A method of data transmission in which a message is broken up into a number of packets
Packet Switching
A self-contained set of instructions for performing a specific task within a computer program.
Function
A program construct that allows for a block of code to be repeated multiple times.
Loop
An accepted form of payment to pay for goods or services.
Digital currency
The software that allow users to access and display web pages on their device screens
Web browser
A binary digit with two possible values, 0 or 1.
Bit
manipulating people into breaking normal security procedures (such as giving away their password) in order to gain illegal access to computer systems
Social engineering
A tag-based programming language designed to create websites.
HTML
This is a decentralised database. All the transactions of networked members are stored on this database in a crypto network.
Blockchain
Executing instructions repeatedly, either for a set number of times or depending on a condition.
iteration/repetition
When the result of an addition is too large for the number of bits the computer is working with.
Overflow Error
A base 16 number system which uses 16 different ‘digits’ to represent each value.
Hexadecimal number system
The act of gaining illegal access to a computer system without the user’s permission.
Hacking
If a hacker wants to ‘crack’ your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually they find your password.
Brute Force attack
A worldwide collection of interconnected networks
Internet
The mode of data transmission when data can be sent in one direction only (for example, from sender to receiver). An example of this would be sending data from a computer to a printer.
Simplex transmission
This technique permanently removes data from a file in order to reduce its size.
Lossy Compression
A program which is often disguised as legitimate software but with malicious instructions embedded within it.
Trojan Horse
An attempt at preventing users from accessing part of a network, notably an internet server.
Denial of service attack
It is a container for storing data values in programming.
Variable
A method of error detection which works on the principle that when data is sent to another device, this data is sent back again to the sender.
Echo Check
Derived from the term 'picture element', this is the smallest element used to make up an image on a display
Pixel
A software that gathers information by monitoring a user’s activities carried out on their computer.
Spyware
Programs that encrypt data on a user’s computer and ‘hold the data hostage’.
Ransomware
Malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge.
Pharming