Excel Igcse Computer Studies Glossary Essay
Actuator – It is a system that can be managed by indicators from a computer or control system triggering physical motion. (E. g. devices intended for opening glass windows in a pc controlled air flow system) Protocol – It is a sequence of instructions made to perform a particular task and it is independent of any programming language.
It includes precise information about the operations to be performed and in what order. (E. g. pseudo-code or software flow chart) Batch processing – It is a processing that doesn’t begin until all of the data are collected without the needs of human interaction. It uses computer system during over night. (E. g. payroll system, billing, talon processing) CAD (Computer Helped Design) – It is the usage of computer system that allows engineers and architects to design new jobs by making drawings. (E. g. developing new cars) Command-line interface – This can be a set of commands instructed by the user to be able to communicate with the computer and get the requirements categorized out.
Compiler – It is just a program that converts high-level language in machine terminology and converts whole software before setup. Cookies – It is a textual content which the customer receives when in access to the internet website and gets automatically downloaded upon the user’s computer and further develops to infect a computer. (E. g. it can be blocked when the customer rejects it by establishing its limit on the web page) Data ethics – It refers to the accuracy of data. Data-logging – It is an programmed capturing and storing of information readings via sensors over a period of time. (E. g. climate forecasting) De-skilling – It truly is replacing a semi-skilled time with a micro-processing control program.
Dry manage – It truly is working by using a program or a section of a plan manually. This is useful for finding errors, especially run time errors. E-commerce – It is an electronic trade that allows buying and selling goods and services throughout the internet/computer networks.
Either B2B or B2C, they continue to serve goods. (E. g. on-line purchasing, Internet/online banking) H. T. Hong Encryption – It is just a way of preventing data files that may contain sensitive information coming from being used in the event that they’re stolen. Expert program – It is an application of artificial intelligence (AI) to a particular area of activity where traditional human professional knowledge and experience are produced available through a computer package deal. (E. g. medical diagnosis) Generic software program – It is a type of software program that can conduct many different related tasks. Intranet – It is just a communication program, providing comparable services to the internet solely within a particular organization or corporation.
It can help you share papers, databases and applications, using the same process as the internet. (E. g. more secure data) Logic gates – These are the components used in making common sense circuits. Every single gate has 1 or even more inputs and produces a sole output that depends upon the input(s). Simulation – It is a study of the behaviour of the system by using a model. (E. g. flight simulator) Structure diagram – It is a ways of representing the style of a program or perhaps system and it demonstrates what happens for a program level Top-down design – Is it doesn’t technic of breaking down a problem into subtasks that are sufficiently simple enough to be written like a self-contained module or procedure. (E. g. allows several programmers to work on a similar large activity, each component can be tested/debugged separately) Affirmation – It is a check on your data input and detects any data that is certainly unreasonable and unacceptable. Video-conferencing – It is just a form of an electric communication through Internet for people who are geographically separated to transmit digital data. (E. g. conferences held by different locations) Virtual reality – It is a computer simulation that uses particular interactive products such as info gloves to create an artificial environment. (E. g. browsing newly made houses/pilot training) Virus – It is a system which recreates itself and damages data or info. (E. g. it changes the data for the infected laptop without the customer knowing it)