Professional Documents
Culture Documents
Terms and Definations
Terms and Definations
Definitions
5. BIOS-A set of computer instructions in firmware which control input and output
operations.
6. BitCoin- a type of digital currency in which encryption techniques are used to regulate
the generation of units of currency and verify the transfer of funds, operating
independently of a central bank.
7. Bit Torrents-A peer to peer file transfer protocol for sharing large amounts of data
over the internet, in which each part of the file downloaded by a user is transferred
to other users.-
9. Caching- It prevents a slower medium from slowing down the performance of a faster
medium.
10. Click Farms -A business which pays employees to click on web links to create inflated
(increased) viewership / follower counts.
13. Convergence -Trend whereby separate technologies and functions from multiple
devices are combined into a single multi-purpose device.
14. convergent devices- Separate technologies and functions from multiple devices, are
combined into a single multi-purpose device
15. Cookie- A text file stored on your local computer that is used to save user
settings/preferences for a website.
16. CSS (Cascading style sheet)- contains the formats for how a particular object should
be displayed in a Web browser and therefore the developer does not have to code
separate web pages for individual user configurations/preferences for example:
different colour schemes
18. Disk caching-Every hard drive has built-in fast high speed memory (RAM) which is
used to cache data read from/written to the hard drive and therefore speed up
subsequent calls for the same code/data from the hard drive.
19. DNS (Domain Name System)-Internets system for converting alphabetic names into
numeric UP addresses. E.g. when a web address URL is typed into a browser. DNS
servers return the IP address of the web server associated with that name.
20. Dogecoin- A cryptocurrency that was created as a parody and named after an
internet meme
23. EEPROM (Electrostatic Programmable read only memory) - a read only memory
whose contents can be erased and reprogrammed using a pulsed voltage.
26. EULA-Legal agreement between a user and a software publisher which has to be
accepted before using the software.
28. FTP-file transfer protocol. A standard for the exchange of program and data files
across a network.
29. Firmware-Software that is stored on a ROM chip and used to control the basic
operation of a device.
31. GIGO -The principle in software development which promotes validation on the basis
that: “where input data is invalid, the output will also be invalid.”
33. Hot swappable/pluggable- The ability to plug in or remove a device from a computer
without switching off the computer
34. Incremental backup-A security copy which contains only those files which have been
altered since the last full backup.
35. Internet of Things -The integration of an always-online Internet connection and
interaction in everyday household appliances.
36. Interpreter- Software that compiles and executes one line of programming code at a
time.
37. Intranet -Network facilities and/or webpages made available within the LAN of an
organisation or business.
39. Jail breaking- Jail breaking means installing a new cracked version of the operating
system’s firmware
40. Logical Error -An error in programming where the program executes, but the output
is incorrect or invalid.
45. Multiprocessing-involves the use of multiple processors active at the same time
(Managed by Hardware).
46. Multithreading-involves breaking an app up into multiple threads with each running
as an individual (Managed by software)
47. NAS (Network Attached Storage) - is a file level computer data storage server
connected to a computer network providing data access to a heterogeneous group of
clients.
48. Neo- Cryptocurrency
49. Network- a group of two or more computers or devices that are linked together via a
communication medium for the purpose of transferring data and communicating
51. NIC (Network Interface Card) - is a circuit board or card that is installed in a computer
so that it can be connected to a network. Provides the computer with a dedicated full
time connection to a network.
52. Overflow- An error condition that occurs when there are not enough bits available to
represent an integer value accurately
53. Patch-is an update that can be downloaded to fix a specific bug in your software
54. Pharming- The fraudulent practice of directing internet users to a bogus website that
mimics the appearance of a legitimate one, in order to obtain personal info.
57. Primary Memory -temporarily stores data or instructions currently being used.
58. Private Key-is secret-only the intended recipient can decrypt the message.
Programs.
59. Protocol-A set of rules for transmission of data across a network/encoding and
decoding data for transmission.
62. RFID tag- ID system that uses small radio frequency identification devices for
identification and tracking purposes. An RFID tagging system includes the tag itself, a
read/write device and a host system application for data collection, processing or
transmission.
63. Rootkit-A collection of programs that is designed to infiltrate a computer and gain the
highest level of privileges to take control of an infected computer.
64. RSS-is a web or news feed/automatic provision to users of updated content and/or
notifications of new content from websites
66. SATA / PATA Cable-Connector which links the HDD to the Motherboard
67. Secondary Memory-stores data permanently that may be loaded into RAM as
required.
68. Semantic Web- Has the ability to interpret information like humans and provide
useful content tailored to user needs/personalization.
70. Spamming- Send the same message indiscriminately to a large number of internet
users.
72. The processor or Central Processing Unit (CPU) - is the part of the computer that
executes the instructions (the software), processes the data and manages and
controls all the other parts of the computer
73. Thin clients-Lightweight computer that has been optimized for establishing a remote
connection with a server based computing environment. The server does most of the
work which can include launching software programs, crunching numbers and storing
data.
74. Thrashing- Computers become very slow and sometimes unresponsive when a
number of applications are open at the same time, as there is a high level of
continuous hard drive activity
75. Topology-The physical layout/connection of the computers in a network
76. UPS(uninterrupted power supply)- relates to the protection of hardware from power
irregularities
77. UTP (Unshielded twisted pair)-uses electric signals via copper cables
78. Virtual memory-is an area of disk space on the drive which is set aside so that the
operating system can temporarily store data there that cannot be loaded into
memory at the time.
80. VPN-
81. Web 1.0-content was provided by the site manager / writers and users were simply
content consumers
82. Web 2.0+ - website where users from all over the world collaborate on content,
content can be provided by the site team as well as a community consisting of users
as well. Users can also be contributors.
83. Wiki- A web application that allows people to add and modify content on an online
knowledge resource
84. Acceptable Use Policy-set of rules applied by the owner, creator or administrator of a
network, website or service that restrict the ways in which the
network/website/system may be used. Sets guidelines as to how it should be used.
85. Actual parameter- The actual value that is passed into the method by a caller. (Also
known as arguments)
86. Formal Parameter-the identifier used in a method to stand for the value that is
passed into the method by a caller.
87. Global variable-variable with global scope. It’s visible throughout the program, unless
shadowed. The set of all global variables is known as the global environment or global
state.
88. SSL (secure Sockets Layer) - Standard security technology for establishing an
encrypted link between a web server and a browser.
Database
89. Data integrity-the maintenance of, and the assurance of the accuracy and consistency
of data over its entire life cycle. It’s a critical aspect of the design implementation and
usage of any system which stores, processes or retrieves data.
90. Data independence- Type of data transparency that matters for a centralized DBMS.
Refers to the immunity of user applications to changes made in the definition and
organization of data.
91. Data security-Protecting digital data, such as those in a database, from destructive
forces and from the unwanted actions of unauthorized users, such as cyber attack or
data breach.
92. Data redundancy- Repetition of data. It’s a common issue in computer data storage
and data base systems. Some data fields are repeated
93. Validate data – The data meets the requirement for a specific format/range/data type
94. Verified data – The user has confirmed that the correct option was selected/correct
data was entered.
95. Private Key-A tiny bit of code that is paired with a public hey to set off algorithms for
text encryption and decryption. Also known as a secret key.
96. Public Key-a cryptographic key that can be obtained and used by anyone to encrypt
messages intended for a particular recipient, such that the encrypted messages can
be deciphered only by using a second key which is known as a private key.
97. Foreign Key- Purpose is to ensure referential integrity of the data. Only values that
are supposed to appear in the database are permitted.
Common stuff
Functions of BIOS:
• Check that all hardware is connected and in working order/POST
• Provide user with a menu of setup options for configuration at lowest level/CMOS
settings
• Locate and load operating system
• Controls hardware at low level
Advantages of SaaS:
• Rent the software instead of purchasing a license
• Can be installed on multiple devices
• Can use cloud version on any device
• Have access to a certain amount of cloud based storage
• Updates are done automatically/always have latest version
• Accessible from any device with Internet access
Public key encryption method: Uses a Public key to encrypt data and a Private
Key (secret/hidden) to decrypt data.
Multitask processing/Multiprocessing:
The computer appears to run multiple programs at the same time/simultaneously by
sharing processing time of the CPU between processes/tasks
Concepts:
• Any indication of multiple programs/applications
• Sharing of CPU time between programs
Multithreading:
When a single program is broken up into independent parts/threads that run at the
same time
Concepts:
• Program/application is split into parts/threads
• Independent processing