IT Flashcards

(51 cards)

1
Q

Factors influencing the use of ICT

A
Cultural 
Economic 
Environmental 
Ethical
Legal 
Social
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is multi user licensing agreement?

A

Allows you to install software on an agreed number of computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is site licensing agreement?

A

Allows you to buy a sing copy of the software and you have permission to install it on all computer at one location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List of five user interface

A
  • Command line interface
  • Graphical user interface
  • Menu based interface
  • Natural language interface
  • On screen forms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ict system

A

Where the output from the system goes directly to a human being.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Methods to communicate in ICT

A

Email, fax, internet, messaging, phones, video conferencing, VoIP, extranet and SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are procedures

A

Rules on what goes where, who does what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quality of information should be…

A

Accurate=
If information is inaccurate then the key decisions may be made wrongly

Up-to-date=
Some information has value within a timescale for example share prices can change several times in a minute,
Relevant= the information should be relevant information gathered from google may have too much unnecessary facts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data that is entered into a computer can take many form such as:-

A
Text 
Numbers
Still Image
Moving images
Sound
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is information. January 2013 past paper

A

It is data plus context= meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is GIGO

A

If you put wrong data into a computer you will get the wrong information out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List of components of an ICT

A
Peopel 
Data 
Procedures 
Software 
Hardware
Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encoding

A

Converting information into digital form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is coding

A

The way of shortening the original data to make it easier to remember. Also, saves time and will take up less storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is knowledge

A

A set of rules or experience allowing people to use information to make decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is incremental backup

A

Backs up the files which have changed since the last backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is full backup

A

Making a copy of all the files on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is ancestral system?

A

Grand father, father and son

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is differential back up

A

A cumulative backup of changes made since the last file backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is spyware

A

A software that collects information about the user of computer connected to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is cookies

A

Small text files downloaded to your computer. They can be used to find out wether the computer user has visited the site before.

22
Q

Personal data

A

Facts & opinions about a living person

23
Q

What is ISP

A

(Internet Service Provider) Organisation that provides a connection service to the Internet.

24
Q

Phishing

A

This is where fraudsters send random emails asking people to update their bank account details.

25
Hackers
A person who tries to break into a secure computer system
26
Encryption
The process of coding files before they are sent over the network to protect them from hackers.
27
Information commissioner
The person responsible for applying the Act.
28
Data subject
The people whom the personal information is about.
29
Malpractice
Improper or careless use ( for example accidentally deleting data)
30
Crime
Acts which are against the law( for example hacking, illegally copying data or software.
31
3 types of wire
* Unshielded twisted pair * Shielded twisted pair * Fibre Optic cable
32
What are Types of user support available to ICT users? What are the Supports for the packages?
Telephone help desks Email User guides Online help (forum) Packages ; Books Internet FAQ's Wizard
33
What is ICT
The use of technology for input, storage, processing of data and the output of information.
34
What are procedures
Rules on what goes where, who does what
35
Quality of information should be...
Accurate= If information is inaccurate then the key decisions may be made wrongly Up-to-date= Some information has value within a timescale for example share prices can change several times in a minute, Relevant= the information should be relevant for the purpose.
36
Data that is entered into a computer can take many form such as:-
``` Text Numbers Images Animation Sound ```
37
What is information
It is data plus context.
38
What is GIGO
If you put wrong data into a computer you will get the wrong information out.
39
List of components of an ICT
``` Peopel Data Procedures Software Hardware Information ```
40
What is encoding
Converting information into digital form.
41
What is coding
The way of shortening the original data to make it easier to remember. Also, saves time and will take up less storage space.
42
What is knowledge
A set of rules or experience allowing people to use information to make decisions.
43
What is incremental backup
Backs up the files which have changed since the last backup.
44
What is full backup
Making a copy of all the files on the system.
45
What is ancestral system?
Grand father, father and son
46
What is differential back up
A cumulative backup of changes made since the last file backup
47
What is spyware
A software that collects information about the user of computer connected to the Internet.
48
What is cookies
Small text files downloaded to your computer. They can be used to find out wether the computer user has visited the site before.
49
Personal data
Facts & opinions about a living person
50
What is ISP
(Internet Service Provider) Organisation that provides a connection service to the Internet.
51
Phishing
This is where fraudsters send random emails asking people to update their bank account details.