Shared Flashcard Set

Details

redalert-2.1.1.5 System Fundementals
PIARRRR
13
Computer Science
Professional
03/08/2011

Additional Computer Science Flashcards

 


 

Cards

Term
ASCII
Definition

American Standard Code for Information Interchange. Code that represents characters as 8-bit codes and allows binary computer to work with letters, digits, and special characters.

 

This code is used to create up to 256 characters that a computer can recognize and is used by most American computers.

 

Ex. American Computers, binary code computers

Term
Compatibility
Definition

The ability of a software program to run on a specific computer system.

 

Compatibility whether a software or hardware works with other software or hardware. A type of software must be compatible with one's computer for it to operate on the computer

 

Ex. iPad linking to a Mac, Printer linking to a computer

Term
OCR
Definition

Locating and identifying printed characters embedded in an image, allowing the text to be stored as an editable document.

 

This is used when a printed document is scanned by either a wand, pen scanner, or software to store and upload text onto a computer.

 

Ex. Pen Scanner, Wand, OCR Software

Term
OMR
Definition

A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms.

 

This is used mainly in schools and for testing with a bubble sheet because the OMR can read the filled in bubbles and score the examination.

 

Ex. Standard Scantron Machine

Term
Bar Code
Definition

A various width of bars read by a scanner to give information about product codes or inventory codes.

 

This is used in many locations such as grocery stores to scan products and instantly access the prices of each product.

 

Ex. Grocery store bar code scanner, Bar code on a box of cereal.

Term
Baud
Definition

 The number of distinct symbol changes made to the transmission medium per second in a digitally modulated signal or a line of code.

 

This is used to monitor, in symbols per second, how fast something such as a modem is transmitting information.

 

Ex. Modem working at 1000 Bd

Term
Verification & Validation
Definition

The process of checking that a product, service, or system meets specifications and that it fulfills its intended purpose.

 

Companies use this to run checks on their software to make sure it is meeting its intended needs for the company. If it is not, the verification and discover this and make a change.

 

Ex. Checking speed of server, checking reliability of modem

Term
Encryption/Decryption
Definition

Protects transmitted information by scrambling the transmissions. Then decodes encryption with matching key to access information.

 

This is often used transferring data incase information is intercepted. It will be intercepted in a random assortment of symbols that has no coherence to the actual data to prevent eavesdroppers.

 

Ex. Encrypting secret CIA files so terroists can't read them.

 

Term
Firewall
Definition

A software or hardware "gate" that protects internal networks from unauthorized access.

 

This is used to prevent viruses or spyware from entering a computer system to prevent the computer from malfunctioning.

 

Ex. Barracuda Firewall Software, Comodo Firwall Software

 

Term
Virus
Definition

Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.

 

This is used by hackers to infect host computers and can crash computers. It can be done out of spite or to obtain information.

 

Ex. Rick Rolled, swine flu

 

Term
Trojan Horse
Definition

A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.

 

This is used by hackers to sneak into host computers to cause ruckus even though the host doesn't expect it. It is very very sneaky.

 

Ex. Placing virus in a windows upgrade secretly

Term
Worm
Definition

Programs that use computer hosts to reproduce themselves.

 

These are used by hackers to make a virus on a computer reproduce many times so that it can be sent out to other computers to infect a wide range of computers.

 

Ex. Developing a virus on one computer that then distributes itself to multiple computers over a network.

Term
Logic Bomb
Definition

A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.

 

This is used to hack computers when the harmful software is stored in a computer to go off only when a specific function such as opening a document is performed.

 

Ex. Storing a virus on Itunes so the computer explodes when one song is played.

 

 

Supporting users have an ad free experience!