Chapter Opener Photo

GLOSSARY

Absolute path

A path that begins at the root and includes all successive subdirectories

Abstract data type (ADT)

A container whose properties (data and operations) are specified independently of any particular implementation

Abstract step

An algorithmic step for which some details remain unspecified

Abstraction

A model of a complex system that includes only the details essential to the viewer

Access control policy

A set of rules established by an organization that specify which types of network communication are permitted and denied

Access time

The time it takes for a block to start being read; the sum of seek time and latency

Adder

An electronic circuit that performs an addition operation on binary values

Addressability

The number of bits stored in each addressable location in memory

Address binding

The mapping from a logical address to a physical address

Adjacent vertices

Two vertices that are connected by an edge

Aggregate operation

An operation on a data structure as a whole, as opposed to an operation on an individual component of the data structure

Algorithm

Unambiguous instructions for solving a problem or subproblem in a finite amount of time using a finite amount of data

ALU

See arithmetic/logic unit

Analog data

A continuous representation of data

Antivirus software

Software designed to detect, remove, and/or prevent malicious software

Application software

Programs that help us solve real-world problems

Arguments

The identifiers listed in parentheses on the subprogram call; sometimes called actual parameters

Arithmetic/logic unit (ALU)

The computer component that performs arithmetic operations (addition, subtraction, multiplication, division) and logical operations (comparison of two values)

Artificial intelligence (AI)

The study of computer systems that model and apply the intelligence of the human mind

Artificial neural network

A computer representation of knowledge that attempts to mimic the neural networks of the human body

Assembler

A program that translates an assembly-language program into machine code

Assembler directives

Instructions to the translating program

Assembly language

A low-level programming language in which a mnemonic represents each of the machine-language instructions for a particular computer

Assignment statement

A statement that stores the value of an expression into a variable

Asynchronous

Not occurring at the same moment in time as some specific operation of the computer; in other words, not synchronized with the program’s actions

Attribute

Part of a tag that provides additional information about the element

Authentication credentials

Information users provide to identify themselves

Availability

The degree to which authorized users can access information for legitimate purposes

Back door

A program feature that gives special and unauthorized access to a software system to anyone who knows it exists

Bandwidth

The number of bits or bytes that can be transmitted from one place to another in a fixed amount of time

Base

The foundational value of a number system, which dictates the number of digits and the value of digit positions

Base register

A register that holds the beginning address of the current partition

Big-O notation

A notation that expresses computing time (complexity) as the term in a function that increases most rapidly relative to the size of a problem

Big data

Large data sets that defy conventional management solutions, such as spreadsheets and databases

Binary digit

A digit in the binary number system; a 0 or a 1

Binary file

A file that contains data in a specific format, requiring a special interpretation of its bits

Binary search

Looking for an item in an already sorted list by eliminating large portions of the data on each comparison

Binary tree

An abstract composite structure with a unique starting node called the root, in which each node is capable of having two child nodes and in which a unique path exists from the root to every other node

Biometrics

Using physiological characteristics, such as fingerprints, to identify users and control access

Bit

Binary digit

Block

The information stored in a sector

Blockchain

An incorruptible public ledger of transactions

Bluetooth

A technology used for wireless communication over short distances

Boolean algebra

A mathematical notation for expressing two-valued logical functions

Boolean expression

A sequence of identifiers, separated by compatible operators, that evaluates to either true or false

Bounds register

A register that holds the length of the current partition

Branch

An instruction that indicates which instruction to process next

Breadth-first approach

Searching across levels of a tree prior to searching down specific paths

Broadband

Network technologies that generally provide data transfer speeds greater than 256 Kbps

Buffer overflow

A defect in a computer program that could cause a system to crash and leave the user with heightened privileges

Bus topology

A LAN configuration in which all nodes share a common line

Bus width

The number of bits that can be transferred in parallel over the bus

Byte

Eight binary digits

Bytecode

A standard machine language into which Java source code is compiled

Cable modem

A device that allows computer network communication using the cable TV hookup in a home

