AI systems simulate human-like responses and behaviors, even without true understanding.
The physical (absolute) address in memory is computed by combining the page frame address with the offset within that page. Physical address = page frame address + offset.
A security technique used to control who has access to data.
A register used to store intermediate arithmetic and logic results.
The degree to which data are free from error and exactly match the intended values.
AI adjusts behavior based on new information or changing conditions.
A one-directional bus carrying memory addresses from the CPU.
Rules defining how the address field of an instruction is interpreted.
Software that automatically displays or downloads advertisements, often without user consent.
A finite, ordered set of well-defined steps used to solve a problem or perform a computation.
Software designed to detect text reuse.
Software designed to help the user perform specific tasks, such as word processing, spreadsheet calculations, or database management.
Performs mathematical and logical operations.
The ability of a computer to perform tasks such as reasoning and learning normally done by humans.
A translator that converts assembly language source code into machine (object) code.
The process of translating source code into an Abstract Syntax Tree representing code structure.
Encryption that uses a pair of public and private keys to secure data.
A system used to overlay information about the world onto a screen.
Some AI operates independently, making decisions without constant human input.
Information and systems must always be available to authorised users when needed.
A search mechanism used to explore possible solutions by reversing steps when necessary.
The process of copying data to prevent loss in case of failure or damage.
Index entry storing the starting address of a segment.
An operating system that executes jobs in batches without user interaction during execution.
The use of measurable physical characteristics of a human for accessing a computer system.
One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system.
Easily detected, this virus type infects your browser and redirects you to malicious websites.
A general attack on a network that requires no specialist knowledge. It uses trial-and-error to obtain login names and passwords to access the network.
Number of bits carried simultaneously by a bus.
A very fast, small memory located close to or inside the CPU that stores frequently accessed data to reduce average memory latency.
A small, fast memory located closer to the CPU than RAM.
AI improves performance over time using data, machine learning, and deep learning.
Encrypted data in unreadable form.
An architecture using many complex instructions performing multi-step operations.
Number of cycles executed per second.
A technique that improves code to use fewer resources and run faster.
A text-based interface where users enter commands to perform operations.
An error caused by incorrect syntax or typing mistakes when compiling code.
Code translated and saved as an object file.
A translator that converts high-level language source code into machine code in one pass before execution.
A bi-directional bus carrying control signals.
Decodes instructions and coordinates activities of CPU components.
Small files stored on a user's device by websites to remember preferences and track activity.
The legal right of a creator to exclusively use or permit the use of their work.
A single processing unit inside a CPU that executes instructions.
The process of obtaining a password by force, bypassing authentication and registration steps.
The CPU component that directs the execution of instructions by coordinating the ALU, registers, and buses.
Temporarily stores the instruction that has just been fetched.
Software developed for a specific user or organization to meet unique requirements not satisfied by off-the-shelf products.
The use of technology, working practices and precautions designed to protect networks, computers, programs, and data from attack, damage or unauthorised access.
The process of copying and storing data separately to protect against loss from deletion, hardware failure, or cyber attacks.
A multi-line bus carrying data between system components.
A graphical model that depicts how data move through a system, showing sources, processes, stores, and destinations.
The accuracy, consistency, and reliability of data throughout its lifecycle.
The aspect of information technology that deals with the proper handling of data in terms of consent, notice, and regulatory obligations.
The practice of protecting digital information from unauthorized access, corruption, or theft throughout its lifecycle.
An organized collection of related data stored electronically and controlled by a database management system (DBMS).
AI makes decisions based on data, algorithms, and predefined rules.
A programming paradigm that expresses the logic of a computation without describing its control flow.
The CPU interprets the fetched instruction and prepares for execution.
The process of converting encrypted data back into its original readable format.
Pages are loaded into RAM only when needed.
Standard icons used in a DFD: circle/rounded rectangle = process, open-ended rectangle = data store, arrow = data flow, square = external entity.
A method of breaking into a password-protected computer, network, or other IT resource by systematically entering each word in the dictionary as a password.
An encryption key assigned to a specific person.
This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of the easier ones to detect and remove.
The operand directly contains the memory address of the value.
A data backup technique that writes the same data to two or more drives simultaneously.
Only required pages are loaded into memory at a given time.
An electronic government portal providing a unified mechanism for interaction between the state, citizens, and government bodies using information technologies.
The process of converting data into a code to prevent unauthorized access.
A planned improvement that adds new features or optimizes existing functionality without altering the system's core purpose.
Poor environmental controls (like inadequate cooling or humidity control) can lead to hardware malfunction or damage, causing data loss and downtime.
Hardware can fail due to age, defects, or lack of maintenance, causing data loss or system unavailability.
Invalid data that should be rejected by the system.
The stage where the CPU processes data and carries out instructions.
Artificial intelligence software that uses knowledge stored in a knowledge base to solve problems.
Data at the upper or lower limits of valid input that should still be accepted.
A basic assertion about a specific relationship or property in the problem domain.
Basic assertions about relationships or properties.
The CPU fetches instructions and data from RAM and stores them in registers.
By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.
A network security system that monitors and controls incoming and outgoing traffic based on predetermined security rules.
A database stored in a single table or text file without structured relationships between separate tables.
AI adapts to different tasks and domains when properly programmed or trained.
Segments vary in size based on program needs.
User interfaces in a DBMS that facilitate data entry, modification, and viewing in a controlled layout.
A type of backup that copies all data and files every time it's performed.
A system capable of recognizing hand movements and sometimes facial emotions.
A backup rotation scheme that uses three generations of backups: daily (son), weekly (father), and monthly (grandfather).
A visual system for interacting with devices using windows, icons, menus, and buttons.
Unauthorized access to or manipulation of a computer system or network.
The physical components of a computer system such as the CPU, RAM, and hard drives.
A device managing communication between input/output devices and the CPU.
A programming paradigm that uses statements that change the program’s state.
A structured process or framework used to put a plan or project into action.
A schedule detailing tasks, responsibilities, and estimated time for completing a project.
A backup that saves only the data that has changed since the last backup.
A pointer-based structure derived from key fields that accelerates query performance at the cost of additional storage.
Final data address obtained by adding an offset to a base address.
Auxiliary data structures that speed up data retrieval by providing rapid access paths to rows based on key values.
The operand contains the address of another memory location holding the final address.
Fetches and interprets knowledge from the knowledge base to infer new facts and solve problems.
Information cannot be lost or changed from its original state.
A standardized form of connection defining signals, pins, and voltage levels.
A translator that converts and executes high-level language code line-by-line at run-time.
A collection of facts and rules forming knowledge in a specific area.
Index entry storing the size of the segment.
The smallest unit of language that cannot be broken down without losing meaning.
The process of converting characters into lexical tokens for the parser to understand.
A collection of pre-compiled routines or classes that programmers can reuse by linking or importing into their own programs.
A method of storing and backing up data on physical hardware like external drives or flash drives.
Segments match logical divisions of a program like functions or structures.
An error where a program follows incorrect logic and produces unintended results.
The primary, volatile storage (RAM) directly accessible by the CPU for currently executing programs and data.
Malicious software designed to harm, exploit, or otherwise compromise a computer system.
Holds the address of memory being accessed.
A bi-directional register holding data being transferred to/from memory.
RAM is divided into fixed-size page frames.
Memory is divided into variable-size logical units called segments.
Segments are allocated/deallocated independently.
Supports modular programming with separate modules as segments.
An operating system that allows two or more users to access a computer's resources simultaneously (e.g., Unix, Linux).
This virus infects the entire system. Multipartite viruses spread by performing unauthorized actions on your operating system, folders, and programs.
Programs consist of segments such as code, data, stack, etc.
Earthquakes, floods, fires, hurricanes, and other natural disasters can damage or destroy physical infrastructure such as data centers, servers, and network devices.
A system that allows interaction with computers using everyday human language.
An operating system designed to manage and facilitate resources and operations within a computer network.
Network viruses travel through network connections and replicate themselves through shared resources.
Pages can be stored in non-sequential memory locations.
Typical test data that should be accepted by the system.
Binary digits representing an operation and its addressing mode.
System software that manages computer hardware and software resources and provides services for application programs.
Programmers decide how to divide code into segments.
Like the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs.
When RAM is full, unused pages are swapped out.
OS manages paging transparently to the programmer.
A character string designed to protect data from unauthorized access.
Rules and guidelines that govern the creation, use, and storage of passwords.
A cyberattack that redirects users from legitimate websites to fraudulent ones to steal information.
A cyberattack where attackers pose as legitimate entities to trick users into revealing sensitive information.
Passing off somebody else's work as your own.
The tool analyzes the text for identical or similar structures and wording.
The system compares the text to a database of sources, including papers and websites.
The system identifies both exact copying and paraphrased content.
A human reviewer checks the report to confirm accuracy.
The tool generates a report showing plagiarism percentage and matching sources.
The process begins when a text is submitted to a plagiarism detection tool.
The document is broken into smaller elements like sentences or words.
The original interpretable and readable data before encryption.
A detailed document outlining steps, resources, and considerations needed to assemble and configure a system or software.
Power outages or surges can damage hardware, lead to data loss, and disrupt operations. Lack of proper power backup systems can make issues worse.
AI can mimic human actions like speech recognition, translation, and image recognition.
A field or combination of fields that uniquely identifies each record in a table and cannot contain NULL values.
Information that should be available only to authorized users.
