17th Test Flashcards

(163 cards)

1
Q

ADSL

A

Asymmetric digital subscriber line: permanent digital connection to the internet by means of copper cables and a landline/telephone to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Software causing unwanted content to automatically display or download while browsing the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-virus

A

Scans files for malware and eliminates it using signatures and definitions to detect malware and prevent practices which increase the risk of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AR

A

Augemented reality is a technology placing interactive digital content over real scenes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Archive

A

Moving messages from the inbox to an archive folder without deleting them./Removing files which are not in use and storing them in a compressed location for saving space and later use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aspect ratio

A

Relationship between the width and height of the display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bandwidth

A

Total amount of data that can be transferred from one point to another in a given period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bandwidth theft

A

Unauthorised access to wireless bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Big data

A

Large amounts of structured and unstructured data analysed using computers to reveal trends and associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biometrics

A

Inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blog/Vlog

A

A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order. A vlog is a video form of blog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bookmark

A

Identifies a location or selection of text that you name and identify for future reference./Keeps track of a website for easy future reference, typically on the home page or under the search bar of a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bots

A

Perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Broadband

A

High speed, high bandwidth connection to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Browser add-ons/extensions/plug-ins

A

A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Browser caching

A

Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bug

A

Unintentional errors made in programming fixed through updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BYOD

A

Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CD

A

Compact disc: an optical disc format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Click-jacking

A

An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cloud computing

A

A general term that refers to the sharing and use of resources and applications offered as services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CMYK

