I.T definitions IEB

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/391

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

392 Terms

1
New cards

1 NF

A table with a primary key, no repeating groups and no data redundancy.

2
New cards

2 NF

A table in 1NF and partial dependencies were removed.

3
New cards

3 NF

A table in 2NF with no transitive dependencies.

4
New cards

Acceptable User Policy (AUP)

A set of rules drawn up by the company management to protect the company, its network, resources, devices and data from misuse.

5
New cards

Accessor method

A method that returns the value of an object's private field.

6
New cards

Accuracy

The degree to which the stored value measures against the actual value. For example, the number of decimal places for numeric data.

7
New cards

Address Bus

Transfers the address of instructions and data between RAM and the CPU

8
New cards

Address Resolution Protocol (ARP)

A protocol that links the device's MAC address (frame) to its IP address (packet).

9
New cards

ADSL

An old telephone communication technology that transmits data along copper cables from the nearest telephone exchange to a location.

10
New cards

Adware

Unwanted content that automatically displays or downloads when browsing the Internet.

11
New cards

Anti-Malware

Software necessary to safeguard a computer against malicious threats.

12
New cards

Anti-Virus

Software that detects malicious software then deletes or quarantines it based on the program's behaviour (signature).

13
New cards

Append

To add data to the end of an existing file.

14
New cards

Application Software (App)

Software that carries out specific tasks for the user. All application software requires an operating system.

15
New cards

Archive

Removing files and storing them in a separate compressed location for space saving and later use.

16
New cards

Argument / Actual Parameter

A value or variable in a call statement sent to a method header.

17
New cards

Arithmetic Logic Unit (ALU)

A part of the CPU that performs arithmetic and logical calculations.

18
New cards

Artificial intelligence (AI)

The simulation of human intelligence in computers designed to think and act like humans.

19
New cards

Assembler

Translates assembly into machine code. Each instruction directly corresponds to a machine language instruction.

20
New cards

Assign

A variable is given a value, such as x = 3.

21
New cards

Asymmetric Encryption

Two non-identical keys used to encrypt and decrypt a message called the public and private keys.

22
New cards

Atomic Data

A single value within a field

23
New cards

Attenuation

The loss of signal strength over a distance.

24
New cards

Attribute

The same as a field or property.

25
New cards

Audit Trails

When database data is changed, the audit trail records the timestamp, username, accessed fields, and the modified data values.

26
New cards

Augmented Reality

A technology that places interactive digital content over real scenes.

27
New cards

Backup

Copying of files or folders in case of data loss - usually to a separate location.

28
New cards

Bandwidth

The maximum amount of data that can be transferred at one time. Measured in bits per second (bps).

29
New cards

Bandwidth Theft

Unauthorised accessing wireless bandwidth.

30
New cards

Barcode

A simple pattern of thin and thick lines that are decoded by the scanner to represent data.

31
New cards

Basic Input Output System (BIOS)

Non-volatile software stored in ROM to initialise the computer.

32
New cards

Big Data

A massive volume of structured and unstructured data that is difficult to process using traditional database and software techniques.

33
New cards

Biometric Device

A device to input and analyse human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.

34
New cards

BitTorrent

A peer-to-peer protocol in which multiple peers can transfer data between each other. Files are split into smaller parts to increase upload and download speeds. Once a peer has the complete file, it becomes a seed that other peers can use.

35
New cards

Black Hat Hackers / Crackers

Malicious hackers (crackers) who illegally access computer systems and networks for personal gain.

36
New cards

Blockchain

A decentralised, distributed, and public digital ledger to create trust. Blockchains act as a shared database, distributed across large peer-to-peer networks with no single point of failure.

37
New cards

Bluetooth

A wireless technology standard for sending data over short distances, using short-wavelength radio transmissions

38
New cards

Botnet / Zombie Army

A vast number of Internet-connected devices that send transmissions (including spam or viruses) to other Internet devices without the owner's knowledge. Often used in a DDOS.

39
New cards

Bounded Media

Communication channels, consisting of physical cabling, commonly used for wired LANs.

40
New cards

Bridge

A device that connects network segments, forwarding data packets to the next network segment if the MAC address is not in the current segment, reducing network traffic.

41
New cards

Broadcast

A communication sent to multiple nodes in the network. The communication is not secure.

42
New cards

Browser Cache

Previously accessed websites are stored on your local computer. If the website is accessed again, it will be loaded from the local computer instead from a remote website.

43
New cards

Browser extension

A small software module that provides customisation for a web browser.

44
New cards

Bytecode

The compiled version of the source code. E.g. code.class.

45
New cards

Candidate Key

A minimal super key

46
New cards

Check Digit

An extra digit, produced by an algorithm, to validate the existing digits in a number.

47
New cards

Check Sum

A test to verify data transfer by performing a calculation (such as a sum) on the bits transferred.

48
New cards

Class

A template to instantiate objects combining fields and methods into a single unit.

49
New cards

Client-Server

A single dedicated networked computer that provides services (file storage, email, printing) to other nodes/devices on the network.

50
New cards

Client-Side Scripting

Scripts that are executed by the client's browser.

51
New cards

Clock Multiplication

Sets the ratio of internal CPU clock rate to that of an external clock

52
New cards

Cloud Computing

On-demand remote computer services providing by Internet-connected servers, such as file storage, databases, applications, and processing power.

53
New cards

Cloud Storage

Storing data on remote servers, accessible from any Internet-connected device.

54
New cards

Co-Processor

An additional parallel processor to the CPU that performs specific tasks, e.g., GPU and FPU (Maths co-processor).

55
New cards

Code Window

The window where you, as a programmer, type in the source code, such as a Java program.

56
New cards

Command Line Interface (CLI))

A text-based interface, with commands entered and executed at the command prompt.

57
New cards

Compiler (One Stage)

Converts source code to object code if there are no syntax errors. The object code (.exe file) is executed. E.g. Delphi

58
New cards

Compiler (Two Stage)

Converts source code to bytecode if there are no syntax errors. The bytecode is interpreted and executed. E.g. Java

59
New cards

Complementary Metal-Oxide-Semiconductor (CMOS)

Battery-backed, volatile memory that stores hardware settings and user settings. It is accessed by BIOS during the POST.

60
New cards

Completeness

All the required fields in a database have values.

61
New cards

Component

A circuit chip placed directly on the motherboard

62
New cards

Composite Key

A combination of fields to form a primary key.

63
New cards

Composition

There is a has-a relationship between two objects. One object is a field of another object.

64
New cards

Compression

The process of reducing file size takes up less storage space and quicker Internet transfer.

65
New cards

Constructor

A method to assign values to the fields of an object.

66
New cards

Control Bus

Transfers signal between RAM and the CPU such as Read From Memory (RFM) and Write To Memory (WTM)

67
New cards

Control Unit (CU)

A part of the CPU that coordinates the processing of instructions.

68
New cards

Cookies

A small text file stored in a user's browser to record their history and preferences.

69
New cards

Correctness

Data that conforms to an approved or conventional standard or agrees with fact, logic, or known truth.

70
New cards

CPU / Processor

A motherboard component that processes instructions.

71
New cards

Creative Commons License

A licence where the author retains copyright of their work but allows people to copy and distribute the work (documents, source code) on condition the author is acknowledged.

72
New cards

Crosstalk

Signals in adjacent wires interfere with each other.

73
New cards

Currency

Data is up-to-date or not outdated.

74
New cards

Cyberbullying

The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.

75
New cards

Dark Web

Non-indexed web pages hidden from standard search engines accessible using an anonymising web browser.

76
New cards

Data

Raw unprocessed information

77
New cards

Data Bus

Transfers instructions and data between RAM and the CPU

78
New cards

Data Mining

A set of techniques for discovering hidden, valid and potentially useful patterns or trends in a data set.

79
New cards

Data Redundancy

Unnecessary repetition of data produced by removing repeating groups as a result of first normal form.

80
New cards

Data Warehouse

The storage of an organisation's large volume of data (usually big data) produced from various sources.

81
New cards

Database Management System (DBMS)

Software that manages and controls a database. This includes permissions, backup, referential integrity and access control.

82
New cards

Declare

A variable is assigned a type. E.g. int x; or Gogga bug.;

83
New cards

Deep Web

Non-indexed web pages that cannot be accessed by a search engine, such as web pages behind a paywall, requiring sign-in credentials.

84
New cards

Deletion Anomaly

The unnecessary loss of data as a result of a deletion of a record.

85
New cards

Delimiter

Separates tokens in the Scanner class.

86
New cards

Denial of Service (DOS)

An attempt to make a server or network resource unavailable to its users.

87
New cards

Dependencies

One field is related to another field in a database.

88
New cards

Derived Data

One field is calculated from another field,

89
New cards

Digital Certificate

An organisation's Certificate Authority (CA) data file proving the organisation's identity. It cryptographically binds an entity's public key to specific attributes relating to its identity.

90
New cards

Digital Heritage

Texts, databases, images, videos, audio, emails, software, and web pages that should be protected and preserved for current and future generations.

91
New cards

Digital Signature

A user can "sign" a document by encrypting data with their private key. If the document can be decrypted with the matching public key, then the document can be proved to be sent by the user.

92
New cards

Disk Cache

A hardware mechanism for improving the time it takes to read from or write to a hard disk

93
New cards

Disk Defragmenter

Rearranges fragmented data on a mechanical hard disk so the data can be loaded and saved more efficiently. It reduces the latency of the hard disk drive.

94
New cards

Distributed Denial of Service (DDOS)

A DOS attack originating from multiple coordinated Internet devices (bots) to render a service useless.

95
New cards

Domain Name Servers (DNS)

A protocol that associates domain names to IP addresses.

96
New cards

Download

The process of receiving data from a remote server to a local computer

97
New cards

Driver

System software that communicates with a device by converting data into a format understandable by the device. Each device must have a driver.

98
New cards

Dumpster Diving

Obtaining discarded data such as invoices, phone records, organisational information, sensitive data printouts and discarded hardware to manipulate people.

99
New cards

Duplicate Data

When two fields have the same value. This is NOT data redundancy and must not be removed through normalisation. For example, two people have the same colour car.

100
New cards

Dynamic Binding

Using the object's appropriate overridden method in an inheritance hierarchy at run-time.