
554
INDEX
bus network topology 28, 37, 39, 542
by reference method 275, 277–8, 542
bytecode 152–3
bytes 6–7
by value method 275, 277, 542
C
cache memory 68, 69, 71, 108, 113, 542,
547
Cambridge Analytica scandal 193
candidate keys 197, 200–1, 542
capacitive touch screens 69, 82–3, 542
carrier sense multiple access with
collision avoidance (CSMA/CA) 335
carrier sense multiple access with
collision detection (CSMA/CD) 29,
51, 543
car sensors 86–7
CASE statements 222, 223, 271–3
CDs 75–6
cellular networks 56
central processing unit (CPU) architecture
107–20
components 109–10
computer ports 108, 114–16, 549
fetch-execute cycle 108, 116–18, 544
interrupts 108, 118–19
registers 108, 109, 110–11, 550
system buses 109, 112–14
certificate authority (CA) 416, 418, 420,
421, 542
character set 2, 12, 542
chatbots 435, 442–3, 542
check digits 169, 171, 542
checksums 169, 172, 340, 542
ciphertext 410, 411, 542
circuit switching 55, 337, 338, 542
comparison with packet switching
340–1
CISC (complex instruction set computer)
347, 348, 542
classes 307, 498, 501, 542
classless inter-domain routing (CIDR)
54, 58, 59, 542
CLI (command line interface) 137,
138–9, 542
client/server network model 28, 32–4,
35–6, 542
clock cycle 108, 113, 542
clock page replacement 388–9
close (file processing) 525, 542
cloud software 41
cloud storage 28, 39–41, 543
clusters 347, 352, 543
CMOS 137, 138, 543
coaxial cables 28, 44, 543
code generation 394, 395, 397, 543
codes of conduct 180–3
coding 283, 284, 285, 286, 543
collisions 29, 50–1, 543
colour depth 15, 16, 24, 543
coloured images 24
colouring monochrome photos 442
combination circuits 354, 358, 543
command line interface (CLI) 137,
138–9, 542
commercial software 187
communication 27–67, 328–45
circuit switching and packet switching
337–43
internet see internet
networking 28–53
protocols 328–37
compare instructions 125
compilation, stages in 395–8
compilers 149, 151–2, 155, 394–5, 543
composite data types 238, 240, 306–7,
543
composite key 197, 543
computational thinking skills 450–97
algorithms see algorithms
recursion 490–4
skills 217–19
computer-assisted translation (CAT) 441
computer ethics 180–1
conditional instructions 125
conditional loops 456
confidentiality 411
conflicts 29, 50, 543
constants 264, 265–71, 543
constructors 499, 515–16, 543
containment (aggregation) 499, 514–15,
543
context switching 373, 379, 381, 543
contiguous 137, 140, 543
single (contiguous) memory allocation
383
control 85–7, 130, 131–2, 543
control bus 108, 112, 543
control unit 108, 109, 110, 543
copyright issues 186–9
cores 108, 113, 543
corrective maintenance 294, 299, 543
count-controlled loops 274, 275
criminal justice system 192
cross-coupling 354, 358–9, 543
CSMA/CA (carrier sense multiple access
with collision avoidance) 335
CSMA/CD (carrier sense multiple access
with collision detection) 29, 51,
543
culture 179, 543
current instruction register (CIR) 108,
110, 116, 117, 543
cyclic shift 130, 543
D
database management systems (DBMSs)
208–10, 543
databases 196–208, 543
normalisation 203–7
data bus 108, 112, 543
data definition language (DDL) 211–12,
543
data dependency 209
data dictionary 208, 209, 543
data entry, verification during 170–2
datagrams 330
data hiding 498, 503, 543
data inconsistency 209
data integrity 169–76, 411, 543
data input instructions 124
data-link layer 329, 330, 334–7
data loss
in cloud storage 40–1
preventing 160–4
data management 208, 209, 543
data manipulation language (DML) 211,
213–14, 543
data modelling 208, 210, 543
data movement instructions 123–4
data output instructions 124
data privacy 159, 160, 543
data protection laws 159, 160, 543
data recovery 167
data redundancy 28, 40, 209, 543
data representation 2–15, 304–27
ASCII code 2, 12–14, 541
file organisation and access 308–11
floating-point numbers 312–25
number systems 2–12
Unicode 2, 14, 15, 552
user-defined data types 304–7, 552
data security 40, 159–68, 410–24, 543
digital signatures and digital
certificates 418–23
encryption 160, 163, 410–14, 544
protocols 416–18
quantum cryptography 414–15, 549
when using cloud storage 40–1
data transfer, verification during 172–5
data types 238–41, 543
abstract see abstract data types (ADTs)
composite 238, 240, 306–7, 543
non-composite 305–6, 547
debugging 150, 155–6, 543
declarative programming 499, 521–4,
543
decomposition 217, 219, 330, 543
deep learning 434, 435, 439–43, 543
default 273
defragmentation software 144–5
De Morgan’s Laws 355
denary numbers 2, 7–8
converting between binary numbers
and 2–3
converting binary floating-point
numbers into 314–17
converting into binary floating-point
numbers 317–25
design 283, 284, 285, 286, 543
destructors 499, 515, 517, 543
developer interface 209, 210, 543
device driver 137, 543
dictionaries 451, 488–9, 544
digest 418, 419, 420, 544
digital certificates 418, 420–2, 544
digital rights management (DRM) 186,
187, 544
digital signatures 162, 418, 419–20, 544