Cache memory

A type of small, high-speed memory used to hold frequently used data

Caesar cipher

A substitution cipher that shifts characters a certain number of positions in the alphabet

Cancellation error

A loss of accuracy during addition or subtraction of numbers of widely differing sizes, due to limits of precision

CAPTCHA

A software mechanism used to verify that a web form is submitted by a human and not an automated program

Cardinality constraint

The number of relationships that may exist at one time among entities in an ER diagram

Case sensitive

Uppercase and lowercase letters are not considered the same; two identifiers with the same spelling but different capitalization are considered to be two distinct identifiers

Cell

An element of a spreadsheet that can contain data or a formula

Character set

A list of the characters and the codes used to represent each one

Chatbot

A program designed to carry on a conversation with a human user

Cipher

An algorithm used to encrypt and decrypt text

Circuit

A combination of interacting gates designed to accomplish a specific logical function

Circuit equivalence

The same output for each corresponding input-value combination for two circuits

Circular reference

A set of formulas that ultimately, and erroneously, rely on each other to compute their results

Class (implementation phase)

A pattern for an object

Class NP problems

Problems that can be solved in polynomial time with as many processors as desired

Class P

The class made up of all polynomial-time algorithms

Class P problems

Problems that can be solved with one processor in polynomial time

Client/server model

A distributed approach in which a client makes requests of a server and the server responds

Cloud computing

A paradigm in which computing system resources are provided by a third party and managed through Internet communication

Code-coverage (clear-box) testing

Testing a program or subprogram based on covering all the statements in the code

Combinational circuit

A circuit whose output is solely determined by its input values

Comment

Explanatory text for the human reader

Compiler

A program that translates a high-level language program into machine code

Compression ratio

The size of the compressed data divided by the size of the uncompressed data

Computational biology

An interdisciplinary field that applies techniques of computer science, applied mathematics, and statistics to problems in biology

Computer gaming

A computer simulation of a virtual world

Computer hardware

The physical elements of a computing system

Computer network

A collection of computing devices connected so that they can communicate and share resources

Computer software

The programs that provide the instructions that a computer executes

Computing system

Computer hardware, software, and data, which interact to solve problems

Concrete step

A step for which the details are fully specified

Confidentiality

Ensuring that data is protected from unauthorized access

Constant time

An algorithm whose Big-O work expression is a constant

Containers

Objects whose role is to hold and manipulate other objects

Context switch

The exchange of register information that occurs when one process is removed from the CPU and another takes its place

Control abstraction

The separation of the logical view of a control structure from its implementation

Control structure

An instruction that determines the order in which other instructions in a program are executed

Control unit

The computer component that controls the actions of the other components so as to execute instructions in sequence

CPU

The central processing unit, a combination of the arithmetic/logic unit and the control unit; the “brain” of a computer, which interprets and executes instructions

CPU scheduling

The act of determining which process in memory is given access to the CPU so that it may execute

Cryptanalysis

The process of decrypting a message without knowing the cipher or key used to encrypt it

Cryptography

The field of study related to encoded information

Cylinder

The set of concentric tracks on all surfaces

Data

Basic values or facts

Data abstraction

The separation of the logical view of data from its implementation

Data compression

Reducing the amount of space needed to store a piece of data

Data coverage (black-box) testing

Testing a program or subprogram based on the possible input values; treating the code as a black box

Data structure

The implementation of a composite data field in an abstract data type

Data transfer rate (bandwidth)

The speed with which data is moved from one place to another on a network

Data type

A description of the set of values and the basic set of operations that can be applied to values of the type

Database

A structured set of data

Database management system

A combination of software and data made up of the physical database, the database engine, and the database schema

Declaration

A statement that associates an identifier with a variable, an action, or some other entity within the language that can be given a name so that the programmer can refer to that item by name

Decryption

The process of converting ciphertext into plaintext

Demand paging

An extension to paged memory management in which pages are brought into memory only when referenced (on demand)

Denial of service

An attack on a network resource that prevents authorized users from accessing the system

Depth-first approach

Searching down the paths of a tree prior to searching across levels

Desk checking

Tracing the execution of a design on paper

Digital certificate

A representation of a sender’s authenticated public key used to minimize malicious forgeries

Digital data

A discrete representation of data

Digital signature

Data that is appended to a message, made from the message itself and the sender’s private key, to ensure the authenticity of the message

Digital subscriber line (DSL)

An Internet connection made using a digital signal on regular phone lines

Digitize

The act of breaking information down into discrete pieces

Direct file access

The technique in which data in a file is accessed directly, by specifying logical record numbers

Directed graph (digraph)

A graph in which each edge is directed from one vertex to another (or the same) vertex

Directory

A named group of files

Directory tree

A structure showing the nested directory organization of the file system

Disk scheduling

The act of deciding which outstanding requests for disk I/O to satisfy first

Document Type Definition (DTD)

A specification of the organization of an XML document

Domain name

The part of a hostname that specifies an organization or group

Domain name server

A computer that attempts to translate a hostname into an IP address

Domain name system

A distributed system for managing hostname resolution

Domain squatting

Purchasing a domain name with the sole intent of selling it at a high price to a person or organization that actually wants to use it

Download

Receiving data on a local computer from the Internet

Dumb terminal

A monitor and keyboard that allowed the user to access the mainframe computer in early timesharing systems

Dynamic-partition technique

The memory management technique in which memory is divided into partitions as needed to accommodate programs

Edge (arc)

A pair of vertices representing a connection between two nodes in a graph

Effective weight

In an artificial neuron, the sum of the weights multiplied by the corresponding input values

Electronic commerce

The process of buying and selling products and services using the World Wide Web

Encapsulation

A language feature that enforces information hiding; bundling data and actions so that the logical properties of data and actions are separated from the implementation details

Encryption

The process of converting plaintext into ciphertext

Entity–relationship (ER) modeling

A popular technique for designing relational databases

ER diagram

A graphical representation of an ER model

Ethernet

A network communication protocol that is integrated into most personal computers

Expert system

A software system based on the knowledge of human experts

Extensible Markup Language (XML)

A language that allows the user to describe the content of a document

Extensible Stylesheet Language (XSL)

A language for defining transformations from XML documents to other output formats

Field (or attribute)

A single value in a database record

Fields

Named items in a class; can be data or subprograms

File

A named collection of data, used for organizing secondary memory

File extension

Part of a file name that indicates the file type

File server

A computer dedicated to storing and managing files for network users

File system

The operating system’s logical view of the files it manages

File type

The specific kind of information contained in a file, such as a Java program or a Microsoft Word document

Fingerprint analysis

A technique used for user authentication that compares a scanned fingerprint to a stored copy of the authorized user’s fingerprint

Firewall

A gateway machine and software that protects a network by filtering the traffic it allows

Fixed-partition technique

The memory management technique in which memory is divided into a specific number of partitions into which programs are loaded

Floating point

A representation of a real number that keeps track of the sign, mantissa, and exponent

Frame

A fixed-size portion of main memory that holds a process page

Full adder

A circuit that computes the sum of two bits, taking an input carry bit into account

Game engine

A software system within which computer games are created

Gameplay

The type of interactions and experiences a player has during the game

Gate

A device that performs a basic operation on electrical signals, accepting one or more input signals and producing a single output signal

Gateway

A node that handles communication between its LAN and other networks

GPS (Global Positioning System)

A system that uses satellites to pinpoint the location of any GPS receiver

Graph

A data structure that consists of a set of nodes and a set of edges that relate the nodes to each other

Half adder

A circuit that computes the sum of two bits and produces the appropriate carry bit

Halting problem

The unsolvable problem of determining whether any program will eventually stop given a particular input

Host number

The part of an IP address that specifies a particular host on the network

Hostname

A name made up of words separated by dots that uniquely identifies a computer on the Internet; each hostname corresponds to a particular IP address

HTML5

The newest HTML standard with a streamlined tag system and support for dynamic content

Huffman encoding

Using a variable-length binary string to represent a character so that frequently used characters have short codes

Hypertext Markup Language (HTML)

The language used to create or build a web page

ICANN

The international organization that approves top-level domain names

Inference engine

The software that processes rules to draw conclusions

Information

Data that has been organized or processed in a useful manner

Information hiding

The practice of hiding the details of a module with the goal of controlling access to the details of the module

Information security

The techniques and policies used to ensure proper access to data

Information system

Software that helps the user organize and analyze data

Inheritance

A mechanism by which one class acquires the properties—data fields and methods—of another class

Input unit

A device that accepts data to be stored in memory

Inspection

A verification method in which one member of a team reads the program or design aloud line by line and the others point out errors

Instant messsaging

A technique for sending short messages in real time

Instantiate

To create an object from a class

Instruction register (IR)

The register that contains the instruction currently being executed

Integer

A natural number, a negative of a natural number, or zero

Integrated circuit (chip)

A piece of silicon on which multiple gates have been embedded

Integrity

Ensuring that data can be modified only by appropriate mechanisms

Interactive system

A system that allows direct communication between the user and the computer

Internet

A wide-area network that spans the planet

Internet backbone

A set of high-speed networks carrying Internet traffic

Internet Protocol (IP)

The network protocol that deals with the routing of packets through interconnected networks to the final destination

Internet service provider (ISP)

An organization providing access to the Internet

Interoperability

The ability of software and hardware on multiple machines and from multiple commercial vendors to communicate

Interpreter

A program that inputs a program in a high-level language and directs the computer to perform the actions specified in each statement

IP address

An address made up of four numeric values separated by dots that uniquely identifies a computer on the Internet

Java applet

A Java program designed to be embedded into an HTML document, transferred over the Web, and executed in a browser

JSP scriptlet

A portion of code embedded in an HTML document designed to dynamically contribute to the content of the web page

Key

One or more fields of a database record that uniquely identifies it among all other records in the table

Keyword encoding

Replacing a frequently used word with a single character

Knowledge-based system

Software that uses a specific set of information

Label

A name given to a memory location, which can then be used as an operand

Latency

The time it takes for the specified sector to be in position under the read/write head

Leaf node

A tree node that has no children

Lexical ambiguity

The ambiguity created when words have multiple meanings

Link

A connection between one web page and another

Linked list

A list in which the order of the components is determined by an explicit link field in each node, rather than by the sequential order of the components in memory

Linked structure

An implementation of a container where the items are stored together with information on where the next item can be found

Loader

A piece of software that takes a machine-language program and places it into memory

Local-area network (LAN)

A network connecting a small number of nodes in a close geographic area

Loebner prize

The first formal instantiation of the Turing test, held annually

Logic bomb

A malicious program that is set up to execute when a specific system event occurs

Logic diagram

A graphical representation of a circuit; each type of gate has its own symbol

Logical address

A reference to a stored value relative to the program making the reference

Lossless compression

A data compression technique in which there is no loss of information

Lossy compression

A data compression technique in which there is loss of information

Machine language

The language made up of binary-coded instructions that is used directly by the computer

Mainframe

A large, multi-user computer often associated with early timesharing systems

Malicious code

A computer program that attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions

Man-in-the-middle

A security attack in which network communication is intercepted in an attempt to obtain key data

Markup language

A language that uses tags to annotate the information in a document

Memory management

The act of keeping track of how and where programs are loaded in main memory

Metadata

Data about data

Metalanguage

A language that is used to define other languages

Method

A named algorithm that defines one aspect of the behavior of a class

Metropolitan-area network (MAN)

A network infrastructure developed for a large city

MIME type

A standard for defining the format of files that are included as email attachments or on websites

Model

An abstraction of a real system; a representation of objects within a system and the rules that govern the behavior of the objects

Motherboard

The main circuit board of a personal computer

Multimedia

Several different media types

Multiplexer

A circuit that uses a few input control signals to determine which of several input data lines is routed to its output

Multiprogramming

The technique of keeping multiple programs in main memory at the same time, competing for the CPU

Natural language

Languages that humans use to communicate, such as English

Natural-language comprehension

Using a computer to apply a meaningful interpretation to human communication

Natural number

The number 0 and any number obtained by repeatedly adding 1 to it

Negative number

A value less than 0, with a sign opposite to its positive counterpart

Nested structure (nested logic)

A structure in which one control structure is embedded within another

Network address

The part of an IP address that specifies a network

Network neutrality

The principle that ISPs should deliver data to everyone equally, as fast as the technology allows

Node (host)

Any addressable device attached to a network

Nonpreemptive scheduling

CPU scheduling that occurs when the currently executing process gives up the CPU voluntarily

NP-complete problems

A class of problems within Class NP that has the property that if a polynomial time solution with one processor can be found for any member of the class, such a solution exists for every member of the class

Number

A unit of an abstract mathematical system subject to the laws of arithmetic

Object

An entity or thing that is relevant in the context of a problem

Object (implementation phase)

An instance of a class

Object class (class) (problem-solving phase)

A description of a group of objects with similar properties and behaviors

Open system

A system that is based on a common model of network architecture and an accompanying suite of protocols

Open Systems Interconnection (OSI) Reference Model

A seven-layer logical breakdown of network interaction to facilitate communication standards

Operating system

System software that manages computer resources and provides an interface for system interaction

Output unit

A device that prints or otherwise displays data stored in memory or makes a permanent copy of information stored in memory or another device

Overflow

The condition that occurs when the results of a calculation are too large to represent in a given machine

P2P model

A decentralized approach that shares resources and responsibilities among many “peer” computers

Packet

A unit of data sent across a network

Packet switching

The approach to network communication in which packets are individually routed to their destination, then reassembled

Page

A fixed-size portion of a process that is stored into a memory frame

Page-map table (PMT)

The table used by the operating system to keep track of page/frame relationships

Page swap

Bringing in one page from secondary memory, possibly causing another to be removed

Paged memory technique

A memory management technique in which processes are divided into fixed-size pages and stored in memory frames when loaded

Parameter list

A mechanism for communicating between two parts of a program

Parameters

The identifiers listed in parentheses beside the subprogram name; sometimes called formal parameters

Password criteria

A set of rules that must be followed when creating a password

Password guessing

An attempt to gain access to a computer system by methodically trying to determine a user’s password

Password management software

A program that helps you manage sensitive data, such as passwords, in a secure manner

Path

A text designation of the location of a file or subdirectory in a file system

Phishing

Using a web page to masquerade as part of a trusted system to trick users into revealing security information

Phone modem

A device that converts computer data into an analog audio signal and back again

Phonemes

The set of fundamental sounds made in any given natural language

Physical address

An actual address in the main memory device

Ping

A program used to test whether a particular network computer is active and reachable

Pipelining

A technique that breaks an instruction into smaller steps that can be overlapped

Pixels

Individual dots used to represent a picture; stands for picture elements

Polymorphism

The ability of a language to determine at runtime which of several possible methods will be executed for a given invocation

Polynomial-time algorithms

Algorithms whose complexity can be expressed as a polynomial in the size of the problem

Port

A numeric designation corresponding to a particular high-level protocol

Positional notation

A system of expressing numbers in which the digits are arranged in succession, the position of each digit has a place value, and the number is equal to the sum of the products of each digit by its place value

Precision

The maximum number of significant digits that can be represented

Preemptive scheduling

CPU scheduling that occurs when the operating system decides to favor another process, preempting the currently executing process

Procedural abstraction

The separation of the logical view of an action from its implementation

Process

The dynamic representation of a program during execution

Process control block (PCB)

The data structure used by the operating system to manage information about a process

Process management

The act of keeping track of information for active processes

Process states

The conceptual stages through which a process moves as it is managed by the operating system

Program

A sequence of instructions written to perform a specified task

Program counter (PC)

The register that contains the address of the next instruction to be executed

Proprietary system

A system that uses technologies kept private by a particular commercial vendor

Protocol

A set of rules that defines how data is formatted and processed on a network

Protocol stack

Layers of protocols that build and rely on each other

Pseudocode

A language designed to express algorithms

Public-key cryptography

An approach to cryptography in which each user has two related keys, one public and one private

Pulse-code modulation

Variation in a signal that jumps sharply between two extremes

Query

A request to retrieve data from a database

Radix point

The dot that separates the whole part from the fractional part in a real number in any base

Range

A set of contiguous cells specified by the endpoints

Raster-graphics format

Storing image information pixel by pixel

Rational number

An integer or the quotient of two integers (division by zero excluded)

Real-time system

A system in which response time is crucial given the nature of the application domain

Reclock

The act of reasserting an original digital signal before too much degradation occurs

Record (or object, or entity)

A collection of related fields that make up a single database entry

Recursion

The ability of an algorithm to call itself

Reference parameter

A parameter that expects the address of its argument to be passed by the calling unit (put on the message board)

Referential ambiguity

The ambiguity created when pronouns could be applied to multiple objects

Register

A small storage area in the CPU used to store intermediate values or special data

Relational model

A database model in which data and the relationships among them are organized into tables

Relative path

A path that begins at the current working directory

Repeater

A network device that strengthens and propagates a signal along a long communication line

Representational (round-off) error

An arithmetic error caused by the fact that the precision of the result of an arithmetic operation is greater than the precision of our machine

Reserved word

A word in a language that has special meaning; it cannot be used as an identifier

Resolution

The number of pixels used to represent a picture

Response time

The time delay between receiving a stimulus and producing a response

Ring topology

A LAN configuration in which all nodes are connected in a closed loop

Risk analysis

Determining the nature and likelihood of the risks to key data

Root

The unique starting node in a tree

Root directory

The topmost directory, in which all others are contained

Route cipher

A transposition cipher that lays out a message in a grid and traverses it in a particular way

Router

A network device that directs a packet between networks toward its final destination

Rule-based system

A software system based on a set of if-then rules

Run-length encoding

Replacing a long series of repeated characters with a count of the repetition

Schema

A specification of the logical structure of data in a database

Scientific notation

An alternative floating-point representation

Search tree

A structure that represents alternatives in adversarial situations, such as game playing

Sector

A section of a track

Security policy

A written statement describing the constraints or behavior an organization embraces regarding the information provided by its users

Seek time

The time it takes for the read/write head to get positioned over the specified track

Semantic network

A knowledge representation technique that represents the relationships among objects

Semiconductor

Material such as silicon that is neither a good conductor nor a good insulator

Sequential circuit

A circuit whose output is a function of its input values and the current state of the circuit

Sequential file access

The technique in which data in a file is accessed in a linear fashion

Shared memory parallel processor

The situation in which multiple processors share a global memory

Signed-magnitude representation

Number representation in which the sign represents the ordering of the number (negative and positive) and the value represents the magnitude

Significant digits

Those digits that begin with the first nonzero digit on the left and end with the last nonzero digit on the right (or a zero digit that is exact)

Simulation

Developing a model of a complex system and experimenting with the model to observe the results

Single contiguous memory management

The approach to memory management in which a program is loaded into one continuous area of memory

Smart card

A card with an embedded memory chip used to identify users and control access

Social network

An online service that allows people with shared interests to communicate and interact

Software requirements

A statement of what is to be provided by a computer system or software product

Software specification

A detailed description of the function, inputs, processing, outputs, and special features of a software product; it provides the information needed to design and implement the software

Spatial compression

Movie compression technique based on the same compression techniques used for still images

Spoofing

An attack on a computer system in which a malicious user masquerades as an authorized user

Spreadsheet

A program that allows the user to organize and analyze data using a grid of cells

Spreadsheet function

A computation provided by the spreadsheet software that can be incorporated into formulas

Star topology

A LAN configuration in which a central node controls all message traffic

Strong equivalence

The equality of two systems based on their results and the process by which they arrive at those results

Strong typing

Each variable is assigned a type and only values of that type can be stored in the variable

Structured Query Language (SQL)