AI solves problems using algorithms—from calculations to complex tasks.
Each process has its own page table for memory management.
A register that holds the address of the next instruction to be executed.
Programs/data are divided into equal-sized pages matching page frames.
A high-level programming language rooted in formal logic.
Segments can be protected or shared among processes.
A server that acts as an intermediary between a client and the internet, often used for security or performance purposes.
Structured requests (often written in SQL) used to retrieve, insert, update, or delete data held in a database.
Questions asked to the system to check whether conditions are met based on facts and rules.
A disk striping method that increases performance but offers no redundancy.
A mirroring method that duplicates data on two disks for redundancy.
A combination of RAID 1 and RAID 0, offering both redundancy and performance.
A method using data striping with distributed parity, allowing for data recovery if one disk fails.
Volatile memory that allows read/write access to any location in equal time, used for active programs and data.
This malware encrypts files on the target and then demands that a ransom be paid for the decryption key needed to decrypt the files.
A specialized operating system designed to provide predictable and guaranteed response times for critical tasks.
AI performs logical reasoning, infers patterns, and makes predictions.
A single row in a table representing one instance of an entity, consisting of individual field values.
Small, high-speed storage locations inside the CPU used to hold data, instructions, or addresses temporarily during processing.
Software updates that include security fixes addressing known vulnerabilities.
A database that organizes data into interrelated tables using keys and enforces relationships through relational integrity rules.
The process of backing up data to an offsite server or storage device for added security.
Formatted outputs that present database information in a readable, often printable, structure for analysis or distribution.
Resident viruses set up shop in your RAM and meddle with your system operations. They’re so sneaky that they can even attach themselves to your anti-virus software files.
An architecture using a small, optimized set of simple instructions.
Non-volatile memory containing firmware or boot code that can be read but not (normally) written during operation.
This malware is used by cybercriminals to gain administrator-account level access to a computer and control them remotely.
A conditional assertion describing a relationship based on facts or other rules.
Conditional assertions that describe relationships between facts or other rules.
An error occurring while a program is running that causes abnormal behaviour or termination.
A non-primary field or set of fields that can also uniquely identify a record and may be indexed for faster searches.
Techniques and technologies used to safeguard data and systems from threats (e.g., firewalls, encryption, access controls).
OS translates logical segment:offset addresses into physical addresses.
An operating environment that runs one application at a time, dedicating all CPU resources to it.
An operating system designed to support one user at a time (e.g., classic MS-DOS).
A type of phishing attack that uses SMS (text messages) to deceive users.
A set of instructions, data, or programs used to operate computers and perform specific tasks.
Human-readable text written in a specific programming language.
Malicious software designed to secretly collect data from a device without user consent.
Contains bits indicating conditions such as zero, carry, negative or overflow from the last instruction.
An index stores details about each segment.
A theoretical form of machine intelligence equal to human intelligence.
Unauthorized surveillance or eavesdropping can compromise sensitive information, including listening to conversations or intercepting data.
A type of encryption where the same key is used for both encryption and decryption.
Analysis of program syntax to ensure statements follow the grammar rules of a programming language.
The main communication channel connecting CPU, memory, and I/O controllers.
The process of assessing the performance of a complete system to understand how it will perform in real-world conditions.
Structured sets of rows and columns within a relational database that store records of a single entity type.
A document describing the test strategy, objectives, estimates, results, and resources needed for software testing.
Unauthorized physical access can lead to theft of equipment like laptops, hard drives, or servers containing sensitive data. Vandalism can also disrupt operations and cause data loss.
The strategic timing of employee training based on company and role needs.
Page tables map virtual addresses to physical addresses.
Installed by a user thinking it is a legitimate piece of software when, in fact, it will cause damage or provide access for criminals.
Malicious software that disguises itself as legitimate software to deceive users.
A data quality attribute indicating that stored data accurately reflect the real-world facts they represent.
A security method requiring users to provide two forms of identification to access an account.
A legally binding contract outlining terms for using a service; proof of user agreement confirms acceptance.
Allows non-expert users to interact with the expert system to find solutions.
The means of interaction between the user and a computer system.
System software that performs maintenance or optimization tasks such as backup, antivirus scanning, or disk defragmentation.
Software running on a host OS that simulates a standalone computer system.
Stores pages not currently in main memory on disk.
A simulated experience that can be similar to or completely different from the real world.
A program is hidden within another program or file, designed to cause damage to file systems.
Voice phishing; attackers use phone calls to trick users into giving personal information.
Machine intelligence that is limited to a specific or narrow area.
This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites.
AI systems operate with clear objectives created or programmed by humans.
Number of bits processed by the CPU at a time.
A standalone malware that replicates itself to spread to other computers.
A malicious program that acts independently and can replicate itself and spread throughout a system.