Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computer Science Ts.

G11

TermDefinition
Algorithm A set of instructions that are followed to solve a problem. Also known as the computer’s thought process.
Argument A way to provide more information to a function. The function uses this information while it runs, like a variable.
Array/s Containers that hold and are used to group together variables. Arrays are like stores, the arrays are the shelves, and the food items are the variables inside.
Arithmetic operators Performs mathematical operations such as addition, subtraction division and multiplication onto numerical values In a video game, if a character earns experience, it must be added to their overall experience. If they take damage, they will lose damage.
Assignment operators (+=, -+, *=,=, ><) Go to the left of the variable of the operator
Equality operator Tests to see if 2 operands are considered equal + returns a boolean value
Binary numbers Millions of 1's and 0's - Computer's way to represent information
Autonomous Self navigating
Bit Individual 1's and 0's in binary
Block coding Programming blocks fit together like puzzle pieces. When coding with blocks, the first block you want to program is taken and attached to another block to execute the program.
Camel case Variables should be named using a camel case, which means that the first word of the name is in lowercase and each new word after that is capitalised. “iPhone, eBay, YouTube, iD, CamelCase”
Conditional statements Evaluate true or false
For loops Allows to run a block of code repeatedly
Else if When statement's condition is not true before the else statement
Integrated Development Environment (IDE) Software that aids with programming
Syntax Set of rules that defines what various symbol combinations mean
Statement Complete command to be executed f.eg System.print.out(“Hello World”);
Declaration statement Used to define a variable by indicating the data type, name then optimally set the variable to a specific value
Character literal !@#$%^&*()
Keywords Any number of reserved words that have a predefined meaning in java
Case sensitive (also a keyword) int --> Int
RAM Random Access Memory
Int Integer (whole number)
Expression Coding construct that evaluates to a single value → On the right side of the equals sign in an assignment or declaration statement
Operators Perform operations (+ - * /) on variables
Primitive types byte, short, int, ling, float, double, char, boolean
Overflow Value larger than MAX into int
Underflow Value smaller than MIN into int
Replacing commas 123,456,789 → 123_456_789
Casting Treating of converting a number from one type to another
Casting example (byte) (myMinByteValue /2);
Char Holds single characters in single quotes 'm'
String Can hold multiple characters in single quotes "Hello World"
Boolean True or false
Server Computer that provides data to other computers
Router Routes data from a LAN to another network connection
Firewall Barrier/filter between trusted system network and outside connections → Security
DNS Server Domain name system → Translates domain names into IP addresses, allowing you to access an internet location by its domain name
LAN Local area network
WAN Wide area network
Hardware Physical components of a computer, for example keyboards, monitors, microchips, hard drives.
Software Sets of instructions that are used to operate a computer or perform tasks. The digital components inside a computer.
Peripheral Device or equipment that is connected to the computer but is not used to perform any core computing processes. Can be connected externally or internally.
Network A system that connects two or more computing devices for transmitting and sharing data.
&& Requires left and right hand operands to be TRUE
Legacy system Once used, no more
Merger considerations Time zones, languages, currencies, cultural differences, data compability
Direct changeover One system out, other one in
Parallel running Old and new system run simultaneously
Phased changeover Changing system bit by bit
Pilot changeover Tried on a test site before launching company wide
Data migration Moving of data
Issues of data migration Null, duplicate data, inconsistent or inaccurate data
Purpose of system testing Works as expected
Unit test Each module is tested
System test Overall function and performance
Recovery test Forces software to fail
Security test Attempts to verify that protection systems work properly
Stress test Resources in abnormal quantities
Black box test Don't know internals
White box test Know internals
Automated test System test
User acceptance test When system is delivered, it is what the user expects
Happy users...= More productive users = Good for developers
Usability testing Does it meet functional requirements?
Acceptance testing For acceptability
Static testing Looking through code
Dynamic testing Running the code
Alpha test First phase of testing process
Beta test Second phase of testing process, sample is given
User documentation Document that helps how to use tagged features,
User documentation examples Books, pdfs, manuals, pamphlets, videos, FAQ, online support
KISS Keep it simple stupid
Help files Accessible when using program itself
Data loss Losing data
Failure Hardware/software/data corruption
Crime Theft, hacking, sabotage
Virus Installs harmful software
Trojan Looks good, is bad
Worm Replicates itself
Client data Digital format, usually backed on DVD/CD
Internal process data Internal forms, on local server or machine
Customer accounting data Invoicing, general accounting of receivables/payables, tax documents, kept on local server or machine
Customer relationship management Where your customers are, interactions with you, behavior, kept on local server or machine
Marketing materials Brochures, print advertisements, websites, local server or machine
Correspondence Email storage, local server or machine
Backup Copy of data
Failover system Constant capability to switch to a highly reliable backup system - Costly, redundant
Redundancy Same data, separate places
Removable media CD, USB, memory card
Offsite storage Stores backup data or applications external to the organization/core IT environment
Online storage Cloud, remotely over internet
Release Launching a new product
Update File that fixes prpblems
Patches Small temporary fixes
Social issues Influences individuals in a society
Social issues examples Crime, health, education, propaganda, poverty, terrorism
Ethical issues Problems that requires person/organization to choose between alternatives that need to be evaluated as right/wrong
Ethical issues examples Computer crime, protection of computer property, records, software, privacy
Stakeholder Person/Group/Organization that has interest or concern in an organization
Are all equally important? NO!
Internal stakeholders Employees, managers, owners
External stakeholders Suppliers, society, government, creditos, shareholders, customers
Utilitarianism When designing it, try to design it for the greatest good and greatest quantity of people. Utilize efficiently
Client requirements What does the client(s) want
Surveys Large amount of data, can be biased
Interviews Opinions, detailed, takes a long time
Direct observation First hand, people don't work the same when observed
Collecting documents Looking at documents to see how a system works, time consuming
Created by: LimppuBiscuit
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards