17th Test Flashcards

1
Q

ADSL

A

Asymmetric digital subscriber line: permanent digital connection to the internet by means of copper cables and a landline/telephone to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Software causing unwanted content to automatically display or download while browsing the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-virus

A

Scans files for malware and eliminates it using signatures and definitions to detect malware and prevent practices which increase the risk of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AR

A

Augemented reality is a technology placing interactive digital content over real scenes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Archive

A

Moving messages from the inbox to an archive folder without deleting them./Removing files which are not in use and storing them in a compressed location for saving space and later use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aspect ratio

A

Relationship between the width and height of the display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bandwidth

A

Total amount of data that can be transferred from one point to another in a given period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bandwidth theft

A

Unauthorised access to wireless bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Big data

A

Large amounts of structured and unstructured data analysed using computers to reveal trends and associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biometrics

A

Inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blog/Vlog

A

A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order. A vlog is a video form of blog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bookmark

A

Identifies a location or selection of text that you name and identify for future reference./Keeps track of a website for easy future reference, typically on the home page or under the search bar of a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bots

A

Perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Broadband

A

High speed, high bandwidth connection to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Browser add-ons/extensions/plug-ins

A

A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Browser caching

A

Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bug

A

Unintentional errors made in programming fixed through updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BYOD

A

Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CD

A

Compact disc: an optical disc format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Click-jacking

A

An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cloud computing

A

A general term that refers to the sharing and use of resources and applications offered as services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CMYK

A

Cyan, Magenta, Yellow and Black

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Colour depth

A

Number of bits used to represent a colour, the higher the better (max 32 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Computer Worm

A

Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Computer virus

A

A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Considerations for internet

A
  1. Shaped/unshaped
  2. Cap
  3. Mobility
  4. Line speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Contrast ratio

A

Relationship between the darkest black and lightest white - higher is better, lower is muddy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Convergence

A

Separate technologies and functions previously requiring multiple devices overlapping into a single device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Piracy

A

Movies, music, games, books or programs in electronic format are copied without being paid for known as piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Count and text functions in excel

A

COUNT() counts cells with number
COUNTA() counts cells that are not empty
COUNTIF(), COUNTIFS() counts cells meeting conditions
LEN() length of text
LEFT(), RIGHT(), MID() extracts
UPPER(), LOWER(), PROPER() changes case
CONCATENATE() or CONCAT() or & joins text strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CPU

A

Central processing unit: hardware component processing data and carrying out instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Crowdfunding

A

A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cyberbullying

A

The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cyberstalking

A

People who are intruding in other peoples personal details online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cyberterrorism

A

A type of internet attack that attacks parts of a country’s IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Data/Intellectual property theft

A

Data can be physically copied onto a storage device or intercepted during transfer over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

DDR

A

Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Defragmentation

A

Fragmentation occurs when different parts of a file become scattered across a hard drive, meaning that each time the file needs to be accessed, the scattered parts must be rejoined causing the file to open slowly. Defragmentation is placing the parts of the file in the same place to speed up the opening of files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Difference between minimum and recommended system requirements

A

Minimum system requirements are what is needed of one’s computer in order for software to function at all whilst recommended system requirements are what is needed for the software to function at its best.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Difference between single user and multi user operating systems

A

Single user operating systems allow for multiple users to use the computer at once whilst multi user operating systems allow for several users to access the computer at the same time such as linux or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Difference between web based and installed applications

A

Web based applications are accessed online and do not need to be installed to the local computer/drive whilst installed applications do not need an internet connection to access and are installed to the local computer/drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Digital divide

A

The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

DIMM

A

Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Disk cleanup

A

Frees up storage through removing temporary files, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Disk scanner

A

Checks a drive for errors and tries to fix them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

DoS

A

A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

dpi

A

Dots per inch/pixel density: how many pixels displayed in 1” horizontal line, higher is better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

DSLR

A

Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

DVD

A

Digital versatile disc: a form of optical disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

E-communication

A

Use of technologies to transfer digital data using computers, smartphones, tablets and networks like the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Effects of technology (positive/negative)

A

Employment
Education
Culture and language
Individual connectedness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Email

A

Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Entry-level computer

A

Cheap to purchase with low hardware specifications and fewer default features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

EULA

A

End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Examples of file attributes

A

Properties which can be set such as read only and hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Fibre

A

Data is transmitted along glass tubes underground allowing it to be faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

File sharing

A

Done through email, FTP or online storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

FTP

A

File transfer protocol: used for transfer of files between computers on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Date and time functions in excel

A

Now() date and time Today() gives date
Day(), Month(), Year() extracts
Hour(), Minute(), Second() extracts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

GAN

A

Global Area Network: A form of worldwide network such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

GHz

A

Gigahertz measures the processing power of the CPU, having multiple cores is similar to having more than one processor on one chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Government internet services

A

Provide an opportunity for government departments to streamline service delivery to the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

GPS

A

Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Grid computing

A

A system where computational resources of multiple computers from different locations are pooled together to work collaboratively on one problem or task. Eg. SETI@Home initiative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

HDD

A

Hard disk drive: a mechanical drive and secondary storage device using mechanical parts to magnetically store data and programs

67
Q

HDMI

A

High definition multimedia interface: a single cable interface transmitting high-definition video and sound offering better quality images due to digital signals

68
Q

How can one identify fake emails/scams?

A

Being aware of phishing and scam and ensuring that email addresses and contact attempts are verified. Assume nothing, believe no one, check everything.

69
Q

What is required for internet access?

A

A device, an ISP and a form of internet connection

70
Q

How is the task manager accessed and what does it do?

A

ctrl+alt+del; provides information about the computer’s performance and running applications and processes.

71
Q

HTTPS

A

HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP, the protocol to transfer web pages and their content across the internet.

72
Q

ICT

A

Information and communication technology: use of computer-based technology and the internet to make information and communication services available for a wide range of users

73
Q

Identity theft

A

Obtaining a user’s identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim’s name. Eg: Banking information

74
Q

IM

A

Instant Messaging: The exchange of text messages through a software application in real-time.

75
Q

Impact of ICT

A
  1. Global scale communication
  2. Work, business and competition on a global scale
  3. Difficult to control and/or restrict information
  4. Telecommuting
  5. Computer fraud
  6. Information Overload
76
Q

Information overload

A

Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can’t cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.

77
Q

Internet

A

Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.

78
Q

Internet precautions

A

Be careful installing free software, ensure sites are encrypted, have good passwords, stay informed. Don’t click on links or open attachments in untrusted emails, don’t click on pop-ups, don’t give out personal information, don’t perform sensitive tasks on public computers.

79
Q

Internet services

A
  1. Realtime messaging: online exchange of messages
  2. VoIP
  3. Video conferencing: allows online conferences using a computer network as if they were in the same room
  4. Cloud computing: sharing and use of resources and applications offered as services over the internet
  5. Online storage: storage location appears to the user as a folder as if it were part of their own computer, but is stored on an online server
  6. File sharing: email, FTP, online storage
  7. Grid computing
  8. Government internet services: government departments streamline service delivery to the public
80
Q

Intranet

A

Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.

81
Q

IoT

A

Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.

82
Q

IP Address

A

Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses.
IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.

83
Q

Is more bandwidth allocated for uploads or downloads?

A

Dowloads

84
Q

ISO rating

A

A digital camera’s sensitivity to light. Higher ISO ratings are better.

85
Q

ISP

A

Internet service provider: a company with a permanent, fast connection to the internet selling internet access and services to individuals/organisations for a fee

86
Q

Keylogger

A

A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.

87
Q

LAN

A

Local Area Network: Network that connects computers and other devices within a limited geographical area, such as a school, office building, or campus.

88
Q

LTE

A

The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.

89
Q

Malware

A

Software harmful to the computer written with negative intentions

90
Q

Money theft

A

Confidential information is taken which allows access to bank accounts or card skimmers, video cameras at ATMs or internet related scams (cons)

91
Q

Network

A

A collection of computing devices that are connected via some form of medium.

92
Q

New technology

A
  1. Faster, cheaper, smaller, more powerful
  2. Longer battery life
  3. Easier and more effective input and output
93
Q

Non-portable computer systems

A
  1. Servers: powerful computer providing resources to the computers linked in its network
  2. Desktops
94
Q

OCR

A

Optical Character Recognition: technology that converts text within an image into editable and searchable text by analysing the image and translating the text into a standardised format such as UNICODE.

95
Q

Online storage

A

Disk space that is allocated to you on a server on the internet. Accessible wherever you can log into the server.

96
Q

Online Survey

A

A method of gathering data about a specific topic to later analyse it, using the internet to gather the data in question.

97
Q

OS

A

Operating system controls activities taking place on a computer, proving user interface, managing programs and hardware and providing basic security

98
Q

OS system utilities

A
  1. File management
  2. Backup
  3. Scheduling
  4. Printer management
99
Q

PDF

A

Portable Document Format: A file format used to distribute documents that is independent of the application in which they were created. It can be read using a free utility program called Adobe Reader.

100
Q

Pharming

A

A scamming practice where a user’s web traffic is automatically redirected to a bogus website, even if the correct URL for the official site is entered. This allows criminals to capture any data the user enters, such as passwords and PINs.

