
352
GLOSSARY
Relative reference Automatically adjusts a cell reference within
a spreadsheet to refer to different cells relative to the
position of the formula during the replication process.
REPEAT…UNTIL A type of loop found in algorithms where the
instructions are executed at least once and then repeated
until the condition is true.
Reverb A shortened form of reverberation, which is an
electronically produced echo effect in recorded music.
Rich text format A file format (.rtf) used for text-based files
that saves the formatting within the document, so allowing
some formatting to be passed from one application package
to another.
RIGHT Function in Microsoft Excel which returns a given number
of characters from the end of a text string.
Rootkit A type of malware that allows an attacker to have
remote access to a victim’s computer continuously.
ROUND Function in Microsoft Excel that rounds a number to a
specified number of decimal places.
ROUNDDOWN Function in Microsoft Excel that rounds a number
down to a specified number of decimal places.
ROUNDUP Function in Microsoft Excel that rounds a number up to
a specified number of decimal places.
.rtf See Rich text format.
Rules base The set of rules applied by an inference engine of
an expert system, usually consisting of series of IF…THEN
statements.
Sandbox A virtual environment within which virus codes are
allowed to be executed to observe their behaviour.
SEARCH Function in Microsoft Excel that returns a number to
represent the position of the first character or text string
that matches a given character or text string.
SECOND Function in Microsoft Excel that returns a number
between 0 and 59 as the number of seconds shown on a clock
from a given time.
Sector Smallest unit of data storage within a disk drive and a
subdivision of a track.
Secure sockets layer (SSL) The predecessor of transport
layer security (TLS); found to have many security flaws
and replaced by TLS which provided greater security when
transmitting data.
Sensor Converts a physical characteristic, such as temperature,
light or pressure, into a signal which can be measured
electrically by a computer.
Sequential access A method of accessing data on a medium, by
having to read through all the preceding data first.
Server A computer that provides data to other computers
connected to it on a network. There are many types of server
including application servers, file servers, mail servers, and
web servers.
Shell The major part of an expert system; usually consists of the
user interface, explanation system, inference engine, and
knowledge base editor.
Signature-based detection A method of detecting viruses based
on recognising existing viruses.
Smart home Uses computers and a router to enable control of
devices within the home.
Smart motorway Section of motorway that uses active traffic
management.
Smishing A variation of phishing whereby an SMS is used rather
than an email to try to obtain personal banking details.
Spyware A type of malware designed to collect information
about a computer user’s activities without their knowledge.
SSH (secure shell) An encryption protocol used to enable
remote logging on to a computer network, securely.
String A type of data that contains characters and may include
text, punctuation, numbers. The term is often interchanged
with the term ‘alphanumeric data’.
SUBTOTAL Function in Microsoft Excel that calculates the
function for a range of value or cells. The parameters passed
to this function determine how it will work; for example it
could be used to calculate the SUM, the AVERAGE and so on.
SUM Function in Microsoft Excel that adds up a list of numbers or
specified cells.
SUMIF Function in Microsoft Excel that looks at the cells within a
given range and adds the total from those cells that meet a
given condition.
SUMIFS Function in Microsoft Excel that looks at the cells within
a given range and adds the total from those cells that meet a
number of given conditions.
Summit A supercomputer which, as of the beginning of 2020,
was the world’s fastest supercomputer.
Supercomputers The largest and fastest computers available.
Symmetric encryption Encryption which uses the same key to
encrypt and decrypt a message, a public key. Often regarded
as a faster process, it is less secure than asymmetric
encryption.
System software Programs that run and control a computer’s
hardware and application software.
Table A two-dimensional grid of data organised by rows and
columns within a database. Each row of the table contains a
record. Each column in the table represents a field and each
cell in that column has the same (predefined) field type.
TEXT Function in Microsoft Excel that changes the formatting of
the current cell from a numeric or date/time value into text
format.
Text file A file format (.txt) used for text-based files that
contain an unformatted ASCII file, although there are file
format variations depending upon the operating system.
These files can be opened in any word processor.
Track Part of the surface of a disk platter which stores data,
with each track containing several sectors.
Transaction In IT terms, when a computer makes an amendment
to a database, be it adding, deleting or changing values in a
record, a transaction is said to have been carried out.
Transaction file A file which contains all ongoing transactions
in a batch-processing system.
Transaction processing A form of processing which can consist
of more than one computer processing operation, but these
operations must combine to form a single transaction.
Transport layer security (TLS) An improved version of the
secure sockets layer (SSL) protocol and which has now
superseded it. The term SSL/TLS is still sometimes used to
bracket the two protocols together. It is used to provide
secure transfer of data when accessing web pages.
Trojan horse A type of malware usually obtained as a result of
the user thinking they have downloaded authentic software.