Information System Design and Development Flashcards
Malware
Short for malicious software. Designed to disrupt or damage a computer system
Interface
Combination of hardware and software that allows the processor and peripherals to communicate
Biometrics
Makes use of our unique physical characteristics and features to identify us
Range Check
Makes sure data is entered within certain limits
Network Hardware
Network Interface Card
Router
Hub
Switch
Solid State Devices
SD cards
USB flash drives
WAN
Wide Area Network. Covers a large geographical area
External Hyperlink
Direct user to a different page on a different website
Bit Depth
Representation of how many colours each pixel can store.
No. of colours = 2n where n is bit-depth
Prescence Check
Makes the person using the database enter something in this field. Cannot be left blank!
Foreign Key
A primary key from one table that appears in another table to link the two together
Reducing Carbon Footprint
Install equipment which reduces emissions
Generate your own renewable energy
File
Stores all the information on a particular subject. It is made up of records.
Field
Stores one particular piece of information about all the people/things
img src=”image” alt=”image”
Adds image to webpage. If image doesn’t display, text displayed instead
Input AND Output Devices
Touchscreen
Interactive White Board
Games Controller
Interface Examples
USB 2.0 + 3.0
Firewire 800
Thunderbolt
Local Advantages
One fixed price
Upload/Download almost instantaneous
Human Computer Interface (HCI)
Things like windows, menus, icons and pointers
Keylogger Security Risk
Programmer can gain access to:
- Usernames
- Passwords
- Credit Card Numbers
- Email Addresses
Capacity
How much data a storage device can store
Output Device
Devices the computer system uses to send out or display information from the processor
Trojan Horse Examples
‘Free’ online games you can download
Browser helper toolbars
Antivirus Software
Cloud Storage
Storage you can upload onto a web server