1.5/1.6 Flashcards

1
Q

2 types of system software?

A

operating software = provides a platform which users can run programs
utility software= used to maintain the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

types of user interface?

A

graphical user interference
command line
natural language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

user interface?

A

the means which a user can interact and exchange info with the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

command line interface?

A

an environment where the computer is controlled by typing text commands using a keyboard.
- cannot display graphics, only text.
- CLIs use less system resource than graphical interfaces but are less intuitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

graphical user interface?

A

are more modern environments that use graphics and animations to work in.
- usually based on the window-icon-menu pointer diagram
- easier to use, more attractive but require more system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

natural language?

A

uses voice recognition to interact with the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multitasking in operating system?

A

running multiple applications at the same time by giving each application a small time- slice of processor time.

this allows more than one program to be held in memory at a time and data shared between them such as copy and paste.

it also enables you to listen to music on your pc at the same time as word processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

multitasking in operating system?

A

running multiple applications at the same time by giving each application a small time- slice of processor time.

this allows more than one program to be held in memory at a time and data shared between them such as copy and paste.

it also enables you to listen to music on your pc at the same time as word processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

memory management in operating system?

A

when programs are loaded, the operating systems decide where they are held in memory.
over time the memory becomes fragmented as programs are loaded and closed because they use different amounts of memory.
the operating system must keep track of different programs fragments.
when the memory is full, the operating system uses virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

peripheral management/device drivers in operating system?

A

translate operating system instructions into commands that the hardware will understand.

each peripheral needs a device driver

many are already built into the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

user management in the operating system?

A

the OS has to manage the accounts of different users, including authenticating users and controlling permissions.

  • providing for different users to log into a computer
  • operating system will retain settings for each user such as icons desktop
  • each user may have different access rights to file and programs
  • client server network may imposed a fixed memory or roaming profile for a user and manage login requests to the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

file management in the operating system?

A

the OS manages the different documents and executable programs stored in secondary storage

  • data is stored in files
  • an extension to the filename tells the operating system which application to load the file into.
  • the operating system may present a logical structure of files into folders and allow the user to rename, delete , copy and move files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

utilities?

A

small programs that perform specific maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encryption software?

A

software that encrypts (and decrypts) files on a storage device and data packets over a network to prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

defragmentation software?

A

physically organising the files on a storage device into the smallest number of fragments to improve performance.

  • this reduces the movement of read/write head across the surface of the disk which speeds up file access
  • solid state drive should not be defragmented
  • it is unnecessary as they have no moving parts
  • also reduces their life spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data compression software?

A

compression utilities reduce the size of a file so that it takes up less space and is quicker to download over the internet.

  • compression file must be extracted before they can read
  • depending on the algorithm used data is either lost or reducing the quality of an image or sound e.g jpeg
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ethics?

A

whether something is morally right or wrong

18
Q

should the internet be regulated? (yes)

A

internet is no different to other medias; radios
children should be better protected
internet has harmful offensive and illegal content.

19
Q

should the internet be regulated (no)

A

freedom of expression is an absolute right.
parents should take more responsibility.
internet grows quickly for filtering to be effective.

20
Q

should smart devices be continually recording? (for)

A

data encryption makes it private
can assist disable users
if you have nothing to hide then privacy is not an issue

21
Q

should smart devices be continually recording? (for)

A

data encryption makes it private
can assist disable users
if you have nothing to hide then privacy is not an issue

22
Q

should smart devices be continually recording (against)

A

invasion of privacy
data is sent over the internet for processing
tv may also be taking video footage

23
Q

privacy issues of computer science:

A

face recognition
cell phone location and gps technology
smart listening data

24
Q

restricting access to the internet and youtube

A

preventing criticism of a ruler , government or religion
preventing violence of national law
preventing violations of hate speech, ethics or morality based laws

25
Q

cultural issues:

A

The pace of technological change and the effect on society.
cultural influences of developers on software.
digital divide and unequal access to the internet.

26
Q

energy consumption of computing technology?

A

2% of global energy consumption is used by data centres

27
Q

disposal of computing technologies

A

harmful materials include:
dioxins
chromium
mercury
cadmium
radioactive sources

computing technology is often shipped to countries with lower standards for disposal.

people trawl through waste looking for metals to be recycled and sold , exposing themselves to danger.

28
Q

impacts on digital technology to customers

A

no need to travel to bank
can access the bank 24/7
potentially opening to hacking

29
Q

impacts on digital technology to bank staff

A

may lose jobs due to closure of the branch
new types of jobs created
skill-set working

30
Q

impacts on digital technology to bank as companies

A

targeted marketing on customers
responsibility for data protection
less overhead; staff , utility bills , rent etc

31
Q

impact on digital technology to local communities

A

small businesses rely on local service
other local shops may suffer less revenue as there are less people
elderly and vulnerable customers in particular value local services.

32
Q

preparing for exams:

A

remember some keyholders:
customers
staff at the company
company directors/shareholders
local communities

remember some key impacts:
increase profits
increased production
loss of jobs
less overheads
less personal service
24/7 access

33
Q

what is the data protection act 2018?

A

law that sets out 7 key principles that should be central to processing personal data:
- lawfulness, fairness and transparency
- purpose limitation
- data minimisation
- accuracy
- storage limitation
- security
- accountability

34
Q

what is the data protection act 2018?

A

law that sets out 7 key principles that should be central to processing personal data:
- lawfulness, fairness and transparency
- purpose limitation
- data minimisation
- accuracy
- storage limitation
- security
- accountability

35
Q

what is the computer misuse act 1990?

A

it is illegal to make any unauthorised access to data
…. with the intent to commit further access
…. with the intent to modify data

36
Q

what does open source software mean?

A

the source code for the program is made available so that people can edit and distribute the code.

37
Q

what does open source software mean?

A

the source code for the program is made available so that people can edit and distribute the code.

38
Q

features of an open source?

A

users can modify and distribute the software.
can be installed on any number of computers.
support provided by the community.
users have access to the source data.
may not be fully tested.

39
Q

what does a proprietary source mean?

A

the source code is kept secure and is not included when you buy the program. this can stop people changing the code or stealing a companies intellectual property.

40
Q

features of a proprietary source

A

users cannot modify the software. protected by copyright design and potential acts.

usually paid for and licensed per user/per computer.

supported by developers

users do not have access to source code

tested by developers prior to release. although they may run beta programmes