click below
click below
Normal Size Small Size show me how
AQA Computing A2
Deffinitions
| Term | Definition |
|---|---|
| abstract data type | a data type those properties are inderpendant of any programing language |
| abstraction | unnessercerry details in a system are removed to make a model. |
| absolute error | the difference between the actual number and the represented number |
| aggregation | same as containment |
| Ajax | a web topology that allows only the part of a eb page that needs refreshing to be reloaded. |
| algorithm | a sequence of unambigious instructions for solving a problem |
| API | a layer of software that allows applications to call on the services of the operating system. Used to developers |
| asynchronous serial data transmission | the arrival of data can't be predicted by the reciever. The start bit is used as a signal to temporarilly synchronise the reciever and transmitter |
| attribute | a property or characteristic of an entity |
| attributes | a properity of an object |
| automation | turning an abstraction into a form that can be proccesed by a computer |
| bandwidth | "for a transmission medium |
| base case | a value that has no refference to the general case |
| baseband system | a single data channel in which the whole bandwidth of the transmittion medium is dedicated to one transmission |
| baud rate | the rate at which signals on a wire may change |
| bit rate | the number of bits transmitted a second. (in serial transmission this is the same as the baud rate) |
| Bluetooth | a wireless protocol for exchanging data over a short distance. Uses FHSS- data chopped into chunks and sent on separate frequencies |
| BNF | a notation for expressing the rules for constructing valid strings in regular language |
| Breath first tree traversal | every node on a level is visited before exploring other levels |
| broadband system | bandwidth of a data channel can carry many streams at the same time |
| buble sort | during a pass through the list naboring values are swapped if they are not in order. Several passes are required to fully order the list |
| cancelation error | a loss of accuracy due to adding a large number to a small one. The result is just the large number |
| cipher text | an encrypted message |
| circular queue | when the last element in an array is being used the next element joins the beginning of the array |
| Class definition | a pattern or template used to create objects |
| client- server system | a system where clients request services provided by servers |
| common gateway interface | a gateway between the webserver and the webserver extension. it tells the server how to send information and how to deal with the reply. |
| complexity | the worst case of the most efficient solution to a problem |
| communication protocol | a set of pre-arranged rules used to ensure succsessful data exchange. |
| composite key | a combination of attributes used to make up a primary key |
| conceptual model | a representation of the datbase requirements |
| containment | objects are made up of smaller objects. Also called aggregation |
| cryptography | the science of designing ciphers |
| crytanalysis | trying to turn cipher text into plain text without knowing the key |
| data transmission | movement of data from one place to another |
| database | a structured collection of data |
| decision problem | has output yes or no |
| dedth first tree traversal | nodes are visited across many levels first |
| desktop operating system | an operating system that can carry out a large range of general purpose tasks |
| dynamic allocation | memory space is allocated when required |
| dynamic webpage content | content that is generated when the request is recieved. |
| embedded computer system | a dedicated computer system with limited or non-existant user interface. |
| Encapsulation | data in an object is hidden from other objects |
| encryption | using an algorithm and a key to convert message data into a form that is not understandable without the key |
| entities | components that make up a system |
| entity | "an object |
| equivilent turing machine | all other programs can be reduced to turing machines. |
| floating point notation | "a real number represented by a sign |
| foreign key | an attribute in one table that is a primary key in another |
| FSA | an FSM that produces no outputs but instead responds true or false when finnished |
| FSM | a set of input symbols that are prosessed by using a finite set of states and transissions between them |
| gateway | a device used to connect networks using different protocols |
| general case | the solution in terms of int's self for a value n |
| graph | diagram consisting of nodes and edges. |
| Halting problem | "is it possible |
| Halting state | a state that has no on going tranission |
| handshaking protocol | the sending and receiving devices exchange signals to ensure that the other device is ready to receive |
| heap | the memory locations availible to applications for dynamic allocation |
| Heuristic | using expert knowledge to guess at a solution to an intractable problem |
| In- order tree traversal | "Left |
| inheritance | "a class is used to define a hierarchy of subclasses |
| interactive operating system | the user and the computer are in direct 2 way communication |
| internet | a collection of LANS that are connected via WANs |
| intractable | a problem with no reasonable time solution |
| linear queue | elements join the queue at one end and leave at the other. |
| linear search | "starts at the beginning of a list an works to the end |
| list | a collection of elements with an inherant order |
| local area network | linked computers in close proximity |
| memory leakage | memory locations that are no longer required are not returned to the stack. Eventually no memory is left on the heap |
| model | an abstraction of an entity in the real world to enable an automated solution |
| Moores machine | an FSM that outputs from states not during transissions |
| Mealy machine | an FSM that produces outputs based on the state and inputs (outputs given on transissions) |
| network operating system | a layer of software is added to the operating system that allows transparent interaction to other computers. |
| network segment | a run of ethernet cable to which a number of workstations are connected |
| nomalisation | optimising a database to remove redundant data |
| non-computable | a problem with no algorithmic solution |
| Non-deterministic FSM | a FSM that has more than 1 possible path for 1 set of inputs |
| normalisation | a method of maximising presicion and range |
| null pointer | a pointer that does not point to anything. Usally 0 or -1 |
| Big O notation | a method for representing the complexity of a problem. |
| Object | An instance of a class |
| orerating system | the most fundermental system program. Designed to hide the complexities or hardware and manage resources |
| overflow | the value is too large to be represented by the number of bits availible |
| parallel data tranmission | bits are sent down several wires simultaniously |
| peer-to-peer network | a network that has no dedicated servers. All computers are equal |
| pharming | when a phisher changes DNS server information so that the victim is directed to another site. |
| phishing | trying to get someone to give you their personal details |
| plain text | an un-encrypted message |
| pointer | a variable that contains an address. The pointer points to a memory location of that address |
| polymorthism | two or more objects can respond to the same message in different ways |
| Post-order tree traversal | "Left |
| power of turing machines | no phyical computer can be more powerful than a turing machine |
| precision | the maximum number of significant digits that can be represented |
| pre-order tree traversal | "Node |
| primary key | an attribute which uniquely identifies an entity |
| Principle of univerality | a universal machine is a machine capable of simulating any other machine |
| priority queue | each element of the queue has an associated priority |
| pseudo-random numbers | a series of numbers generated by software with apparent randomness. |
| queue | a first in first out data structure |
| real number | a number with a fractional part |
| real time operating system | inputs are proccesed in a timely manner under time constraints |
| realtive error | the absolute error divided by the actual number |
| Recursion | Deffining a program in terms of it's self |
| referential integritty | if a value apears as a foreign key it must be a primary key in another. |
| Regular expression | a notation for defining all valid strings |
| Regular Language | Any language that a FSM will acsept |
| relationship | an association between 2 entitys |
| remote login | connecting to a computer via the internet |
| rounding error | the precision of an arithmetic function is greater than the representable value. |
| SaaS | "software as a service |
| space complexity | how much memory an olgorithm needs |
| sandbox | a tightly controled set of resources for guest programs to run in. |
| scientific notation | "a real number represented by a sign |
| serial data transmission | signle bits are sent one after another along a single wire |
| server operating system | an operating system designed to provide one or more specialised services |
| spam | unsolicited junk emails |
| stack | a last in first out data structure |
| stack frame | the locations in the stack used to store the values reffering to one invocation of a routine |
| stand-alone computer | a computer that is not networked and requires all of its own devices |
| state history | consists of state descriptiond at each of the chronological stages of instances |
| State Transition diagrams | a directed graph whose nodes represent the states and edges represent transitions. |
| system program | a program that mannages the operation of the computer |
| time complexity | how much time an algorithm takes to run |
| thin-client network | a network where all processing is done by a central server. |
| topology | "the shape |
| tractable | a problem that has a reasonable time solution |
| tree | "a connected |
| Trojan | a program that hides in desirable programs. |
| travelers problem | a problem of visiting each city and then returning to a starting point (intractable) |
| Turing Machine | an FSM that controls one or more tapes of infinate length |
| underflow | the value is to small to be represented using the number of bits availible |
| virtual machine | the apparent machine that the operating system presents to the user to hide the complexities of hardware |
| Virus | a small program attached to another program or data file. |
| web 2.0 | software that becomes a service offered over the internet. |
| web server extension | a program running on a web server that extends the functionality and allows content in real time. |
| web services | self contained modular applications that are located on the web |
| wide area network | a set of links that connect a large geographical area. |
| Wi-Fi | IEEE 802.11 that supports wireless networking of home and buissness networks |
| worm | a small program that exploites a network or security weekness |
| 1st Normal Form | No repeating attributes |
| 2nd Normal Form | No non-Key dependancies |
| 3rd Normal Form | No partial dependancies |