Tuesday, March 12, 2019
Excel Igcse Computer Studies Glossary Essay
Actuator It is a device that can be operated by signals from a data processor or control system causing sensible movement. (E.g. devices for opening windows in a computer controlled ventilation system) Algorithm It is a sequence of instructions designed to perform a extra trade union movement and it is independent of any programmeming linguistic conversation. It includes precise details about the operations to be performed and in what order. (E.g. pseudo-code or program flow chart) Batch process It is a processing that doesnt start until all the data argon collected without any needs of human interaction. It uses computer during overnight. (E.g. payroll system, billing, baulk processing) CAD (Computer Aided Design) It is the use of computer system that allows engineers and architects to design tonic projects by producing drawings.(E.g. designing new cars) Command-line interface It is a set of commands instructed by the user in order to communicate with the computer and g et the requirements pick out out. Compiler It is a program that converts high-level language into machine language and converts whole program before execution. Cookies It is a text which the user receives when in access to the internet website and gets automatically downloaded onto the users computer and get on develops to infect a computer. (E.g. it can be blocked when the user rejects it by setting its restriction on the web page) Data integrity It refers to the the true of data.Data-logging It is an automatic capturing and storing of data readings from sensors over a period of time. (E.g. weather forecasting) De-skilling It is renewal a semi-skilled labour with a micro-processing control system. Dry run It is works through a program or a section of a program manually. This is useful for locating errors, particularly run time errors. E-commerce It is an electronic commerce that allows buying and selling goods and services through the internet/computer networks. Either B 2B or B2C, they still serve their products. (E.g. on-line shopping, Internet/online banking)H.J.Hongencryption It is a way of preventing data files that contain sensitiveinformation from creation use if theyre stolen. Expert system It is an application of artificial comprehension (AI) to a particular area of activity where traditional human skillful knowledge and experience are made available through a computer package. (E.g. medical diagnosis) Generic computer software It is a type of software that can perform many different related tasks. Intranet It is a communication system, providing similar services to the internet solely within a particular company or organization. It makes it possible to share documents, databases and applications, using the same communications protocol as the internet. (E.g. more secure data) Logic gates They are the components used in making logic circuits. Each gate has 1 or more inputs and produces a single output that depends upon the input(s). Simulation It is a submit of the behaviour of a system by using a model. (E.g. public life simulator) Structure diagram It is a means of representing the design of a program or system and it demonstrates what happens at a program level top-down design It is the technic of breaking down a problem into subtasks that are sufficiently simple enough to be written as a poised module or procedure. (E.g. allows several programmers to work on the same mammoth task, each module can be tested/debugged separately) Validation It is a check on the data input and detects any data that is unwarranted and unacceptable.Video-conferencing It is a form of an electronic communication through Internet for throng who are geographically separated to transmit audio and video data. (E.g. meetings held at different locations) Virtual reality It is a computer simulation that uses spare interactive devices such as data gloves to create an artificial environment. (E.g. see newly constructed houses/ pilot training) Virus It is a program which replicates itself and damages files or data. (E.g. it alters the data on the infected computer without the user knowing it)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment