Thursday, June 6, 2019

Excel Igcse Computer Studies Glossary Essay Example for Free

Excel Igcse Computer Studies Glossary EssayActuator It is a device that great deal be operated by signals from a computer or control system causing physical movement. (E.g. devices for opening windows in a computer controlled ventilation system) Algorithm It is a sequence of instructions designed to finish a particular task and it is independent of any planming language. It includes precise details about the operations to be performed and in what order. (E.g. pseudo-code or program shine chart) Batch processing It is a processing that doesnt start until all the data are collected without any needs of human interaction. It uses computer during overnight. (E.g. paysheet system, billing, cheque processing) CAD (Computer Aided Design) It is the use of computer system that allows engineers and architects to design new projects by producing drawings.(E.g. designing new cars) Command-line interface It is a set of commands instructed by the user in order to communicate with the computer and get the requirements sorted out. Compiler It is a program that converts high-level language into machine language and converts safe and sound program before execution. Cookies It is a text which the user receives when in access to the internet website and gets automatically downloaded onto the users computer and further develops to infect a computer. (E.g. it can be blocked when the user rejects it by setting its restriction on the web page) Data integrity It refers to the accuracy of data.Data-logging It is an automatic capturing and storing of data readings from sensors over a period of time. (E.g. weather forecasting) De-skilling It is replacing a semi-skilled labour with a micro-processing control system. Dry run It is working by means of a program or a section of a program manually. This is useful for locating errors, particularly run time errors. E-commerce It is an electronic commerce that allows buying and selling goods and services through the inte rnet/computer networks. Either B2B or B2C, they still serve their products. (E.g. on-line shopping, Internet/online banking)H.J.HongEncryption It is a way of preventing data files that contain sensitive data from being used if theyre stolen. Expert system It is an application of artificial intelligence (AI) to a particular area of activity where traditional human safe knowledge and experience are made available through a computer package. (E.g. medical diagnosis) Generic software It is a type of software that can perform many different related tasks. Intranet It is a communication system, providing similar services to the internet solely within a particular company or organization. It makes it possible to share documents, databases and applications, using the same protocol as the internet. (E.g. more secure data) Logic gates They are the components used in making logical system circuits. Each gate has 1 or more inputs and produces a single output that depends upon the input(s) .Simulation It is a study of the behaviour of a system by using a model. (E.g. flight simulator) Structure diagram It is a means of representing the design of a program or system and it demonstrates what happens at a program level Top-down design It is the technic of breaking down a problem into subtasks that are sufficiently simple enough to be written as a self-contained module or procedure. (E.g. allows several programmers to work on the same large task, each module can be tested/debugged separately) Validation It is a check on the data input and detects any data that is unreasonable and unacceptable.Video-conferencing It is a form of an electronic communication through Internet for people who are geographically separated to transmit audio and video data. (E.g. meetings held at different locations) Virtual reality It is a computer simulation that uses special interactive devices much(prenominal) as data gloves to create an artificial environment. (E.g. viewing newly constr ucted houses/pilot training) Virus It is a program which replicates itself and damages files or data. (E.g. it alters the data on the septic computer without the user knowing it)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.