General Flashcards

1
Q

Text, numbers and images in a format suitable for use by computers

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software used to remove malware from a computer system

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A wild card used in database queries

A

Astirisk (*)
Hashtag (#)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of printer that uses plastic to print

A

3D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A file format that can be used to share data between applications

A

CSV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A word processing option that allows you to apply different footers in the same document

A

Section Break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of network with a very high level of security, that can be accessed over the internet

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The evaluation of information that focuses on whether that information is still applicable

A

Currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An update that corrects a single error found in software

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of program that infects a computer and tracks the user’s internet activities

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Raw numbers or facts that are unorganised

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A device used on a network to manage and share resources

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An internet technology that enables people from various countries to communicate in real time

A

VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This user generally requires a good quality graphics card

A

Gamer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firmware containing instructions for the start-up of a computer

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An example of HTML code used to open a picture in a new browser window

A

<a></a>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A technology that uses a person’s unique physical characteristics to control access

A

Biometrics

18
Q

A reason why certain documents display unreadable content when you open it on your computer, even though you have an appropriate application

A

Software Version

19
Q

An arrangement for employees to work from home using ICTs

A

Telecommuting

20
Q

A spreadsheet error message that will appear if you enter the following function: =AVG(B1:B20)

21
Q

A program that enables a user to organise his/her files and folders

22
Q

An application most suited for data analysis

A

Spreadsheet

23
Q

Software that attempts to collect information about a user without his/her permission

24
Q

A spreadsheet function that extracts text data

25
**A standard used in wireless communication that provides high-speed data transfers**
LTE | Long-Term Evolution ## Footnote Is a fourth generation [4G] wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third generation [3G] technology
26
**Certain internet services are given bandwidth preference over other services**
Shaping ## Footnote When an internet service provider reduces the available bandwidth to a single customer. *[Keep in mind that THROTTLING is across an entire network not a single customer]*
27
**An important consideration when purchasing a monitor**
Resolution
28
**A hardware component that will improve the performance of a computer**
RAM
29
**Type of network that connects offices of a company that are located in different cities**
WAN | Wide-area Network ## Footnote The technology that connects your offices, data centers, clould applications and cloud storage together
30
**Unwanted e-mail sent to a large number of users**
Spam ## Footnote Any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email.
31
**A legal agreement between a software company and a user for the use of their software**
EULA | End-User License Agreement
32
**A utility program that can free up space on a storage medium**
Disk Clean-Up
33
**The act of opening a bank account using someone else's personal details**
Identity Theft
34
**A spreadsheet function that totals the values in a range based on a certain condition**
SUMIF | A function in Excel
35
**Software that can monitor all attempts made to access your computer**
Firewall / Antivirus
36
**A technology that tries to solve problems in the way that humans do**
AI | Artificial Intellegence
37
**Data needs to be loaded into this type of memory before it can be processed**
RAM | Random-Acess Memory ## Footnote Ram is your computer/laptops short-term memory.
38
**A reference found at the bottom of a page in a word processing document**
Footnote
39
**Technology using radio waves to communicate with a tag attached to an object**
RFID | Radio Frequency Identification ## Footnote A wireless system comprised of two components: tags & readers
40
**A circuit board that may be faulty if your computer will not start up**
Motherboard