Index

A   B   C   D   E   F   G   H   I     K   L   M   N   O   P   Q   R   S   T   U   V   W   X     Z

2-dimensional array


A

Acceptance testing  
Actuator
Adaptive maintenance
ADC
Address
Address
Address bus
Adware
Aircraft Control System
Algorithm
Algorithm
Algorithm construct
Algorithm testing
Algorithm testing
Alpha testing
ALU
Analogue
Analysis
AND
AND
Application generator
Archive file
Arithmetic shift
Array
Array
Array(2-dimensional)
Array(2-dimensional)
Array(3-dimensional)
ASCII
Assembler
Assembly language


B

Back strain
Backup
Backup
BACS
Bar code reader
Batch file
Batch processing
Batch processing
Beta testing
Billing system
Binary
Binary
Binary search
Binary tree
Bit
Blackmail
Block
BNF (Backus Naur Form)
Booking system
Boolean
Boot
Booting
Break point
Browser
Bubble sort
Bubble sort
Budget report
Buffer
Bulletin Board
Bus network
Bus network
Byte


C

Cache
CASE
Cashless society
CBL
CBT
CD
Changeover
Character
Character
Chat room
Check digit
Checksum
Child node
Circuit switching
Code of Conduct
Code generation
Code optimisation
Collision detecting
COM
Command line interface
Command line interface
Commercial language
Compiler
Compiler
Compiler
Computer Misuse Act
Computer-Based Learning
Constant
Constructs
Control bus
Control signals
Control signals
Control system
Control system
Control system
Control Unit
Copyright, Design and Patents Act
Corrective maintenance
Cost-effective report
Count
CPU
Crime
Cyberbullies


D

DAT tape
Data bus
Data capture
Data compression
Data dictionary
Data flow diagram
Data inconsistency
Data mining
Data Protection Act
Data redundancy
Data store
Data structure
Data type
Data validation
Data verification
Data warehouse
Database
Database
Database administrator
DBMS
DBMS
DBMS
Debugger
Dedicated computer
Defragmentation
Denary
Design
Design evaluation
Design validation
Device control
Dialogue box
Digital
Digital camera
Direct access file
Direct changeover
Disc cache
Distributed system
Domain
DOS
Double buffering
Double-keying
Dry run
DVD


E

EBCDIC
Editor
EFT
Email
Email bullying
Email dangers
Embedded system
Employment
Employment
Encryption
Encryption
Entity
Entity
Entity relationship diagram
Error diagnostics
Event handler
Event-driven language
Exclusive OR
Execution error
Exponent
External entity
Extranet
Eye strain


F

FAT
Feasibility study
Feedback
Field
Field terminator
FIFO
File
File attribute
File attribute
File design
File format
File generations
File management
File organisation
File security
File server
File update
Firewall
First Normal Form (1NF)
Fitness problems
Fixed length
Flash memory
Flat file database
Floating point
Floppy disk
Flowchart
Foreign field
Form letter
Format check
Forum
FTP
FTP
Full-duplex
Function
Function


G

Gateway
Gigabyte
Glass manufacture
Global
Graph plotter
Graphical User Interface (GUI)
Graphical User Interface (GUI)
Graphics tablet
Greenhouse control
GUI


H

Hacking
Half-duplex
Handshaking
Handwriting recognition
Handwriting recognition
Hashing algorithm
Hard disk
HCI
HCI
Health and Safety
Health and Safety
Hexadecimal
Hierarchy
High Level Language
High Level Language
HTML
HTTP
HTTP
Hub
Human Computer Interface
Hyperlink
Hypertext


I

I/O
Indexed sequential file
Insertion sort
Instrument Landing System
Integer
Interface
Internal sort
Internet
Internet
Internet dangers
Interpreter
Interpreter
Interrupt
Interrupt register
Interrupt request
Interrupt service routine
Interview
Intranet
ISO 8859
ISP (Internet Service Provider
ISP (Internet Service Provider
Iteration


J

Job scheduler
Joystick


K

Key field
Keyboard
Kilobyte


L

LAN (Local Area Network)
Laptop
Leaf node
Length check
Lexical analysis
LIFO
Light pen
Linear search
Link editor
Link editor
Linked list
Linking error
Linking loader
Loader
Local
Logical error
Logical operator
Logical operator
Logical shift
Look-up check
Low Level Language
Low Level Language


M

Machine code
Macro
Magnetic strip
Magnetic tape
Mail merge
Maintenance
Mantissa
Mark sense reader
Mark-up language
Mark-up language
Master file
Megabyte
Memory
Memory partition
Memory partition
Memory swapping
Menu interface
Messaging
Method
MICR reader
MIDI input
Mnemonic
Mnemonic
Monitor
Mouse
Multi-access system
Multi-level index
Multiplexing
Multi-tasking


N

Natural language interface
Neck strain
Network
Network card
Network topology
Newsgroup
Next free pointer
Non-procedural language
Normalisation
NOT
NOT


O

Object Oriented Language (OOP)
Object oriented language (OOP)
Observation
OCR reader
OMR reader
OOP
Operating system
Optical disk
OR
OR
Overflow
Overflow area


P

Package based language
Packet switching
Parallel port
Parallel running
Parallel transmission
Parameter
Parent node
Parsing
Partial dependency
Partition
Password
Password
Payroll
Payroll
PDA
Perfective maintenance
Peripheral
Phased change
Phishing
Piloting
Polling
POP3
Port
Portable
Presence check
Primary key field
Primary key field
Primary storage
Printer
Printer server
Priority
Priority
Privacy
Procedural language
Procedural language
Procedure
Process control
Process control
Program
Program design language checker
Program version
Proof reading
Protocol
Protocol
Protocol
Pseudocode
Pseudocode


Q

Query language
Questionnaire
Queue

Quicksort


R

RAID drive
RAM
RAM
RAM cache
Random access file
Range check
Real
Real time
Real time transaction processing
Record
Record
Record
Record locking
Record locking
Record terminator
Recovery
Recursion
Register
Relational database
Relay
Relocatable code
Requirements analysis
Ring network
Rogue value
ROM
Root directory
Root node
Rounding
Rounding
Router
Router
RSI
RSI
Run-time error


S

Safe surfing
Scanner
Schedule report
Scheduling
Scientific language
Scripting language
Second Normal Form (2NF)
Secondary storage
Security
Selection
Semantic analysis
Sensor
Sensor
Sensor input
Sequence
Sequential access
Sequential file
Sequential file
Sequential file access
Sequential search
Serial file
Serial file access
Serial port
Serial search
Serial transmission
Shift functions
Sign and magnitude
Simplex
Smart card
SMTP
SMTP
Social issues
Software engineer
Software engineering
Sort
Sound input
Sound output
Spam
Spam
Special purpose language
Speech input
Speech recognition
Speech recognition
Spellchecker
Spooling
Spyware
SQL
Stack
Stack pointer
Standalone computer
Standard function
Standard module
Standard module
Standards
Star network
Start pointer
Stepwise refinement
Store dump
Store location
Store location
String
Structure
Subroutine
Subroutine
Subscript
Subscript
Switch
Symbol table
Syntax analysis
Syntax diagram
Syntax error
System design
System design
System flowchart
Systems analysis


T

Tape cartridge
TCP/IP
TCP/IP
TCP/IP
Teamwork
Technical report
Teleworking
Terabyte
Test data
Test data
Thesaurus
Third Normal Form (3NF)
Time slice
Time slice
Token ring
Top-down design
Token ring network
Touch screen
Touch screen
Trace
Trace table
Transaction log
Transaction file
Transaction file
Transactional website
Transitive dependency
Translation error
Tree
Truncating
Truncation
Truth table
Two's complement
Type check


U

Underflow
Unicode
USB
USB
USB memory stick
Utility program


V

Validation
Variable
Variable length
Variable watch
Verification
Videoconferencing
Virtual community
Virtual memory
Virtual Reality
Virtual Reality
Virtual team
Virus
Virus
Visual language
Visual language
VoIP
Volatile


W

WAN (Wide Area Network)
WAP
WIMP
Wireless network
Word
Word processing
World Wide Web


X

XOR

XOR
XOR


YZ

ZIP