17th Test Flashcards
ADSL
Asymmetric digital subscriber line: permanent digital connection to the internet by means of copper cables and a landline/telephone to transmit data.
Adware
Software causing unwanted content to automatically display or download while browsing the internet.
Anti-virus
Scans files for malware and eliminates it using signatures and definitions to detect malware and prevent practices which increase the risk of malware.
AR
Augemented reality is a technology placing interactive digital content over real scenes
Archive
Moving messages from the inbox to an archive folder without deleting them./Removing files which are not in use and storing them in a compressed location for saving space and later use
Aspect ratio
Relationship between the width and height of the display
Bandwidth
Total amount of data that can be transferred from one point to another in a given period of time
Bandwidth theft
Unauthorised access to wireless bandwidth.
Big data
Large amounts of structured and unstructured data analysed using computers to reveal trends and associations
Biometrics
Inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.
Blog/Vlog
A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order. A vlog is a video form of blog.
Bookmark
Identifies a location or selection of text that you name and identify for future reference./Keeps track of a website for easy future reference, typically on the home page or under the search bar of a browser.
Bots
Perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.
Broadband
High speed, high bandwidth connection to the internet
Browser add-ons/extensions/plug-ins
A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.
Browser caching
Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.
Bug
Unintentional errors made in programming fixed through updates
BYOD
Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device
CAPTCHA
Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.
CD
Compact disc: an optical disc format
Click-jacking
An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.
Cloud computing
A general term that refers to the sharing and use of resources and applications offered as services over the internet.
CMYK
Cyan, Magenta, Yellow and Black
Colour depth
Number of bits used to represent a colour, the higher the better (max 32 bits)
Computer Worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Considerations for internet
- Shaped/unshaped
- Cap
- Mobility
- Line speed
Contrast ratio
Relationship between the darkest black and lightest white - higher is better, lower is muddy
Convergence
Separate technologies and functions previously requiring multiple devices overlapping into a single device.
Piracy
Movies, music, games, books or programs in electronic format are copied without being paid for known as piracy
Count and text functions in excel
COUNT() counts cells with number
COUNTA() counts cells that are not empty
COUNTIF(), COUNTIFS() counts cells meeting conditions
LEN() length of text
LEFT(), RIGHT(), MID() extracts
UPPER(), LOWER(), PROPER() changes case
CONCATENATE() or CONCAT() or & joins text strings
CPU
Central processing unit: hardware component processing data and carrying out instructions
Crowdfunding
A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme
Cyberbullying
The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.
Cyberstalking
People who are intruding in other peoples personal details online.
Cyberterrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
Data/Intellectual property theft
Data can be physically copied onto a storage device or intercepted during transfer over a network
DDR
Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.
Defragmentation
Fragmentation occurs when different parts of a file become scattered across a hard drive, meaning that each time the file needs to be accessed, the scattered parts must be rejoined causing the file to open slowly. Defragmentation is placing the parts of the file in the same place to speed up the opening of files.
Difference between minimum and recommended system requirements
Minimum system requirements are what is needed of one’s computer in order for software to function at all whilst recommended system requirements are what is needed for the software to function at its best.
Difference between single user and multi user operating systems
Single user operating systems allow for multiple users to use the computer at once whilst multi user operating systems allow for several users to access the computer at the same time such as linux or networks.
Difference between web based and installed applications
Web based applications are accessed online and do not need to be installed to the local computer/drive whilst installed applications do not need an internet connection to access and are installed to the local computer/drive
Digital divide
The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.
DIMM
Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.
Disk cleanup
Frees up storage through removing temporary files, etc.
Disk scanner
Checks a drive for errors and tries to fix them.
DoS
A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.
dpi
Dots per inch/pixel density: how many pixels displayed in 1” horizontal line, higher is better
DSLR
Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.
DVD
Digital versatile disc: a form of optical disc
E-communication
Use of technologies to transfer digital data using computers, smartphones, tablets and networks like the internet
Effects of technology (positive/negative)
Employment
Education
Culture and language
Individual connectedness
Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.
Entry-level computer
Cheap to purchase with low hardware specifications and fewer default features
EULA
End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.
Examples of file attributes
Properties which can be set such as read only and hidden
Fibre
Data is transmitted along glass tubes underground allowing it to be faster
File sharing
Done through email, FTP or online storage
FTP
File transfer protocol: used for transfer of files between computers on the internet
Date and time functions in excel
Now() date and time Today() gives date
Day(), Month(), Year() extracts
Hour(), Minute(), Second() extracts
GAN
Global Area Network: A form of worldwide network such as the Internet.
GHz
Gigahertz measures the processing power of the CPU, having multiple cores is similar to having more than one processor on one chip
Government internet services
Provide an opportunity for government departments to streamline service delivery to the public
GPS
Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.
Grid computing
A system where computational resources of multiple computers from different locations are pooled together to work collaboratively on one problem or task. Eg. SETI@Home initiative
HDD
Hard disk drive: a mechanical drive and secondary storage device using mechanical parts to magnetically store data and programs
HDMI
High definition multimedia interface: a single cable interface transmitting high-definition video and sound offering better quality images due to digital signals
How can one identify fake emails/scams?
Being aware of phishing and scam and ensuring that email addresses and contact attempts are verified. Assume nothing, believe no one, check everything.
What is required for internet access?
A device, an ISP and a form of internet connection
How is the task manager accessed and what does it do?
ctrl+alt+del; provides information about the computer’s performance and running applications and processes.
HTTPS
HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP, the protocol to transfer web pages and their content across the internet.
ICT
Information and communication technology: use of computer-based technology and the internet to make information and communication services available for a wide range of users
Identity theft
Obtaining a user’s identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim’s name. Eg: Banking information
IM
Instant Messaging: The exchange of text messages through a software application in real-time.
Impact of ICT
- Global scale communication
- Work, business and competition on a global scale
- Difficult to control and/or restrict information
- Telecommuting
- Computer fraud
- Information Overload
Information overload
Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can’t cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.
Internet
Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.
Internet precautions
Be careful installing free software, ensure sites are encrypted, have good passwords, stay informed. Don’t click on links or open attachments in untrusted emails, don’t click on pop-ups, don’t give out personal information, don’t perform sensitive tasks on public computers.
Internet services
- Realtime messaging: online exchange of messages
- VoIP
- Video conferencing: allows online conferences using a computer network as if they were in the same room
- Cloud computing: sharing and use of resources and applications offered as services over the internet
- Online storage: storage location appears to the user as a folder as if it were part of their own computer, but is stored on an online server
- File sharing: email, FTP, online storage
- Grid computing
- Government internet services: government departments streamline service delivery to the public
Intranet
Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.
IoT
Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.
IP Address
Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses.
IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.
Is more bandwidth allocated for uploads or downloads?
Dowloads
ISO rating
A digital camera’s sensitivity to light. Higher ISO ratings are better.
ISP
Internet service provider: a company with a permanent, fast connection to the internet selling internet access and services to individuals/organisations for a fee
Keylogger
A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.
LAN
Local Area Network: Network that connects computers and other devices within a limited geographical area, such as a school, office building, or campus.
LTE
The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.
Malware
Software harmful to the computer written with negative intentions
Money theft
Confidential information is taken which allows access to bank accounts or card skimmers, video cameras at ATMs or internet related scams (cons)
Network
A collection of computing devices that are connected via some form of medium.
New technology
- Faster, cheaper, smaller, more powerful
- Longer battery life
- Easier and more effective input and output
Non-portable computer systems
- Servers: powerful computer providing resources to the computers linked in its network
- Desktops
OCR
Optical Character Recognition: technology that converts text within an image into editable and searchable text by analysing the image and translating the text into a standardised format such as UNICODE.
Online storage
Disk space that is allocated to you on a server on the internet. Accessible wherever you can log into the server.
Online Survey
A method of gathering data about a specific topic to later analyse it, using the internet to gather the data in question.
OS
Operating system controls activities taking place on a computer, proving user interface, managing programs and hardware and providing basic security
OS system utilities
- File management
- Backup
- Scheduling
- Printer management
Portable Document Format: A file format used to distribute documents that is independent of the application in which they were created. It can be read using a free utility program called Adobe Reader.
