Across
- 2. – (2 words) problem resulting from use of virtual memory. Excessive swapping in and out of virtual memory leads to a high rate of hard disk read/write head movements thus reducing processing speed.
- 7. – virtual machine software that creates and runs virtual machines.
- 9. – computer architecture which uses many processors, each of which can use a separate data source.
- 11. – central server that stores details of all other computers in the swarm.
- 13. – (2 words) the second stage in the process of compilation: output from the lexical analysis is checked for grammatical (syntax) errors.
- 15. – process manager which handles the removal of running programs from the CPU and the selection of new processes.
- 19. – (2 words) the process of responding to an exception within the program so that the program does not halt unexpectedly.
- 20. – (2 words) circuit in which the output depends on input values produced from previous output values.
- 21. – a more up-to-date version of SSL.
- 23. – (2 words) the method used to physically find a record in the file.
- 27. – method that employs a practical solution (rather than a theoretical one) to a problem; when applied to algorithms this includes running tests and obtaining results by trial and error.
- 29. – (2 words) main/primary RAM memory.
- 30. – (2 words) table that maps logical addresses tophysical addresses; it contains page number, flag status, frame address and time of entry.
- 31. – file transfer protocol.
- 38. – (2 words) method used in artificial neural networks to calculate error gradients so that actual node/neuron weightings can be adjusted to improve the performance of the model.
- 40. – a message/data is split up into smaller groups of bits for transmission over a network.
- 41. – an instance of a class that is self-contained and includes data and methods.
- 42. – (2 words) method of transmission in which a dedicated circuit/channel lasts throughout the duration of the communication.
- 45. – an OS that controls the physical hardware.
- 46. – connected peers (clients) that share a torrent/tracker.
- 47. – (2 words) a terminating solution to a process that is not recursive.
- 48. – a set of rules governing communication across a network: the rules are agreed by both sender and recipient.
- 50. – protocol used when sending emails, in which the client opens the connection to the server and keeps the connection active all the time, then uploads new emails to the server.
- 52. – (2 words) data where we know the target answer and the data object is fully recognised.
- 54. – a set of data that describes and gives information about other data.
- 57. – a given list of unordered elements that can use set theory operations such as intersection and union.
- 58. – (2 words) a graphical method of defining and showing the grammatical rules of a programming language.
- 59. – the basic unit of a quantum of information (quantum bit).
- 60. – (2 words) occurs when a requested page is not in memory and a free page cannot be used to satisfy allocation.
- 63. – process of putting data and methods together as a single unit, a class.
- 66. – the result of carrying out a calculation which produces a value too large for the computer’s allocated word size.
- 67. – statistical measure used to make predictions from data by finding learning relationships between the inputs and outputs.
- 68. – the result of carrying out a calculation which produces a value too small for the computer’s allocated word size.
- 70. – (2 words) mode of addressing in which the contents of the contents of the memory location in the operand are used.
- 71. – (2 words) occurs when a new page is referred but is not yet in memory.
- 72. – protocol used when receiving emails, in which the client periodically connects to a server, checks for and downloads new emails from a server and then closes the connection.
- 73. – (2 words) the first stage in the process of compilation: removes unnecessary characters and tokenises the program.
Down
- 1. - protocol used to find the IP address, for example, when sending emails
- 3. – (2 words)encryption that uses public keys (known to everyone) and private keys (secret keys).
- 4. – fixed-size physical memory blocks.
- 5. – (2 words) a hierarchical data structure in which each parent node can have a maximum of two child nodes.
- 6. – a method of file access in which a record can be physically found in a file without physically reading other records.
- 8. – data and methods within an object that perform a named action.
- 10. – An occurrence of an object during the execution of a program.
- 12. – (2 words) method of transmission where a message is broken into packets which can be sent along paths independently from each other
- 14. – (2 words) machines that think in a way similar to the human brain. They handle huge amounts of data using artificial neural networks.
- 16. – (2 words) two half adders combined to allow the sum of several binary bits.
- 17. –a fixed-size numeric representation of the contents of a message produced from a hashing algorithm. This can be encrypted to form a digital signature.
- 18. – an abstract data type that consists of pairs, a key and a value, in which the key is used to find the value.
- 22. – (3 words)a non-composite data type that uses the memory address of where the data is stored.
- 24. – (2 words) circuit in which the output depends entirely on the input values.
- 25. – a non-linear data structure consisting of nodes and edges.
- 26. – the product when plaintext is put through an encryption algorithm.
- 28. – a programmed procedure that is defined as part of a class.
- 32. – a template defining the methods and data of a certain type of object.
- 33. – simple mail transfer protocol.
- 34. – fixed-size logical memory blocks.
- 35. – a mathematical formula used to perform a calculation on the key field
- 36. – (2 words)commercial organisation used to generate a digital certificate requested by website owners or individuals.
- 37. – a small program that is used to load other programs to ‘start up’ a computer.
- 39. – computer architecture which uses many processors but the same shared data source.
- 43. – an OS running on a virtual machine.
- 44. – the process of initiating communication between two devices. This is initiated by one device sending a message to another device requesting the exchange of data
- 49. – the original text/document/message before it is put through an encryption algorithm.
- 51. – the fractional part of a floating point number.
- 53. – an unexpected event that disrupts the execution of a program.
- 55. – splitting up of a file when using peer-to-peer file sharing.
- 56. – a process using a function or procedure that is defined in terms of itself and calls itself.
- 61. – the data items in a class.
- 62. – fundamental unit from which graphs are formed (______ the points where edges converge).
- 64. – file access mode in which data can be added to the end of a file.
- 65. – (2 words) a data table that contains the information necessary to forward a package along the shortest or best route to allow it to reach its destination.
- 69. – electronic circuits with two stable conditions using sequential circuits
