All Flashcards

1
Q

2-in-1 device

A

A portable computer sharing characteristics of both tablets and laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3D Printer

A

Printer that allows one to create a physical three-dimensional model from designs created using CAD or 3D modelling software by layering material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4G LTE

A

The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5G

A

The new generation of radio systems and network architecture for extreme broadband and ultra-robust, low latency connectivity, to enable the programmable world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11 a/b/g/n

A

Indicates if a device has a wireless adapter. Letters show the speed the wireless network is capable of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Absolute cell reference

A

The cell address in the formula will not change as the formula is copied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accelerometer

A

Input device to detect which way a device is being held to change the screen’s orientation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control

A

The operating system asks for permission before installing software to avoid malware installation without consent. Access control can also be placed on an entire device such that permission is given through a password before the device is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Filter

A

A criterion or rule set for a field in a database query to display only records that meet the specified condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ADSL

A

Asymmetric Digital Subscriber Line: permanent digital connection along copper cables to the internet using a landline or telephone line by transmitting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adware

A

Software causing unwanted content to automatically display or download while browsing the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AI

A

Artificial Intelligence: simulation of human intelligence in computers where they are designed to think and act like humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Algorithm

A

Step-by-step, sequential solution used to solve a problem, typically in programming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ALU

A

Arithmetic Logic Unit: part of the CPU performing arithmetic and logical calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-malware

A

Software safeguarding a computer against malicious threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anti-spyware

A

Programs designed to remove or block spyware and user practices that increase the chance of getting spyware on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Anti-virus

A

Software detecting malicious software then deletes or quarantines it based on the program’s behaviour/signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Append

A

Add records to an existing table in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Application software

A

Executes specific tasks for the user, requiring an operating system to run on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AR

A

Augmented reality: technology placing interactive digital content over real scenes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Archive emails

A

Moving messages from the inbox to an archive folder without deleting them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Archive files

A

Removing files which aren’t used regularly and storing them in a separate compressed location for space saving and later use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Aspect ratio

A

The relationship between the width and the height of the display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attachment

A

One or more files sent with a message (typically e-mail) to share documents and images, typically represented by a paperclip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Attenuation

A

Loss of signal strength over a distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Attribute

A

Name and value combination defining a property of an element.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

AUP

A

Acceptable use policy: a set of rules drawn up by company management to protect the company, its network and resources from misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Authentication

A

Verifying a user or device before allowing access to a system or resources (eg. CAPTCHA, OTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Autofill

A

Microsoft Excel feature automatically filling selected cells with data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Autonomous Vehicles

A

A self-driving/driverless car that can sense its environment and move safely with little to no human input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Backbone

A

Part of a computer network interconnecting pieces of the network and providing a path for the exchange of information between different LANs and subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Backup

A

Copying of files/folders in case of data loss to a separate location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Bandwidth

A

Maximum amount of data that can be transferred from one point to another in a period of time measured in (kilo/mega) bits per second (bps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Bandwidth theft

A

Unauthorised access to wireless bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Barcode

A

A pattern of thick and thin lines that are decoded by a scanner to represent data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Beta software

A

Preliminary version of software released by developers to test software before it is published where any errors are fixed before the final release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Bibliography

A

A list of sources of information at the end of a document to acknowledge the references, refer to them later and compare the final document to the original sources for plagiarism (APA, Chicago and Harvard referencing are most common)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Big data

A

A large volume of structured and unstructured data that is analysed using computers through a difficult process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Biometric device

A

A device that inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

BIOS

A

Basic Input Output System: non-volatile software stored in ROM to initialise the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Bit torrent

A

A peer-to-peer protocol where multiple peers can transfer data between each other. Files are split into smaller parts to increase upload and download speeds. A complete file becomes a seed which other users can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Bitcoin

A

A digital currency with encryption techniques to regulate the generation of units of currency and verify transfers. Operating independently of a central bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Black hat

A

Crackers/Hackers with malicious intentions to steal or vandalise systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Blockchain

A

Advanced database mechanism allowing transparent information sharing within a business network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Blog

A

A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Blu-ray

A

An optical disc format designed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data (more than DVD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Bluetooth

A

Wireless technology for sending data over short distances using short-wavelength radio transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Bookmark

A

Identifies a location or selection of text that you name and identify for future reference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Boot

A

A term to describe a computer’s start-up process. Restarting is rebooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Bot / Zombie

A

A software application that runs automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Botnet / Zombie Army

A

A group of compromised or infected computers connected to a network such as the internet and controlled remotely to attack other machines by infecting them with malware, sending spam, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Bounded media

A

Communication channels consisting of physical cabling common in wired LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Broadband

A

High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Broadband

A

High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Broadcast

A

An unsecured method of communication sent to multiple nodes in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Browser Add-on/Extension

A

A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Browser cache

A

Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Buffering

A

A temporary storage area in RAM to speed up a slow input/output device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Bug

A

An unintentional error, flaw, fault or failure made by programmers in a computer program/system causing it to produce an incorrect/unexpected result or behave in unintended ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Bus

A

An electronic pathway along which data can be sent from one part of the computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

BYOD

A

Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Bit

A

A binary digit is a single unit of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Cache

A

A high-speed memory used to hold recently or frequently accessed data, in order to be able to retrieve that data faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Cap / Uncapped

A

A bandwidth cap can be applied to a network by the service provider such that a certain amount of data can be transferred over that network to limit the channel from being overloaded. Going over the band cap incurs a fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

CAPTCHA

A

Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Caption

A

A numbered description added to a graphic object (such as a diagram or photo) or a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Card reader

A

Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Card skimmer

A

Device that reads the magnetic data from a bank card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Cell range

A

Two or more adjacent cells on a spreadsheet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Chart / Graph

A

Used to visualise a trend in data over intervals of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Chart area

A

Includes both the Plot Area and the ‘outside’ part of a chart where the titles are located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Chatbot

A

A computer program that simulates online conversations using text or voice commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Citation

A

Reference to the source used in a specific instance and found in the text immediately after the piece of information being referred to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

CLI

A

Command line interface: A text-based interface, with commands entered and executed at the command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Click-jacking

A

An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Client-server

A

A single dedicated networked computer that provides services (file storage, email, printing) to other nodes/devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Clients

A

Computers connected to a network that use services and resources from the servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Clipboard

A

Area in memory (RAM) where copied or moved objects – both text and graphics – are temporarily stored. They are kept there until they are pasted somewhere (or until the program is closed or the computer is shut down).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Closed questions

A

Questions that can be answered directly with facts. These questions often start with words such as What? When? Where? Who? How many? etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Cloud computing

A

A general term that refers to the sharing and use of resources and applications offered as services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Cloud storage

A

Storing data on remote servers, accessible from any Internet-connected device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

CMOS

A

Complementary Metal-Oxide Semiconductor: Battery-backed, volatile memory that stores hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Colour Depth

A

The number of bits used to represent the colour of each pixel in an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Column break

A

Used if you want to shift text to the top of the next column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Combo box

A

A list of values from which a user can choose a value. Only one value is visible at a time, the others will appear only when the user clicks on the arrow. A Lookup Wizard is used to create the list of values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Combo chart

A

If a chart has more than one data series, a different chart type can be used for each series.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Component

A

A circuit chip placed directly on the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Compression

A

The process of reducing file size takes up less storage space and quicker Internet transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Computer virus

A

A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Computer worm

A

Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Conditional formatting

A

Formatting of data on reports or computer programs that changes based upon specific criteria, e.g. printing and displaying negative quantities in red.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Constant

A

An entry which has a specific fixed value, e.g. 3.5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Contrast ratio

A

The relationship between the darkest black and the brightest white that a display device can produce. Higher values are better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

CU

A

Control unit: A part of the CPU that coordinates the processing of instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Convergence

A

The trend where separate technologies and functions that required different devices in the past are combined into one single device, e.g. the smartphone and the tablet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Cookies

A

A small text file stored in a user’s browser to record their history and preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Copyright

A

Software is developed and all rights belong to the owner/developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Core

A

A single physical processor. Chips that are ‘dual core’ have 2 processors, ‘quad core’ have 4 processors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

CPU

A

Central Processing Unit – hardware component that processes all data and carries out all instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

CPU Architecture

A

32-bit computers have a processor that works with 32 bits at a time. The memory addresses, register sizes, address and data bus sizes and instruction sizes are all 32 bits in length. The computer is able to process at most 32 bits of data at once. In the same way a 64-bit computer sizes are all 64 bits in length. The computer is able to process at most 64 bits of data at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Creative Commond License

A

A licence where the author retains copyright of their work but allows people to copy and distribute the work (documents, source code) on condition the author is acknowledged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Crop

A

To remove parts of a picture that you do not need. You can also customize it, for example to fit a specific shape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Cross-reference

A

Used to refer to related information elsewhere in the same document. One can choose what information to display about the item referred to. A hyperlink to this item is created by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Crosstalk

A

Signals in adjacent wires interfere with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Crowdfunding

A

A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Cryptocurrency

A

A form of virtual, digital currency, e.g. Bitcoin, Ethereum, Luno, that can be exchanged for other currencies, products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

CSV

A

Comma Separated Values file – a text file which uses commas to separate the values in each line. Commonly used to import and export data between programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

CTS

A

Carpal Tunnel Syndrome: A painful compression of the nerves in the wrist caused by repetitive manual action such as typing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Cyber-attack

A

Any type of offensive manoeuvre employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Cyberbullying

A

The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Cyberstalking

A

People who are intruding in other peoples personal details online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Cyberterrorism

A

A type of internet attack that attacks parts of a country’s IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Dark / deep web

A

Non-indexed web pages hidden from standard search engines accessible using an anonymising web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Data

A

Data is unprocessed items or facts in raw form that usually have to be manipulated or processed before it makes complete sense or before it becomes useful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Data labels

A

The values of the data points on a chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Data redundancy

A

Unnecessary repetition of data produced by removing repeating groups as a result of first normal form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Data series

A

A column or row of numbers in a spreadsheet that is depicted in a chart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Data Validation

A

Techniques used to ensure the accuracy and integrity of data entered into a database or spreadsheet, such as input masks, validation rules, drop-down boxes, and adjusting field size properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Database

A

A collection of related tables store data about a subject or a group of subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Date Picker

A

A control in Access that allows selection of a specific date by clicking on an onscreen calendar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

DBMS

A

Database Management System: Software that manages and controls a database, including permissions, backup, referential integrity, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

DDoS

A

Distributed Denial of Service: An attack where multiple coordinated Internet devices (bots) are used to overwhelm a service, making it inaccessible to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

DDR RAM

A

Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Dedicated device

A

Devices that are designed to perform one specific task only, e.g. traffic lights, washing machines, ATMS, calculators, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Default Printer

A

The printer to which documents are sent unless the user specifies otherwise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Default Value

A

In databases, a preset value defined for a column type, automatically allocated to a field in a new record when many records hold similar data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Defragmentation

A

The process of using a utility program to reverse fragmentation by rearranging and consolidating scattered file parts on a disk for quicker retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Delimiter

A

A character such as a comma, space or tab, used to separate each piece of data (each field) in a line in a CSV file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Desktop

A

The visual space on a computer screen where programs, shortcuts, icons, folders, files, and documents are displayed upon startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Desktop computer / PC

A

Personal computer: A single computer designed for home or office use, typically placed on a desk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Digital camera

A

A camera that captures and stores images digitally, allowing them to be downloaded to a computer for editing with graphics software and printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Digital Certificate

A

A data file from a Certificate Authority (CA) that verifies an organization’s identity by cryptographically linking its public key to specific identity attributes, such as VeriSign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Digital divide

A

The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Digital footprint

A

A trail left by an entity’s interactions in a digital environment; including their usage of TV, mobile phone, Internet and World Wide Web, mobile web and other devices and sensors. A digital footprint is the size of an individual’s online presence; as it relates to the number of individuals with whom they interact mainly on social networking sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Digital migration (digitisation of media)

A

The process of converting TV signals from analogue to digital format for broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Digital Signature

A

A cryptographic method where a user can “sign” a document by encrypting it with their private key. The document can then be verified using the user’s public key, ensuring its authenticity and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Digital zoom

A

Increasing the apparent size of an object in a photograph by enlarging pixels, resulting in potential blurriness and pixelation as the image quality decreases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

DIMM

A

Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Disk Cache

A

The use of RAM to enhance the speed of access to a slower hard drive by storing chunks of data read from the disk, reducing the need for repeated reads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Disk Cleanup

A

A computer maintenance utility in Microsoft Windows that identifies and removes unnecessary files from the hard drive to free up storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Disk Defragmenter

A

A utility that rearranges fragmented data on a mechanical hard disk to improve efficiency in loading and saving data, thereby enhancing computer speed. Note that it does not increase available disk space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Disk Scanner

A

A utility included with operating systems that checks a drive for errors and bad sectors on the disk, attempting to repair them if possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Distribution list/Mailing list

A

A list of email addresses grouped under a single name. Sending an email to this list forwards it to all addresses included, facilitating communication with multiple recipients simultaneously. Also known as a distribution list or contact group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Distributed Processing

A

A method of processing where the computational tasks required to solve a problem are distributed among multiple computers (such as servers in different data centres), thereby enhancing total processing power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

DNS

A

Domain Name Servers: A protocol that translates domain names into IP addresses, enabling computers to locate resources on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Domain Name

A

A unique string of characters that identifies a website on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Dongle

A

A device plugged into a USB port to enable connectivity, such as for wireless keyboards or mice. It can also refer to a 3G or 4G dongle used with a desktop computer or laptop to connect to a cellular network for internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

DoS attack

A

A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Download

A

The process of receiving data from a remote server to a local computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Downward/backward compatibility

A

The ability of software to open and use files created in previous or older versions of the same software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

DPI

A

Dots per Inch: A measure of print or scan resolution indicating the density of dots per inch. For instance, an average print resolution might be around 4800 x 1200 dpi. High scan resolution is crucial for those frequently making high-quality copies or scanning pictures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

DRAM

A

Dynamic RAM: RAM that utilizes capacitors and requires periodic refreshing to maintain stored data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Driver

A

System software that enables the operating system to communicate with hardware devices, facilitating their functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Drop Cap

A

An enlarged initial letter or word at the beginning of a paragraph that extends into the lines of text below it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

DSLR Camera

A

Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Dumpster Diving

A

The practice of obtaining discarded data, such as invoices, phone records, organizational information, sensitive data printouts, or discarded hardware, typically to extract information or manipulate individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

E-commerce

A

The general term for any type of business transaction conducted over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

E-learning

A

A learning environment where individuals use computers to participate in teaching and learning activities to further their education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

E-mail spoofing

A

The forgery of an email header so that the email appears to be from a different origin (or person).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

E-waste

A

Electronic Waste: Waste materials generated from the use or disposal of electronic devices, such as computers, televisions, and mobile phones. E-waste often contains hazardous materials that can be harmful to humans, plants, and animals, and can contaminate water, air, and soil.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Eavesdropping

A

The act of intercepting and monitoring signals traveling along copper cables by unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

eBook / eReader

A

A mobile electronic device designed primarily for reading digital eBooks and magazines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

EEPROM

A

Electronically Erasable Programmable ROM: ROM that can be electronically modified and erased using software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

EFT

A

Electronic Funds Transfer: The process of transferring money from one bank account to another electronically, typically using internet banking services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Email

A

Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

EMI

A

Electro-Magnetic Interference: The corruption of signals traveling in copper cables due to electromagnetic sources, such as nearby machines or equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

En dash

A

A dash that is slightly longer than a hyphen, typically used for number ranges and occasionally for indicating relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Encryption

A

The process of converting plain text into unreadable ciphertext to secure it from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Endnote

A

Similar to a footnote but placed at the end of a section or document rather than at the bottom of the page where referenced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Entry-level computer

A

A desktop computer designed for users who primarily use basic applications like email, web browsing, and general document tasks, typically available at an affordable price point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Ergonomics

A

The study and design of workplace equipment and furniture to ensure it promotes comfort and safety for individuals in their work environments. Specific areas of interest include keyboards (curved for comfortable arm and wrist positioning), chairs, mice, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Ethernet

A

A LAN (Local Area Network) technology that encompasses protocols, devices, and communication methods for wired network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

EULA

A

End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Excel Filter

A

A feature used in Excel to display only certain rows of data in a worksheet based on specified criteria or conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Expansion Card

A

A small circuit board that is inserted into a motherboard slot (such as PCI, PCIe, SATA) to enhance the functionality of a computer beyond what is provided by the onboard components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Export

A

Saving data in a format that can be read by a different version of the same application or even a totally different application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Fake News

A

Stories or hoaxes created to deliberately misinform or deceive readers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Fibre optic cable

A

A type of network cable that transmits data using light pulses through a central glass or plastic core, making it exceptionally fast and efficient for data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Field

A

In the context of a database, a field refers to a single piece of data or a single fact, such as an ID number, surname, or any other attribute of a record. It is the smallest unit of data stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

File Extension

A

A set of characters, typically 3-5 in length, added to the end of a filename to denote the type of file and the software required to operate or open it. Examples include JPG, EXE, BMP, DOCX, HTML, ACCDB, PPTX, XLSX, and ZIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

File Path

A

The complete location or name of where a computer file, webpage, or other object is located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

File property

A

The basic information about a file such as its name, size and date modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Firewall

A

A security system, implemented as hardware, software, or both, that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the internet), helping to protect against unauthorized access and potential cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Flash Drive

A

Portable secondary storage that stores programs and using flash memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Folder

A

A virtual location where programs, files, and other folders can be located. Computers with an Apple, Microsoft Windows, or other GUI operating system have folders to help users store and organize their files. A subfolder is a folder that is located inside another folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Footnote

A

Additional information placed at the bottom of the page in a document, and linked by a number or symbol to the relevant text in the body of the page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Foreign Key

A

A field in a table that is a primary key in another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Form

A

An interface or object in software applications that allows users to input, store, and view data in a structured and user-friendly manner. Forms typically include fields for entering data and controls for navigation and interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Form Letter

A

A standard letter template designed to be personalized and distributed to multiple recipients on a mailing list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Formatting

A

The process of preparing a storage device, such as a disk or a drive, to store data by defining its file system structure. Initialisation determines how data is stored and accessed. Formatting a disk usually erases all existing data on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Formula

A

A statement written by a user in software applications like spreadsheets to perform calculations. Formulas can range from simple arithmetic operations to complex calculations involving functions, cell references, and constants. They always begin with an equals sign (=).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Fragmentation

A

The more you use your computer, the more the files (and parts of files) get scattered on the disk. The more scattered the files’ parts are, the slower your computer becomes, as the files take longer to retrieve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Freemium Software

A

A type of software that offers basic functionality or a limited version for free, but charges for additional features or premium services. This model allows users to use the software for free with the option to upgrade to access more advanced capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Freeware

A

Software that is fully functional and available for use and distribution at no cost. Unlike open-source software, freeware typically does not provide access to its source code and may have restrictions on resale or modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

FTP

A

File Transfer Protocol: A protocol to transfer and download files from the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Function

A

A named and predefined procedure in software that performs a specific operation and returns a result. Functions are typically invoked by typing their name followed by parentheses, within which arguments (if any) are specified. Examples include functions like COUNT, SUM, and MEDIAN in spreadsheet applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

GAN

A

Global Area Network: A worldwide WAN such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Gap width

A

The distance between columns or bars in a chart, typically expressed as a percentage of the width of the columns or bars themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Gateway

A

A device that connects and translates between network segments with different topologies, technologies, or protocols, enabling communication between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Geotagging

A

The process of adding geographical coordinates (latitude and longitude) to the metadata of a file, such as a photo, indicating where the photo was taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

GHz

A

Gigahertz: A unit of frequency measurement for CPUs, indicating their processing speed. A higher GHz value generally signifies faster processing capabilities. 1GHz = 1 billion cycles (of instructions) per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

GIGO

A

Garbage-In-Garbage-Out: The principle that if incorrect or low-quality data is entered into a system, the output or results will also be incorrect or of low quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

GPS

A

Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

GPU

A

Graphics Processing Unit: A co-processor on a video card that accelerates applications by offloading complex mathematical and geometric calculations required for graphics rendering from the CPU. This can significantly enhance computer performance in tasks such as CAD, 3D graphics rendering, and gaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

Green Computing

A

The practice of using computers and related resources in an environmentally responsible and eco-friendly manner, encompassing their manufacturing, use, and disposal processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Grid Computing

A

A system where the computational resources of multiple computers from different locations are pooled together to work collaboratively on a single problem or task. Examples include projects like the SETI@Home initiative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Gridlines (Excel chart)

A

Lines displayed in the plot area of a chart to aid in visually estimating the values of data points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Gridlines (Excel worksheet)

A

Lines forming a rectangular grid that distinguish individual cells in an Excel worksheet, aiding in visual organization and alignment of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

GUI

A

Graphical User Interface: A user interface that allows users to interact with electronic devices through graphical icons and visual indicators, rather than text-based commands. It typically includes windows, icons, menus, and a pointing device (like a mouse) for navigation and selection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

Hackers and crackers

A

Individuals who break into computer systems. Hackers often do so for prestige and recognition, while crackers have criminal intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

HAN

A

Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Hard copy

A

A printed version of data stored on a computer, as opposed to a soft copy, which is visual output on a screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Hard space

A

A space where word wrapping cannot occur, keeping the characters or words on either side together on the same line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

Hardware

A

The physical components of a computer, such as the mouse, keyboard, and monitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

HDD/Mechanical Drive

A

Hard disk drive: A secondary storage device that uses mechanical parts to store programs and data magnetically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

HDMI

A

High-Definition Multimedia Interface – a single cable interface that transmits high-definition video and sound, offering better quality images due to digital signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

HDMI Port

A

A connection interface that transmits both video and audio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

Header / footer

A

An area within the top and bottom margins of a page, which can contain information that appears on each page of the document or section, such as page numbers, a company logo, or the file name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

Hidden attribute

A

A file attribute indicating if a file is visible. Hidden files, unlike visible files, do not appear in File Explorer by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

History

A

An option that allows a user to find the web pages they have previously visited. When you click this option, it shows a list of sites you have visited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Hits

A

Each file sent to a web browser by a web server, also called a page hit. It refers to the retrieval of any item, such as a page or graphic, from a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Hoax

A

A cybercrime involving fraudulent chain messages, typically warning about a nonexistent virus. These deceptive messages can be sent via email, SMS, WhatsApp, or social media platforms like Facebook and Twitter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Home page

A

The first page of a website, which contains information about the website’s purpose and content. It also provides links to other web pages and resources in the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

Hot swappable

A

An extension of plug and play functionality where a new device can be connected to a computer while it is still running, without needing to power down, set up the device, or reboot the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Hotspot

A

The area where a WiFi signal can be detected and used, providing internet access to devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

HTML

A

Hyper-Text Markup Language: The predominant markup language for creating web pages. Used to structure and present content on the World Wide Web (WWW), including text, graphics, audio, and video. HTML elements consist of tags surrounded by angle brackets within web page content. HTML files are text files readable by all browsers and word processing software, making it the fundamental language for creating basic websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

HTTP

A

HyperText Transfer Protocol: The standard protocol for transferring web pages and their content across the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

HTTPS

A

HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

Hybrid computer

A

Laptop / tablet with a reversible or detachable screen and a normal keyboard. The screen is touch- or pen-sensitive. This machine can be used either as a normal laptop or as a tablet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

Hybrid Drive

A

A secondary storage device that combines a mechanical HDD and an SSD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

Hyperlink (Link)

A

An icon, graphic, or text in a document that links to another file or object. A built-in connection to another place in a document (web page, resource), often indicated as text underlined in blue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

Hypertext

A

A document with highlighted words or pictures, which when clicked on links to other information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

ICT

A

Information and Communication Technology: The use of computer-based technology and the Internet to make information and communication services available in a wide range of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

Identity Theft

A

Obtaining a user’s identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim’s name. Eg: Banking information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

IM

A

Instant Messaging: The exchange of text messages through a software application in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

Import

A

Process of opening or ‘reading’ data created in a different version of the same application or even a totally different application. It involves bringing in data saved in a format that can be read by a different version of the same software or a different program altogether.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

Information

A

Information is processed facts or data. Information comprises particulars that make sense, that you can use when you have to make decisions or when you have to solve problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

Information overload

A

Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can’t cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

Information Processing Cycle

A

The sequence of events in processing data into information which includes input, processing, storage and output. Communication has also become a very important element in this cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

Information Theft

A

The illegal copying or storage of confidential personal or financial information, including passwords, software code, algorithms or databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

Infrared

A

Infrared connects devices in a short range, devices need to be line-of-sight and only one-to-one connections can be made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

Inkjet printer

A

Type of printer that sprays microscopic dots of ink onto the paper and is relatively cheap to buy but is comparatively expensive to run. Good for high-quality graphics such as photographs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

Input Mask

A

Field property in database design used to enforce data entry in a specific format. It consists of a code made up of letters, digits, and symbols, which dictates how data should be formatted when entered into a field. Input masks are commonly used for fields such as telephone numbers or dates to ensure consistency and accuracy of data input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

Integrated Graphics

A

A GPU that is embedded in the CPU, and instead of separate VRAM, the GPU shares system RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

Internet

A

Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

Interrupt

A

A signal sent to the operating system from hardware or software requiring the CPU’s attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

Intranet

A

Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

IoT

A

Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

IP Address

A

Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses.
IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

IRQ

A

Interrupt Request Number: A unique device number that the operating system uses to identify the source of the interrupt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

ISO rating

A

A digital camera’s sensitivity to light. Higher ISO ratings are better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

ISP

A

Internet Service Provider: a company that has a permanent, fast connection to the internet. They sell internet access and services to individuals or organisations for a monthly fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

ISP-Based email

A

When using ISP-based email, you access your email by using software such as Microsoft Outlook on the device where your account settings have been configured.

254
Q

Kernel

A

The kernel is the core of the operating system that is always in RAM to control the computer.

255
Q

Keylogger / Keylogging

A

A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.

256
Q

Label (Access)

A

A control containing text, mainly used for headings and captions.

257
Q

LAN

A

Local Area Network: Network that connects computers and other devices within a limited geographical area, such as a school, office building, or campus.

258
Q

Laptop / Notebook

A

A mobile electronic device that has the same power today as a PC. Its main advantage is that it is portable.

259
Q

Laser printer

A

Type of printer that works like a photocopier, using toner instead of ink cartridges. Relatively expensive to buy compared to inkjet printers but cheaper to run and, of the two, best suited for higher volume printing.

260
Q

Latency

A

The time taken for a component or device to respond.

261
Q

LBS

A

Location Based Services: Services that use a device’s geographical position provide contextual information like the nearest ATM, restaurant or retail store.

262
Q

LCD

A

Liquid Crystal Display: A monitor that does not need to be refreshed. Found in Laptops and PDAs.

263
Q

Legend (Excel)

A

The ‘key’ which describes (gives the names of) the different data series in the chart, by depicting the fill colours or the patterns used.

264
Q

Linux

A

An open source operating system.

265
Q

List box (Access)

A

A list of values from which a user can select a value but not add an additional one

266
Q

Lumen

A

This measures the brightness of the image projected by a data projector. The higher the lumen rating, the more effective the projector will be.

267
Q

M.2 Format

A

M.2 is a form factor – it describes the shape and size of a hardware device.

268
Q

MAC Address

A

Media Access Control Address: A hardware identification number that uniquely identifies each network node.

269
Q

Machine Cycle

A

The steps for a program instruction to be executed by the CPU. It consists of FETCH, DECODE, EXECUTE and STORE.

270
Q

Macro

A

A single instruction that expands automatically into a set of instructions to perform a particular task.

271
Q

Mail merge

A

A document is merged with a list of names/addresses to avoid having to type out letters out individually. The data source could be a spreadsheet, a database table or a word processing table.

272
Q

Mainframe

A

A powerful computer that is used to control major networks, e.g. banks, universities and large companies.

273
Q

Malware

A

Software harmful to the computer written with negative intentions

274
Q

MAN

A

Metropolitan Area Network: High-speed interconnected LANs across a city or metropolitan area.

275
Q

Margins

A

The distance between the text and the sides of a whole page or whole document.

276
Q

Markers (Excel)

A

Small marks (e.g. dots or crosses) used to indicate the actual data points on a line chart.

277
Q

Meme

A

An image, video, piece of text, etc., typically humorous in nature, that is copied and spread rapidly by Internet users, often with slight variations.

278
Q

Memory

A

Temporary storage area for programs and data being processed in the computer. Memory loses its contents when the power is switched off. Such as RAM

279
Q

Memory Card

A

Electronic storage media used in digital cameras and smartphones.

280
Q

Metadata

A

Additional data. Providing information about a certain item’s content. Eg: size, colour depth, resolution, date created, document length, author, etc.

281
Q

Metaverse

A

A world that promises to combine the physical world, digital, artificial intelligence, augmented reality and cryptonomics into one immersive experience.

282
Q

Micro-USB

A

A smaller type of USB port, usually found on mobile devices such as smartphones.

283
Q

Microwave

A

A communications system that uses microwave frequency radio waves to transmit video, audio, or data between two locations, from a few metres to several kilometres apart.

284
Q

Mid-range computer

A

For users that will be using their desktop for basic applications such as e-mail, Internet surfing and general documentation, but are more frequent users, require multi-tasking and are looking for a PC with slightly better specs than the entry-level range shown above.

285
Q

Mobile Applications

A

Applications that are downloaded and installed on a mobile device. An app can access remote content and data using the Internet or download the content to be accessed locally.

286
Q

Mobile Device

A

Electronic devices, usually portable, which helps the user with diary, dates, calendars and short notes.

287
Q

Mobile Offices

A

A temporary or movable configuration of equipment and services allowing a person to function as if they are working from a permanent office

288
Q

Mobile Operating System

A

Operating systems designed to run on mobile devices with limited resources, e.g. iOS, Windows Mobile, Android

289
Q

Mobile or m-learning

A

A form of education and training delivered and conducted via the internet using mobile devices.

290
Q

Mobile user

A

User (not necessarily a separate category) who wants and needs to have their technology with them wherever they are, e.g. sales people and consultants.

291
Q

Modular Design

A

A computer is assembled with various components to suit a user’s requirements.

292
Q

Monitor / Screen

A

A piece of electrical equipment which displays images generated from the video output of devices such as computers, without producing a permanent record.

293
Q

Motherboard

A

A large circuit board that connects the most important components such as CPU, memory and connectors for peripherals

294
Q

Multi-function printer

A

An all-in-one input/output device which can typically print, scan, photocopy and fax

295
Q

Multi-touch (touch screen)

A

A screen that allows for two or more fingers to be detected and used on it at one time, e.g. for pinching actions.

296
Q

Multi-user operating system

A

An operating system that allows multiple users to access a computer system at the same time. It is often used in networks where the same single operating system deals with multiple users that are simultaneously logged on.

297
Q

Multimedia

A

Content that uses a combination of different content forms. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content forms.

298
Q

Multiprocessing

A

More than one physical core on a CPU chip. When a computer is able to run more than one process simultaneously.

299
Q

Multitasking

A

An operating system is able to load and process multiple tasks/processes simultaneously. True multitasking is achieved if the CPU has more than one core (multiprocessing). For example, compiling a program and listening to music.

300
Q

Netiquette

A

The use of good manners when using the Internet and respect for other users.

301
Q

Network

A

A collection of computing devices that are connected via some form of medium.

302
Q

NFC

A

Near Field Communication: Technology that allows electronic devices to connect wirelessly and exchange data, simply by touching them together or bringing them close together. NFC is mainly used for payment processing.

303
Q

NIC

A

Network Interface Card: Connects a computer to a network enabling data to be sent and received between the computer and other network-connected devices.

304
Q

Node

A

Any device connected to a network and has an IP address.

305
Q

Non-breaking hyphen

A

Used to force the words or characters on both sides of the hyphen to remain on the same line. ()

306
Q

Normalisation

A

The process of creating separate linked tables by removing data redundancy, anomalies and complex SQL queries.

307
Q

NVMe

A

Non-Volatile Memory express: A device interface specification for accessing a computer’s non-volatile storage media attached via PCI Express bus.

308
Q

OCR

A

Optical Character Recognition: technology that converts text within an image into editable and searchable text by analysing the image and translating the text into a standardised format such as UNICODE.

309
Q

Office Suite

A

A package which includes a number of standalone programs. Referred to as an Integrated Package. Types of applications included: Word processing, spreadsheet, presentations, e-mail, and database. Examples include Office 365, OpenOffice

310
Q

OLE Object (Access)

A

A data type that can contain graphics, sound and video in addition to other data types. (Object Linking and Embedding)

311
Q

Onboard Controller

A

A hardware component embedded into a circuit board such as the motherboard.

312
Q

Online / Virtual Community

A

An online group of individuals who share common interests and ideas through digital networks.

313
Q

Online banking

A

Allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtual bank, credit union or building society.

314
Q

Online storage

A

Disk space that is allocated to you on a server on the internet. Accessible wherever you can log into the server.

315
Q

Open Source Licence

A

The source code is freely available and can be changed. For a copyleft licence, any changes to the source code require the user to release the source code.

316
Q

Open-ended questions

A

Questions that cannot be answered directly with facts and require some form of exploring, brainstorming or judgment. These questions often start with words such as Why? How? What if? etc.

317
Q

Optical Drives

A

A secondary storage device that stores programs and data using lasers, e.g. DVD, CD

318
Q

Optical Zoom

A

Uses lenses on the camera to ‘get closer’ to the object being photographed. Use optical zoom for better quality images.

319
Q

Orientation

A

The horizontal (landscape) and vertical (portrait) orientation of a page.

320
Q

OS

A

Operating system: System software that manages hardware resources and runs applications, controlling all activities within a computer. Examples include Windows, Linux, macOS, iOS, and Android.

321
Q

OSS

A

Open Source Software: Software for which the source code is available to users, allowing it to be freely used, modified, and distributed. While the software itself can be freely copied and shared, it may not be sold. An example of open source software is Linux.

322
Q

Page break

A

Starts text on a new page, without creating a new section.

323
Q

PAN

A

Personal Area Network: A network organised around an individual or a small group, typically with a range of a few metres, used to communicate between personal devices such as PCs, smartphones, smart wear, and tablets.

324
Q

Patch

A

A downloadable software update that fixes flaws, bugs, or security vulnerabilities in an operating system or other programs.

325
Q

Path

A

The succession of folders, starting from the drive letter and separated by \ , that lead to the location of a specific file, e.g. U:\Documents\Finance\2019

326
Q

PCIe Bus

A

PCI-express Bus: High-speed motherboard bus of various sizes to connect graphics cards, RAID cards, Wi-Fi cards or SSDs.

327
Q

PDF

A

Portable Document Format: A file format used to distribute documents that is independent of the application in which they were created. It can be read using a free utility program called Adobe Reader.

328
Q

Peer to Peer File sharing

A

Each networked computer acts as a file server providing file sharing services to other network nodes.

329
Q

Pen input

A

A pen (or stylus) is an input device used together with a pressure-sensitive digitising tablet.

330
Q

Peripheral

A

Input, output or storage devices connected to the motherboard

331
Q

Phablet

A

A smartphone with a screen size larger than 5” (midway in size between a smartphone and a tablet).

332
Q

Pharming

A

A scamming practice where a user’s web traffic is automatically redirected to a bogus website, even if the correct URL for the official site is entered. This allows criminals to capture any data the user enters, such as passwords and PINs.

333
Q

Phishing

A

A scamming technique where users are enticed, usually via email, to click on a link to a fraudulent website in order to trick them into providing personal and confidential information, such as banking details, PIN numbers, and passwords, often by posing as a legitimate organisation.

334
Q

PIN

A

Personal Identification Number: A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards.

335
Q

Pivot Tables

A

An interactive table that automatically extracts, organizes, and summarizes your data. You can use this report to analyse the data, make comparisons, detect patterns and relationships, and discover trends.

336
Q

Pixel density

A

Also known as dpi – how many pixels the display fits into a 1” horizontal line. A higher pixel density is better.

337
Q

Pixels

A

Digital cameras capture images as pixel elements, known as pixels. Simply put, a megapixel is equal to one million pixels.

338
Q

Plagiarism

A

The use of materials and sources without acknowledging the author.

339
Q

Plain text file

A

A text file that contains lines of plain text with no formatting. The file extension .txt is associated with text files.

340
Q

Platform

A

A type of operating system, e.g. Linux, Android, Windows.

341
Q

Plot Area (Excel)

A

The ‘middle’ part of a chart where the data – the bars/columns/line – is plotted.

342
Q

Plug and Play/Hotswappable/Autoconfiguration

A

A series of technologies where a new hardware device connected to a computer is automatically detected and configured by the operating system, enabling it to be used almost immediately without requiring manual installation.

343
Q

Plug-in

A

A third-party app that the browser can call on to display specialised content such as a Flash video.

344
Q

Podcast

A

A series of on-demand digital audio files that typically focus on a specific topic or theme, available for streaming or downloading over the internet.

345
Q

Point to Point

A

A direct connection between two network nodes.

346
Q

Pointing stick

A

An alternative to a mouse, used with laptops. It takes the form of a small button between the keys of the keyboard. You move the pointing stick to move the pointer, and press it down to click.

347
Q

Pop-up

A

A small web browser window that appears on top of the website you are viewing. They are usually created by advertisers and often open as soon as you visit a website.