Pharming
A scamming practice where a user’s web traffic is automatically redirected to a bogus website, even if the correct URL for the official site is entered. This allows criminals to capture any data the user enters, such as passwords and PINs.
Phishing
A scamming technique where users are enticed, usually via email, to click on a link to a fraudulent website in order to trick them into providing personal and confidential information, such as banking details, PIN numbers, and passwords, often by posing as a legitimate organisation.
Portable computers
- Laptop/notebook
- Tablet
- Hybrid computer
- Phablet (smartphone with a screen larger than 5”)
- Smartphone
POS
Point of Sale: The software used in shops and supermarkets to manage tills, often linked to stock control systems designed to expedite the sale of goods and services in retail environments.
Primary Storage
Fast and typically electronic volatile memory holding instructions used by the computer whilst it is on. Eg: RAM, ROM
Printers
- Inkjet: best for images, cheaper than laser, high running cost, low text print quality, slower than laser
- Laser: faster than inkjet, high quality text, low running cost, uses toner
- Dot matrix: cheap, low running cost, low print quality, uses ribbon, create carbon copies
- 3D printer: creates physical three-dimensional objects designed on a computer
- 300 dpi for text is good
Processing and time power theft
When criminals have a large task they need to execute, they take processing power from computers they don’t own using a botnet
QR
Quick response code: A two-dimensional square barcode capable of storing significantly more data than traditional barcodes. QR codes can be scanned using a mobile device camera to access encoded information.
RAM
Random access memory: Primary short-term, volatile memory that temporarily stores programs and instructions currently loaded.
Ransomware
Malicious software that encrypts data on a computer or network, making it inaccessible to the user until a ransom is paid to the attacker.
Real-time messaging
Online exchange of messages (also images, video and voice) in real time. It includes IM (e.g. WhatsApp) and chat.
Refresh rate
How often the screen display is refreshed - higher refresh rate is better, low refresh rate leads to ghosting
Resolution
Highest number of pixels supported by the display given as horizontal pixels by vertical pixels
RFID
Radio Frequency Identification: A technology that uses small radio devices, typically smaller than a grain of rice, to store and transmit data via radio signals, allowing identification and data transfer to a receiving device.
USB
Universal Serial Bus: Standardised serial bus to connect most types of peripherals to the motherboard. It transfers data and power.
ROM
Read only memory: a non-volatile memory which stores the instructions needed for the computer to switch on (check hardware, find and load the operating system) after which control is given to the operating system
RSS
Really Simple Syndication – a technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines – all from many different sites.
Scam
Falsities which can be conducted online aiming to gain money or personal information through trickery
Screen-lock pattern
A security feature on mobile devices where a pattern, drawn or traced on the screen with a finger, is used to unlock the device.
Secondary Storage
Permanent, non-volatile storage storing programs and data on the local computer
Security tools
- Access control: prevents malware from being installed without consent/knowledge by verifying software installations
- Firewall: a barrier between the computer and the internet, filtering network traffic
- Security settings
Shaped/unshaped
A shaped internet connection is an internet connection where preference is given to certain services on the internet, such as email, downloading and browsing. Other services, such as online gaming and VoIP, are given less preference and are slower.
SIM
Subscriber identity module: a removable card inside a cell phone that stores data unique to the user, allowing the network provider to provide services
SMS
Short message service: allowing for the exchange of text messages between devices
Social engineering
The use of deception and psychological manipulation to trick individuals into divulging confidential information, providing unauthorized access to computer systems, or performing actions that may compromise security. This can include impersonation, installing malware, or other fraudulent activities.
Social networking
Allow people to connect with each other and share information (Facebook, Twitter, Kickstarter, Waze, Yelp, Pinterest, Foursquare) typically for free after registration, encouraging users to get others to join. Hackers can gain money by getting and selling users’ information
Spam
The electronic equivalent of junk mail, specifically referring to unsolicited email advertisements or messages sent to users without their request or consent.
Spoofing
The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL.
Spyware
Software that covertly installs malware on a user’s device to intercept and collect their data without their informed consent. This may include keystroke logging or other methods to monitor and report user activities to third parties.
SSD
Solid state drive: an electronic storage device with no moving parts and a flash memory to store programs and data allowing for faster disk access than HDD
Throttle
When an Internet Service Provider (ISP) intentionally slows down the internet connection speed of a user who is consuming excessive amounts of data. This is typically done based on the ISP’s acceptable use policy (AUP), which defines thresholds or conditions under which throttling may occur to manage network congestion or ensure fair usage among subscribers.
Tools to use the web efficiently
- Caching
- Add-ons/extensions
- History
- Blocking websites
- Home page settings
- Pop-up blocker
- Bookmarks
Track changes
A feature in word recording and displaying modifications made to a document allowing users to review and accept/reject changes made during collaborative editing.
Trojan
A type of malicious software that masquerades as a legitimate or useful program, but when executed, it causes harm to a computer system.
Types of compatibility
- OS Compatibility
- Compatibility between different versions of the same application
Types of computer systems
Portable or non portable
Types of software
- Application software
- Reference software
- Web browsing software
- Email software
- Document management software
- Voice recognition software
- Note-taking software
- Education/training software
Types of users
- SOHO: Small Office Home Office executes their business from their home
- Personal: do not depend on their technology for many things
- Mobile: any of the categories, but needing their devices to be portable
- Power: need top range hardware and software
USB 2, USB 3, USB C
In terms of transfer speed, USB C > USB 3 > USB 2
User-centred design
Aim to develop interfaces that are attractive, easy to use and minimise input errors.
VDSL
Very high speed digital subscriber line: ADSL improvement offering faster speeds
Video conferencing
Allows people to hold online conferences using a computer network
Virtual communities
A group of people who gather online to share ideas and interests.
Podcasts
A series of on-demand digital audio files that typically focus on a specific topic or theme, available for streaming or downloading over the internet.
VoIP
Voice Over Internet Protocol: A technology that enables voice and multimedia communications to be transmitted over IP networks, such as LANs, WANs, and the internet. VoIP allows users to make telephone calls to others with VoIP systems anywhere in the world, leveraging internet connectivity for communication.
VR
Virtual reality uses computer-based technology to create a simulated environment that immerses users and allows them to interact with a 3D, computer-generated environment.
WAN
Network spread over a wide geographical area
PAN
Personal Area Network: A network organised around an individual or a small group, typically with a range of a few metres, used to communicate between personal devices such as PCs, smartphones, smart wear, and tablets.
HAN
Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.
What are accessibility options in Microsoft Word?
Screen readers, text-to-speech, positioning of text and graphical elements need to be inline, providing alternative text to images, high contrast modes, etc. Accessibility options allow for those who do not interact with the world to the typical full potential due to differences in sight, hearing or physical impairments.
What are factors which influence performance of a computer?
- Memory
- CPU
- Storage
- Presence of malware
What are risks of human input
- Accuracy and validity
- Security
What are slots and ports?
Ports and slots allow for peripherals to be connected to computers such as HDMI ports and RAM slots
What are the rules for email attachments?
There are guidelines for sending email attachments such as supported formats and file size limits. Any attachment to an email not meeting these guidelines will need to be sent using a different medium.
What services can an ISP provide?
Email, web hosting, broadband, spam filtering, wired and wireless internet access, fax-to-email
Why are computers and ICT used?
Efficiency, reliability, accuracy, accessibility and communication
Wikis
A website that allows multiple users to collaborate by adding, editing, and modifying content collectively. An example is Wikipedia, where users can contribute and edit articles collaboratively.
Wired connections
- ADSL
- Fibre
Wireless connections
Cellular technology allowing wireless connection to the internet using an existing cellular network, a computer can access this using a dongle.
WWW
World Wide Web: A service on the internet that comprises a vast collection of multimedia, interactive documents stored on servers worldwide. These documents are interconnected and accessed using HTTP (Hypertext Transfer Protocol).
Card skimmer
Device that reads the magnetic data from a bank card.
Card reader
Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.
Optical Disc
A secondary storage device that stores programs and data using lasers, e.g. DVD, CD
PIN
Personal Identification Number: A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards.