Monday, January 28, 2019
Excel Igcse Computer Studies Glossary Essay
Actuator It is a device that can be operated by signals from a calculator or control system causing strong-arm movement. (E.g. devices for opening windows in a computer controlled ventilation system) Algorithm It is a sequence of instructions designed to perform a fussy undertaking and it is independent of any course of instructionming linguistic confabulation. It includes precise details about the trading operations to be performed and in what order. (E.g. pseudo-code or program flow chart) Batch touch It is a processing that doesnt start until all the data ar collected without any needs of human interaction. It uses computer during overnight. (E.g. payroll system, billing, impediment processing) CAD (Computer Aided Design) It is the use of computer system that allows engineers and architects to design radical projects by producing drawings.(E.g. designing new cars) Command-line interface It is a set of commands instructed by the user in order to communicate with the computer and get the requirements take out. Compiler It is a program that converts high-level language into machine language and converts whole program before execution. Cookies It is a text which the user receives when in access to the internet website and gets automatically downloaded onto the users computer and advertise develops to infect a computer. (E.g. it can be blocked when the user rejects it by setting its restriction on the web page) Data integrity It refers to the the true of data.Data-logging It is an automatic capturing and storing of data readings from sensors over a period of time. (E.g. weather forecasting) De-skilling It is replacement a semi-skilled labour with a micro-processing control system. Dry run It is running(a) through a program or a section of a program manually. This is useful for locating errors, particularly run time errors. E-commerce It is an electronic commerce that allows buying and selling goods and services through the internet/comp uter networks. Either B2B or B2C, they still serve their products. (E.g. on-line shopping, Internet/online banking)H.J.Hong encoding It is a way of preventing data files that contain sensitive information from cosmos utilise if theyre stolen. Expert system It is an application of artificial intuition (AI) to a particular area of activity where traditional human full knowledge and experience are made available through a computer package. (E.g. medical diagnosis) Generic parcel It is a type of software that can perform many different related tasks. Intranet It is a communication system, providing similar services to the internet solely within a particular company or organization. It makes it possible to share documents, databases and applications, using the same communications protocol as the internet. (E.g. more secure data) Logic gates They are the components used in making logic circuits. Each gate has 1 or more inputs and produces a single output that depends upon th e input(s).Simulation It is a conceive of the behaviour of a system by using a model. (E.g. fledge simulator) Structure diagram It is a means of representing the design of a program or system and it demonstrates what happens at a program level top-down design It is the technic of breaking down a problem into subtasks that are sufficiently simple enough to be written as a self-possessed module or procedure. (E.g. allows several programmers to work on the same hulking task, each module can be tested/debugged separately) Validation It is a check on the data input and detects any data that is ill-advised and unacceptable.Video-conferencing It is a form of an electronic communication through Internet for masses who are geographically separated to transmit audio and video data. (E.g. meetings held at different locations) Virtual reality It is a computer simulation that uses excess interactive devices such as data gloves to create an artificial environment. (E.g. view newly c onstructed houses/pilot training) Virus It is a program which replicates itself and damages files or data. (E.g. it alters the data on the infected computer without the user knowing it)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment