Oqu Easy

A

Ability to Seem Intelligent (AI)

AI systems simulate human-like responses and behaviors, even without true understanding.

Absolute address calculation (Paging)

The physical (absolute) address in memory is computed by combining the page frame address with the offset within that page. Physical address = page frame address + offset.

Access control

A security technique used to control who has access to data.

Accumulator (ACC) (CPU)

A register used to store intermediate arithmetic and logic results.

Accuracy

The degree to which data are free from error and exactly match the intended values.

Adaptation to Circumstances (AI)

AI adjusts behavior based on new information or changing conditions.

Address bus

A one-directional bus carrying memory addresses from the CPU.

Addressing mode

Rules defining how the address field of an instruction is interpreted.

Adware

Software that automatically displays or downloads advertisements, often without user consent.

Algorithm

A finite, ordered set of well-defined steps used to solve a problem or perform a computation.

Antiplagiarism

Software designed to detect text reuse.

Application Systems

Software designed to help the user perform specific tasks, such as word processing, spreadsheet calculations, or database management.

Arithmetic Logic Unit (ALU) (CPU)

Performs mathematical and logical operations.

Artificial intelligence (AI)

The ability of a computer to perform tasks such as reasoning and learning normally done by humans.

Assembler

A translator that converts assembly language source code into machine (object) code.

AST compilation

The process of translating source code into an Abstract Syntax Tree representing code structure.

Asymmetric Encryption

Encryption that uses a pair of public and private keys to secure data.

Augmented reality (AR)

A system used to overlay information about the world onto a screen.

Autonomy (AI)

Some AI operates independently, making decisions without constant human input.

Availability

Information and systems must always be available to authorised users when needed.

B

Backtracking (Prolog)

A search mechanism used to explore possible solutions by reversing steps when necessary.

Backup

The process of copying data to prevent loss in case of failure or damage.

Base address (Segmentation)

Index entry storing the starting address of a segment.

Batch processing operating system

An operating system that executes jobs in batches without user interaction during execution.

Biometrics

The use of measurable physical characteristics of a human for accessing a computer system.

Boot sector virus

One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system.

Browser hijacker

Easily detected, this virus type infects your browser and redirects you to malicious websites.

Brute force attack

A general attack on a network that requires no specialist knowledge. It uses trial-and-error to obtain login names and passwords to access the network.

Bus width (CPU)

Number of bits carried simultaneously by a bus.

C

Cache

A very fast, small memory located close to or inside the CPU that stores frequently accessed data to reduce average memory latency.

Cache (CPU)

A small, fast memory located closer to the CPU than RAM.

Capacity to Learn (AI)

AI improves performance over time using data, machine learning, and deep learning.

Ciphertext

Encrypted data in unreadable form.

CISC (CPU)

An architecture using many complex instructions performing multi-step operations.

Clock speed (CPU)

Number of cycles executed per second.

Code optimisation

A technique that improves code to use fewer resources and run faster.

Command Line Interface

A text-based interface where users enter commands to perform operations.

Compilation error

An error caused by incorrect syntax or typing mistakes when compiling code.

Compiled code

Code translated and saved as an object file.

Compiler

A translator that converts high-level language source code into machine code in one pass before execution.

Control bus

A bi-directional bus carrying control signals.

Control Unit (CU) (CPU)

Decodes instructions and coordinates activities of CPU components.

Cookies

Small files stored on a user's device by websites to remember preferences and track activity.

Copyright

The legal right of a creator to exclusively use or permit the use of their work.

CPU core (CPU)

A single processing unit inside a CPU that executes instructions.

Cracking

The process of obtaining a password by force, bypassing authentication and registration steps.

CU

The CPU component that directs the execution of instructions by coordinating the ALU, registers, and buses.

Current Instruction Register (CIR) (CPU)

Temporarily stores the instruction that has just been fetched.

Custom Software

Software developed for a specific user or organization to meet unique requirements not satisfied by off-the-shelf products.

Cyber security

The use of technology, working practices and precautions designed to protect networks, computers, programs, and data from attack, damage or unauthorised access.

D

Data backup and recovery

The process of copying and storing data separately to protect against loss from deletion, hardware failure, or cyber attacks.

Data bus

A multi-line bus carrying data between system components.

Data Flow Diagram

A graphical model that depicts how data move through a system, showing sources, processes, stores, and destinations.

Data Integrity

The accuracy, consistency, and reliability of data throughout its lifecycle.

Data Privacy

The aspect of information technology that deals with the proper handling of data in terms of consent, notice, and regulatory obligations.

Data Security

The practice of protecting digital information from unauthorized access, corruption, or theft throughout its lifecycle.

Database

An organized collection of related data stored electronically and controlled by a database management system (DBMS).

Decision-Making Ability (AI)

AI makes decisions based on data, algorithms, and predefined rules.

Declarative programming

A programming paradigm that expresses the logic of a computation without describing its control flow.

Decode (CPU)

The CPU interprets the fetched instruction and prepares for execution.

Decryption

The process of converting encrypted data back into its original readable format.

Demand paging (Paging)

Pages are loaded into RAM only when needed.

DFD Symbols

Standard icons used in a DFD: circle/rounded rectangle = process, open-ended rectangle = data store, arrow = data flow, square = external entity.

Dictionary attack

A method of breaking into a password-protected computer, network, or other IT resource by systematically entering each word in the dictionary as a password.

Digital Signature

An encryption key assigned to a specific person.

Direct action

This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of the easier ones to detect and remove.

Direct addressing

The operand directly contains the memory address of the value.

Disk Mirroring

A data backup technique that writes the same data to two or more drives simultaneously.

Dynamic loading (Paging)

Only required pages are loaded into memory at a given time.

E

EGOV.KZ

An electronic government portal providing a unified mechanism for interaction between the state, citizens, and government bodies using information technologies.

Encryption

The process of converting data into a code to prevent unauthorized access.

Enhancement

A planned improvement that adds new features or optimizes existing functionality without altering the system's core purpose.

Environmental hazards

Poor environmental controls (like inadequate cooling or humidity control) can lead to hardware malfunction or damage, causing data loss and downtime.

Equipment failure

Hardware can fail due to age, defects, or lack of maintenance, causing data loss or system unavailability.

Erroneous data

Invalid data that should be rejected by the system.

Execute (CPU)

The stage where the CPU processes data and carries out instructions.

Expert system

Artificial intelligence software that uses knowledge stored in a knowledge base to solve problems.

Extreme data

Data at the upper or lower limits of valid input that should still be accepted.

F

Fact (Expert Systems)

A basic assertion about a specific relationship or property in the problem domain.

Facts (Prolog)

Basic assertions about relationships or properties.

Fetch (CPU)

The CPU fetches instructions and data from RAM and stores them in registers.

File infector

By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

Firewall

A network security system that monitors and controls incoming and outgoing traffic based on predetermined security rules.

Flat File Database

A database stored in a single table or text file without structured relationships between separate tables.

Flexibility (AI)

AI adapts to different tasks and domains when properly programmed or trained.

Flexibility (Segmentation)

Segments vary in size based on program needs.

Forms

User interfaces in a DBMS that facilitate data entry, modification, and viewing in a controlled layout.

Full Backup

A type of backup that copies all data and files every time it's performed.

G

Gesture Recognition Interface

A system capable of recognizing hand movements and sometimes facial emotions.

Grandfather-Father-Son Backup Strategy

A backup rotation scheme that uses three generations of backups: daily (son), weekly (father), and monthly (grandfather).

Graphical User Interface (GUI)

A visual system for interacting with devices using windows, icons, menus, and buttons.

H

Hacking

Unauthorized access to or manipulation of a computer system or network.

Hardware

The physical components of a computer system such as the CPU, RAM, and hard drives.

I

I/O controller

A device managing communication between input/output devices and the CPU.

Imperative programming

A programming paradigm that uses statements that change the program’s state.

Implementation method

A structured process or framework used to put a plan or project into action.

Implementation timeline

A schedule detailing tasks, responsibilities, and estimated time for completing a project.

Incremental Backup

A backup that saves only the data that has changed since the last backup.

Index

A pointer-based structure derived from key fields that accelerates query performance at the cost of additional storage.

Indexed addressing

Final data address obtained by adding an offset to a base address.

Indexes

Auxiliary data structures that speed up data retrieval by providing rapid access paths to rows based on key values.

Indirect addressing

The operand contains the address of another memory location holding the final address.

Inference engine (Expert Systems)

Fetches and interprets knowledge from the knowledge base to infer new facts and solve problems.

Integrity

Information cannot be lost or changed from its original state.

Interface

A standardized form of connection defining signals, pins, and voltage levels.

Interpreter

A translator that converts and executes high-level language code line-by-line at run-time.

K

Knowledge base (Expert Systems)

A collection of facts and rules forming knowledge in a specific area.

L

Length (Segmentation)

Index entry storing the size of the segment.

Lexeme

The smallest unit of language that cannot be broken down without losing meaning.

Lexical analysis

The process of converting characters into lexical tokens for the parser to understand.

Library

A collection of pre-compiled routines or classes that programmers can reuse by linking or importing into their own programs.

Local backup

A method of storing and backing up data on physical hardware like external drives or flash drives.

Logical blocks (Segmentation)

Segments match logical divisions of a program like functions or structures.

Logical error

An error where a program follows incorrect logic and produces unintended results.

M

Main Memory

The primary, volatile storage (RAM) directly accessible by the CPU for currently executing programs and data.

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system.

Memory Address Register (MAR) (CPU)

Holds the address of memory being accessed.

Memory Buffer Register (MBR/MDR) (CPU)

A bi-directional register holding data being transferred to/from memory.

Memory division (Paging)

RAM is divided into fixed-size page frames.

Memory division (Segmentation)

Memory is divided into variable-size logical units called segments.

Memory management (Segmentation)

Segments are allocated/deallocated independently.

Modularity (Segmentation)

Supports modular programming with separate modules as segments.

Multi-User OS

An operating system that allows two or more users to access a computer's resources simultaneously (e.g., Unix, Linux).

Multipartite virus

This virus infects the entire system. Multipartite viruses spread by performing unauthorized actions on your operating system, folders, and programs.

Multiple segments (Segmentation)

Programs consist of segments such as code, data, stack, etc.

N

Natural disasters

Earthquakes, floods, fires, hurricanes, and other natural disasters can damage or destroy physical infrastructure such as data centers, servers, and network devices.

Natural Language Interface (NLI)

A system that allows interaction with computers using everyday human language.

Network operating system (NOS)

An operating system designed to manage and facilitate resources and operations within a computer network.

Network virus

Network viruses travel through network connections and replicate themselves through shared resources.

Non-Contiguous Allocation (Paging)

Pages can be stored in non-sequential memory locations.

Normal data

Typical test data that should be accepted by the system.

O

Opcode

Binary digits representing an operation and its addressing mode.

Operating System

System software that manages computer hardware and software resources and provides services for application programs.

Organizing code (Segmentation)

Programmers decide how to divide code into segments.

Overwrite virus

Like the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs.

P

Page replacement (Paging)

When RAM is full, unused pages are swapped out.

Paging is hidden (Paging)

OS manages paging transparently to the programmer.

Password

A character string designed to protect data from unauthorized access.

Password policies

Rules and guidelines that govern the creation, use, and storage of passwords.

Pharming

A cyberattack that redirects users from legitimate websites to fraudulent ones to steal information.

Phishing

A cyberattack where attackers pose as legitimate entities to trick users into revealing sensitive information.

Plagiarism

Passing off somebody else's work as your own.

Plagiarism: Analysis and matching

The tool analyzes the text for identical or similar structures and wording.

Plagiarism: Database comparison

The system compares the text to a database of sources, including papers and websites.

Plagiarism: Direct and indirect detection

The system identifies both exact copying and paraphrased content.

Plagiarism: Human review

A human reviewer checks the report to confirm accuracy.

Plagiarism: Report generation

The tool generates a report showing plagiarism percentage and matching sources.

Plagiarism: Submission of work

The process begins when a text is submitted to a plagiarism detection tool.

Plagiarism: Text parsing

The document is broken into smaller elements like sentences or words.

Plaintext

The original interpretable and readable data before encryption.

Plan for an installation

A detailed document outlining steps, resources, and considerations needed to assemble and configure a system or software.

Power failures and interruptions

Power outages or surges can damage hardware, lead to data loss, and disrupt operations. Lack of proper power backup systems can make issues worse.

Power to Copy Intelligent Human Behavior (AI)

AI can mimic human actions like speech recognition, translation, and image recognition.

Primary Key

A field or combination of fields that uniquely identifies each record in a table and cannot contain NULL values.

Privacy/Confidentiality

Information that should be available only to authorized users.

Problem-Solving Skills (AI)

AI solves problems using algorithms—from calculations to complex tasks.

Process management (Paging)

Each process has its own page table for memory management.

Program Counter (CPU)

A register that holds the address of the next instruction to be executed.

Program/Data division (Paging)

Programs/data are divided into equal-sized pages matching page frames.

Prolog

A high-level programming language rooted in formal logic.

Protection and sharing (Segmentation)

Segments can be protected or shared among processes.

Proxy Server

A server that acts as an intermediary between a client and the internet, often used for security or performance purposes.

Q

Queries

Structured requests (often written in SQL) used to retrieve, insert, update, or delete data held in a database.

Queries (Prolog)

Questions asked to the system to check whether conditions are met based on facts and rules.

R

RAID 0

A disk striping method that increases performance but offers no redundancy.

RAID 1

A mirroring method that duplicates data on two disks for redundancy.

RAID 10

A combination of RAID 1 and RAID 0, offering both redundancy and performance.

RAID 5

A method using data striping with distributed parity, allowing for data recovery if one disk fails.

RAM

Volatile memory that allows read/write access to any location in equal time, used for active programs and data.

Ransomware

This malware encrypts files on the target and then demands that a ransom be paid for the decryption key needed to decrypt the files.

Real-time operating system (RTOS)

A specialized operating system designed to provide predictable and guaranteed response times for critical tasks.

Reasoning Ability (AI)

AI performs logical reasoning, infers patterns, and makes predictions.

Record

A single row in a table representing one instance of an entity, consisting of individual field values.

Registers

Small, high-speed storage locations inside the CPU used to hold data, instructions, or addresses temporarily during processing.

Regular updates and patches

Software updates that include security fixes addressing known vulnerabilities.

Relational Database

A database that organizes data into interrelated tables using keys and enforces relationships through relational integrity rules.

Remote backup

The process of backing up data to an offsite server or storage device for added security.

Reports

Formatted outputs that present database information in a readable, often printable, structure for analysis or distribution.

Resident virus

Resident viruses set up shop in your RAM and meddle with your system operations. They’re so sneaky that they can even attach themselves to your anti-virus software files.

RISC (CPU)

An architecture using a small, optimized set of simple instructions.

ROM

Non-volatile memory containing firmware or boot code that can be read but not (normally) written during operation.

Rootkit

This malware is used by cybercriminals to gain administrator-account level access to a computer and control them remotely.

Rule (Expert Systems)

A conditional assertion describing a relationship based on facts or other rules.

Rules (Prolog)

Conditional assertions that describe relationships between facts or other rules.

Run-time error

An error occurring while a program is running that causes abnormal behaviour or termination.

S

Secondary Key

A non-primary field or set of fields that can also uniquely identify a record and may be indexed for faster searches.

Security Methods

Techniques and technologies used to safeguard data and systems from threats (e.g., firewalls, encryption, access controls).

Segment addressing (Segmentation)

OS translates logical segment:offset addresses into physical addresses.

Single-Tasking System

An operating environment that runs one application at a time, dedicating all CPU resources to it.

Single-User OS

An operating system designed to support one user at a time (e.g., classic MS-DOS).

Smishing

A type of phishing attack that uses SMS (text messages) to deceive users.

Software

A set of instructions, data, or programs used to operate computers and perform specific tasks.

Source code

Human-readable text written in a specific programming language.

Spyware

Malicious software designed to secretly collect data from a device without user consent.

Status Register (SR) (CPU)

Contains bits indicating conditions such as zero, carry, negative or overflow from the last instruction.

Storage of segment information (Segmentation)

An index stores details about each segment.

Strong Artificial Intelligence (AI)

A theoretical form of machine intelligence equal to human intelligence.

Surveillance and eavesdropping

Unauthorized surveillance or eavesdropping can compromise sensitive information, including listening to conversations or intercepting data.

Symmetric Encryption

A type of encryption where the same key is used for both encryption and decryption.

Syntactic analysis

Analysis of program syntax to ensure statements follow the grammar rules of a programming language.

System bus

The main communication channel connecting CPU, memory, and I/O controllers.

System evaluation

The process of assessing the performance of a complete system to understand how it will perform in real-world conditions.

T

Tables

Structured sets of rows and columns within a relational database that store records of a single entity type.

Test plan

A document describing the test strategy, objectives, estimates, results, and resources needed for software testing.

Theft and vandalism

Unauthorized physical access can lead to theft of equipment like laptops, hard drives, or servers containing sensitive data. Vandalism can also disrupt operations and cause data loss.

Timing of staff training

The strategic timing of employee training based on company and role needs.

Tracking pages (Paging)

Page tables map virtual addresses to physical addresses.

Trojan

Installed by a user thinking it is a legitimate piece of software when, in fact, it will cause damage or provide access for criminals.

Trojan Horse

Malicious software that disguises itself as legitimate software to deceive users.

Truthfulness

A data quality attribute indicating that stored data accurately reflect the real-world facts they represent.

Two-factor authentication (2FA)

A security method requiring users to provide two forms of identification to access an account.

U

User agreement

A legally binding contract outlining terms for using a service; proof of user agreement confirms acceptance.

User interface (Expert Systems)

Allows non-expert users to interact with the expert system to find solutions.

User interface (UI)

The means of interaction between the user and a computer system.

Utility

System software that performs maintenance or optimization tasks such as backup, antivirus scanning, or disk defragmentation.

V

Virtual machine

Software running on a host OS that simulates a standalone computer system.

Virtual memory (Paging)

Stores pages not currently in main memory on disk.

Virtual reality (VR)

A simulated experience that can be similar to or completely different from the real world.

Virus

A program is hidden within another program or file, designed to cause damage to file systems.

Vishing

Voice phishing; attackers use phone calls to trick users into giving personal information.

W

Weak Artificial Intelligence (AI)

Machine intelligence that is limited to a specific or narrow area.

Web scripting virus

This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites.

Well-Defined Goals (AI)

AI systems operate with clear objectives created or programmed by humans.

Word length (CPU)

Number of bits processed by the CPU at a time.

Worm

A standalone malware that replicates itself to spread to other computers.

Worm

A malicious program that acts independently and can replicate itself and spread throughout a system.