17th Test Flashcards
ADSL
Asymmetric digital subscriber line: permanent digital connection to the internet by means of copper cables and a landline/telephone to transmit data.
Adware
Software causing unwanted content to automatically display or download while browsing the internet.
Anti-virus
Scans files for malware and eliminates it using signatures and definitions to detect malware and prevent practices which increase the risk of malware.
AR
Augemented reality is a technology placing interactive digital content over real scenes
Archive
Moving messages from the inbox to an archive folder without deleting them./Removing files which are not in use and storing them in a compressed location for saving space and later use
Aspect ratio
Relationship between the width and height of the display
Bandwidth
Total amount of data that can be transferred from one point to another in a given period of time
Bandwidth theft
Unauthorised access to wireless bandwidth.
Big data
Large amounts of structured and unstructured data analysed using computers to reveal trends and associations
Biometrics
Inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.
Blog/Vlog
A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order. A vlog is a video form of blog.
Bookmark
Identifies a location or selection of text that you name and identify for future reference./Keeps track of a website for easy future reference, typically on the home page or under the search bar of a browser.
Bots
Perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.
Broadband
High speed, high bandwidth connection to the internet
Browser add-ons/extensions/plug-ins
A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.
Browser caching
Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.
Bug
Unintentional errors made in programming fixed through updates
BYOD
Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device
CAPTCHA
Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.
CD
Compact disc: an optical disc format
Click-jacking
An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.
Cloud computing
A general term that refers to the sharing and use of resources and applications offered as services over the internet.
CMYK
Cyan, Magenta, Yellow and Black
Colour depth
Number of bits used to represent a colour, the higher the better (max 32 bits)
Computer Worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Considerations for internet
- Shaped/unshaped
- Cap
- Mobility
- Line speed
Contrast ratio
Relationship between the darkest black and lightest white - higher is better, lower is muddy
Convergence
Separate technologies and functions previously requiring multiple devices overlapping into a single device.
Piracy
Movies, music, games, books or programs in electronic format are copied without being paid for known as piracy
Count and text functions in excel
COUNT() counts cells with number
COUNTA() counts cells that are not empty
COUNTIF(), COUNTIFS() counts cells meeting conditions
LEN() length of text
LEFT(), RIGHT(), MID() extracts
UPPER(), LOWER(), PROPER() changes case
CONCATENATE() or CONCAT() or & joins text strings
CPU
Central processing unit: hardware component processing data and carrying out instructions
Crowdfunding
A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme
Cyberbullying
The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.
Cyberstalking
People who are intruding in other peoples personal details online.
Cyberterrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
Data/Intellectual property theft
Data can be physically copied onto a storage device or intercepted during transfer over a network
DDR
Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.
Defragmentation
Fragmentation occurs when different parts of a file become scattered across a hard drive, meaning that each time the file needs to be accessed, the scattered parts must be rejoined causing the file to open slowly. Defragmentation is placing the parts of the file in the same place to speed up the opening of files.
Difference between minimum and recommended system requirements
Minimum system requirements are what is needed of one’s computer in order for software to function at all whilst recommended system requirements are what is needed for the software to function at its best.
Difference between single user and multi user operating systems
Single user operating systems allow for multiple users to use the computer at once whilst multi user operating systems allow for several users to access the computer at the same time such as linux or networks.
Difference between web based and installed applications
Web based applications are accessed online and do not need to be installed to the local computer/drive whilst installed applications do not need an internet connection to access and are installed to the local computer/drive
Digital divide
The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.
DIMM
Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.
Disk cleanup
Frees up storage through removing temporary files, etc.
Disk scanner
Checks a drive for errors and tries to fix them.
DoS
A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.
dpi
Dots per inch/pixel density: how many pixels displayed in 1” horizontal line, higher is better
DSLR
Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.
DVD
Digital versatile disc: a form of optical disc
E-communication
Use of technologies to transfer digital data using computers, smartphones, tablets and networks like the internet
Effects of technology (positive/negative)
Employment
Education
Culture and language
Individual connectedness
Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.
Entry-level computer
Cheap to purchase with low hardware specifications and fewer default features
EULA
End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.
Examples of file attributes
Properties which can be set such as read only and hidden
Fibre
Data is transmitted along glass tubes underground allowing it to be faster
File sharing
Done through email, FTP or online storage
FTP
File transfer protocol: used for transfer of files between computers on the internet
Date and time functions in excel
Now() date and time Today() gives date
Day(), Month(), Year() extracts
Hour(), Minute(), Second() extracts
GAN
Global Area Network: A form of worldwide network such as the Internet.
GHz
Gigahertz measures the processing power of the CPU, having multiple cores is similar to having more than one processor on one chip
Government internet services
Provide an opportunity for government departments to streamline service delivery to the public
GPS
Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.
Grid computing
A system where computational resources of multiple computers from different locations are pooled together to work collaboratively on one problem or task. Eg. SETI@Home initiative