IT Flashcards

(20 cards)

1
Q

What is HCI

A

Human-computer interaction (HCI) is defined as the field of study that focuses on optimizing how users and computers interact by designing interactive computer interfaces that satisfy users’ needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give a device or application that would use touch sensitive interface (TSI)

A

Tablet, Mobile phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 2 digital devices

A

phone tablet laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does WWW stand for

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain one method of gathering information about the
booking system requirements that would occur during the
Systems Analysis stage.

A

Questionnaire ,Interview and observation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name an operating system

A

Linux ,Mac and windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is encryption

A

Encryption is the process of converting plaintext (a readable message) into ciphertext (an unreadable format) to protect the data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three types of hackers are…

A

white hat hacker ,black hat hacker and gray hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a gray hat hacker

A

Gray hat hackers may act with less worthy intentions and skirt the bounds of legality, but do not have destructive goals in mind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a black hat hacker

A

Those who use there technical knowledge for malicious and illegal purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a white hat hacker

A

Those who use there technical knowledge for defense purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are access rights

A

refer to legal permissions or rights that allow individuals or applications to perform specific actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a wireframe

A

A simplified, visual representation of a digital interface, such as a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a mindmap

A

a diagram in which information is represented visually, usually with a central idea placed in the middle and associated ideas arranged around it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is verification

A

Verification is intended to check that a product, service, or system meets a set of design specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is validation

A

Validation is the process of ensuring that a product, service, or system meets the needs of the customer and other identified stakeholders

17
Q

what is the difference between validation and verification

A

Verification helps in examining whether the product is built right according to requirements, while validation helps in examining whether the right product is built to meet user needs.

18
Q

which physical protection measure uses a fingerprint

A

biometric security

19
Q

One physical protection measure

A

cameras and gates

20
Q

Data is …

A

Raw unstructured data