- IB
- Computer Science (First Exam 2027)
IB Computer Science Key Definitions
The IB Computer Science Key Definitions is a vital reference for IB Computer Science students (both SL and HL), offering a curated collection of critical terminology and phrases aligned with the IB curriculum. Designed to support you in Paper 1, Paper 2, and Paper 3, this resource ensures you have the right language tools at your fingertips.
On this page, you'll find an organized list of essential terms, complete with clear definitions, IB-specific usage, and examiner-focused context that helps you build confidence in understanding and applying subject-specific vocabulary.
With Jojo AI integration, you can reinforce learning through quizzes, contextual examples, or targeted term practice. Perfect for coursework, written assignments, oral exams, or exam preparation, RevisionDojo's IB Computer Science Key Definitions equips you with precise language knowledge to excel in IB assessments.
Key Definitions
A
Abstraction
Abstraction is the process of hiding implementation details and exposing only the essential features of an object.
Abstraction
Abstraction can be defined as hiding intricate details beneath a simpler, more manageable layer (or interface).
Actuators
Devices that effect changes in a system based on controller signals.
Application layer
The application layer provides the interface between applications and the network.
Augmented Reality
A technology that overlays digital content such as images, sounds, or data onto the real-world environment, enhancing how users perceive and interact with their surroundings.
Autonomous vehicles
Autonomous vehicles are complex control systems that rely on a sophisticated interplay of sensors, algorithms, and actuators.
B
Binary
Binary is a base-2 number system, using only two digits: 0 and 1. Each digit in a binary number is called a bit (short for binary digit).
Binary tree
gwoigwrpg
Buses
Buses are communication pathways that transfer data between CPU components and other parts of the computer.
C
Cache memory
Cache memory is a high-speed memory located close to the CPU, designed to store frequently accessed data and instructions.
Classification
A type of supervised learning where the goal is to predict discrete categorical outcomes.
Closed-loop systems
Continuously monitor output and adjust inputs based on feedback.
Clustering
Clustering is a technique used to group a set of objects so that objects in the same group (or cluster) are more similar to each other than to those in other groups.
Composite key
A composite key is a primary key that consists of two or more columns.
Compression
Compression is the process of reducing the size of data files to save storage space and improve transmission efficiency.
Control algorithm
A mathematical formula or logic that determines the system's output based on input data.
Control system
A control system is a set of devices that manage, direct, or regulate the behavior of other systems using control loops.
CPU Instruction Set
The instruction set is the collection of basic machine-level commands that a CPU is designed to understand and execute. such as load, store, add, compare, and jump.
It forms the CPU’s vocabulary and defines what operations it can perform.
D
Data Representation
Computers store and process data as numbers, specifically in binary. Since modern computer architecture relies on transistors which are either On (1) or Off (0)
Deadlock
Deadlock occurs when processes are stuck waiting for resources held by each other.
Denormalization
Denormalization is the process of intentionally introducing redundancy into a normalized database to improve performance.
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses and network configuration settings to devices on a network.
E
Embedded Multimedia Cards (eMMCs)
Embedded Multimedia Cards (eMMCs) are a type of flash storage integrated directly onto a device's motherboard.
F
Feature selection
Feature selection is the process of identifying and retaining the most informative attributes of a data set while removing those that are redundant or irrelevant.
Feedback
Monitoring and evaluating the output to influence future behavior.
Fetch-Decode-Execute
The basic operational process of a computer's Central Processing Unit (CPU), in which instructions are carried out:
- Fetch: The CPU retrieves an instruction from memory.
- Decode: The CPU interprets (decodes) the instruction to determine what action is required.
- Execute: The CPU performs the specified action, such as a calculation, data movement, or decision-making.
This cycle repeats continuously, allowing the computer to run programs and process data.
Firewalls
Firewalls are security devices that monitor and control network traffic based on predetermined rules. They act as a barrier between trusted and untrusted networks.
First-Come, First-Served (FCFS)
Processes are executed in the order they arrive, with no pre-emption.
Flash drives
Flash drives, also known as USB drives, are portable storage devices that use NAND flash memory.
Foreign key
A foreign key is a column (or set of columns) in one table that references the primary key of another table.
G
Gateways
Gateways are network devices that act as bridges between two networks using different protocols. They translate data formats and ensure seamless communication between disparate systems.
H
Hard Disk Drives (HDDs)
Hard Disk Drives (HDDs) are traditional storage devices that use magnetic platters and a read/write head to store and retrieve data.
Hexadecimal
Hexadecimal is a base-16 number system, using 16 digits: 0–9 and A–F (where A = 10, B = 11, ..., F = 15).
Home thermostats
Home thermostats regulate temperature using a simple yet effective control system.
Hybrid networks
Hybrid networks combine elements from different topologies (e.g., star and mesh) to optimize performance, reliability, and scalability.
Hyperparameters
Parameters set before training that cannot be learned from data.
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol (HTTP) is the foundational protocol for data communication on the World Wide Web.
I
Inheritance
Inheritance is a fundamental concept in object-oriented programming (OOP) that allows a class (subclass/child) to reuse and extend the attributes and methods of another class (superclass/parent).
Input
Data or signals fed into the system.
Internet layer
The internet layer handles packetization, addressing, and routing.
Interrupt Handling
Interrupt Handling involves a device sending a signal to the CPU, causing it to pause its current task and execute a specific routine to address the event.
L
Linear Regression
A statistical method used to model the relationship between a dependent variable (also known as the response variable) and one or more independent variables (also known as predictor variables).
Local Area Netwrok (LAN)
A LAN connects devices over a short distance, typically within a building or campus.
Logic diagrams
Logic diagrams are visual representations of how logic gates are connected and interact within a circuit.
Logic gates
Logic gates are the building blocks of digital circuits. They perform Boolean operations on one or more binary inputs to produce a single binary output.
Lossless compression
Lossless compression runs an algorithm to compress the data, the algorithm can then be reversed to restore the data. This ensures that the original data can be perfectly reconstructed from the compressed version.
Lossy compression
Lossy compression reduces file size by discarding some data that is less noticeable or redundant, resulting in an approximation of the original content.
M
Memory cards
Memory cards are small, removable storage devices used in cameras, smartphones, and tablets.
Mesh topology
In a mesh topology, devices ( nodes) connect directly to multiple other nodes, creating a mesh-like structure.
Modems
Modems (Modulator-Demodulators) convert digital data from a computer into analog signals for transmission over telephone lines or broadband connections.
Modularization
Modularization is the process of dividing a program into independent, interchangeable modules.
Multi-Threading
A thread is a lightweight process, the smallest unit a CPU schedules.
Multi-threading allows a single core to handle multiple threads by rapidly switching between them, sharing execution resources.
Multilevel Queue Scheduling
Divides the ready queue into multiple queues, each with its own scheduling algorithm and priority.
Multitasking
Multitasking is the ability of an operating system (OS) to manage and execute multiple processes simultaneously.
N
Network Attached Storage (NAS)
Network Attached Storage (NAS) devices provide centralized storage accessible over a network.
Network interface layer
The network interface layer deals with the physical transmission of data.
Network topology
Network topology is the arrangement of devices ( nodes) and connections ( links) within a network. It can be physical (the actual layout of cables and hardware) or logical (how data flows across the network).
NICs
NICs are hardware components that enable a device to connect to a network. They convert electrical signals into digital data and vice versa.
O
Open-loop systems
Execute predefined operations without feedback.
Operating system (OS)
An operating system (OS) is the bridge between the user, applications, and the hardware of a computer system. It abstracts the complexities of hardware, managing system resources and providing a stable environment for applications to run.
Optical drives
Optical drives read and write data to optical discs such as CDs, DVDs, and Blu-ray discs.
Output
The system's response or behavior.
P
Packet switching
Packet switching is a method of transmitting data by dividing it into smaller units called packets.
Personal Area Network (PAN)
A PAN is designed for personal use, typically within 10 meters.
Pervasive AI
The seamless integration of artificial intelligence into everyday objects, environments, and systems, enabling them to continuously collect data, learn, and make intelligent decisions in real-time to enhance user experiences and automate tasks.
Pipelining
Pipelining is a technique that allows multiple instructions to be processed simultaneously by dividing the execution process into distinct stages. While one instruction is being executed, the next can be decoded, and a third can be fetched, all simultaneously, but in different stages of the pipeline.