348
Q

POS

A

Point of Sale: The software used in shops and supermarkets to manage tills, often linked to stock control systems designed to expedite the sale of goods and services in retail environments.

349
Q

POST

A

Power On Self Test: A program executed by BIOS to check the computer’s hardware using the list of installed devices from CMOS.

350
Q

Power user

A

Category of user who has computing needs that make the top-of-the-range hardware and software indispensable, e.g. architects and engineers. They typically also use all the advanced functions of the software they use.

351
Q

ppm

A

Pages per minute: A measurement of the printing speed, indicating the number of pages a printer can produce in one minute.

352
Q

Primary Key

A

A field within a database table that uniquely identifies each record by its unique value, ensuring each record can be distinguished from others in the table.

353
Q

Primary Memory / Storage

A

Electronic and fast memory that holds the instructions that the computer is using whilst it is on. Examples include RAM, BIOS and ROM.

354
Q

Printer

A

An electromechanical device that prints text or illustrations (hard copies) on paper.

355
Q

Printer queue

A

Temporary storage area on the hard drive where print tasks are sent and where they wait until the printer is ready to print them. Each printer has its own queue

356
Q

Processor cache

A

Primary storage that stores the next few instructions and data to be processed from slower RAM. Level 1 runs at the speed of the CPU.

357
Q

Program files

A

Actual programs, not data files, that run (execute) when opened. They normally have a .com or .exe file extension. .

358
Q

Proprietary software / License

A

Software that is licensed under specific terms and conditions, typically restricting users from freely using, copying, modifying, or distributing it. The source code is not available, only the executable code, and usage often requires product or activation keys for licensing.

359
Q

PSU

A

Power Supply Unit: An internal or external device to provide regulated power to the computer.

360
Q

QR code

A

Quick response code: A two-dimensional square barcode capable of storing significantly more data than traditional barcodes. QR codes can be scanned using a mobile device camera to access encoded information.

361
Q

Quarantine

A

Placing a virus in an area of the disk where it cannot infect the computer.

362
Q

Query

A

The object that allows you to retrieve specific information from a vast database based on certain criteria. Advanced queries can be made, i.e. more than one field, certain fields can be displayed, criteria can be applied to a number of fields in a specific order and results are stored.

363
Q

RAID

A

Redundant Array of Inexpensive Disks: Multiple hard drives to protect against hard drive failure so if one hard drive fails, the other hard drive(s) can reconstruct the missing data providing reliable hard drive storage.

364
Q

RAM

A

Primary short-term, volatile memory that temporarily stores programs and instructions currently loaded.

365
Q

Ransomware

A

Malicious software that encrypts data on a computer or network, making it inaccessible to the user until a ransom is paid to the attacker.

366
Q

Read-only

A

A file attribute that indicates if a file is read only or not. A read-only file cannot be modified and saved under the same name within the same folder.

367
Q

Real-time messaging

A

Online exchange of messages (also images, video and voice) in real time. It includes IM (e.g. WhatsApp) and chat.

368
Q

Record

A

A group of related fields that contains the particulars of a specific entity

369
Q

Referential Integrity

A

A record cannot refer to another record that does not exist.

370
Q

Refresh Rate

A

The frequency at which a monitor’s screen is refreshed or redrawn each second, measured in hertz (Hz). A higher refresh rate indicates a smoother and more responsive display.

371
Q

Registers

A

Fast RAM (SRAM) on the CPU that stores the current instruction and its data.

372
Q

Relational Database

A

A collection of related tables store data about a subject or a group of subjects.

373
Q

Relative cell reference

A

In a spreadsheet formula, a cell address that adjusts automatically when the formula is copied to another cell.

374
Q

Remote Access

A

Using a computer to access and control a remote networked computer or device using the Internet.

375
Q

Remote working

A

Teleworking allows employees to work at home or at a local telework centre one or more days per week using communication tools, such as such as phone, fax, modem, Internet teleconferencing, e-mail or IM, to perform work duties from a remote location.

376
Q

Report

A

Allows the user to view information so it can be presented in a printed format in various different ways.

377
Q

Resolution

A

Scanner: Resolution is measured in dots per inch (DPI), indicating the number of dots the scanner can capture per inch.
Digital Camera: Resolution refers to the total number of pixels that make up an image.
Printer: Resolution indicates the number of dots the printer/scanner can create along a horizontal line, measured in dots per inch (DPI) determining the quality of the image

378
Q

Reverse Social Engineering or Role Playing

A

An attacker convinces the target that they have a computer problem or vulnerability so they can access or download Malware onto the target’s device.

379
Q

RFID

A

Radio Frequency Identification: A technology that uses small radio devices, typically smaller than a grain of rice, to store and transmit data via radio signals, allowing identification and data transfer to a receiving device.

380
Q

Robotics

A

Designing, manufacturing and operating intelligent machines to perform human tasks.

381
Q

ROM

A

Read Only Memory: A non-volatile memory chip that can be used to permanently store data in computers and other electronic devices, such as BIOS firmware, embedded operating systems and appliance/robotics controllers. Holding the instructions to start the computer and loard the operating system.

382
Q

Router

A

A network device that connects multiple networks using the same protocol and determines the best path for data packets to travel between them. It enables devices to connect to a network and provides internet connectivity via fixed lines (such as telephone lines or fibre optic cables) or wireless means like WiFi.

383
Q

rpm

A

Revolutions per minute – unit in which the rotational speed of a hard drive is measured, e.g. 7200 rpm.

384
Q

RSI

A

Repetitive Strain Injury: An occupational illness caused by repetitive movements, typically of the hands and arms, resulting in damage to nerves in the hands, arms, shoulders, and neck. It is associated with fast, repetitive actions such as frequent text messaging.

385
Q

RSS

A

Really Simple Syndication – a technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines – all from many different sites.

386
Q

rtf

A

Rich Text Format: A file format that supports text formatting such as bold, font sizes, tab settings and even images. Widely used and supported by most word processors.

387
Q

Safe Mode

A

A mode in which a computer can be booted in order to help fix various software problems. In Safe Mode, only essential system programs and services are loaded.

388
Q

Sample group

A

The group of people chosen to take part in a survey, whose responses are used to reflect the opinions and responses of the bigger target group. The sample group should be fairly representative of the target group.

389
Q

SATA

A

The internal hard drive interface or connection used to connect mass storage devices (such as mechanical or solid state hard drives) to a computer motherboard.

390
Q

Satellite

A

Used to establish communication links in remote locations or over long distances. Used by Telkom, Military and other media organisations.

391
Q

Scam

A

False organisations that trick you into doing business with them online, which means you, lose money.

392
Q

Scanner

A

An input device that scans images, including printed text, graphics, barcodes, QR codes, and even parts of the human body, into a computer. OCR (Optical Character Recognition) can be used to convert scanned images into editable text files.

393
Q

Scheduler

A

A program that is used to run certain programs at specific times.

394
Q

Screen lock pattern

A

A security feature on mobile devices where a pattern, drawn or traced on the screen with a finger, is used to unlock the device.

395
Q

SD Card

A

Secure Digital Card: A secondary storage medium that stores programs but mostly data and is small in size.

396
Q

Search Engine

A

A software program or website that allows users to search for webpages or documents on the internet using keywords or phrases entered by the user.

397
Q

Secondary storage

A

Permanent storage that stores all programs and data on the local computer.

398
Q

Section (Word)

A

A part of a document in which the page formatting can differ from the rest of the document. Sections are thus used to vary the page layout on one or more pages of the same document.

399
Q

Section Break (Word)

A

Separates a document or page into sections, and indicates the end of one section / start of the next section. Distinguishes sections from one another, and allows different sections to be formatted differently.

400
Q

Secure URL

A

A URL that begins with https:// or has a small closed lock displayed somewhere on the page, often next to the URL. It means that the site is encrypted for security.

401
Q

Sensor size

A

The size of the sensor in a digital camera. The bigger the size, the better the quality of the image.

402
Q

Sensors

A

A device that converts a real-world property into data that a computer can process by converting the physical parameter (for example, temperature, blood pressure, height, humidity, speed, etc.) into a signal which can be measured electrically.

403
Q

SEO

A

Search Engine Optimisation: A combination of strategies to increase the number of website visitors by obtaining a high-ranking placement in the Search Engine Page Results (SERP).

404
Q

Server

A

A computer or software that provides services or resources to other computers (clients) within a network. This includes functions like file serving, print serving, hosting websites, managing email, and more.

405
Q

Service pack

A

A collection of all the previous software updates for the last period of time (6 months to a year). It is meant to help people who are behind in their updates fix their software all at once. Service packs are pretty much a thing of the past. Most software companies create software so that it will regularly check for updates and then automatically download and install those updates.

406
Q

Shaped connection

A

An internet connection where preference is given to certain services on the
internet, such as email, downloading and browsing. Other services, such as online
gaming and VoIP, are given less preference and are slower.

407
Q

Shareware

A

Proprietary software that is freely distributed to users on a trial basis, typically for a limited period (usually 30 days). Users can download and use shareware for free during the trial period, after which the software may stop functioning or restrict some features until a full version is purchased.

408
Q

Shoulder Surfing

A

Using observational techniques, such as looking over someone’s shoulder, to gain private information such as a password.

409
Q

Single-user Licence

A

A licence under which you may only install one copy of the software. You may not install it on other computers.

410
Q

Single-user Operating System

A

An operating system that can only be used by a single user at a time.

411
Q

Site Licence

A

A licence agreement that allows a company or organisation an unrestricted number of installations of the software within the company or organisation.

412
Q

Skype

A

A popular software package that allows people to communicate using VoIP. Skype also allows you to make video calls if you have a webcam attached to your computer.

413
Q

Smart home

A

Home in which virtual assistant software is coupled to ‘pods’ that link to all the electronically controlled devices in the home.

414
Q

Smartphone

A

Handheld devices that integrates mobile phone capabilities with the more common features of a handheld computer or cellphone. Smartphones allow users to store information, e-mail, and install programs, along with using a mobile phone in one device.

415
Q

SMiShing

A

When a phishing attack is done via an SMS on a smartphone. SMiShing is short for SMS phishing.

416
Q

SMTP

A

Simple Mail Transfer Protocol: An email protocol for delivering emails from an email client to a server. It is usually used for outgoing emails.

417
Q

Social Engineering

A

The use of deception and psychological manipulation to trick individuals into divulging confidential information, providing unauthorized access to computer systems, or performing actions that may compromise security. This can include impersonation, installing malware, or other fraudulent activities.

418
Q

Social Media

A

The collective of online communications channels dedicated to community-based input, interaction, content-sharing and collaboration. Social media refers to websites and applications that enable users to create and share content or to participate in social networking.

419
Q

Social Networking

A

A web-based technology platform that facilitates communication, data sharing, and connections among users, including friends, family, colleagues, and strangers with similar interests. It allows individuals and organisations to post and share likes, dislikes, interests, comments, photographs, and activities. Examples include Facebook, Instagram, TikTok, Twitter, etc.

420
Q

Soft Copy

A

A readable version of information that is not printed on a physical medium, typically stored or displayed on a computer screen. It contrasts with hard copy, which refers to information printed on paper.

421
Q

Software

A

Programs written to control, support and operate the computer itself (It enables everything on your computer to work better) e.g. operating system, utilities, drivers etc.

422
Q

Software Piracy

A

The illegal copying, distribution, or downloading of software, CDs, or DVDs without proper authorization, typically for commercial or personal use.

423
Q

Software Theft

A

The unauthorised or illegal copying, sharing or usage of copyright-protected software programs.

424
Q

SOHO

A

Small Office Home Office: A SOHO user is the type of user that works from home and might need general entry-level desktops for administrative functions such as accounting, databases, planning and scheduling.

425
Q

Spam

A

The electronic equivalent of junk mail, specifically referring to unsolicited email advertisements or messages sent to users without their request or consent.

426
Q

Speech recognition

A

Software that ‘listens’ to what you say and ‘understands’ it as a command or turns it into text (instead of the user typing the text).

427
Q

Spoofing

A

The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL.

428
Q

Spooling

A

The process where documents waiting to be printed are temporarily stored on a disk, forming a queue until the printer is ready to process them. This technique helps manage printing tasks efficiently when the printer operates slower than the speed of the computer.

429
Q

Spyware

A

Software that covertly installs malware on a user’s device to intercept and collect their data without their informed consent. This may include keystroke logging or other methods to monitor and report user activities to third parties.

430
Q

SRAM

A

Static RAM: Fast RAM located on or near the CPU without capacitors. It does not need to be refreshed; hence it is faster. Also smaller and more expensive.

431
Q

SSD

A

Solid State Drive: A storage device that electronically stores programs and data in flash memory, providing faster disk access compared to traditional hard drives.

432
Q

SSL

A

Secure Sockets Layer: A security management protocol for transmitting data on the Internet. It has been replaced with Transport Layer Security (TLS) certificates.

433
Q

Stack and scale (Excel)

A

Where a data series in a chart is filled with pictures, and each picture is used to represent a certain number of units.

434
Q

Stacked chart (Excel)

A

A type of chart where data series are placed one on top of the other – useful for comparing main categories (grand totals) and sub-categories in the same chart.

435
Q

Stand-Alone Applications

A

Applications that do not require any networking hardware or software resources.

436
Q

STP

A

Shielded Twisted Pair: Twisted pairs of copper wire enclosed in a protective foil. This type of cable is less affected than UTP by interference and crosstalk.

437
Q

Streaming

A

The process of continuously receiving data from the Internet in real-time.

438
Q

String (text data)

A

Combinations of characters (letters, digits and symbols like @) in text data. Examples are names and surnames, as well as strings of digits such as cellphone numbers and postal codes.

439
Q

Styles

A

A combination of formatting attributes saved as a collection under one name.

440
Q

Subscription-based software

A

Software where the user pays a monthly or yearly subscription for the use of the software, e.g. Office 365.

441
Q

Super computer

A

A high powered, large computer that is used by big corporations, governments and universities, for massive calculations or number crunching.

442
Q

Superscript / Subscript

A

Superscript is text that appears in smaller script above the text line. Subscript is text that appears in smaller script below the text line.

443
Q

Surface Web

A

Indexed part of the World Wide Web that is searchable with standard web search engines.

444
Q

Survey

A

A method of gathering data about a specific topic to analyse the data.

445
Q

Switch

A

A network device used to connect multiple computers or devices within a local area network (LAN), allowing communication between them via Ethernet cables. Switches operate in a star topology and are essential for local network communication but do not provide internet access directly.

446
Q

Synching

A

The process where changes made to data on one device are automatically updated and replicated across all devices that share the same data, ensuring consistency and accessibility in real-time.

447
Q

System Clock

A

The microchip on the motherboard that regulates the timing and speed of computer functions.

448
Q

System requirements

A

The minimum requirements (such as storage space, processing power and memory) needed to run a piece of software. When software requirements are indicated, this usually relates to the operating system needed.

449
Q

System Software

A

Software designed to manage and control computer hardware and provide a platform for running application software. This includes operating systems, utilities, device drivers, and other essential programs that enable the computer to function efficiently.

450
Q

Tabbed browsing

A

Allows you to have several web pages open on separate tabs of a single web browser, allowing you to quickly and easily jump between web pages.

451
Q

Table

A

A collection of records in a database.

452
Q

Table of contents (Word)

A

Automatically created list of headings or chapters and the pages on which they start, placed at the beginning of a document.

453
Q

Tablet

A

A portable computer featuring a touch- or pen-sensitive screen for user interaction. Tablets are similar to smartphones but offer advantages such as larger screens and longer battery life. They are designed for mobile use and typically run special operating systems, providing wireless or 3G data connectivity. Unlike smartphones, tablets cannot make phone calls or send/receive SMS messages.

454
Q

Target audience

A

The specific group of individuals or users that information, messages, or surveys are intended for, typically chosen based on demographics, interests, or specific criteria relevant to the communication or research objective.

455
Q

Task Manager

A

Provides information about the computer’s performance and applications and processes. Most often used to end non-responding tasks or programs.

456
Q

TCP/IP Protocol

A

The communication protocol for the Internet. It defines the address of each device (IP) and the packet structure of the communication (TCP).

457
Q

Telecommuting (e-commuting)

A

A work arrangement where employees work from home or remote locations, communicating with their workplace, colleagues, and clients primarily through electronic means such as phone, fax, email, or internet. This eliminates the need for physical commuting to a traditional office setting.

458
Q

Template

A

A blueprint or framework for a specific type of document, providing a predefined layout. Templates allow users to create new copies of the document by filling in necessary information, thereby streamlining the document creation process.

459
Q

Text File

A

A data structure that stores unstructured text data permanently.

460
Q

Theme

A

A collection of formatting elements that complement each other to lend a specific appearance to a document, in respect of fonts used for headings and body text, the colour combinations as well as the fill and line effects are used in the document.

461
Q

Thin client

A

A special (cheaper) type of computer that doesn’t have its own hard drive and has limited memory and CPU power. It relies on a server for resources.

462
Q

Throttling

A

When an Internet Service Provider (ISP) intentionally slows down the internet connection speed of a user who is consuming excessive amounts of data. This is typically done based on the ISP’s acceptable use policy (AUP), which defines thresholds or conditions under which throttling may occur to manage network congestion or ensure fair usage among subscribers.

463
Q

Tooltip

A

A tip or information that pops up when you rest the pointer on an icon or object.

464
Q

Top-range Computer

A

For users that will be using their desktop for more

465
Q

Topology

A

The physical layout of a network. Star, bus, ring and hybrid

466
Q

Touch Screen

A

An electronic display screen that serves as both an input and output device, allowing users to interact directly with a computer or device using their finger or a stylus. Touch screens are commonly found in smartphones, tablets, and other electronic devices, with variations that can respond to different types of touch inputs.

467
Q

Touchpad

A

A pressure-sensitive surface built into laptops. It is an input device that can be used instead of a mouse.

468
Q

Track changes

A

A feature in word processing software that records and displays all modifications made to a document. Deletions are typically shown as strike-through text, while insertions are often indicated with underlined text or in a different colour. This feature allows users to review and accept or reject changes made during collaborative editing processes.

469
Q

Trackball

A

An input device with a large ball on it. You move the pointer on the screen by rolling the ball with your thumb.

470
Q

Trendline (Excel)

A

A straight or curved type of ‘best fit’ line in a chart, that shows the general trend or direction of the values of a data series – usually over time.

471
Q

Trojan

A

A type of malicious software that masquerades as a legitimate or useful program, but when executed, it causes harm to a computer system.

472
Q

Twitter

A

A microblogging service (‘micro’ is used to describe the service because messages in Twitter can’t be longer than 280 characters). Twitter allows people to send messages (tweets) to their ‘followers’.

473
Q

Unbounded Media

A

Transferring signals between nodes using no cables such as Bluetooth, infrared beams, microwaves, satellites or laser light signals.

474
Q

Unmanned Aerial Vehicles

A

A type of aircraft that operates without an onboard pilot, the most common being a drone.

475
Q

Unshaped connection

A

An internet connection that gives all the internet services the same priority.

476
Q

Update

A

Either the latest fix for bugs in the current version of the software, or the addition of new, additional features to the software.

477
Q

Upgrade

A

Hardware Upgrade: The process of replacing old or obsolete hardware components with newer equivalents to improve performance or functionality.

Software Upgrade: Installing a new version of software that includes significant changes or new features. Software upgrades typically require payment for the new version.

478
Q

UPS

A

Uninterruptible Power Supply: An electrical device designed to provide emergency power to electrical equipment when the primary power source fails. It protects computers and other devices from power surges, spikes, and outages, allowing enough time to save work and shut down equipment properly.

479
Q

URL

A

Uniform Resource Locator: A unique alphanumeric address used to identify resources such as websites, web pages, documents, and files stored on web servers. URLs are entered into the address bar of a web browser to locate and access specific resources on the internet.

480
Q

URL Shortener

A

A tool or service, such as TinyURL.com, that converts a long URL into a shorter version. This abbreviated URL redirects users to the same web address as the original, making it easier to share, remember, and type.

481
Q

USB

A

Universal Serial Bus: Standardised serial bus to connect most types of peripherals to the motherboard. It transfers data and power.

482
Q

USB Port

A

Standard port commonly used to connect devices such as keyboards, mice and printers to a computer. USB ports and standards are evolving and becoming faster.

483
Q

Username / password

A

Your username identifies you as a user and the password is a secret set of characters that ensures that it is you that is logging in . The computer will then authenticate you as a valid user.

484
Q

Utility programs

A

System software programs designed to assist users in performing maintenance tasks and managing computer resources. Operating systems often include utilities for tasks such as managing disk drives, printers, and other devices.

485
Q

UTP

A

Unshielded Twisted Pair: A type of cable that consists of several pairs of copper twisted wires within an outer protective plastic cover.

486
Q

Valid data

A

Data where the values are acceptable in terms of permissible values, the limits within which it occurs or the format in which it is entered.

487
Q

Validation Rule

A

Criteria that data must meet to be considered valid within a specific field. Validation rules help prevent errors by enforcing the input of predefined values or conditions, ensuring data integrity and accuracy.

488
Q

Validation text

A

The message that must be displayed if the data entered does not meet the condition(s) in the Validation Rule.

489
Q

VGA port

A

Port used to connect the monitor to the computer. Largely replaced today by other connection types, such as HDMI.

490
Q

Video blog (vlog)

A

A form of blog which uses video as the medium. Entries on the vlog normally consist of video supported by text and images.

491
Q

Video Card

A

A separate circuit board that plugs into a special slot on the motherboard. It has its own video memory and a graphics processing unit (GPU) that improves video processing.

492
Q

Video conference

A

An online conference between two or more people at different locations, using a computer network to transmit audio and video data, as if all the people were in the same room.

493
Q

Video RAM (VRAM)

A

RAM that stores data about each pixel, its colour and location on the screen to be used by the GPU.

494
Q

Virtual (on-screen) Keyboard

A

A software component that allows a user to enter characters. A virtual keyboard can usually be operated with multiple input devices, which may include a touchscreen, an actual keyboard and a computer mouse.

495
Q

Virtual assistant

A

Software that allows you to speak to your phone (or tablet) and have it ‘understand’ and respond to what you say, e.g. ‘turn off the lights’.

496
Q

Virtual community

A

A group of people who gather online to share ideas and interests.

497
Q

Virtual Memory

A

A technique where the operating system uses free disk space on a hard drive to simulate additional RAM capacity. This allows the computer to run more programs simultaneously than the physical RAM would normally support. In virtual memory systems, RAM data is divided into pages that are swapped between RAM and the hard drive as needed, to optimize memory usage and performance.

498
Q

Virtual Offices

A

A flexible workspace to provide businesses with any combination of services, space and/or technology without owning or leasing a traditional office.

499
Q

Virtual Reality

A

The use of computer-based technology to create a simulated environment that immerses users and allows them to interact with a three-dimensional, computer-generated environment.

500
Q

Virus

A

Damaging programs that are illegally copied and installed onto a computer and are part of Malware.

501
Q

Virus signature/definition

A

The pattern that uniquely identifies the malware.

502
Q

Vlog

A

A blog in which the postings are primarily in video form.

503
Q

Vodcast

A

A video form of podcast

504
Q

Voice Recognition Software

A

Software that enables computers to interpret and understand spoken language. It operates by converting spoken words into text or executing commands based on voice input. There are two primary categories: software for commanding computers and dictating text, and virtual assistants that perform tasks based on voice commands. Examples: Dragon Dictate or Dragon Naturally Speaking, Siri, Dragon Mobile Assistant, Google Now, Google Voice Search, etc.

505
Q

VoIP

A

Voice Over Internet Protocol: A technology that enables voice and multimedia communications to be transmitted over IP networks, such as LANs, WANs, and the internet. VoIP allows users to make telephone calls to others with VoIP systems anywhere in the world, leveraging internet connectivity for communication.

506
Q

Volatile memory

A

Memory (RAM) does not keep its contents when the power is switched off and this means that it is volatile. Storage (and ROM) keeps its contents at all times – therefore it is non-volatile.

507
Q

VPN

A

Virtual Private Network: A network that connects remote users to a private internal network using the Internet.

508
Q

WAN

A

Wide Area Network: A network that spans a large geographical area, such as a city, country, or continents, connecting multiple LANs (Local Area Networks) or MANs (Metropolitan Area Networks) across different locations.

509
Q

Watermark

A

Text or a graphic which appears very lightly as a background on all the pages in a document.

510
Q

Wearable devices

A

Wearable technologies, e.g. electronic mobile devices worn as accessories or part of clothing, e.g. smartwatches, fitness health trackers, etc. continuously generate data from various environments and communication with other devices.

511
Q

Web 1.0

A

Static websites that do not allow users to interact with the content.

512
Q

Web 2.0

A

Dynamic websites that allow users to interact with the content.

513
Q

Web 3.0

A

Websites that provide users with a more personal experience by accessing browser history and location.

514
Q

Web 4.0

A

Web 4.0 is the mobile web that can adapt to its mobile surroundings. Web 4.0 connects all devices in the real and virtual world in real time.

515
Q

Web application/online software

A

Software that runs on servers on the internet. You view the interface in a web browser. Requiring only a browser and internet access to function.

516
Q

Web browser

A

Software that allows you to view and explore Web pages on the Internet, e.g. Internet Explorer, Netscape Navigator, Google Chrome.

517
Q

Web Cache

A

The activity of storing recently accessed web pages on a server in a network.

518
Q

Web caching

A

Temporarily storing recently accessed web pages on disk so that they can be loaded more quickly the next time they are requested.

519
Q

Web page

A

A document on the web which can be viewed in a web browser, and created in languages such as HTML, JavaScript, PHP and Python.

520
Q

Web-based email

A

A service that allows you to access an email account through a web browser from any location that has internet access.

521
Q

Webcam

A

A digital camera typically used for video conferencing, security monitoring, and other applications requiring real-time video feeds. Webcams are often integrated into laptops or set up separately, providing live video images to the computer or web server.

522
Q

Weblog / blog

A

Website updated often with news and events in chronological or sequential order. A blog reads like a journal with the most recent entry at the top.

523
Q

White Hat Hackers

A

Non-malicious hackers who legitimately test a company’s computer and network security.

524
Q

Wi-Fi

A

A popular technology that enables electronic devices to exchange data wirelessly over a computer network, including high-speed internet connections. Devices such as computers, smartphones, tablets, and others can connect to network resources like the internet via a wireless access point. Wi-Fi can provide coverage ranging from small areas like a single room to large areas encompassing multiple square miles, achieved through multiple overlapping access points.

525
Q

Wi-Fi Router

A

A network device that connects a LAN to another network with the same protocol and provides Wi-Fi access to mobile devices.

526
Q

Widow/Orphan

A

A single ‘dangling’ line at the top or bottom of a page of a paragraph that splits over a page.

527
Q

Wiki

A

A website that allows multiple users to collaborate by adding, editing, and modifying content collectively. An example is Wikipedia, where users can contribute and edit articles collaboratively.

528
Q

Wildcard

A

Wildcards are like the blank pieces in Scrabble, or like the Jokers you can use in some card games to stand in for any card. The wildcards “” and “?” can be used to display all files with the extension “.doc” by typing “.doc”, or all files “01062001.doc”, “01072001.doc”,“01122001.doc”… by typing “01??2001.doc”.

529
Q

WIMAX

A

An upgrade on WiFi and a more secure wireless networking technology, that allows wireless devices to communicate with one another over a much wider area than WiFi.

530
Q

Wireless Access Point

A

A wireless transceiver that broadcasts a signal within a limited area. Each access point is connected to a wired network.

531
Q

Wizard

A

A feature that guides a user through a process such as creating a document.

532
Q

WLAN

A

Wireless Local Area Network: A network that links two or more devices using wireless distribution methods, typically through an access point, allowing mobility within a local coverage area while maintaining connectivity to the wider internet. Wireless LANs are popular for their ease of installation and are commonly found in homes and commercial settings, providing wireless access to users.

533
Q

WWW

A

World Wide Web: A service on the internet that comprises a vast collection of multimedia, interactive documents stored on servers worldwide. These documents are interconnected and accessed using HTTP (Hypertext Transfer Protocol).

