams like:
Process charts
Organization charts
Cycles
Pie charts
Line graphs
Data Filtering
Filtering lets you show only the data you need by hiding the
rest.
Example: Show only students who scored above 70%.
Sorting
Sorting means arranging data in order — either A–Z, Z–A, or
by number.
Example: Sort names alphabetically or scores from highest to
lowest.
Data Validation
12
Data validation helps control what users can enter in a cell.
Example: Only allow numbers between 1 and 100 in a quiz
score column.
Styles
Styles are pre-designed formatting options for text, tables, or
cells — including font, colour, and borders.
Example: Bold headers with background colour in a table.
Themes
A theme is a set of matching colours, fonts, and effects used to
give a consistent look to a presentation or document.
Example: A blue business theme in PowerPoint gives all slides a
similar style.
Templates
Templates are pre-made files with layout and design already set,
so you can quickly start a new document or presentation.
Example: A resume template in Word or an invoice template in
Excel.
Macros
A macro is a set of recorded actions you can play back to
automate tasks.
Example: Record a macro to format a report the same way
every time.
Data Tables
In Excel, a data table is a range of cells organized into rows
and columns that stores related information.
Example: A list of students and their marks in different subjects.
Pivot Tables
A pivot table is a tool to summarize and analyze large data sets
quickly.
13
It helps answer questions like “How many students scored above
80 in each class?”
Charts
Charts turn data into visuals — like:
Bar charts for comparisons
Pivot Charts
Pivot charts are charts created from pivot tables. They give a
visual summary of pivot data, updating automatically when you
change the pivot table.
Cyber bullying
Using the internet or a phone to hurt, threaten, or embarrass
someone.
Example: Sending mean messages or posting lies about someone
online.
Cyber stalking
When someone uses the internet to secretly watch, follow, or
harass another person.
Example: Constantly checking someone's online activity or
sending creepy messages without consent.
Digital Footprint
Everything you do online that leaves a trace — like posts, likes,
searches, or comments.
Example: Your Instagram photos and YouTube comments are
part of your digital footprint.
Digital Shadow
Info about you shared by others or collected without your
knowledge.
14
Example: A friend tags you in a photo or apps collect your
location without telling you.
Phishing
A scam where attackers pretend to be someone you trust to trick
you into giving personal info.
Example: A fake email from your bank asking for your
password.
Keyloggers
A tool or malware that records everything you type, often used
to steal passwords or messages.
Example: A hidden program capturing your login info.
Denial of Service (DoS) Attack
An attack where hackers overload a website or server, making it
crash or stop working.
Example: Too many fake users hitting a website at once.
Eavesdropping (in networks)
Secretly listening to or spying on online communications, like
messages or calls.
Example: Hackers reading your unencrypted emails.
Man-in-the-Middle (MITM) Attack
An attacker secretly sits between two people (or systems) talking
online and reads or changes the messages.
Example: A hacker intercepts your chat with a friend and
changes what you send.
Brute Force Attack
A method where a hacker tries many passwords over and over
until one works.
Example: Typing thousands of password combinations to break
into an account.
15
Malware
Short for malicious software — programs made to damage, spy
on, or steal from your device.
Examples: Viruses, worms, trojans, ransomware.
Botnet
A group of infected computers controlled by a hacker, often
used to send spam or launch big attacks.
Example: 1,000 hacked computers sending phishing emails
without the owners knowing.
16