A comprehensive relational database language for data management and queries

Substitution cipher

A cipher that substitutes one character with another

Synchronous processing

Multiple processors apply the same program in lockstep to multiple data sets

Syntactic ambiguity

The ambiguity created when sentences can be constructed in various ways

System software

Programs that manage a computer system and interact with hardware

Table

A collection of database records

Tag

The syntactic element in a markup language that indicates how information should be displayed

TCP/IP

A suite of protocols and programs that support low-level network communication

Temporal compression

Movie compression technique based on differences between consecutive frames

Ten’s complement

A representation of negative numbers, such that the negative of I is 10 raised to k minus I

Test plan

A document that specifies how a program is to be tested

Test plan implementation

Using the test cases specified in a test plan to verify that a program outputs the predicted results

Text file

A file that contains characters

Thrashing

Inefficient processing caused by constant page swapping

Time slice

The amount of time given to each process in the round-robin CPU scheduling algorithm

Timesharing

A system in which CPU time is shared among multiple interactive users at the same time

Top-level domain (TLD)

The last section of a domain name, specifying the type of organization or its country of origin

Traceroute

A program that shows the route a packet takes across the Internet

Track

A concentric circle on the surface of a disk

Training

The process of adjusting the weights and threshold values in a neural net to get a desired outcome

Transfer rate

The rate at which data moves from the disk to memory

Transistor

A device that acts either as a wire or a resister, depending on the voltage level of an input signal

Transmission Control Protocol (TCP)

The network protocol that breaks messages into packets, reassembles them at the destination, and takes care of errors

Transposition cipher

A cipher that rearranges the order of characters in a message

Trojan horse

A malicious program disguised as a benevolent resource

Truth table

A table showing all possible input values and the associated output values

Turing test

A behavioral approach to determining whether a computer system is intelligent

Turnaround time

The CPU scheduling metric that measures the elapsed time between a process’s arrival in the ready state and its ultimate completion

Underflow

The condition that occurs when the results of a calculation are too small to represent in a given machine

Undirected graph

A graph in which the edges have no direction

Uniform Resource Locator (URL)

A standard way of specifying the location of a web page

Upload

Sending data from a local computer to a destination on the Internet

User authentication

The process of verifying the credentials of a particular user of a computer or software system

User Datagram Protocol (UDP)

An alternative to TCP that achieves higher transmission speeds at the cost of reliability

Value parameter

A parameter that expects a copy of its argument to be passed by the calling unit (put on the message board)

Variable

A location in memory, referenced by an identifier, that contains a data value

Vector graphics

Representation of an image in terms of lines and shapes

Vertex

A node in a graph

Video codec

Methods used to shrink the size of a movie

Virtual computer (machine)

A hypothetical machine designed to illustrate important features of a real machine

Virtual machine

The illusion created by a timesharing system that each user has a dedicated machine

Virtual memory

The illusion that there is no restriction on program size because an entire process need not be in memory at the same time

Virus

A malicious, self-replicating program that embeds itself into other code

Voice recognition

Using a computer to recognize the words spoken by a human

Voice synthesis

Using a computer to create the sound of human speech

Voiceprint

The plot of frequency changes over time representing the sound of human speech

Walk-through

A verification method in which a team performs a manual simulation of the program or design

Weak equivalence

The equality of two systems based on their results

Web analytics

The collection and analysis of data related to website usage

Web browser

A software tool that retrieves and displays web pages

Web page

A document that contains or references various kinds of data

Web server

A computer set up to respond to requests for web pages

Website

A collection of related web pages, usually designed and controlled by the same person or company

What-if analysis

Modifying spreadsheet values that represent assumptions to see how changes in those assumptions affect related data

Wide-area network (WAN)

A network connecting two or more local-area networks

Wiki

A website whose content can be created and edited by multiple users

Wireless

A network connection made without physical wires

Wireless network

A network in which devices communicate with other nodes through a wireless access point

Word

A group of one or more bytes; the number of bits in a word is the word length of the computer

Working directory

The currently active subdirectory

World Wide Web (the Web)

An infrastructure of information and the network software used to access it

Worm

A malicious stand-alone program that often targets network resources

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.94.251