534
Q

Ink-jet printer

A

An ink-jet printer produces high-quality text and graphics by spraying ink onto a sheet of paper by using an ink cartridge.

535
Q

Laser printer

A

A laser printer uses a laser beam to produce an image onto a drum. A laser printer uses a toner cartridge similar to a photocopy machine.

536
Q

Bits and bytes conversions

A

One byte is 8 bits
One kilobyte (KB) is equal to 1,024 bytes
One Megabyte (MB) is equal to 1,024×1,024 or 1048576 bytes (1,024 kilobytes)
One gigabyte (GB) is equal to 1,024 megabytes.
One Terabyte (TB) is equal to 1,024 gigabytes.

537
Q

Pie chart

A

Show and compare the cost percentages of items

538
Q

Bar chart

A

A chart with bars whose lengths are proportional to quantities

539
Q

Why would one pay more for a high-end computer?

A

To use demanding applications such as CAD, games, photo and video editing, graphic rendering, etc. as well as basic applications such as e-mail, Internet surfing and general documentation, and who are looking for a PC with more power. Paying extra for a higher performance PC will ensure that your PC can cope with more demanding applications while building future capacity.

540
Q

Retinal scanner

A

Uses unique patterns of a person’s retina to identify them.

541
Q

Multi-function printer

A

A Multi-function printer incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting or to provide centralized document management/ distribution/production in a large-office setting. A typical MFP may act as a combination of some or all of the following devices: E-mail, Fax, Photocopier, Printer, Scanner

542
Q

FIFO

A

First in, first out: ata transfer is not controlled by the ISP and is operated on a first come first served basis FIFO OR all protocols are treated in the same way and no protocol is given priority.

543
Q

Disk Optimisation

A

Optimising the disk means that it compresses and/or organizes the files on your hard disk

544
Q

Embedded computer

A

A dedicated computer system that forms an integral part of a larger machine or system

545
Q

Drone Technologies

A

A drone is a flying robot that can be remotely controlled, combined with advanced technologies including GPS, sensors, artificial intelligence, and video cameras. It is an unarmed aircraft.

546
Q

Memory Card Reader

A

A device connected to a computer designed to accept and read data from different types of storage media such as SIM and SD cards and flash drives.

547
Q

Another word for shaping?

A

Tuning

548
Q

Another word for throttling?

A

Policing

549
Q

4IR

A

4th industrial revolution: describes the blurring boundaries between the physical, digital and biological worlds where AI, robotics, IoT and other technologies to make newly essential products and services

550
Q

5IR

A

5th Industrial Revolution: develops alongside 4IR and uses its advantages to place focus on humans and their endeavours, defining the ethics and impact of technology.

551
Q

IPO

A

Input, Processing and Output:
Input
Output
Processing
Storage
Communication

552
Q

Computer

A

An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

553
Q

Raspberry PI/Arduino

A

Single board computers

554
Q

Advantages and disadvantages of using computers.

A

Advantages:
1. Speed and efficiency: ability to process and analyse large amounts of data
2. Storage and organisation: ability to store large amounts of information in an organised manner
3. Connectivity and communication: enable easy communication and access to information worldwide
Disadvantages:
1. Dependency and over-reliance: people can be dependent on computers for basic tasks
2. Health issues: prolonged use can lead to health issues
3. Security risks: security threats like viruses and hacking

555
Q

Types of input

A

Data or instructions

556
Q

How are computers categorised?

A

Portability, processing power and usage

557
Q

What may disabled people use to make computing more accessible?

A
558
Q

Ergonomic considerations for keyboard

A
559
Q

Ergonomic considerations for mouse

A
560
Q

Examples of pointing devices

A

Touch pad, trackball, keyboards, touch screen, stylus, joystick

561
Q

Magnetic stripe

A

A magnetic area on the back of a plastic card containing electronic information.

562
Q

Advantages and disadvantages of scanners

A

Advantages:
1. Digital archiving: conversion of physical documents into digital format for archiving
2. Easy sharing: digital files created can be shared
3. Improved organisation: documents can be organised and searched through easily
Disadvantages:
1. Initial cost: high quality scanners are expensive
2. Technical issues: Scanners can have technical problems such as software glitches/hardware failures
3. Quality variations: scanned image quality can vary depending on scanner and scanner settings

563
Q

Advantages and disadvantages of digital cameras

A

Advantages:
1. Instant gratification: photos can be seen immediately
2. Cost-effective: no film purchase or development costs
3. Easy editing and sharing online
Disadvantages:
1. Battery dependency
2. Initial cost: Higj quality digital cameras can be expensive
3. Complexity for beginners: advanced digital cameras can be complex to use

564
Q

Advantages and disadvantages of input hand-held devices

A

Advantages:
1. Portability: easy to use and carry anywhere
2. Ease of use: many are user-friendly
3. Efficienct: devices can speed up data input and processing
Disadvantages:
1. Limited functionality: limited capabilities compared to larger devices
2. Battery dependency: many require frequent recharging or battery changing
3. Durability issues: can be fragile and prone to damage

565
Q

Types of output

A

Text, graphic, audio, video

566
Q

Types of input

A

Video, audio, biometric

567
Q

Output devices for disabled users

A
568
Q

Print speed of inkjet, laser, 3D and dot matrix printers

A
569
Q

Advantages and disadvantages of inkjet, laser, 3D and dot matrix printers

A
570
Q

Quality of inkjet, laser, 3D and dot matrix printers

A
571
Q

Cost of inkjet, laser, 3D and dot matrix printers

A
572
Q

Advantages and disadvantages of [display devices]

A
573
Q

Factors to consider when purchasing

A

Budget, speed, colour, cost, graphics, printing, paper type and size, compatibility, mobility, resolution, economic/environmental considerations

574
Q

One EB is how many PB?

A

One exabyte is 1000 petabytes

575
Q

One PB is how many GB?

A

One petabyte is one million gigabytes

576
Q

Robustness

A
577
Q

What is the difference between primary and secondary storage?

A
578
Q

What storage media is suitable for backups?

A
579
Q

Advantages and disadvantages of cloud storage?

A
580
Q

How can peripherals be connected?

A

Cabled or wireless (bluetooth, USB or WiFi)

581
Q

Outline the booting/start-up process

A
582
Q

SDRAM

A
583
Q

DDRRAM chips

A
584
Q

PROM

A
585
Q

EPROM

A
586
Q

EEPROM

A
587
Q

How would one troubleshoot the following:
1. Disk errors
2. Resolution
3. Non-responding programs
4. Non-responding mouse
5. Non-respinding keyboard
6. Printing issues
7. Connection issues
8. Storage issues
9. Issues with UPS

A
588
Q

Differentiate between system software and application software

A
589
Q

Examples of GUI

A

Icons, combo boxes, checkboxes

590
Q

Advantages and disadvantages of open source software

A
591
Q

Site license agreement

A
592
Q

Subscription model agreement

A
593
Q

Risks of using flawed software

A
594
Q

Factors that influence performace

A

RAM, Processing (type, speed, number of cores, cache), number of applications running and caching, disk optimisation

595
Q

Mobile operating systems

A

Android, iOS

596
Q

Desktop operating systems

A

Windows, Linux, MacOS

597
Q

Embedded operating systems

A
598
Q

Auto configuration of devices

A
599
Q

Troubleshooting for system software

A

Disk cleanup, wizards, etc.

600
Q

Basic security of a computer

A

Username and password log on

601
Q

Forms of authentication

A

Screen lock pattern, biometric input

602
Q

Examples of utility programs

A

Scheduler/update utility, backup/archive, firewalls

603
Q

Application version

A
604
Q

Software for disabled users

A

Screen readers, voice recognition software…

605
Q

Typing tutor

A
606
Q

How to use snipping tool

A

Win+shift+S

607
Q

How to add a new peripheral

A
608
Q

How to access task manager

A
609
Q

How to change the default printer

A
610
Q

How to manage the printer queue

A
611
Q

Hardware configuration of:
1. Processor
2. Memory
3. Hard drive size

A
612
Q

File organisation

A
613
Q

Provide possible file extensions for:
1. Compressed files
2. Office suite files
3. Graphics
4. Movie
5. Sound
6. Animation
7. PDF

A
614
Q

What are the objectives of a network?

A
615
Q

Advantages and disadvantages of networks

A

Advantages: Facilitating communications, sharing hardware/software/data/information
Disadvantages: security issues, privacy issues

616
Q

What can make a network more secure?

A

Access rights, usernames and passwords

617
Q

Purpose, role and use of:
1. PAN
2. HAN
3. LAN
4. MAN
5. WAN
6. GAN

A
618
Q

Advantages and disadvantages of WLAN

A
619
Q

Role, use and purpose of WLAN

A
620
Q

Give an example of a GAN and advantages and disadvantages

A

The internet

621
Q

What are the basic components of a network?

A

Workstations and servers, NIC, connection devices (router and switch), communication medium, network software

622
Q

What is needed to set up a PAN/HAN

A
623
Q

Good practices when engaging in digital communications

A
624
Q

Types of digital communications

A

VoIP, File sharing (eg. FTP), video conferencing

625
Q

Advantages and disadvantages of digital communications

A
626
Q

Website

A

A set of related web pages under a single domain name.

627
Q

Hardware and software required to connect to the internet using a computer

A
628
Q

Examples of web browsers

A

Google Chrome, Brave, Microsoft Edge

629
Q

Examples of IoT

A

Smart appliances, wearable technology, self-driving cars

630
Q

SBC

A

Single-board computer is a complete computer built on a single circuit board with microprocessors, memory, output, input, etc.