A

Cyan, Magenta, Yellow and Black

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Colour depth

A

Number of bits used to represent a colour, the higher the better (max 32 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Computer Worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
26
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
27
Considerations for internet
1. Shaped/unshaped 2. Cap 3. Mobility 4. Line speed
28
Contrast ratio
Relationship between the darkest black and lightest white - higher is better, lower is muddy
29
Convergence
Separate technologies and functions previously requiring multiple devices overlapping into a single device.
30
Piracy
Movies, music, games, books or programs in electronic format are copied without being paid for known as piracy
31
Count and text functions in excel
COUNT() counts cells with number COUNTA() counts cells that are not empty COUNTIF(), COUNTIFS() counts cells meeting conditions LEN() length of text LEFT(), RIGHT(), MID() extracts UPPER(), LOWER(), PROPER() changes case CONCATENATE() or CONCAT() or & joins text strings
32
CPU
Central processing unit: hardware component processing data and carrying out instructions
33
Crowdfunding
A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme
34
Cyberbullying
The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.
35
Cyberstalking
People who are intruding in other peoples personal details online.
36
Cyberterrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
37
Data/Intellectual property theft
Data can be physically copied onto a storage device or intercepted during transfer over a network
38
DDR
Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.
39
Defragmentation
Fragmentation occurs when different parts of a file become scattered across a hard drive, meaning that each time the file needs to be accessed, the scattered parts must be rejoined causing the file to open slowly. Defragmentation is placing the parts of the file in the same place to speed up the opening of files.
40
Difference between minimum and recommended system requirements
Minimum system requirements are what is needed of one’s computer in order for software to function at all whilst recommended system requirements are what is needed for the software to function at its best.
41
Difference between single user and multi user operating systems
Single user operating systems allow for multiple users to use the computer at once whilst multi user operating systems allow for several users to access the computer at the same time such as linux or networks.
42
Difference between web based and installed applications
Web based applications are accessed online and do not need to be installed to the local computer/drive whilst installed applications do not need an internet connection to access and are installed to the local computer/drive
43
Digital divide
The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.
44
DIMM
Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.
45
Disk cleanup
Frees up storage through removing temporary files, etc.
46
Disk scanner
Checks a drive for errors and tries to fix them.
47
DoS
A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.
48
dpi
Dots per inch/pixel density: how many pixels displayed in 1” horizontal line, higher is better
49
DSLR
Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.
50
DVD
Digital versatile disc: a form of optical disc
51
E-communication
Use of technologies to transfer digital data using computers, smartphones, tablets and networks like the internet
52
Effects of technology (positive/negative)
Employment Education Culture and language Individual connectedness
53
Email
Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.
54
Entry-level computer
Cheap to purchase with low hardware specifications and fewer default features
55
EULA
End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.
56
Examples of file attributes
Properties which can be set such as read only and hidden
57
Fibre
Data is transmitted along glass tubes underground allowing it to be faster
58
File sharing
Done through email, FTP or online storage
59
FTP
File transfer protocol: used for transfer of files between computers on the internet
60
Date and time functions in excel
Now() date and time Today() gives date Day(), Month(), Year() extracts Hour(), Minute(), Second() extracts
61
GAN
Global Area Network: A form of worldwide network such as the Internet.
62
GHz
Gigahertz measures the processing power of the CPU, having multiple cores is similar to having more than one processor on one chip
63
Government internet services
Provide an opportunity for government departments to streamline service delivery to the public
64
GPS
Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.
65
Grid computing
A system where computational resources of multiple computers from different locations are pooled together to work collaboratively on one problem or task. Eg. SETI@Home initiative
66
HDD
Hard disk drive: a mechanical drive and secondary storage device using mechanical parts to magnetically store data and programs
67
HDMI
High definition multimedia interface: a single cable interface transmitting high-definition video and sound offering better quality images due to digital signals
68
How can one identify fake emails/scams?
Being aware of phishing and scam and ensuring that email addresses and contact attempts are verified. Assume nothing, believe no one, check everything.
69
What is required for internet access?
A device, an ISP and a form of internet connection
70
How is the task manager accessed and what does it do?
ctrl+alt+del; provides information about the computer’s performance and running applications and processes.
71
HTTPS
HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP, the protocol to transfer web pages and their content across the internet.
72
ICT
Information and communication technology: use of computer-based technology and the internet to make information and communication services available for a wide range of users
73
Identity theft
Obtaining a user's identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim's name. Eg: Banking information
74
IM
Instant Messaging: The exchange of text messages through a software application in real-time.
75
Impact of ICT
1. Global scale communication 2. Work, business and competition on a global scale 3. Difficult to control and/or restrict information 4. Telecommuting 5. Computer fraud 6. Information Overload
76
Information overload
Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can't cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.
77
Internet
Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.
78
Internet precautions
Be careful installing free software, ensure sites are encrypted, have good passwords, stay informed. Don't click on links or open attachments in untrusted emails, don't click on pop-ups, don't give out personal information, don't perform sensitive tasks on public computers.
79
Internet services
1. Realtime messaging: online exchange of messages 2. VoIP 3. Video conferencing: allows online conferences using a computer network as if they were in the same room 4. Cloud computing: sharing and use of resources and applications offered as services over the internet 5. Online storage: storage location appears to the user as a folder as if it were part of their own computer, but is stored on an online server 6. File sharing: email, FTP, online storage 7. Grid computing 8. Government internet services: government departments streamline service delivery to the public
80
Intranet
Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.
81
IoT
Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.
82
IP Address
Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses. IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.
83
Is more bandwidth allocated for uploads or downloads?
Dowloads
84
ISO rating
A digital camera’s sensitivity to light. Higher ISO ratings are better.
85
ISP
Internet service provider: a company with a permanent, fast connection to the internet selling internet access and services to individuals/organisations for a fee
86
Keylogger
A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.
87
LAN
Local Area Network: Network that connects computers and other devices within a limited geographical area, such as a school, office building, or campus.
88
LTE
The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.
89
Malware
Software harmful to the computer written with negative intentions
90
Money theft
Confidential information is taken which allows access to bank accounts or card skimmers, video cameras at ATMs or internet related scams (cons)
91
Network
A collection of computing devices that are connected via some form of medium.
92
New technology
1. Faster, cheaper, smaller, more powerful 2. Longer battery life 3. Easier and more effective input and output
93
Non-portable computer systems
1. Servers: powerful computer providing resources to the computers linked in its network 2. Desktops
94
OCR
Optical Character Recognition: technology that converts text within an image into editable and searchable text by analysing the image and translating the text into a standardised format such as UNICODE.
95
Online storage
Disk space that is allocated to you on a server on the internet. Accessible wherever you can log into the server.
96
Online Survey
A method of gathering data about a specific topic to later analyse it, using the internet to gather the data in question.
97
OS
Operating system controls activities taking place on a computer, proving user interface, managing programs and hardware and providing basic security
98
OS system utilities
1. File management 2. Backup 3. Scheduling 4. Printer management
99
PDF
Portable Document Format: A file format used to distribute documents that is independent of the application in which they were created. It can be read using a free utility program called Adobe Reader.
100
Pharming
A scamming practice where a user's web traffic is automatically redirected to a bogus website, even if the correct URL for the official site is entered. This allows criminals to capture any data the user enters, such as passwords and PINs.
101
Phishing
A scamming technique where users are enticed, usually via email, to click on a link to a fraudulent website in order to trick them into providing personal and confidential information, such as banking details, PIN numbers, and passwords, often by posing as a legitimate organisation.
102
Portable computers
1. Laptop/notebook 2. Tablet 3. Hybrid computer 4. Phablet (smartphone with a screen larger than 5”) 5. Smartphone
103
POS
Point of Sale: The software used in shops and supermarkets to manage tills, often linked to stock control systems designed to expedite the sale of goods and services in retail environments.
104
Primary Storage
Fast and typically electronic volatile memory holding instructions used by the computer whilst it is on. Eg: RAM, ROM
105
Printers
1. Inkjet: best for images, cheaper than laser, high running cost, low text print quality, slower than laser 2. Laser: faster than inkjet, high quality text, low running cost, uses toner 3. Dot matrix: cheap, low running cost, low print quality, uses ribbon, create carbon copies 4. 3D printer: creates physical three-dimensional objects designed on a computer 5. 300 dpi for text is good
106
Processing and time power theft
When criminals have a large task they need to execute, they take processing power from computers they don't own using a botnet
107
QR
Quick response code: A two-dimensional square barcode capable of storing significantly more data than traditional barcodes. QR codes can be scanned using a mobile device camera to access encoded information.
108
RAM
Random access memory: Primary short-term, volatile memory that temporarily stores programs and instructions currently loaded.
109
Ransomware
Malicious software that encrypts data on a computer or network, making it inaccessible to the user until a ransom is paid to the attacker.
110
Real-time messaging
Online exchange of messages (also images, video and voice) in real time. It includes IM (e.g. WhatsApp) and chat.
111
Refresh rate
How often the screen display is refreshed - higher refresh rate is better, low refresh rate leads to ghosting
112
Resolution
Highest number of pixels supported by the display given as horizontal pixels by vertical pixels
113
RFID
Radio Frequency Identification: A technology that uses small radio devices, typically smaller than a grain of rice, to store and transmit data via radio signals, allowing identification and data transfer to a receiving device.
114
USB
Universal Serial Bus: Standardised serial bus to connect most types of peripherals to the motherboard. It transfers data and power.
115
ROM
Read only memory: a non-volatile memory which stores the instructions needed for the computer to switch on (check hardware, find and load the operating system) after which control is given to the operating system
116
RSS
Really Simple Syndication – a technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines – all from many different sites.
117
Scam
Falsities which can be conducted online aiming to gain money or personal information through trickery
118
Screen-lock pattern
A security feature on mobile devices where a pattern, drawn or traced on the screen with a finger, is used to unlock the device.
119
Secondary Storage
Permanent, non-volatile storage storing programs and data on the local computer
120
Security tools
1. Access control: prevents malware from being installed without consent/knowledge by verifying software installations 2. Firewall: a barrier between the computer and the internet, filtering network traffic 3. Security settings
121
Shaped/unshaped
A shaped internet connection is an internet connection where preference is given to certain services on the internet, such as email, downloading and browsing. Other services, such as online gaming and VoIP, are given less preference and are slower.
122
SIM
Subscriber identity module: a removable card inside a cell phone that stores data unique to the user, allowing the network provider to provide services
123
SMS
Short message service: allowing for the exchange of text messages between devices
124
Social engineering
The use of deception and psychological manipulation to trick individuals into divulging confidential information, providing unauthorized access to computer systems, or performing actions that may compromise security. This can include impersonation, installing malware, or other fraudulent activities.
125
Social networking
Allow people to connect with each other and share information (Facebook, Twitter, Kickstarter, Waze, Yelp, Pinterest, Foursquare) typically for free after registration, encouraging users to get others to join. Hackers can gain money by getting and selling users' information
126
Spam
The electronic equivalent of junk mail, specifically referring to unsolicited email advertisements or messages sent to users without their request or consent.
127
Spoofing
The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL.
128
Spyware
Software that covertly installs malware on a user's device to intercept and collect their data without their informed consent. This may include keystroke logging or other methods to monitor and report user activities to third parties.
129
SSD
Solid state drive: an electronic storage device with no moving parts and a flash memory to store programs and data allowing for faster disk access than HDD
130
Throttle
When an Internet Service Provider (ISP) intentionally slows down the internet connection speed of a user who is consuming excessive amounts of data. This is typically done based on the ISP's acceptable use policy (AUP), which defines thresholds or conditions under which throttling may occur to manage network congestion or ensure fair usage among subscribers.
131
Tools to use the web efficiently
1. Caching 2. Add-ons/extensions 3. History 4. Blocking websites 5. Home page settings 6. Pop-up blocker 7. Bookmarks
132
Track changes
A feature in word recording and displaying modifications made to a document allowing users to review and accept/reject changes made during collaborative editing.
133
Trojan
A type of malicious software that masquerades as a legitimate or useful program, but when executed, it causes harm to a computer system.
134
Types of compatibility
1. OS Compatibility 2. Compatibility between different versions of the same application
135
Types of computer systems
Portable or non portable
136
Types of software
1. Application software 2. Reference software 3. Web browsing software 4. Email software 5. Document management software 6. Voice recognition software 7. Note-taking software 8. Education/training software
137
Types of users
1. SOHO: Small Office Home Office executes their business from their home 2. Personal: do not depend on their technology for many things 3. Mobile: any of the categories, but needing their devices to be portable 4. Power: need top range hardware and software
138
USB 2, USB 3, USB C
In terms of transfer speed, USB C > USB 3 > USB 2
139
User-centred design
Aim to develop interfaces that are attractive, easy to use and minimise input errors.
140
VDSL
Very high speed digital subscriber line: ADSL improvement offering faster speeds
141
Video conferencing
Allows people to hold online conferences using a computer network
142
Virtual communities
A group of people who gather online to share ideas and interests.
143
Podcasts
A series of on-demand digital audio files that typically focus on a specific topic or theme, available for streaming or downloading over the internet.
144
VoIP
Voice Over Internet Protocol: A technology that enables voice and multimedia communications to be transmitted over IP networks, such as LANs, WANs, and the internet. VoIP allows users to make telephone calls to others with VoIP systems anywhere in the world, leveraging internet connectivity for communication.
145
VR
Virtual reality uses computer-based technology to create a simulated environment that immerses users and allows them to interact with a 3D, computer-generated environment.
146
WAN
Network spread over a wide geographical area
147
PAN
Personal Area Network: A network organised around an individual or a small group, typically with a range of a few metres, used to communicate between personal devices such as PCs, smartphones, smart wear, and tablets.
148
HAN
Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.
149
What are accessibility options in Microsoft Word?
Screen readers, text-to-speech, positioning of text and graphical elements need to be inline, providing alternative text to images, high contrast modes, etc. Accessibility options allow for those who do not interact with the world to the typical full potential due to differences in sight, hearing or physical impairments.
150
What are factors which influence performance of a computer?
1. Memory 2. CPU 3. Storage 4. Presence of malware
151
What are risks of human input
1. Accuracy and validity 2. Security
152
What are slots and ports?
Ports and slots allow for peripherals to be connected to computers such as HDMI ports and RAM slots
153
What are the rules for email attachments?
There are guidelines for sending email attachments such as supported formats and file size limits. Any attachment to an email not meeting these guidelines will need to be sent using a different medium.
154
What services can an ISP provide?
Email, web hosting, broadband, spam filtering, wired and wireless internet access, fax-to-email
155
Why are computers and ICT used?
Efficiency, reliability, accuracy, accessibility and communication
156
Wikis
A website that allows multiple users to collaborate by adding, editing, and modifying content collectively. An example is Wikipedia, where users can contribute and edit articles collaboratively.
157
Wired connections
1. ADSL 2. Fibre
158
Wireless connections
Cellular technology allowing wireless connection to the internet using an existing cellular network, a computer can access this using a dongle.
159
WWW
World Wide Web: A service on the internet that comprises a vast collection of multimedia, interactive documents stored on servers worldwide. These documents are interconnected and accessed using HTTP (Hypertext Transfer Protocol).
160
Card skimmer
Device that reads the magnetic data from a bank card.
161
Card reader
Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.
162
Optical Disc
A secondary storage device that stores programs and data using lasers, e.g. DVD, CD
163
PIN
Personal Identification Number: A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards.