access levels
The amount of direct access a user is given to data and resources. This could be set to be only a certain sections of a whole collection of data and resources.
accumulator (ACC)
A register that is built into the ALU that stores the result of any interim calculations
acknowledgement
A message that is sent from one device to another to indicate whether data is received correctly
active script
The script that is used to produce any of the interactive elements of a web page
actuator
A mechanical part that causes another device or part to move
address
A memory location in RAM
address bar
the section of a web browser where you type the web page address
address bus
wires used for the transmission of addresses between components in a computer
adware
a software based cyber issue that automatically creates pop up advertisements
analogue
continuous data that can be any value within a range
analogue data
a continuous stream of data that is processed by humans
analysis
the first stage of the program development life cycle that involves investigating the problem
AND operator
returns True when both outputs are True
anti-malware
a type of software that scans a computer or device with the purpose of finding and removing malware
application software
software that allows the user to perform a useful task
architecture
the design of a computer system, including the components it contains
arithmetic logic unit (ALU)
the component in the CPU that performs all the mathematical and logical operations required when processing data and instructions
arithmetic operator
a symbol that performs a mathematical function (eg + adds two values)
array
a data structure where you can store multiple data items, of the same data type, under one identifier
artificial intelligence (AI)
a part of computer science that looks at creating machines that can think and perform tasks a person would usually perform
assembler
converts assembly language into machine code
assembly language
code written in mnemonics that allows direct manipulation of the hardware, it must be converted into binary code to run
assignment
a type of programming statement that stores data in a variable or constant
asymmetric
a type of encryption that uses two different keys to encrypt and decrypt data
auto-completion
a feature of an editor that gives the user options when they start typing a command
auto-correction
a feature of an editor that identifies spelling errors and changes them
automated
a device that is operated without human interaction
automated system
a system that is designed to operate without the need for any human intervention
automatic repeat request (ARQ)
a type of error detection method that uses acknowledgement and timeout to see if data has arrived correctly after transmission
automation
the use of automated equipment in a process, e.g. a factory
average
the mean of a set of values or the total divided by the quantity
binary
a base-2 number system that uses the values 0 and 1
biometric device
a device that allows a user to record and input a biometric password
biometric password
a type of password that uses a persons biological data, such as their fingerprint
blockchain
a method that is used to track all the transactions made with a cryptocurrency
bookmark
a link that can be created to allow you to quickly find a web page again
boolean
a data type: True or False
boolean operator
a symbol that joins multiple logical comparisons, can be AND OR or NOT
bootstrap
the first commands loaded when a computer starts, it checks hardware and loads the firmware
1-dimensional array
an array that has only 1 index
2-dimensional array
an array that has two indexes
abnormal test data
data that a program should not accept
bot
the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack
botnet
a network of bots that are created to carry out a DDoS attack
boundary test data
data that is on the edge of being accepted, and data that is on the edge of not being accepted
brute-force attack
a type of cyber threat that involves repeatedly inputting a password until the correct one is found, to try to break into an account or device
bubble sort
a sorting algorithm that moves through the list repeatedly swapping values in pairs
cache
a type of storage that is built into the CPU, to store the most frequently used data and instructions
cascading style sheet (CSS)
a scripting language that is used to create a presentation template for a web page, it includes what kind of font and colour text will appear on the web page
CASE statement
a type of selection construct where there is a list of different values to compare a single value against
casting
converting data from one data type to another data type
cell
the intersection of the rows and columns of transistors in solid-state storage
central processing unit (CPU)
a component in a computer system that processes data and instructions
certificate authority
the awarding organisation that checks if another organisation is real and secure before awarding them a digital certificate
char
a single character, eg: ‘A’, ‘1’, ’*’
character set
it contains all the characters that are in that character set and the binary value that is assigned to each character
check digit
a type of error detection method that is sued for data entry - a calculation is performed on the data entered to create a value, values are compared to see if the data entered is correct
checksum
a type of error detection method that performs a calculation
cipher text
the name given to data after transmission
clock speed
the number of fetch-decode-execute cycles that can be performed in a second
cloud storage
data storage that is owned by a third party and accessed by the user, using the internet
coding
the writing of a program using one or more programming languages