IT Flashcards
(20 cards)
What is HCI
Human-computer interaction (HCI) is defined as the field of study that focuses on optimizing how users and computers interact by designing interactive computer interfaces that satisfy users’ needs.
Give a device or application that would use touch sensitive interface (TSI)
Tablet, Mobile phone
Name 2 digital devices
phone tablet laptop
What does WWW stand for
World Wide Web
Explain one method of gathering information about the
booking system requirements that would occur during the
Systems Analysis stage.
Questionnaire ,Interview and observation
Name an operating system
Linux ,Mac and windows
what is encryption
Encryption is the process of converting plaintext (a readable message) into ciphertext (an unreadable format) to protect the data from unauthorized access.
The three types of hackers are…
white hat hacker ,black hat hacker and gray hat hacker
what is a gray hat hacker
Gray hat hackers may act with less worthy intentions and skirt the bounds of legality, but do not have destructive goals in mind.
what is a black hat hacker
Those who use there technical knowledge for malicious and illegal purposes
what is a white hat hacker
Those who use there technical knowledge for defense purposes
What are access rights
refer to legal permissions or rights that allow individuals or applications to perform specific actions.
what is a wireframe
A simplified, visual representation of a digital interface, such as a website
what is a mindmap
a diagram in which information is represented visually, usually with a central idea placed in the middle and associated ideas arranged around it
what is verification
Verification is intended to check that a product, service, or system meets a set of design specifications.
what is validation
Validation is the process of ensuring that a product, service, or system meets the needs of the customer and other identified stakeholders
what is the difference between validation and verification
Verification helps in examining whether the product is built right according to requirements, while validation helps in examining whether the right product is built to meet user needs.
which physical protection measure uses a fingerprint
biometric security
One physical protection measure
cameras and gates
Data is …
Raw unstructured data