Polling
Polling is a technique where the CPU repeatedly checks the status of a device at regular intervals to see if it needs attention.
Polymorphism
Polymorphism means “many forms” - the ability of objects to take on different forms depending on context.
Primary key
A primary key is a unique identifier for each record in a table.
Priority Scheduling
Assigns a priority to each process, with the CPU allocated to the highest-priority process.
Process
Manipulation or transformation of input data.
Q
Quantum Computing
Uses quantum bits (qubits) and mechanical phenomenons of superposition and entanglement to perform operations, enabling unprecedented computational power.
R
Random-Access Memory (RAM)
Random-Access Memory (RAM) is the primary workspace of a computer, storing data and instructions that the CPU actively uses.
Read-Only Memory (ROM)
Read-Only Memory (ROM) is a non-volatile memory that stores essential instructions for booting the computer.
Recursion
Recursion is a programming technique where a function calls itself to solve a problem. It is particularly useful for problems that can be broken down into smaller, similar subproblems.
Registers
Registers are the fastest and smallest type of memory, built directly into the CPU.
Registers
Registers are small, high-speed storage locations within the CPU.
Relationships
Relationships define how tables are connected in a relational database.
Resource allocation
Resource allocation involves distributing system resources like CPU time, memory, and I/O devices among these processes.
Resource contention
Resource contention occurs when multiple processes try to access the same resource simultaneously.
rlkf
Round Robin
Each process receives a fixed time slice (quantum) in a cyclic order.
Routers
Routers are devices that direct data packets between networks. They determine the optimal path for data transmission using routing protocols and routing tables.
Run-Length Encoding (RLE)
Run-Length Encoding (RLE) is a lossless data compression technique that replaces consecutive repeating occurrences of a symbol with a single instance of the symbol followed by a count of its repetitions.
S
Scheduling
Scheduling is the process of allocating CPU time to various processes to optimize system performance.
Secondary Storage
Secondary storage is non-volatile memory used to store data permanently, even when the computer is turned off.
It holds files, applications, and the operating system for long-term use.
Sensors
Devices that detect and measure physical quantities, converting them into signals
Sensors
Devices that detect and measure physical quantities, converting them into signals.
Sign and Magnitude
A signed binary integer representation that uses the MSB to indicate 0 for + and 1 for - while the remaining place values indicate the number being represented.
Solid State Drives (SSDs)
Solid State Drives (SSDs) are a type of non-volatile storage that use flash memory to store data. Unlike HDDs, SSDs have no moving parts, which makes them faster, more durable, and more energy-efficient.
Star topology
A star topology connects each device directly to a central device (usually a switch or hub), forming a star-like structure.
substring
A substring is a portion of a string, obtained using an index or slicing operation.
Switches
Switches connect devices within a Local Area Network (LAN). They manage the flow of data by forwarding packets to the correct destination based on MAC addresses.
T
Tables
Tables are the core structure of a relational database, where data is organized into rows and columns.
Task scheduling
Task scheduling is the process of determining the order and timing of process execution.
Transducers
Devices that convert one form of energy or signal into another.
Transform coding
Transform coding is a lossy compression technique that converts data from the spatial or time domain into a different mathematical representation, typically using frequency-based transformations like the Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT).
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is a connection-oriented protocol that ensures reliable and ordered delivery of data between devices on a network.
Transport layer
The transport layer ensures reliable communication between hosts.
Two's Complement
Two's complement is a method for representing signed (positive, negative, and zero) binary numbers in computers. It's the most common way to represent integers in digital systems, enabling the use of the same hardware for both addition and subtraction operations.
U
User Datagram Protocol (UDP)
User Datagram Protocol (UDP) is a connectionless protocol that provides faster but less reliable data transmission compared to TCP.
V
Virtual Private Network (VPN)
A VPN extends a private network across a public network, such as the internet.
Virtual Reality (VR)
A technology that generates fully immersive digital environments, allowing users to interact with and experience a simulated world that replaces or enhances their perception of the real world.
W
WAPs
WAPs extend a wired network by providing wireless connectivity. They convert wired Ethernet data into wireless signals and vice versa.
Wide Area Network (WAN)
A WAN connects devices across large geographic areas, such as cities or countries.