See also: the Quizlet Sets. There are definitions on this page.

Sort: A-Z Z-A Page

Abstraction means ignoring or removing unnecessary details that don't matter and only focusing on the important information.

An algorithm is a set of instructions used to solve a problem or complete a task.

Algorithmic thinking means taking logical steps to get from the problem to the solution.

The American Standard Code for Information Interchange (ASCII) is a character set which uses 7 bits to encode each character.

An analogue to digital converter (ADC) is used in a microphone to convert the analogue sound wave into a digital stream of binary numbers.

The AND gate receives two boolean inputs and checks if both of them are true.

Application software means programs which perform end-user tasks.

An array is a data structure that can store a group of data of the same type under a single identifier.

Authentication is the process of checking that a particular user is permitted to use a system and, if so, which parts of that system they can use.

Authentication systems determine who you are and what you can access.

Automatic software updates help ensure your computer has up-to-date security fixes for any known vulnerabilities.

Backup software allows the user to schedule backups for their files.

A binary left-shift is equivalent to adding 0s on the end of a binary number.

The binary number system is a way of writing numbers with only 1s and 0s.

A binary right-shift is equivalent to taking away digits from the end of a binary number.

Binary search is a more efficient searching algorithm which only works on sorted lists.

Biometrics authenticate or verify an individual's identity using physical data unique to that individual.

In a black-box penetration test, the ethical hackers are given no information at all about the network.

Blagging (or pretexting) refers to using an invented scenario to increase the chances of the victim divulging information.

Bubble sort is a simple sorting algorithm.

Cache memory is very fast memory located within the CPU.

The Central Processing Unit (CPU) processes all of the data and instructions that make the computer system work.

A character set is a collection of characters that a computer can recognise from their binary representation.

The clock speed of a CPU is the number of pulses sent out by the clock every second.

Cloud Storage is a service where files can be uploaded via the Internet to a remote server.

The colour depth of an image is the number of bits used to store the colour of each pixel.

A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) confirms that the system is being accessed by a person and not a robot.

Compression means reducing the file size, while trying to keep the compressed file as close to the original file as possible.

Compression utilities apply a form of lossless compression to a file's binary data.

Computational thinking is all about the steps you take to find the best solution to a complex problem.

A computer network refers to two or more computing devices connected together in order to share data and resources.

A constant is a special type of variable whose value does not change as the program runs.

CPU cores have their own CU, ALU and cache.

Cyber Security is an approach to computer security covering processes, practices, and technologies designed to protect networks, computers, programs, and data from attack, damage, and unauthorised access.

Data structures are formats for storing data - like arrays, records, and files.

The data type of a variable determines how its binary form in memory is interpreted.

Databases are used to store large amounts of data, organised into tables.

Declaring a variable means setting its value for the first time.

Decomposition is the process of breaking down a complex problem into smaller problems and solving each one individually.

Defragmentation utility programs reorganise the data stored on a hard disk drive (HDD).

An embedded system is a computer system which is built into another device to perform a specific task.

Encryption utilities scramble data to prevent unauthorised access.

Encryption provides protection against data being read if it is stolen or intercepted.

Environmental issues are about the impact on the natural world.

Errors (or bugs) are accidental mistakes in the code.

Ethernet is also a family of related protocols which operate at the link layer.

Ethical issues are about what is considered right and wrong by society.

The Fetch-Execute Cycle (sometimes called the Fetch-Decode-Execute Cycle) describes how a CPU carries out instructions.

The file size of an image is the total number of bits needed to store the image.

The File Transfer Protocol (FTP) also operates at the application layer.

Firewalls are devices that act as barriers between the network and the outside world.

A flowchart is a diagram that depicts an algorithm.

A foreign key is a field (column) which is the primary key of another table.

A function is a subroutine which does return a value.

A general purpose system is a computer system which can perform many tasks and has replaceable software.

Global variables have a global scope: they can be used anywhere.

Hard Disk Drives (HDDs) are the main form of magnetic storage in computers.

Hardware is the physical components of a computer system.

The hexadecimal number system (also called base-16) is a way of writing numbers using 16 different digits.

Huffman Coding is a form of lossless data compression which can be used on text files.

The HyperText Transfer Protocol (HTTP) operates at the application layer.

The Internet Messaging Access Protocol (IMAP) also operates at the application layer.

The Internet Protocol (IP) operates at the internet layer.

Iteration means looping. There are three different types of loops in pseudo-code.

Legal issues are about what is deemed right and wrong by the law.

Linear search is a searching algorithm which checks each item in order.

A Local Area Network (LAN) covers a small geographical area located on a single site.

Local variables have a local scope: they can only be used inside the structure they're defined in.

Logic diagrams are often drawn to represent boolean expressions.

Logic errors occur when the program does something unexpected.

Logic gates are special circuits built into computer chips.

Logic symbols can also be used to represent boolean expressions.

MAC Address Filtering limits network access to only whitelisted devices.

Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software.

Merge sort is a more complicated but sometimes more efficient sorting algorithm.

Misconfigured access rights can open up a network to an insider attack.

A Network Interface Card (NIC) is a piece of hardware inside a device that allows it to connect to networks.

The NOT gate receives one boolean input and outputs its opposite.

The Operating System (OS) is a complex piece of system software found on general-purpose computer systems.

Operators in Computer Science are just like operators in Maths: they are symbols which perform certain functions on data.

Optical Storage uses indentations on the surface of a disc to represent binary data.

The OR gate receives two boolean inputs and checks if either one of them is true.

An overflow occurs when a number is too big to fit in a set amount of space.

A penetration test is an authorised attempt to gain access to a network without the normal means of access.

A Personal Area Network (PAN) is a very small network centred around a single user.

Pharming means creating fake versions of websites where victims enter their details.

Phishing is the technique of fraudulently obtaining private information, often via email or SMS.

A pixel is a single coloured point.

The primary key of a table is a field (column) which can uniquely identify each record.

A procedure is a subroutine which doesn't return a value.

A protocol is a set of rules that defines how devices on a network communicate with each other.

Pseudo-code is a way of writing algorithms that reads like code written in actual programming languages.

Random Access Memory (RAM) is used as a form of main memory in computer systems.

Read Only Memory (ROM) is a non-volatile form of main memory.

A record is a data structure (like an array) which can store values with different data types.

A relational database is a database containing multiple tables, in order to reduce data inconsistency and redundancy.

Removable media devices pose two main risks to network security.

A router transmits data between different LANs.

Run-Length Encoding (RLE) is a form of lossless compression where "runs" (groups) of consecutive data which have the same value are grouped together in length/data pairs.

The sample rate of an audio file is the number of samples every second.

The sample resolution of an audio file is the number of bits used to store each sample.

The scope of a variable tells you which parts of the program it can be used in.

A searching algorithm is an algorithm to find the index of an item in a list.

Secondary Storage is non-volatile storage which isn't directly accessible by the CPU.

Selection allows you to choose between multiple options.

Sequence is just a matter of writing of writing down the steps in the correct order.

Shouldering is the way of obtaining someone's private information (PIN, password, etc.) by looking while they enter it.

The Simple Mail Transfer Protocol (SMTP) operates at the application layer.

Social engineering is the art of manipulating people so that they divulge confidential information.

Software refers to the programs or instructions that control a computer's hardware.

Solid State Drives (SSDs) are the main form of flash storage in computers.

A sorting algorithm is an algorithm to put the items of a list in order.

Spyware means malware intended to gather information about users and devices without their knowledge.

Strings are collections of characters.

Structured programming involves decomposing the program into manageable modules.

Structured Query Language (SQL, pronounced "sequel") provides an efficient way to retrieve information from a database.

A subroutine is a set of instructions inside an algorithm stored under one name.

Subscript notation is a way of writing the base a number has been represented in so that we don't get confused.

A switch is a component of a wired LAN which sends data packets to devices on its network.

Syntax errors occur when the code doesn't follow the rules (syntax) of the programming language.

System software means programs which are needed for the computer to function.

Testing a program means giving it some example inputs to make sure that there are no logic errors.

A test plan should outline exactly what will be tested.

The topology of a network refers to the how the devices on that network are arranged.

Translators are a type of software which translate (convert) code into machine code that the computer can run.

The Transmission Control Protocol (TCP) operates at the transport layer.

Trojans are malware programs that pretend to be useful software, which users then willingly install on their computers.

Truth tables show the output of every possible input combination to a boolean expression.

Unicode is a different character set which uses multiple bytes for each character.

Using unpatched or outdated software can leave devices vulnerable to attack through known exploits in that software.

The User Datagram Protocol (UDP) also operates at the transport layer.

Utility software is a category of system software used to describe programs that maintain a computer.

Validating inputs prevents the user from accidentally or intentionally misusing a program.

Variables are named references to locations in memory for temporarily storing data while a program is running.

Verification emails protect against automated sign-ups from bots, alongside CAPTCHAs.

Viruses (in the context of Computer Science) are small computer programs that cause damage to host systems.

Volatile memory loses its contents when the power is switched off.

Using weak or default passwords provides an easy way into a network for hackers.

In a white-box penetration test, the ethical hackers are given some knowledge about the network.

Wi-Fi is a family of related protocols which operate at the link layer.

A Wireless Access Point is essentially a switch for a wireless network.

A Wide Area Network (WAN) connects LANs in multiple geographical areas.

A Wireless LAN (WLAN) is a local wireless network.

The XOR gate (exclusive OR) receives two boolean inputs and checks if exactly one of them is true.