click below
click below
Normal Size Small Size show me how
Computer Science Ts.
G11
| Term | Definition |
|---|---|
| Algorithm | A set of instructions that are followed to solve a problem. Also known as the computer’s thought process. |
| Argument | A way to provide more information to a function. The function uses this information while it runs, like a variable. |
| Array/s | Containers that hold and are used to group together variables. Arrays are like stores, the arrays are the shelves, and the food items are the variables inside. |
| Arithmetic operators | Performs mathematical operations such as addition, subtraction division and multiplication onto numerical values In a video game, if a character earns experience, it must be added to their overall experience. If they take damage, they will lose damage. |
| Assignment operators | (+=, -+, *=,=, ><) Go to the left of the variable of the operator |
| Equality operator | Tests to see if 2 operands are considered equal + returns a boolean value |
| Binary numbers | Millions of 1's and 0's - Computer's way to represent information |
| Autonomous | Self navigating |
| Bit | Individual 1's and 0's in binary |
| Block coding | Programming blocks fit together like puzzle pieces. When coding with blocks, the first block you want to program is taken and attached to another block to execute the program. |
| Camel case | Variables should be named using a camel case, which means that the first word of the name is in lowercase and each new word after that is capitalised. “iPhone, eBay, YouTube, iD, CamelCase” |
| Conditional statements | Evaluate true or false |
| For loops | Allows to run a block of code repeatedly |
| Else if | When statement's condition is not true before the else statement |
| Integrated Development Environment (IDE) | Software that aids with programming |
| Syntax | Set of rules that defines what various symbol combinations mean |
| Statement | Complete command to be executed f.eg System.print.out(“Hello World”); |
| Declaration statement | Used to define a variable by indicating the data type, name then optimally set the variable to a specific value |
| Character literal | !@#$%^&*() |
| Keywords | Any number of reserved words that have a predefined meaning in java |
| Case sensitive (also a keyword) | int --> Int |
| RAM | Random Access Memory |
| Int | Integer (whole number) |
| Expression | Coding construct that evaluates to a single value → On the right side of the equals sign in an assignment or declaration statement |
| Operators | Perform operations (+ - * /) on variables |
| Primitive types | byte, short, int, ling, float, double, char, boolean |
| Overflow | Value larger than MAX into int |
| Underflow | Value smaller than MIN into int |
| Replacing commas | 123,456,789 → 123_456_789 |
| Casting | Treating of converting a number from one type to another |
| Casting example | (byte) (myMinByteValue /2); |
| Char | Holds single characters in single quotes 'm' |
| String | Can hold multiple characters in single quotes "Hello World" |
| Boolean | True or false |
| Server | Computer that provides data to other computers |
| Router | Routes data from a LAN to another network connection |
| Firewall | Barrier/filter between trusted system network and outside connections → Security |
| DNS Server | Domain name system → Translates domain names into IP addresses, allowing you to access an internet location by its domain name |
| LAN | Local area network |
| WAN | Wide area network |
| Hardware | Physical components of a computer, for example keyboards, monitors, microchips, hard drives. |
| Software | Sets of instructions that are used to operate a computer or perform tasks. The digital components inside a computer. |
| Peripheral | Device or equipment that is connected to the computer but is not used to perform any core computing processes. Can be connected externally or internally. |
| Network | A system that connects two or more computing devices for transmitting and sharing data. |
| && | Requires left and right hand operands to be TRUE |
| Legacy system | Once used, no more |
| Merger considerations | Time zones, languages, currencies, cultural differences, data compability |
| Direct changeover | One system out, other one in |
| Parallel running | Old and new system run simultaneously |
| Phased changeover | Changing system bit by bit |
| Pilot changeover | Tried on a test site before launching company wide |
| Data migration | Moving of data |
| Issues of data migration | Null, duplicate data, inconsistent or inaccurate data |
| Purpose of system testing | Works as expected |
| Unit test | Each module is tested |
| System test | Overall function and performance |
| Recovery test | Forces software to fail |
| Security test | Attempts to verify that protection systems work properly |
| Stress test | Resources in abnormal quantities |
| Black box test | Don't know internals |
| White box test | Know internals |
| Automated test | System test |
| User acceptance test | When system is delivered, it is what the user expects |
| Happy users...= | More productive users = Good for developers |
| Usability testing | Does it meet functional requirements? |
| Acceptance testing | For acceptability |
| Static testing | Looking through code |
| Dynamic testing | Running the code |
| Alpha test | First phase of testing process |
| Beta test | Second phase of testing process, sample is given |
| User documentation | Document that helps how to use tagged features, |
| User documentation examples | Books, pdfs, manuals, pamphlets, videos, FAQ, online support |
| KISS | Keep it simple stupid |
| Help files | Accessible when using program itself |
| Data loss | Losing data |
| Failure | Hardware/software/data corruption |
| Crime | Theft, hacking, sabotage |
| Virus | Installs harmful software |
| Trojan | Looks good, is bad |
| Worm | Replicates itself |
| Client data | Digital format, usually backed on DVD/CD |
| Internal process data | Internal forms, on local server or machine |
| Customer accounting data | Invoicing, general accounting of receivables/payables, tax documents, kept on local server or machine |
| Customer relationship management | Where your customers are, interactions with you, behavior, kept on local server or machine |
| Marketing materials | Brochures, print advertisements, websites, local server or machine |
| Correspondence | Email storage, local server or machine |
| Backup | Copy of data |
| Failover system | Constant capability to switch to a highly reliable backup system - Costly, redundant |
| Redundancy | Same data, separate places |
| Removable media | CD, USB, memory card |
| Offsite storage | Stores backup data or applications external to the organization/core IT environment |
| Online storage | Cloud, remotely over internet |
| Release | Launching a new product |
| Update | File that fixes prpblems |
| Patches | Small temporary fixes |
| Social issues | Influences individuals in a society |
| Social issues examples | Crime, health, education, propaganda, poverty, terrorism |
| Ethical issues | Problems that requires person/organization to choose between alternatives that need to be evaluated as right/wrong |
| Ethical issues examples | Computer crime, protection of computer property, records, software, privacy |
| Stakeholder | Person/Group/Organization that has interest or concern in an organization |
| Are all equally important? | NO! |
| Internal stakeholders | Employees, managers, owners |
| External stakeholders | Suppliers, society, government, creditos, shareholders, customers |
| Utilitarianism | When designing it, try to design it for the greatest good and greatest quantity of people. Utilize efficiently |
| Client requirements | What does the client(s) want |
| Surveys | Large amount of data, can be biased |
| Interviews | Opinions, detailed, takes a long time |
| Direct observation | First hand, people don't work the same when observed |
| Collecting documents | Looking at documents to see how a system works, time consuming |