0% found this document useful (0 votes)
15 views7 pages

Comp Sci Definitions

The document provides an overview of computer architecture, including components such as the CPU, memory types, and storage solutions, as well as concepts related to privacy, validation, data representation, subprograms, and software. It also discusses data storage and compression techniques, highlighting the differences between lossy and lossless compression. Additionally, it covers computational thinking concepts like decomposition and abstraction, and the role of utility software in enhancing user experience.

Uploaded by

Thisage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Comp Sci Definitions

The document provides an overview of computer architecture, including components such as the CPU, memory types, and storage solutions, as well as concepts related to privacy, validation, data representation, subprograms, and software. It also discusses data storage and compression techniques, highlighting the differences between lossy and lossless compression. Additionally, it covers computational thinking concepts like decomposition and abstraction, and the role of utility software in enhancing user experience.

Uploaded by

Thisage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

Stored program computer - A computer in which the processing


instructions are stored in memory with the data.
2. CPU – Hardware device that carries out the processing in a
computer.
3. Main memory [RAM] – A temporary store for data and
instructions.
4. BUS - A group of connections between devices in a computer.
5. Input & Output devices – Input devices provide data to process
and output devices used by the computer to communicate the
result of processing.
6. Memory Addressing :
Writing – When CPU saves data to memory to be stored at a given
address.
Reading – When CPU retrieves data stored at a given address
7. Cache memory – A small amount of fast, expensive memory that’s
used between two devices that communicate at different speeds.
 In a CPU cache, frequently used code or data is loaded in
chunks from the slower RAM into the cache.
8. Bottle neck – When something is working at full capacity and
cannot handle further demand.
9. Cache Miss – When the data requested for processing by a
component or application is not found in the cache memory.
10. Virtual memory – When a computer is running, the OS and
several applications at the same time, the RAM often becomes
full. Instead of closing some programs, the ‘memory manager’ of
the OS will use ‘pretend’ or virtual memory to store some of the
date usually on the HDD.
11. ALU – Performs arithmetic calculations and logical operations.
12. CU – Organises the actions of the other parts of the CPU.
13. Clock – An electronic device inside a CPU that ‘ticks’ at regular
intervals and is used to synchronise the actions of the other parts
of the CPU.
14. Register – A storage location inside the CPU used to hold an
instruction, an address or other single item of data.
15. CIR – Holds instructions currently being executed.
16. ACC – Carry out ALU calculations, it stores data temporarily
during the calculations.
17. PC – Holds the memory address of the next instruction to be
fetched.
18. Address BUS – Carries memory addresses between memory to
identify a memory location.
19. Data BUS – Carries the values to be read from or written to
memory.
20. Control BUS – Carries the signals to read or write the data.
21. Bus Width – The number of wires used to make up a bus. This
determines the range of binary numbers that can be
communicated.
22. Clock speed – The rate at which instructions are processed by
the CPU is controlled by the clock speed.
23. Secondary storage – Any kind of permanent storage to which
the contents of the ROM/RAM are copied usually on HDD, optical
or SSD.
24. Magnetic storage – A secondary storage than works by making
parts of a substance behave like a magnet in north and south
poles to represent binary 1s and 0s.
25. Optical storage – A secondary storage that works using
differences in light reflection from a material.
26. Solid State Storage – Secondary storage that works by storing
charge [electrons].
27. Cloud Storage – A secondary storage, often belonging to a third
party that is accessed via the internet.
28. Virtualisation – The process that hides the true physical nature
of computing resources making it look different, usually to
simplify the way it is accessed.
29. Embedded systems – Combination of computer hardware and
software designed for a specific function.

PRIVACY
1. Privacy – The right to be alone and free from unwanted critical
observations, examination [scrutiny] and interfere your life,
interfere data without your permission [intrusion].
2. Ethics – A set of moral principles that governs a person’s
behaviour.
3. Whistle blower – A method used to prevent surveillance
technology. This means someone who draws attention to the
activities of an organisation or person believed to be acting
illegally or unethically.
4. Big data – Data analysts are able to learn more about you by
analysing huge volumes of personal data gathered from various
sources. The data that is collected in huge amounts is called
‘big data’.

Validation and Verification


1. Validation – The automated checking by a program that data is
reasonable before it is accepted into a computer system.
2. Range check – A range check is used to data entered is within a
specified range.
3. Presence check – Ensures that the value has been entered,
preventing the user from leaving an input blank.
4. Look-up check – A look-up check is used to check that a value
is one of a predefined set of acceptable values.
5. Length check – Checks that the length of a value falls within a
specified range.
6. Type check –
Testing Validation rules
1. Normal data – This is data within the limits of what should be
accepted by the program.
2. Boundary data – this is the data that is at the outer limits of
what should accepted by the program.
3. Erroneous data – this is the data that should not be accepted
by the program.

Data representation
1. ASCII – A standard data encoding format for electronic
communication between computers.
2. Extended ASCII – Unicode is and international character
encoding standard that provides a unique number for every
characters in every language.
3. Text file – A sequence of lines, each of which consists of a
sequence of characters.
4. File handle – A label that is assigned to a resource needed by
the program. It can only access the file through the computer
OS.
5. Pixel – The smallest single point of colour in a graphic image.
6. Resolution – The number of pixels per inch when the image is
displayed.
7. Colour depth – The number of bits used to encode the colour
of each pixels.

Representation of Sounds
1. Analogue recording – Constantly changing and do not have
defined ranges. They are continuous and are often represented
by waves. [storage is a form of a flat disk]
2. Digital recording – Uses series of sound ‘snapshots’. These
snapshots of the sounds are called ‘samples’ and the process
of taking them is called sampling.
3. ADR – Converts analogue to digital.
4. DAC – Convert digital to analogue.
5. Fidelity – The relationship between the original sound and
recording sound.
6. hi-fidelity – Very high accuracy.
7. Bit depth – Number of bits used to encode the information
from each sample [aka sample size]

Subprograms
1. Subprogram – A self-contained module of code that performs
a specific task.
2. Local variable – A variable that is accessed only from within
the subprograms in which it is created.
3. Global variable – A variable that can be accessed from
anywhere in the programs including inside subprograms.
4. Function – A function is a block of code that performs a
specific task and returns a value to the caller.
5. Procedure – A procedure does not return a value to the main
program.
6. Parameter – Names of variables that are used in the
subroutine to store that data passed from the main program as
arguments.
7. Built-in functions – Functions that are provided in the highest
level programming language to perform a common task.
8. Scope – The region of code within which a variable is visible.

Testing and evaluation


1. Logic errors – An algorithm that results in incorrect or
unexpected results.
2. Trace table – A technique used to identify any logic errors in an
algorithm. Each column represents a variables or output and
each row represent the value of that variable.

Decomposition and Abstraction


1. Computational thinking – A thinking about how you can
use a computer to solve a problem or accomplish a task.
2. Decomposition – Breaking down the complex problem into
smaller, more manageable chunks or parts, which are then
easier to solve.
3. Abstraction – In simple terms, abstraction is taking away or
removing unnecessary details from the problem so that we
can focus only on the important or relevant details.
4. Algorithmic thinking – All the planning and thought
procedd that goes into designing an algorithm.

Software
1. Application software – Refers to the programs designed to
perform a specific tasks or application for users.
2. System software – A type of software that manages and
controls our computer hardware and provide a platform for
running application software.
3. OS – Operating system is a software designed for a
particular hardware which manages other program access
to hardware.
Data Storage and Compression
1. Decimal prefix – Uses powers of 10 and was introduced by
international system of measurements.
2. Binary prefix – Uses powers of 2 and was introduced by
electro technical commission.
3. Data compression – Changing the format of a data file so
that the size of the file becomes smaller.
4. Lossy compression _ Compression where some of the data is
removed, original file can’t be restored.
5. Lossless compression – Compression where a file can be
decompressed without any loss of data
 RLE – Used to reduce the size of a repeating string of items.
This repeating string is called a ‘run’ and is represented by 2
bytes[1st byte- #of time repeated & 2nd byte – item of info]

Utility software
1. Utility software – Does a useful job for the user that is note
essential to the OS and is not the reason to use a computer
in the first place.
2. Computer models – Computer modelling enables experts to
ask ‘what if?’ questions without affecting the real world.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy