Information System Design and Development Flashcards

1
Q

Malware

A

Short for malicious software. Designed to disrupt or damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interface

A

Combination of hardware and software that allows the processor and peripherals to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometrics

A

Makes use of our unique physical characteristics and features to identify us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Range Check

A

Makes sure data is entered within certain limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Hardware

A

Network Interface Card

Router

Hub

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Solid State Devices

A

SD cards

USB flash drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WAN

A

Wide Area Network. Covers a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

External Hyperlink

A

Direct user to a different page on a different website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bit Depth

A

Representation of how many colours each pixel can store.

No. of colours = 2n where n is bit-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prescence Check

A

Makes the person using the database enter something in this field. Cannot be left blank!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Foreign Key

A

A primary key from one table that appears in another table to link the two together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reducing Carbon Footprint

A

Install equipment which reduces emissions

Generate your own renewable energy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File

A

Stores all the information on a particular subject. It is made up of records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Field

A

Stores one particular piece of information about all the people/things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

img src=”image” alt=”image”

A

Adds image to webpage. If image doesn’t display, text displayed instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Input AND Output Devices

A

Touchscreen

Interactive White Board

Games Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Interface Examples

A

USB 2.0 + 3.0

Firewire 800

Thunderbolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Local Advantages

A

One fixed price

Upload/Download almost instantaneous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Human Computer Interface (HCI)

A

Things like windows, menus, icons and pointers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Keylogger Security Risk

A

Programmer can gain access to:

  • Usernames
  • Passwords
  • Credit Card Numbers
  • Email Addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Capacity

A

How much data a storage device can store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Output Device

A

Devices the computer system uses to send out or display information from the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trojan Horse Examples

