Term 1 Flashcards

(41 cards)

1
Q

What is a CVS file? (comma separated values)

A

Takes data in table and saves it in text form, separates items with commas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a txt file?

A

Not formatted can be opened in any word processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is rich text formatting? (rtf)

A

Only save some of the formatting within text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is graphics interchange format? (Gif)

A

Stores still or moving images using smaller file size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is joint Photographic expert group? (jpg)

A

Stores still images only - not moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is portable document format? (pdf)

A

Document converted into images read on most computers. Can protect document
-pdf software writing can be used for editing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a portable network graphics? (PNG)

A

Compress image files without loss of image quality (lossless compression)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is moving picture experts group layer 4? (MP4)

A

Can store video, still images, audio
-used to transfer video files on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is moving picture experts group layer 3? (MP3)

A

-stores audio files
-no images
-small file sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cascading style sheet? (CSS)

A

Attached to webpages to define formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a ZIP? (zipped file)

A

-files in compressed format
-saves storage, space and reduces transmission time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why reduce files sizes?

A

-Limited storage, efficient use is important
-speed at which files are transmitted, depends on the size
-the larger the file size the more time it takes to send

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is resizing and resampling?

A

-resizing changes the dimensions
-resampling changes the quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some solutions to ye strain because of computer use?

A

-dont use monitors that flicker
-use a screen filter
-take regular breaks- at least 5 minutes every hour
-keep your eyes at least 18 inches away from the screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is repetitive strain injury? (RSI)

A

Damage to the fingers, wrists and other parts of the body due to repeated movements over a long period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the causes of RSI?

A

Typing or using a mouse for long periods of time
-Using too much force on your fingers when typing
-using a poorly designed keyboard
-workstation or chair is in the wrong height so arms are in an unnatural position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the solutions to RSI?

A

-Ensure workstation and chair are correct height
-support wrists by using wrist rests
-keep elbows close to your sides
-five minute break from typing attest every hour.

18
Q

What is deep vein thrombosis? (DTV)

A

Clot forming in a leg vein

19
Q

What are some symptoms of DTV?

A

-Swelling in the affected leg
-Localised heat in the affected leg
-Pain in the affected leg

20
Q

What can you do to prevent DTV?

A

-Take regular breaks
-Stand up and move around to allow the blood flow in your legs to return to normal
-Use an adjustable chair and ensure that your feet are firmly on the floor.
-Sit with a suitable posture - do not cross your legs long periods

21
Q

What is a hacker?

A

Breaks codes and passwords to gain unauthorised entry to computer systems.

22
Q

What are stand alone computers not affected by hackers?

A

Computers as part of networks or those with external links, are in danger from hackers

23
Q

What are the consequences of loss of data due to hacking?

A

-affects a business
-affects personal data
-comprises data privacy
-damage company reputation

24
Q

What are physical protecting systems?

A

-keeping servers or mainframes in locked rooms
-posting security guards
-security locks, smart cards
-using alarm systems and videos

25
What is software used to protect computers?
Data encryption - data is being scrambled before being transmitted firewalls- block access from outside Access rights User IDs and passwords
26
What is a virus?
a software program that is designed to copy itself over and over again attach itself to other programs.
27
What is the most common way of getting computer viruses?
-email attachments -infected web pages -memory stick -downloading a file
28
How can viruses be removed?
Anti-virus software
29
How does anti-virus software work?
We detected, -alert the user, and ask them whether they want to remove the virus and clean the systems. -or whether they simply want to 'quarantine' the virus
30
What is a trojan?
an application that appears to do something useful such as a computer game but quietly, behind the scenes it is doing something with ill-intent.
31
How does a trojan work?
-log all your keystrokes -Allow someone else to take control of your computer whilst you are online -Capture screen shots and send them to a remote computer
32
What is a worm?
Like a computer virus but they spread on their own though computer networks.
33
What its spyware?
programs designed to keep track of which adverts you click on and then they send specific adverts to your browser.
34
What is online crime?
Criminal activity directly related to the use of computers.
35
What are some reasons for online crime?
-steal money --steal data or information -steal someones identity -cause general havoc for fun
36
What are some consequences of theft of data?
-can stop business running -losing customers -losing sales -Can damage the reputation of the company
37
What is fraud?
Trying to trick someone in order to gain an advantage.
38
What are the most common forms of computer fraud?
-posing as someone from an official organisation -stealing your identity -phishing (sending emails to get you to give over your personal or account details or getting you to download a data key logger.) -promising a get rich scheme
39
What is piracy?
copying software, music or film DVDs.
40
What are some advantages of social networking?
-it is usually free -You can post interesting things online -The site makes it simpler to get in touch with long lost friends -very easy to keep in contact with people with similar interests
41
What are some disadvantages of social networking.
-you lose privacy compared to not being on social network -Online bullying can be a problem if someone posts untrue or unkind thing about you -A real distraction and time waster. Some people spend many hours on social media instead of studying or working -Some people may use a fake profile and say untrue things about themselves.