click below
click below
Normal Size Small Size show me how
Comp Science vocab
Glossary of Computer Science terms
| Term | Definition |
|---|---|
| Algorithm | A finite, well‑defined sequence of steps used to perform a task or solve a problem. |
| Abstraction | Techniques for removing unnecessary details so the main ideas or processes can be more easily understood |
| Address Bus | A communication pathway that carries the memory address used in read/write operations. |
| Accessibility | The practice of ensuring products and systems are usable by people with diverse abilities. |
| Agile Methodology | An iterative software development methodology focused on flexibility and interactive progress. |
| Agent (AI) | A computational entity that interacts with an environment and learns via feedback. |
| Heuristic | A technique used to improve algorithmic performance via informed estimation. |
| Iteration | A process of repeatedly executing instructions, used heavily in list processing. |
| Dynamic Data Structure | A structure whose size can change at runtime, such as a list. |
| Indexing | Accessing elements in lists/arrays by position, usually starting at zero. |
| Key–Value Pair | A data representation where a key maps to a specific value. |
| Hash Table | A common implementation of dictionaries using hashing for fast retrieval. |
| Bandwidth | The theoretical maximum amount of data transferable over a channel, usually measured in bits per second. |
| Big Data | Data sets that are too large or complex for traditional processing approaches. |
| Binary | The base‑2 number system using digits 0 and 1. |
| BIOS | Non‑volatile firmware that checks hardware and boots a computer to the point where the OS can take over. |
| Bit | The fundamental unit of data (0 or 1) in digital systems. |
| Black‑Box Testing | Testing that focuses on inputs and outputs without knowledge of internal implementation. |
| Bluetooth | A short‑range wireless standard for exchanging data between devices. |
| Boolean Algebra | Algebra of two values (True/False) with operators like AND, OR, NOT. |
| Botnet | A group of malware‑infected computers remotely controlled as a single network. |
| Brute‑Force Attack | Trying all possibilities systematically to discover a secret like a password or key. |
| Byte | A unit of digital information equal to eight bits. |
| Cache | High‑speed memory storing frequently accessed data to improve performance. |
| Call Stack | A stack structure storing stack frames for all currently executing subroutines. |
| Casting | Converting data from one type to another (e.g., string to integer) |
| Checksum | A value computed from data to detect errors in transmission or storage. |
| Cipher / Ciphertext | n algorithm for encryption/decryption; ciphertext is the encrypted result. |
| Clock Speed | Processor rate of completing cycles, typically in GHz |
| Cloud Storage | Storing and retrieving files over the internet on provider‑managed remote servers. |
| Compiler | A translator that converts source code to object/executable code through multiple stages. |
| Complexity | A measure of the time and/or memory resources an algorithm requires. |
| CPU (Central Processing Unit) | The component that executes instructions, manages memory, and handles I/O operations |
| Data Structure | A structured way of organising and storing data (e.g., arrays, lists, trees). |
| Decryption | Converting ciphertext back into plaintext using an appropriate key. |
| Encryption | Transforming plaintext into ciphertext using an encryption algorithm. |
| Function (Mathematics/CS) | A mapping of inputs to outputs |
| Hash Function | A function that maps data to a fixed‑size value; used in dictionaries & hashing. |
| Malware | Software designed to harm or exploit systems |
| Memory | Storage for instructions/data used by a program |
| Network | A group of devices communicating over wired or wireless channels |
| Operating System (OS) | The software that boots from BIOS and manages hardware |
| Packet | A formatted unit of data transmitted across networks |
| Pointer / Reference | A value identifying a memory location |
| RAM | Fast, volatile memory used for active program execution |
| Recursion | A technique where a function calls itself; uses base cases |
| Tree | A hierarchical data structure with parent‑child relationships. |
| Unicode / Character Encoding | Systems for mapping text to binary |
| User Authentication | Verifying identity before granting access. |
| Virtual Machine | Software running bytecode produced by compilers. |
| Web Browser | Software that stores cookies, loads HTML/CSS, and retrieves resources. |
| Wireless Communication | Data transfer over radio waves |
| XML | Although not explicitly in the visible snippet, the glossary references markup concepts |