![]() |
Created by Lyndsay Hope
over 8 years ago
|
|
![]() |
Copied by Seb Fowkes
over 7 years ago
|
|
Question | Answer |
ABSTRACTION | Representation that is arrived at by removing unnecessary details. |
ALGORITHM | A sequence of unambiguous instructions for solving a problem. It can be represented as a Turing machine program. |
AUTOMATION | Turning an abstraction into a form that can be processed by a computer. |
BANDWIDTH | For a transmission medium, the range of signal frequencies it may transmit. |
BAUD RATE | The rate at which signals on a wire may change. |
BIT RATE | The number of bits transmitted per second. |
BROADBAND | A multiple data channel system in which the bandwidth of the transmission medium carries several data streams at the same time. |
BUBBLE SORT | A sorting algorithm where during a pass, neighbouring values are compared and swapped. Passes are made until no further swaps are needed. |
CIPHER TEXT | Message data after it has been encrypted. |
CLIENT | A computer that uses the services provided by a server. |
CLIENT-SERVER SYSTEM | A system in which some computers (the clients), request services provided by other computers, the servers. |
COMMUNICATION PROTOCOL | A set of agreed signals, codes and rules to be used for data and information exchange between computers. |
COMPLEXITY OF A PROBLEM | Taken to be the worst case complexity of the most efficient algorithm which solves the problem. |
COMPOSITE KEY | A combination of attributes that uniquely identifies a tuple / record. |
COMPUTATIONAL COMPLEXITY | A measure of how economical an algorithm is with time and space. |
CONCEPTUAL MODEL | A representation of the data requirements of an organisation constructed in a way that is independent of any software that is used to construct the database. |
CRYPTOGRAPHY | The science of designing cipher systems. |
CYCLE | A closed path in which all the edges are different and all the intermediate vertices are different. |
DATA MODEL | A method of describing the data, it's structure, the way it is interrelated and the constraints that apply to it for a given system or organisation. |
DATA TRANSMISSION | Movement of data. |
DATABASE | A structured collection of data. |
DATABASE MANAGEMENT SYSTEM | A software system that enables the definition, creation and maintenance of a database and which provides controlled access to this database. |
DECRYPTION | Using an algorithm and a key to convert encrypted message data into its plain text equivalent. |
DEGREE (OF A VERTEX) | The number of neighbours for that vertex. |
DEGREE OF RELATIONSHIP | Between two entities, it refers to the number of entity occurrences of one entity which are associated with just one entity occurrence of the other and vice versa. |
DIRECTED GRAPH | A diagram consisting of vertices, joined by directed edges. |
EMBEDDED COMPUTER SYSTEM | A dedicated computer system with a limited or non-existent user interface and designed to operate completely, or largely, autonomously from within other machinery. |
ENCRYPTION | Using an algorithm and a key to convert message data into a form that is not understandable without that key. |
ENTITY | An object, person, event or thing of interest to an organisation and about which data are recorded. |
ROUTE INSPECTION PROBLEM | The solution finds a route that traverses each road exactly once before returning to the starting point. |
EXPONENTIAL GROWTH | Growth that has the form kn, e.g. 2n where k = 2 and n = 1, 2, 3, etc. |
EXPONENTIAL TIME ALGORITHM | An algorithm whose execution time grows exponentially with input size. |
FINITE STATE MACHINE (FSM) | A model of some types of computation that consists of a set of input rules and output conditions and a set of transitions between states. Generates an output as processing takes place. |
FLOATING POINT NOTATION | A real number represented by a sign, some significant digits (the mantissa) and a power of 2 (the exponent). |
FOREIGN KEY | An attribute in one table that is a primary key in another table. |
GENERAL CASE | The solution in terms of itself for a value n. |
GRAPH | A diagram consisting of vertices joined by edges. |
HALTING STATE | A state that has no outgoing transition. |
HUMAN-COMPUTER INTERACTION | The study, planning and design of what happens when a computer and human work together. |
INHERITANCE | The relationship between two object types in which one is a kind of the other and shares some of its properties or behaviours. |
INTERNET | A global wide area network that is formed from the interconnection of many other networks and that uses the TCP/IP protocol. |
INTERPRETER | An interpreter works its way through a set of source code instructions identifying the next instruction and then running routine(s) to execute it, before moving on to the next instruction. |
INTRACTABLE | A problem which can be solved, but for which no polynomial time solution (or better) has been found. |
LABELLED OR WEIGHTED GRAPH | A graph in which the edges are labelled or given a value called its weight. |
LINEAR QUEUE | Elements join the queue at one end and leave the queue at the other. |
LINEAR SEARCH | Starts at the beginning of the list and compares each element in turn with the required value until a match is found, or the end of the list is reached. |
LIST | A collection of elements with an inherent order. |
MAINTAINABILITY OF SOFTWARE | How easy it is to fix bugs, change parameters and respond to changing requirements. |
MAINTENANCE | Fixing bugs, changing parameters and responding to changing requirements. |
MEALY MACHINE | A finite state machine (FSM)that determines its outputs from the present state and from the inputs. |
NEIGHBOURS | Two vertices are neighbours if they are connected by an edge. |
NORMALISATION (DB) | A technique used to produce a normalised set of entities in a database. |
NORMALISED ENTITIES | A set of entities that contain no redundant data. |
NULL POINTER | A pointer that does not point to anything, usually represented by Ø or –1. |
OBJECT | An instance of a class. |
OPERATING SYSTEM ROLE | Manage the hardware resources to provide for an orderly & controlled allocation of processors, memories and I/O devices among the various programs competing for them. Manage the storage of data. Hide the complexities of the hardware from the user. |
OVERFLOW | The result of a calculation is too large to be represented using the available number of bits. |
PARALLEL DATA TRANSMISSION | Multiple bits are sent down several wires simultaneously. |
PEER-TO-PEER NETWORK | A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. |
PHISHING | When someone tries to get you to give them your personal information. |
PLAIN TEXT | Message data before it is encrypted. |
POINTER TYPE | A variable of pointer type that stores an address of a data value. |
POLYMORPHISM | Giving an action one name that is shared up and down a class hierarchy. Each class in the hierarchy implements the action in a way appropriate to itself. |
POLYNOMIAL GROWTH | Growth that has the form nk, e.g. n3 where k = 3 and n = 1, 2, 3, etc. |
POLYNOMIAL TIME ALGORITHM | An algorithm whose execution time grows as a polynomial of input size. |
PRECISION | The maximum number of significant digits that can be represented. |
PRIMARY KEY | An attribute or set of attributes which uniquely identifies a tuple. |
PRINCIPLE OF UNIVERSALITY | A universal machine is a machine capable of simulating any other machine. |
PRIORITY QUEUE | Each element of a priority queue has an associated priority. |
PROTOTYPE | An early or trial working version of the proposed system developed to test possible solutions. |
PROTOTYPING | Building a working model, demonstration system, simplified version, rough copy or trial piece of software to help an analyst. |
PSEUDO-RANDOM NUMBERS | A series of numbers generated by computer with apparent randomness. |
QUEUE | A first-in-first-out (FIFO) abstract data type. |
RECURSIVE DEFINITION | One that is defined in terms of itself. |
RECURSIVE ROUTINE | A routine defined in terms of itself. |
REFERENTIAL INTEGRITY | If a value appears in a foreign key in one table it must also appear in the primary key in another table. |
REGULAR EXPRESSION | A notation for defining all the valid strings of a formal language or a special text string for describing a search pattern. |
REGULAR LANGUAGE | Any language that a finite state machine (FSM) will accept. |
RELATION | A set of attributes and tuples, modelling an entity (a table). |
RELATIONAL DATABASE | A collection of tables which can be linked together by means of primary and foreign keys. |
RELATIONSHIP | An association or link between two entities. |
RELATIVE ERROR | The absolute error divided by the actual numbers. |
ROBUST CODE | The program will function reliably and not crash or go into infinite loops, even with incorrect inputs or unpredictable values. |
ROOTED TREE | A tree in which one vertex has been designated as the root and every edge is directed away from the root. |
ROUTER | A device that receives packets or from one host (computer) or router and uses the destination IP address that they contain to pass them correctly formatted, to another host (computer) or router. |
WORM | A small program that exploits a network security weakness (security hole) to replicate itself through computer networks. |
WIRELESS NETWORK | Any type of local area network (LAN) in which the nodes (computers or computing devices, often portable devices) are not connected by wires but use radio waves to transmit data between them. |
WIFI | Trademarked IEEE 802.11 technologies that support wireless networking of home and business networks. |
WEB SERVICES | Self-contained, modular applications that can be described, published, located and invoked over a network, generally the web. |
WEB SERVER EXTENSION | A program written in native code, ie an executable or a script that is interpreted by an interpreter running on the web server that extends the functionality of the web server and allows it to generate content at the time of the HTTP request. |
WEB 2.0 | Software that becomes a service that is accessed over the Internet. |
VOLUMETRICS | Measurement or assessment of the volume of data that a system will be required to process and store. |
VIRUS (COMPUTER) | A small program attached to another program or data file. It replicates itself by attaching itself to other programs. |
VIRTUAL MACHINE | The apparent machine that the operating system presents to the user, achieved by hiding the complexities of the hardware behind layers of operating system software. |
USABILITY | The ease with which a user interface can be used by its intended audience to achieve defined goals. |
UNIVERSAL TM, UTM | A universal Turing machine can simulate any other Turing machine. A UTM, U, is an interpreter that reads the description <M> of any arbitrary Turing machine M and faithfully executes operations on data D precisely as M does. For single-tape Turing machines, it is imagined that <M> is written at the beginning of the tape, followed by D. |
UNDERFLOW | The result of a calculation is too small to be represented using the available number of bits. |
UNDECIDABLE | Describes a decision-type algorithmic problem that is non-computable. |
TURING MACHINE (TM) | A formal model of computation that consists of a finite state machine (FSM) that controls one or more tapes, where at least one tape is of unbounded length (ie infinitely long). |
TUPLE | A program that hides in or masquerades as desirable software, such as utility or a game, but attacks computers it infects. |
TROJAN | A program that hides in or masquerades as desirable software, such as utility or a game, but attacks computers it infects. |
TREE | A connected undirected graph with no cycles. |
TRAVELLER’S PROBLEM | The solution finds a route that visits each city exactly once before returning to the starting point. |
TRANSITION TABLE | Tabulates the mappings (input symbol, current state) to (output symbol, next state, direction of movement) for all inputs. |
TRANSITION FUNCTION | Maps (input symbol, current state) to (output symbol, next state, direction of movement). |
TRACTABLE | A problem that has a reasonable (polynomial) time solution as the size of the input increases. |
TOPOLOGY (NETWORKS) | The shape, configuration or structure of the connections that connect device to the network. |
TIME-COMPLEXITY (OF AN ALGORITHM) | How fast an algorithm runs, expressed as a function of the number of input values. |
THIN-CLIENT NETWORK | A network where all processing takes place in a central server; the clients are dumb terminals with little or no processing power or local hard disk storage. |
SYSTEM SOFTWARE | A program that manages the operation of a computer. |
STATIC DATA STRUCTURE | The memory required to store the data structure is declared before run time. |
STATE TRANSITION DIAGRAM | A directed graph whose nodes represent the states. An edge leading from state s to state t is called a transition and is labelled with a symbolic code, eg a | b. The a part of the label is called the transition’s trigger and denotes the input symbol. The b part, which is optional, denotes the output symbol. |
STAND-ALONE COMPUTER | A computer not networked, requiring its own printer and other peripherals plus its own installation of application software. |
STACK FRAME | The locations in the stack area used to store the values referring to one invocation of a routine. |
STACK | A last-in-first-out (LIFO) abstract data type. |
SPACE-COMPLEXITY (OF AN ALGORITHM) | How much memory an algorithm needs. |
SOFTWARE AS A SERVICE (SAAS) | A model of software deployment where an application is hosted as a service provided to customers across the Internet. |
SIMPLE GRAPH | A graph without multiple edges in which each edge connects to two different vertices. |
SIGNIFICANT DIGITS | Those digits which carry meaning contributing to the accuracy of a number. This includes all digits except leading and trailing zeros where they serve merely as placeholders to indicate the scale of the number. |
SERVER | A computer that provides shared resources to network users. |
SERIAL DATA TRANSMISSION | Single bits are sent one after another along a single wire. |
Big Data: Volume | Big Data: Data too big to fit into a single server |
Big Data: velocity | Big Data: streaming data, milliseconds to seconds to respond |
Big Data: variety | Big Data: data in many forms such as structured, unstructured, text, multimedia. |
Register | A very fast memory location inside the processor or I/O controller. Used to temporarily store data or control information. |
Program Counter (PC) | In the Control Unit, contains the address of the next machine-code instruction to be executed. |
Memory Address Register (MAR) | in the central processor, stores the address of the memory location currently being accessed. |
Memory Buffer Register (MBR) AKA Memory Data Register (MDR) | stores data being transferred to and from memory (IAS) location currently being accessed by the processor |
Current Instruction Register (CIR) | Holds the current instruction to be executed while it is decoded and executed |
Accumulator(ACC) | Holds the result of the current calculations |
There are no comments, be the first and leave one below:
Want to create your own Flashcards for free with GoConqr? Learn more.