101
Q

Phishing

A

A scamming technique where users are enticed, usually via email, to click on a link to a fraudulent website in order to trick them into providing personal and confidential information, such as banking details, PIN numbers, and passwords, often by posing as a legitimate organisation.

102
Q

Portable computers

A
  1. Laptop/notebook
  2. Tablet
  3. Hybrid computer
  4. Phablet (smartphone with a screen larger than 5”)
  5. Smartphone
103
Q

POS

A

Point of Sale: The software used in shops and supermarkets to manage tills, often linked to stock control systems designed to expedite the sale of goods and services in retail environments.

104
Q

Primary Storage

A

Fast and typically electronic volatile memory holding instructions used by the computer whilst it is on. Eg: RAM, ROM

105
Q

Printers

A
  1. Inkjet: best for images, cheaper than laser, high running cost, low text print quality, slower than laser
  2. Laser: faster than inkjet, high quality text, low running cost, uses toner
  3. Dot matrix: cheap, low running cost, low print quality, uses ribbon, create carbon copies
  4. 3D printer: creates physical three-dimensional objects designed on a computer
  5. 300 dpi for text is good
106
Q

Processing and time power theft

A

When criminals have a large task they need to execute, they take processing power from computers they don’t own using a botnet

107
Q

QR

A

Quick response code: A two-dimensional square barcode capable of storing significantly more data than traditional barcodes. QR codes can be scanned using a mobile device camera to access encoded information.

108
Q

RAM

A

Random access memory: Primary short-term, volatile memory that temporarily stores programs and instructions currently loaded.

109
Q

Ransomware

A

Malicious software that encrypts data on a computer or network, making it inaccessible to the user until a ransom is paid to the attacker.

110
Q

Real-time messaging

A

Online exchange of messages (also images, video and voice) in real time. It includes IM (e.g. WhatsApp) and chat.

111
Q

Refresh rate

A

How often the screen display is refreshed - higher refresh rate is better, low refresh rate leads to ghosting

112
Q

Resolution

A

Highest number of pixels supported by the display given as horizontal pixels by vertical pixels

113
Q

RFID

A

Radio Frequency Identification: A technology that uses small radio devices, typically smaller than a grain of rice, to store and transmit data via radio signals, allowing identification and data transfer to a receiving device.

114
Q

USB

A

Universal Serial Bus: Standardised serial bus to connect most types of peripherals to the motherboard. It transfers data and power.

115
Q

ROM

A

Read only memory: a non-volatile memory which stores the instructions needed for the computer to switch on (check hardware, find and load the operating system) after which control is given to the operating system

116
Q

RSS

A

Really Simple Syndication – a technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines – all from many different sites.

117
Q

Scam

A

Falsities which can be conducted online aiming to gain money or personal information through trickery

118
Q

Screen-lock pattern

A

A security feature on mobile devices where a pattern, drawn or traced on the screen with a finger, is used to unlock the device.

119
Q

Secondary Storage

A

Permanent, non-volatile storage storing programs and data on the local computer

120
Q

Security tools

A
  1. Access control: prevents malware from being installed without consent/knowledge by verifying software installations
  2. Firewall: a barrier between the computer and the internet, filtering network traffic
  3. Security settings
121
Q

Shaped/unshaped

A

A shaped internet connection is an internet connection where preference is given to certain services on the internet, such as email, downloading and browsing. Other services, such as online gaming and VoIP, are given less preference and are slower.

122
Q

SIM

A

Subscriber identity module: a removable card inside a cell phone that stores data unique to the user, allowing the network provider to provide services

123
Q

SMS

A

Short message service: allowing for the exchange of text messages between devices

124
Q

Social engineering

A

The use of deception and psychological manipulation to trick individuals into divulging confidential information, providing unauthorized access to computer systems, or performing actions that may compromise security. This can include impersonation, installing malware, or other fraudulent activities.

125
Q

Social networking

A

Allow people to connect with each other and share information (Facebook, Twitter, Kickstarter, Waze, Yelp, Pinterest, Foursquare) typically for free after registration, encouraging users to get others to join. Hackers can gain money by getting and selling users’ information

126
Q

Spam

A

The electronic equivalent of junk mail, specifically referring to unsolicited email advertisements or messages sent to users without their request or consent.

127
Q

Spoofing

A

The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL.

128
Q

Spyware

A

Software that covertly installs malware on a user’s device to intercept and collect their data without their informed consent. This may include keystroke logging or other methods to monitor and report user activities to third parties.