A

‘Free’ online games you can download

Browser helper toolbars

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud Storage

A

Storage you can upload onto a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Rtf
Rich Text Format. Stores text and formatting information
26
p..../p
States where new paragraphs of text begin and end
27
Reducing Typing in Forms
Radio Buttons Calender Picker Autocomplete
28
HTML uses
Set where text should be placed Describe the structure of text Create hyperlinks Embed Images Create sections within the page
29
Field Length
Restricts the number of characters user is able to type
30
Magnetic Storage
Magnetic Tape Hard Disk Drive
31
Restricted Choice
Cuts down on mistakes by only letting you select an option from a menu or list
32
Svg
Scalable Vector Graphics.
33
Lossy
Method of compression * Reduces file size substantially * Media becomes very pixelated the more it's compressed * Used on JPEG files
34
Txt
Plain text file. Only stores text, meaning formatting isn't saved
35
Recycling
Computers contain finite resources like gold, silver and palladium. To sustain our use of these devices, materials need to be recovered and reused
36
Networks Allow People To
Send/Recieve emails Share Peripherals (printer) Work Simultaneously on Tasks
37
Validation Checks
Prescence Check Restricted Choice Field Length Range Check
38
Copyright, Designs and Patents Act
Protects the creative work of individuals or businesses by making it a crime for anyone to download their work without paying or permission
39
Router
Needed to connect two different networks, most commonly a home or business network to the internet
40
Virus
Program that is written to copy their code into other programs. 'spread' themselves
41
Type of Biometric
Retina Scanning Fingertip Recognition Palm Print Recognition Face Recognition
42
Lifetime Carbon Footprint of Device
Comes from: Manufacturing Use Disposal
43
Jpeg
Joint Photographic Experts Group. Uses lossy compression. Supports 24-bit colour
44
a href="link".. Link .. /a
Creates hyperlink to a website
45
Arithmetic Logic Unit (ALU)
Performs Calculations (x,+,÷) Makes logic decisions(=,if,\>)
46
Object Field
Stores different types of 'document'. Could be spreadsheet files, text documents or html webpages
47
Wireless Connection Disadvnatages
Others can access if connection is insecure There could be interference from other devices
48
URL
Uniform Resource Locator. Address of a website
49
HTML
Hyper Text Markup Language. Most commonly used markup language
50
Local Disadvantages
You are responsible for backups Must have system with you to access
51
Wired Connection Disadvantages
Can leave many wires around an office Large amount of cabling/network hubs may be needed
52
Data Protection Act
Aims to protect anyone who has personal information stored on a computer system. Outlines a set of responsibilities for person who stores the data
53
Mp4
Video equivalent of mp3. Compressed video file
54
Latest HTML Version
HTML 5
55
Input Device Examples
Keyboard Mouse Track Pad Webcam Microphone
56
Lossless
Method of Compression * Reduces file size a little * Little data removed, no visible effect * Used on TIFF,PNG,GIF
57
Trojan Horse
Malware that disguises itself as a useful program whilst secretly performing another function
58
LAN
Local Area Network. A network which covers a small geographical area
59
Password Flaws
Users often have simple passwords that are easy to guess Users often have the same password for multiple accounts Computer programs can randomly generate millions of passwords and unlock them Can be forgotten
60
Record
Stores all the information about one person/thing. It usually consists of several different fields
61
Primary Key
Used to uniquely identify every record in the database
62
Gif
Graphics Interchange Format. Lossless Compression. Supports 8 bit colour. Designed for internet transfer of images
63
Vector Graphics
Stores a series of attributes (size,colour,location) about shapes. Advantages: * Can zoom in without losing quality * Smaller storage size Disadvantages: * Can't be as easily manipulated at pixel level,not very detailed * Can't represent many irregular shapes that can be drawn
64
Wav
Uncompressed Audio File. Higher quality but greater file size
65
Cloud Advantages
Regularly backed up. Don't have to save it yourself. Can access anywhere with internet
66
Operating System
Controls all the different tasks a computer system carries out: * Providing human computer interface to user * Providing Security * Keeping track of filing system and where items are stored in memory * Controlling Input and Output devices
67
Markup Languages
Used to tell a browser how to set out a web page
68
Complex Sort
Sort which takes place in more than one field
69
Wired Connection Advantages
Normally more secure Connection speed normally faster
70
Phishing
Attempt by someone to get you to send personal information to them
71
Internal Hyperlink
Directs user to a different page on the same website
72
Methods of Reducing Energy Use
Use energy efficient monitors Reduce brightness on monitors Activate standby settings on monitors after 15 minutes of inactivity Activate sleep/standby settings for laptop/desktop Only switch peripherals on when needed
73
Text Field
Stores words, numbers and other characters. Similar to a string variable
74
Electronic Database Advantages
Easy to add new information Easy to sort information Easy to search information Takes up very little space
75
Calculated Field
Could have type like number/text. Database works out what to put in there using a formula usually based on the contents of other fields in the record
76
Computer Misuse Act
Determines whether people are allowed to access computers and modify the data on the system
77
Regulation of Investigatory Powers Act (RIPA)
Allows security organisations such as MI5 to monitor peoples emails etc.
78
Clock Speed
Measured in Herts(Hz). Good indication of how quickly a processor can complete tasks
79
Registers
Temporary storage locations within the processor Stores addresses, data or instructions
80
Increase Interactivity
Include sounds, animations, images Avoid long passages of text Use quizzes, polls and games
81
Wireless Connection Advantages
No wires to be stood on/tripped over Connection can be made anywhere
82
Firewalls
Used to check packets of data as they are received by a computer system. If packet is not acceptable it's not allowed to pass
83
True Colour
24 bit-depth image that can store around 16 million colours. Contains more colours than the human eye can detect.
84
DVD-R
Recordable. Data can be written on this device once
85
RAM
Random Access Memory. Data that will be processed by the processor is **temporarily** stored in RAM. When program is closed or computer shuts down the data held in RAM is deleted
86
Avi
Uncompressed video format used by Microsoft
87
Anti-Virus Software
Helps protect computer from threat of viruses by: * Scanning files for known virus signatures * Performing calculations on files to check for unauthorised changes * Monitoring main memory for files behaving like a virus
88
Number
Stores whole numbers (integers) and decimal (real) numbers
89
Interface Jobs
Buffering/Compensating for different speeds in devices Data format Conversion(Digital-Analogue,Parrallel-Serial,Wired-Wireless) Handling status signals from peripherals
90
Solid State Storage
No moving parts. * Smaller * Use less battery power * More robust
91
Bandwith
Data transfe rate when sending data on a computer network. Speeds in megabits(Mb)
92
Processor
Part of the computer system that handles the instructions used to ensure the hardware and software responds as expected
93
Optical Storage
Makes use of a laser to shine and reflect lights to read the data stored. * CD's * DVD's * Blu-Ray
94
Flat File Database
Consists of one table. As a result it may have data which is unecessarily repeated several times in the same table
95
Types of Malware
Viruses Trojan Horses Worms Spyware
96
Link Field
Allows user to click link which takes them to a specific place
97
Identity Theft
Someone else pretends to be you
98
Piggybacking
Using someone elses wifi
99
h1 .... /h1 ## Footnote #
Creates headings. h1 largest, h6 smallest
100
Internet
A network of networks all connected together. Allows us to access informationon other computer systems
101
Graphics Calculations
Dimensions - length x breadth x bit depth DPI - length x breadth x dpi2 x bit depth 1. Divide by 8 to get size in Bytes(B) 2. DIvide by 1024 to get size in Kilobytes(kB) 3. Divide by 1024 to get size in Megabytes(MB) 4. Divide by 1024 to get size in Gigabytes(GB)
102
DVD-RW
Rewritable. Data can be written on this device and then changed several times
103
Date Field
Stores dates like someones D.O.B
104
Improving Readability
Break up long passages of text, using headings and subheadings Use readable fonts and font sizes Use quizzes, polls and games
105
Getting a Virus
Downloading movies/games from pirate websites Using infected CDs/USB flash drives Opening links in emails fom untrustworthy sources Downloading infected files in email atttachments
106
Mp3
Compressed audio file. Smaller file size but lower quality
107
ROM
Read Only Memory. Data on this device is permanent and connot be changed
108
Computer Misuse Act Implications
Makes 'Unauthorised Access' illegal 'Unauthorised Access' with intent to commit further offences treated as a more serious crime.
109
Storage Devices
USB Memory Stick Cloud-based Services Writable DVD/CD External Hard Drive
110
Keylogger
Records all the keys pressed on your computer system
111
Files can be
Corrupted Lost Destroyed Deleted Hacked Damaged
112
Communications Act Protects Against
Piggybacking Threatening behaviour online Offensive and Indecent Images
113
Hacker
Someone who tries to gain access to a computer system without permission
114
Control Unit
Controls all the other parts of the processor and makes sure instructions are executed in the correct order. Responsible for managing the clock and the read, write, reset and interrupt lines
115
Boolean
Stores two data options (Yes/No, True/False)
116
Relational Database
Two different tables linked by a foreign key
117
Switch
Designed to make sure data can be sent around a network. More efficient than a hub as uses MAC address to make sure data packets are only sent to certain devices
118
Time Field
Stores a specific time
119
Optical
Data sent through strands of glass Incredibly fast transfer speeds
120
Copyright, Designs and Patents Act Protects Against
Software Piracy Use of software without relevant liscense Theft of Intellectual property Using/Downloading images without copyright holder's permisiion Illegal Download of Video and Audio Files
121
Getting a Keylogger
Can be installed by viruses or trojan horses. Can also be plugged between USB socket and keyboard USB
122
Data Holder Requirements
Store Data no longer than necessary Takes measures to protect users' data(passwords, encryption) Store only relevant information Ensure data is accurate and up to date Only use data for purpose agreed wih user
123
Bitmap Graphic
The colour of every individual pixel is stored in a 2D array
124
link href="theme.css" rel="stylesheet" type="text/css" /
Links to a CSS file
125
Hub
Takes data it receives from the router or server and sends it to every device its connected to. Innefficient and increases network traffic
126
Data Subject Rights
Allowed to see any information held on them Can sk to have data changed if they feel it;s incorrect Claim compensation if rights are broken Prevent auomated decision making
127
Graphic Field
Stores pictures and images
128
Input Devices
Anything that is used to control a computer system or to send data to it
129
Best Password Format
Choose at least 8 characters, with upper and lower case, a special symbol and a numeric character
130
Online Fraud
Deceiving someone to take advantage of them online. Often getting personal details and credit card numbers to use maliciously
131
Network
Two or more computer systems connected to allow them to communicate and share information
132
Local Storage
A storage device that is used on the computer system you are working on
133
How Viruses Affect your System
Deleting and Altering files Displaying unwanted sounds and messages (pop ups) Redirecting weblinks to web sites you don't intend to visit Copying themselves and using up resources
134
Complex Search
Search which takes place in more than one field
135
Hyperlink
Used to move around the web from page to page
136
Web Browser
Downloads pages from a web server and then interprets the code to run the commands used to generate the web page
137
Output Device Examples
Monitor Speaker Printer Projector
138
Cloud Disadvantages
Can't access if website is down May come with cost-per-storage Upload/Download speed depends on connection. Large files may take a long time
139
Ways to Spot Phishing Scams
Spelling errors Lack of personalisation Link appears to go to one site but directs to another
140
Denial of Service (DoS)
Attempt to prevent legitimate users from accessing a server by one computer
141
DDoS
Attempt to prevent legitimate users from accessing a server by multiple computers
142
Relative Links
Link to a location in the same directory. Usually shorter (e.g. /picture1.jpeg)
143
Absolute Links
Completely fixed. Do not change and point to a specific location to access (e.g. http://www.bbc.co.uk/scotland/)
144
Client-Server
The relationship between two computers in which one, the client, makes a service request from another, the server.
145
Peer to Peer
No single provider is responsible for being the server.