Print Options

Font size:

← Back to notecard set|Easy Notecards home page

To print: Ctrl+PPrint as notecards

COSC101 Terms

1.

Computer Science

The formal study of algorithms.

2.

Algorithm

A step-by-step method for solving a problem.

3.

Von Neumann Architecture

The standard computer design model based on storing both program instructions and data in the same memory.

4.

First Generation Computing Technology

Vacuum tubes.

5.

Pseudocode

A mix of English and code used to describe algorithms.

6.

Binary Search Efficiency

O(log n) (Logarithmic time).

7.

Two's Complement

The standard way computers represent signed integers.

8.

ASCII

An early, 7-bit standard for encoding text characters.

9.

Control Unit (CU)

The part of the CPU that fetches instructions from memory, decodes them, and directs the ALU and other components.

10.

Arithmetic/Logic Unit (ALU)

The part of the CPU that performs mathematical and logical operations (e.g., addition, comparison).

11.

Volatile Memory

Memory (like RAM) that loses its contents when the power is turned off.

12.

Cache Memory

A small, extremely fast memory unit placed between the CPU and main RAM to speed up access.

13.

Seek Time

The time it takes for a disk's read/write head to move to the correct track.

14.

System Software

Software that manages a computer system's hardware and software resources, acting as an intermediary between the user and the hardware.

15.

Operating System

The primary system software that manages hardware, memory, process scheduling, and file storage.

16.

Time-Sharing System

An OS that allows multiple users or processes to share a computer's resources by rapidly switching between tasks.

17.

Computer Network

Two or more computers connected to share data and resources.

18.

Bandwidth

The maximum data transfer rate of a network.

19.

Domain Name System (DNS)

A distributed system that translates human-readable host names (like google.com) into IP addresses.

20.

Phishing

A social engineering attack using fraudulent messages to trick victims into revealing sensitive information.

21.

Symmetric Encryption

An encryption method that uses the same key for both encryption and decryption.

22.

Public Key Encryption (Asymmetric)

Uses a pair of keys: a public key to encrypt and a private key to decrypt.

23.

DDOS Attack

An attack using a network of compromised computers to flood a target with traffic, causing it to crash.

24.

Malware

Any software intentionally designed to cause damage, disrupt operations, or gain unauthorized access.