front 1 Computer Science | back 1 The formal study of algorithms. |
front 2 Algorithm | back 2 A step-by-step method for solving a problem. |
front 3 Von Neumann Architecture | back 3 The standard computer design model based on storing both program instructions and data in the same memory. |
front 4 First Generation Computing Technology | back 4 Vacuum tubes. |
front 5 Pseudocode | back 5 A mix of English and code used to describe algorithms. |
front 6 Binary Search Efficiency | back 6 O(log n) (Logarithmic time). |
front 7 Two's Complement | back 7 The standard way computers represent signed integers. |
front 8 ASCII | back 8 An early, 7-bit standard for encoding text characters. |
front 9 Control Unit (CU) | back 9 The part of the CPU that fetches instructions from memory, decodes them, and directs the ALU and other components. |
front 10 Arithmetic/Logic Unit (ALU) | back 10 The part of the CPU that performs mathematical and logical operations (e.g., addition, comparison). |
front 11 Volatile Memory | back 11 Memory (like RAM) that loses its contents when the power is turned off. |
front 12 Cache Memory | back 12 A small, extremely fast memory unit placed between the CPU and main RAM to speed up access. |
front 13 Seek Time | back 13 The time it takes for a disk's read/write head to move to the correct track. |
front 14 System Software | back 14 Software that manages a computer system's hardware and software resources, acting as an intermediary between the user and the hardware. |
front 15 Operating System | back 15 The primary system software that manages hardware, memory, process scheduling, and file storage. |
front 16 Time-Sharing System | back 16 An OS that allows multiple users or processes to share a computer's resources by rapidly switching between tasks. |
front 17 Computer Network | back 17 Two or more computers connected to share data and resources. |
front 18 Bandwidth | back 18 The maximum data transfer rate of a network. |
front 19 Domain Name System (DNS) | back 19 A distributed system that translates human-readable host names (like google.com) into IP addresses. |
front 20 Phishing | back 20 A social engineering attack using fraudulent messages to trick victims into revealing sensitive information. |
front 21 Symmetric Encryption | back 21 An encryption method that uses the same key for both encryption and decryption. |
front 22 Public Key Encryption (Asymmetric) | back 22 Uses a pair of keys: a public key to encrypt and a private key to decrypt. |
front 23 DDOS Attack | back 23 An attack using a network of compromised computers to flood a target with traffic, causing it to crash. |
front 24 Malware | back 24 Any software intentionally designed to cause damage, disrupt operations, or gain unauthorized access. |