129
Q

SSD

A

Solid state drive: an electronic storage device with no moving parts and a flash memory to store programs and data allowing for faster disk access than HDD

130
Q

Throttle

A

When an Internet Service Provider (ISP) intentionally slows down the internet connection speed of a user who is consuming excessive amounts of data. This is typically done based on the ISP’s acceptable use policy (AUP), which defines thresholds or conditions under which throttling may occur to manage network congestion or ensure fair usage among subscribers.

131
Q

Tools to use the web efficiently

A
  1. Caching
  2. Add-ons/extensions
  3. History
  4. Blocking websites
  5. Home page settings
  6. Pop-up blocker
  7. Bookmarks
132
Q

Track changes

A

A feature in word recording and displaying modifications made to a document allowing users to review and accept/reject changes made during collaborative editing.

133
Q

Trojan

A

A type of malicious software that masquerades as a legitimate or useful program, but when executed, it causes harm to a computer system.

134
Q

Types of compatibility

A
  1. OS Compatibility
  2. Compatibility between different versions of the same application
135
Q

Types of computer systems

A

Portable or non portable

136
Q

Types of software

A
  1. Application software
  2. Reference software
  3. Web browsing software
  4. Email software
  5. Document management software
  6. Voice recognition software
  7. Note-taking software
  8. Education/training software
137
Q

Types of users

A
  1. SOHO: Small Office Home Office executes their business from their home
  2. Personal: do not depend on their technology for many things
  3. Mobile: any of the categories, but needing their devices to be portable
  4. Power: need top range hardware and software
138
Q

USB 2, USB 3, USB C

A

In terms of transfer speed, USB C > USB 3 > USB 2

139
Q

User-centred design

A

Aim to develop interfaces that are attractive, easy to use and minimise input errors.

140
Q

VDSL

A

Very high speed digital subscriber line: ADSL improvement offering faster speeds

141
Q

Video conferencing

A

Allows people to hold online conferences using a computer network

142
Q

Virtual communities

A

A group of people who gather online to share ideas and interests.

143
Q

Podcasts

A

A series of on-demand digital audio files that typically focus on a specific topic or theme, available for streaming or downloading over the internet.

144
Q

VoIP

A

Voice Over Internet Protocol: A technology that enables voice and multimedia communications to be transmitted over IP networks, such as LANs, WANs, and the internet. VoIP allows users to make telephone calls to others with VoIP systems anywhere in the world, leveraging internet connectivity for communication.

145
Q

VR

A

Virtual reality uses computer-based technology to create a simulated environment that immerses users and allows them to interact with a 3D, computer-generated environment.

146
Q

WAN

A

Network spread over a wide geographical area

147
Q

PAN

A

Personal Area Network: A network organised around an individual or a small group, typically with a range of a few metres, used to communicate between personal devices such as PCs, smartphones, smart wear, and tablets.

148
Q

HAN

A

Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.

149
Q

What are accessibility options in Microsoft Word?

A

Screen readers, text-to-speech, positioning of text and graphical elements need to be inline, providing alternative text to images, high contrast modes, etc. Accessibility options allow for those who do not interact with the world to the typical full potential due to differences in sight, hearing or physical impairments.

150
Q

What are factors which influence performance of a computer?

A
  1. Memory
  2. CPU
  3. Storage
  4. Presence of malware
151
Q

What are risks of human input

A
  1. Accuracy and validity
  2. Security
152
Q

What are slots and ports?

A

Ports and slots allow for peripherals to be connected to computers such as HDMI ports and RAM slots

153
Q

What are the rules for email attachments?

A

There are guidelines for sending email attachments such as supported formats and file size limits. Any attachment to an email not meeting these guidelines will need to be sent using a different medium.

154
Q

What services can an ISP provide?

A

Email, web hosting, broadband, spam filtering, wired and wireless internet access, fax-to-email

155
Q

Why are computers and ICT used?

A

Efficiency, reliability, accuracy, accessibility and communication

156
Q

Wikis

A

A website that allows multiple users to collaborate by adding, editing, and modifying content collectively. An example is Wikipedia, where users can contribute and edit articles collaboratively.

157
Q

Wired connections

A
  1. ADSL
  2. Fibre
158
Q

Wireless connections

A

Cellular technology allowing wireless connection to the internet using an existing cellular network, a computer can access this using a dongle.

159
Q

WWW

A

World Wide Web: A service on the internet that comprises a vast collection of multimedia, interactive documents stored on servers worldwide. These documents are interconnected and accessed using HTTP (Hypertext Transfer Protocol).

160
Q

Card skimmer

A

Device that reads the magnetic data from a bank card.

161
Q

Card reader

A

Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.

162
Q

Optical Disc

A

A secondary storage device that stores programs and data using lasers, e.g. DVD, CD

163
Q

PIN

A

Personal Identification Number: A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards.