click below
click below
Normal Size Small Size show me how
Computer Science Ts.
G11
Term | Definition |
---|---|
Algorithm | A set of instructions that are followed to solve a problem. Also known as the computer’s thought process. |
Argument | A way to provide more information to a function. The function uses this information while it runs, like a variable. |
Array/s | Containers that hold and are used to group together variables. Arrays are like stores, the arrays are the shelves, and the food items are the variables inside. |
Arithmetic operators | Performs mathematical operations such as addition, subtraction division and multiplication onto numerical values In a video game, if a character earns experience, it must be added to their overall experience. If they take damage, they will lose damage. |
Assignment operators | (+=, -+, *=,=, ><) Go to the left of the variable of the operator |
Equality operator | Tests to see if 2 operands are considered equal + returns a boolean value |
Binary numbers | Millions of 1's and 0's - Computer's way to represent information |
Autonomous | Self navigating |
Bit | Individual 1's and 0's in binary |
Block coding | Programming blocks fit together like puzzle pieces. When coding with blocks, the first block you want to program is taken and attached to another block to execute the program. |
Camel case | Variables should be named using a camel case, which means that the first word of the name is in lowercase and each new word after that is capitalised. “iPhone, eBay, YouTube, iD, CamelCase” |
Conditional statements | Evaluate true or false |
For loops | Allows to run a block of code repeatedly |
Else if | When statement's condition is not true before the else statement |
Integrated Development Environment (IDE) | Software that aids with programming |
Syntax | Set of rules that defines what various symbol combinations mean |
Statement | Complete command to be executed f.eg System.print.out(“Hello World”); |
Declaration statement | Used to define a variable by indicating the data type, name then optimally set the variable to a specific value |
Character literal | !@#$%^&*() |
Keywords | Any number of reserved words that have a predefined meaning in java |
Case sensitive (also a keyword) | int --> Int |
RAM | Random Access Memory |
Int | Integer (whole number) |
Expression | Coding construct that evaluates to a single value → On the right side of the equals sign in an assignment or declaration statement |
Operators | Perform operations (+ - * /) on variables |
Primitive types | byte, short, int, ling, float, double, char, boolean |
Overflow | Value larger than MAX into int |
Underflow | Value smaller than MIN into int |
Replacing commas | 123,456,789 → 123_456_789 |
Casting | Treating of converting a number from one type to another |
Casting example | (byte) (myMinByteValue /2); |
Char | Holds single characters in single quotes 'm' |
String | Can hold multiple characters in single quotes "Hello World" |
Boolean | True or false |
Server | Computer that provides data to other computers |
Router | Routes data from a LAN to another network connection |
Firewall | Barrier/filter between trusted system network and outside connections → Security |
DNS Server | Domain name system → Translates domain names into IP addresses, allowing you to access an internet location by its domain name |
LAN | Local area network |
WAN | Wide area network |
Hardware | Physical components of a computer, for example keyboards, monitors, microchips, hard drives. |
Software | Sets of instructions that are used to operate a computer or perform tasks. The digital components inside a computer. |
Peripheral | Device or equipment that is connected to the computer but is not used to perform any core computing processes. Can be connected externally or internally. |
Network | A system that connects two or more computing devices for transmitting and sharing data. |
&& | Requires left and right hand operands to be TRUE |
Legacy system | Once used, no more |
Merger considerations | Time zones, languages, currencies, cultural differences, data compability |
Direct changeover | One system out, other one in |
Parallel running | Old and new system run simultaneously |
Phased changeover | Changing system bit by bit |
Pilot changeover | Tried on a test site before launching company wide |
Data migration | Moving of data |
Issues of data migration | Null, duplicate data, inconsistent or inaccurate data |
Purpose of system testing | Works as expected |
Unit test | Each module is tested |
System test | Overall function and performance |
Recovery test | Forces software to fail |
Security test | Attempts to verify that protection systems work properly |
Stress test | Resources in abnormal quantities |
Black box test | Don't know internals |
White box test | Know internals |
Automated test | System test |
User acceptance test | When system is delivered, it is what the user expects |
Happy users...= | More productive users = Good for developers |
Usability testing | Does it meet functional requirements? |
Acceptance testing | For acceptability |
Static testing | Looking through code |
Dynamic testing | Running the code |
Alpha test | First phase of testing process |
Beta test | Second phase of testing process, sample is given |
User documentation | Document that helps how to use tagged features, |
User documentation examples | Books, pdfs, manuals, pamphlets, videos, FAQ, online support |
KISS | Keep it simple stupid |
Help files | Accessible when using program itself |
Data loss | Losing data |
Failure | Hardware/software/data corruption |
Crime | Theft, hacking, sabotage |
Virus | Installs harmful software |
Trojan | Looks good, is bad |
Worm | Replicates itself |
Client data | Digital format, usually backed on DVD/CD |
Internal process data | Internal forms, on local server or machine |
Customer accounting data | Invoicing, general accounting of receivables/payables, tax documents, kept on local server or machine |
Customer relationship management | Where your customers are, interactions with you, behavior, kept on local server or machine |
Marketing materials | Brochures, print advertisements, websites, local server or machine |
Correspondence | Email storage, local server or machine |
Backup | Copy of data |
Failover system | Constant capability to switch to a highly reliable backup system - Costly, redundant |
Redundancy | Same data, separate places |
Removable media | CD, USB, memory card |
Offsite storage | Stores backup data or applications external to the organization/core IT environment |
Online storage | Cloud, remotely over internet |
Release | Launching a new product |
Update | File that fixes prpblems |
Patches | Small temporary fixes |
Social issues | Influences individuals in a society |
Social issues examples | Crime, health, education, propaganda, poverty, terrorism |
Ethical issues | Problems that requires person/organization to choose between alternatives that need to be evaluated as right/wrong |
Ethical issues examples | Computer crime, protection of computer property, records, software, privacy |
Stakeholder | Person/Group/Organization that has interest or concern in an organization |
Are all equally important? | NO! |
Internal stakeholders | Employees, managers, owners |
External stakeholders | Suppliers, society, government, creditos, shareholders, customers |
Utilitarianism | When designing it, try to design it for the greatest good and greatest quantity of people. Utilize efficiently |
Client requirements | What does the client(s) want |
Surveys | Large amount of data, can be biased |
Interviews | Opinions, detailed, takes a long time |
Direct observation | First hand, people don't work the same when observed |
Collecting documents | Looking at documents to see how a system works, time consuming |