The Information Processing Cycle Flashcards

1
Q

Input

A

The computer receives instructions

Input devices only allow for input of data to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Output

A

Displayw results after processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Processing

A

The computer works on the data

The part of the computer tha does all the processing is the CPU (Central Processing Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Storage

A

Keep permanent record of our work

Can provide input(hard drive or flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Communications

A

Computers linked to other computers can communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do computers need data

A

Because without it ther is nothing to process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keyboard shortcuts

A

F1 - opens up a help screen for the program you are working in

Esc- let’s you get out of options or cancel choices

Print screen key - tales a photo of everything on the screen and places it on clipboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do we mean by plug and play

A

A series of technologies where the operating system automatically detects and configures a device that has been plugged into the computer so that the device can be used immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of wireless devices

A

Less clutter as there are no cables

You have a wider range of movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantage or limitations of wireless devices

A

They require batteries

They are slightly more expensive than wired devices

Can easily be removed so easily stolen

There can sometimes be inference with the wireless signal, causing the device to stop working temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hard copy

A

Print outs on paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Soft copy

A

The visual output on our computer screens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is a monitor measured

A

The size is measured diagonally in inches from one corner to the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Resolution

A

Refers to the number of pixels used to form the image

It is measured horizontally and vertically in pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Storage medium

A

Actual physical material or objects on which we store the data and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Storage devices

A

The computer hardware that read from and write to storage media

17
Q

Storage capacities

A

Kilobyte (KB) 1024 bytes - normal word document

Megabyte (MB) 1024 KB - programs, videos, music

Gigabyte (GB) 1024 MB - browse web, use social networks and check email for up to around 40 minutes per day. Ideal for lighter users

Terabyte (TB) 1024 GB - external hard drives

18
Q

Health concerns

A

Repetitive Strain Injury (RSI) - name given to injuries resulting from fast, repetitive work

Back pain
Headache
Carpal tunnel syndrome

19
Q

Prevent RSI

A

Built-in wrist rests
Curved keyboards

Other health issues
Eyesight problems
Stiffness of the back
General tiredness

20
Q

Health tips for using computers

A

Use ergonomically designed equipment

Sit correctly

Ensure that lighting and ventilation are adequate

Occasionally turn your eyes away from the monitor

Take regular breaks

21
Q

Ergonomics

A

The study and design of the workplace for the comfort and safety of people in work environments

22
Q

Ways to practice green computing

A

Try to conserve power- switch devices off when not being used

Do not waste paper

Try to upgrade or donate old hardware

Buy energy efficient notebook computers instead of desktop computers

Check if you can refill and reuse ink and toner cartridges

23
Q

What should you consider when buying a storage device

A

Storage considerations - storage capacity refers to how much disk space one or more storage devices provides

Read and write speeds - a measure of performance on a storage device

Reliability - the ability of the computer system to perform it’s required functions for a given period of time

Function - what do you want to do on computer

24
Q

Examples of internal storage devices

A

Internal hard drive (HDD) - hard drive that resides inside the computer

25
Q

External hard drive

A

Device which is plugged into your machine to give almost immediate storage space with the need yo open your computer’s internal storage to make upgrades

SD ( Secure Digital Card) -removable memory card

26
Q

Solid state Drive (ssd)

A

Mass storage device similar to a Hard disk drive (HDD)

Do not any have moving parts like HDDs

Instead of storing data on magnetic platters, SSD’s store data using flash memory

Access data faster than HDDs

USB flash drives - used for storage, data and backup and transferring of computer files

27
Q

How do you sit behind your computer

A

Your upper legs should be flat against the bottom of the chair

Your lower legs should form a 90 degree angle at your knees

Your feet should be at a flat 90 degree angle to your lower legs

Your back should be at between 100 and 135 degrees in relation to your legs

Your arms should be tucked near your sides

Your shoulders and neck should be relaxed

Your eyes should be able to view the screen comfortably without having to stretch, crane, or strain your neck or eyes

28
Q

What is green computing

A

Environmentally responsible and eco- friendly use of computers and their resources

29
Q

What is authentication

A

Process of verifying the identity of a person or device

30
Q

Example of authentication

A

Entering a username and password when you log in to a website

31
Q

Why is authentication important

A

Authentication is crucial because it ensures that only authorized users can access protected resources like computer systems, networks, and websites, helping organizations keep their networks secure.