Terms in this set (70)
Memory that loses its contents when it has no power.
Non - Volatile Memory
Memory that keeps its contents even after power is lost.
Coming up with an algorithm to solve a problem.
A step-by-step set of rules or instructions.
Software that is designed to stop malware from damaging a computer or network.
Arithmetic Logic Unit (ALU)
The part of the CPU that carries out arithmetic and Boolean operations.
A data structure where all of the data is stored under one variable name/a list of data that is stored under one name.
A vulnerability in a computer or network's security that a hacker can exploit and easily access your computer's files and data.
A counting system using base-2, which consists of 0's and 1's, e.g. 01001110 (an 8 bit/a byte).
Moving the bits in a binary number to the left or right adding 0's on the end. So, if the shift occurred to the right then a 0 would be added to the very left column and it would mean that binary number has been divided by 2. It's the opposite with the left shift.
A logical system using the operators OR, AND and NOT. The Boolean data can take one of two values, either True (1) or False (0).
Brute Force Attack
A network attack which uses software to crack security passwords through trial and error.
Quick access memory inside the CPU.
A small range of WiFi frequencies.
CPU (or processor)
The part of the computer system that processes the data. It contains the control unit, ALU and cache.
Breaking a problem down into smaller problems.
A number system using base-10 (the number system which humans use). E.g. 1,2,3,4,5,6,7,8
A network attack which stops users from accessing a part of a network or website.
Domain Name Server (DNS)
A server which stores website domain names and their IP addresses.
A computer built into another device, e.g. a TV.
Coding ('encrypting') data so that it can be decoded ('decrypted') with the correct key.
The process that the CPU uses to retrieve and execute instructions.
Fibre Optic Cable
A high performance cable that uses light to carry data.
Solid state non-volatile data storage.
A graphical way of showing an algorithm.
FTP (File Transfer Protocol)
A protocol used to access, edit, move files onto another device, like a server.
A person who tries to illegally access or attack a computer network or device.
Hard Disk Drive (HDD)
Traditional internal storage for PCs and laptops that stores data magnetically.
The physical parts of a computer system.
A counting system using base-16 consisting of the digits 0-9 and the letters A-F.
HTTP (Hyper Text Transfer Protocol)
Used by web browsers to access a websites and communicate with web servers.
IMAP (Internet Message Access Protocol)
A protocol used to retrieve emails from a server.
The ultimate/biggest/best WAN in the world, based around the TCP/IP protocol.
IP (Internet Protocol)
The protocol responsible for packet switching.
A unique identifier given to a device when it accesses an IP network.
LAN (Local Area Network)
A network which only covers a single site.
An electronic circuit component that performs a Boolean operation (AND, OR or NOT).
A set of instructions that the program repeats until a condition is met or count is reached.
A unique identifier assigned to a device that cannot be changed.
Hard disk drives and magnetic tapes that hold data as magnetised patterns.
Malicious software created to damage or gain illegal access to a computer system.
Hardware used to store data that a CPU needs access to.
MAR (Memory Address Register)
A CPU register that holds memory addresses (locations) for data and instructions that the CPU needs.
MDR (Memory Data Register)
A CPU register that holds data and instructions.
The main circuit board in a computer that other hardware connects to.
Investigations that organisations undertake to find the cause of attacks on their network.
OS (Operating System)
A piece of software responsible for running the computer, managing hardware, applications, users and resources.
CD, DVD or Blu-Ray disc that is read/written to with lasers.
Device that is used to read and write to optical discs.
Either input can be 1 to output a 1
Both inputs must be 1 to output a 1
Running a CPU at a higher clock speed than was intended.
An error that occurs when the computer attempts to process a number that has too many bits for it to handle.
Small, equal-sized units of data used to transfer files over networks.
The process of directing data packets on a network using routers and the IP protocol.
The process of simulating attacks on a network to identify weaknesses.
When criminals send emails or texts to someone claiming to be a well-known business.
PC (Program Counter)
Holds the memory address of the next CPU instruction.
A set of rules for how devices communicate over a network.
The main memory of a computer.
A type of malware that uses encryption to lock a user out of their files.
A temporary data store inside a CPU.
ROM (Read Only Memory)
Memory that can be read but not written to.
A piece of hardware responsible for transmitting data between networks.
SMTP (Simple Mail Transfer Protocol)
Used to send emails and transfer emails between servers.
Programs or applications that can be run on a computer system
SSD (Solid State Drive)
Alternative to a traditional magnetic hard disk drive that uses flash memory.
A type of malware which secretly monitors and records user actions.
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
Introduction to Computer Science I - Computer Systems
Computer Concepts 1
OTHER SETS BY THIS CREATOR
2.1 - Algorithms
Chapter 10 - Henry Jekyll's full statement of the case
Chapter 9 - Dr Lanyon's Narrative
Chapter 8 - The Last Night
THIS SET IS OFTEN IN FOLDERS WITH...
1.1 - Systems Architecture
1.2 - Memory
1.3 - Storage
1.4 Wired and Wireless Networks