A LEVEL TERMS ()

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
Across
  1. 2. – (2 words) problem resulting from use of virtual memory. Excessive swapping in and out of virtual memory leads to a high rate of hard disk read/write head movements thus reducing processing speed.
  2. 7. – virtual machine software that creates and runs virtual machines.
  3. 9. – computer architecture which uses many processors, each of which can use a separate data source.
  4. 11. – central server that stores details of all other computers in the swarm.
  5. 13. – (2 words) the second stage in the process of compilation: output from the lexical analysis is checked for grammatical (syntax) errors.
  6. 15. – process manager which handles the removal of running programs from the CPU and the selection of new processes.
  7. 19. – (2 words) the process of responding to an exception within the program so that the program does not halt unexpectedly.
  8. 20. – (2 words) circuit in which the output depends on input values produced from previous output values.
  9. 21. – a more up-to-date version of SSL.
  10. 23. – (2 words) the method used to physically find a record in the file.
  11. 27. – method that employs a practical solution (rather than a theoretical one) to a problem; when applied to algorithms this includes running tests and obtaining results by trial and error.
  12. 29. – (2 words) main/primary RAM memory.
  13. 30. – (2 words) table that maps logical addresses tophysical addresses; it contains page number, flag status, frame address and time of entry.
  14. 31. – file transfer protocol.
  15. 38. – (2 words) method used in artificial neural networks to calculate error gradients so that actual node/neuron weightings can be adjusted to improve the performance of the model.
  16. 40. – a message/data is split up into smaller groups of bits for transmission over a network.
  17. 41. – an instance of a class that is self-contained and includes data and methods.
  18. 42. – (2 words) method of transmission in which a dedicated circuit/channel lasts throughout the duration of the communication.
  19. 45. – an OS that controls the physical hardware.
  20. 46. – connected peers (clients) that share a torrent/tracker.
  21. 47. – (2 words) a terminating solution to a process that is not recursive.
  22. 48. – a set of rules governing communication across a network: the rules are agreed by both sender and recipient.
  23. 50. – protocol used when sending emails, in which the client opens the connection to the server and keeps the connection active all the time, then uploads new emails to the server.
  24. 52. – (2 words) data where we know the target answer and the data object is fully recognised.
  25. 54. – a set of data that describes and gives information about other data.
  26. 57. – a given list of unordered elements that can use set theory operations such as intersection and union.
  27. 58. – (2 words) a graphical method of defining and showing the grammatical rules of a programming language.
  28. 59. – the basic unit of a quantum of information (quantum bit).
  29. 60. – (2 words) occurs when a requested page is not in memory and a free page cannot be used to satisfy allocation.
  30. 63. – process of putting data and methods together as a single unit, a class.
  31. 66. – the result of carrying out a calculation which produces a value too large for the computer’s allocated word size.
  32. 67. – statistical measure used to make predictions from data by finding learning relationships between the inputs and outputs.
  33. 68. – the result of carrying out a calculation which produces a value too small for the computer’s allocated word size.
  34. 70. – (2 words) mode of addressing in which the contents of the contents of the memory location in the operand are used.
  35. 71. – (2 words) occurs when a new page is referred but is not yet in memory.
  36. 72. – protocol used when receiving emails, in which the client periodically connects to a server, checks for and downloads new emails from a server and then closes the connection.
  37. 73. – (2 words) the first stage in the process of compilation: removes unnecessary characters and tokenises the program.
Down
  1. 1. - protocol used to find the IP address, for example, when sending emails
  2. 3. – (2 words)encryption that uses public keys (known to everyone) and private keys (secret keys).
  3. 4. – fixed-size physical memory blocks.
  4. 5. – (2 words) a hierarchical data structure in which each parent node can have a maximum of two child nodes.
  5. 6. – a method of file access in which a record can be physically found in a file without physically reading other records.
  6. 8. – data and methods within an object that perform a named action.
  7. 10. – An occurrence of an object during the execution of a program.
  8. 12. – (2 words) method of transmission where a message is broken into packets which can be sent along paths independently from each other
  9. 14. – (2 words) machines that think in a way similar to the human brain. They handle huge amounts of data using artificial neural networks.
  10. 16. – (2 words) two half adders combined to allow the sum of several binary bits.
  11. 17. –a fixed-size numeric representation of the contents of a message produced from a hashing algorithm. This can be encrypted to form a digital signature.
  12. 18. – an abstract data type that consists of pairs, a key and a value, in which the key is used to find the value.
  13. 22. – (3 words)a non-composite data type that uses the memory address of where the data is stored.
  14. 24. – (2 words) circuit in which the output depends entirely on the input values.
  15. 25. – a non-linear data structure consisting of nodes and edges.
  16. 26. – the product when plaintext is put through an encryption algorithm.
  17. 28. – a programmed procedure that is defined as part of a class.
  18. 32. – a template defining the methods and data of a certain type of object.
  19. 33. – simple mail transfer protocol.
  20. 34. – fixed-size logical memory blocks.
  21. 35. – a mathematical formula used to perform a calculation on the key field
  22. 36. – (2 words)commercial organisation used to generate a digital certificate requested by website owners or individuals.
  23. 37. – a small program that is used to load other programs to ‘start up’ a computer.
  24. 39. – computer architecture which uses many processors but the same shared data source.
  25. 43. – an OS running on a virtual machine.
  26. 44. – the process of initiating communication between two devices. This is initiated by one device sending a message to another device requesting the exchange of data
  27. 49. – the original text/document/message before it is put through an encryption algorithm.
  28. 51. – the fractional part of a floating point number.
  29. 53. – an unexpected event that disrupts the execution of a program.
  30. 55. – splitting up of a file when using peer-to-peer file sharing.
  31. 56. – a process using a function or procedure that is defined in terms of itself and calls itself.
  32. 61. – the data items in a class.
  33. 62. – fundamental unit from which graphs are formed (______ the points where edges converge).
  34. 64. – file access mode in which data can be added to the end of a file.
  35. 65. – (2 words) a data table that contains the information necessary to forward a package along the shortest or best route to allow it to reach its destination.
  36. 69. – electronic circuits with two stable conditions using sequential circuits