B061 Flashcards

1
Q

What are the advantages and disadvantages of Bus Networks?

A

Ad: Are the cheapest.
DisAd: With lots of users,it becomes slow,due to all the traffic going down the central line;Failure of central network brings the whole network down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages and disadvantages of a Star Network?

A

Ad: Performance is unaffected by events elsewhere;Easy to add more computers.
DisAd: Failure of central computer causes system to crash;Uses a lot of crashing,it’s expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages and disadvantages of Ring Networks?

A

Ad: Cheap to expand;Fast as data only flows in one direction.
DisAd: Lots of users-data becomes slower,as all of the data flows along one line; Failure of the cable bring the whole network down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the possible dangers from use of ICT?

A

Back problems,Eye Strain and Repetitive Strain Injure (RSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the solutions to Back Problems?

A

Fully adjustable chair to avoid bad posture;

Screens should be able to tilt and turn to a position that avoids awkward movements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are solutions to Eyestrain?

A

Take regular breaks;
Use screens that do not flicker;
Blinds fitted to reduce glares.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the solutions to Repetitive Strain Injury?

A

Use wrist rests;
Take five minute breaks;
Make sure Posture is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages and disadvantages of social networking?

A

Ad: Good for raising awareness;
You can keep up to date with people from all over the world;
Good place for people to get creative and promote their work.

DisAd: People may lie about themselves;Employers may let profiles influence job applications;Putting information online puts you at risk,from identify theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are different types of Data Validation?

A
Data Type Check;
Presence Check;
Range Check;
Length Check;
Check Digit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different types of Data Verification?

A

Double Entry;

Proof Reading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Data Verification do?

A

Ensures Data is accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Data Validation?

A

Checks Data is of the correct type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the problems with Validation?

A

Only checks if the data is correct type,not if it’s accurate,
Any problems with validation could mean mistakes are allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the problems with Verification?

A

Double-Entry is time consuming,so it can be expensive.

Proof-Reading is also time consuming,and doesn’t eliminate human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a Word Processor allow you to do?

A

To write,edit and format text documents,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Desktop Publishing software allow you to do?

A

It allows users to create publications that contain text and images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give three examples of uses of Word Processor?

A

Mainly text documents:

  • Letters
  • Essays
  • Reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give three examples of DTP software?

A

Mainly images and text,with a flexible layout:

  • Leaflets
  • Newspapers
  • Posters
  • Magazine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are spreadsheets?

A

A program which can display and process data in a structured way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are Databases?

A

A store of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two types of databases?

A

A flat-file and Relational:

Flat-file: All of the data in one table.
Relational: Data is in separate tables,linked together by key fields.

22
Q

What does each table in a Database have?

A

A primary key,which is a unique identifier.

23
Q

What does a cell in a database contain?

A

Cells contain 1 of these 3 things?

  • Numerical Data
  • Text (Alphanumeric)
  • Formulas
24
Q

What does the IF function do?

A

It gives different results depending on whether data in other cells matches it’s conditions.

25
Q

What does LAN stand for?

A

Local Area Network

26
Q

What does WAN mean?

A

Wide Area Network

27
Q

What are advantages and disadvantages of using Networks?

A

Ad: Communication is cheap and fast.
Software can be shared.
Sharing files centrally makes them less vulnerable to loss from workstation failure.

DisAd: Cabling can be expensive to install and replace.
Viruses could disable the whole network.
Faults with the server can bring the whole network down.

28
Q

What is Data Logging?

A

Recording Data Automatically.
It captures information using sensors.
E.g Gathering weather data from a satellite.

29
Q

What is a Logging Period?

A

The total length of time you’re going to collect data for. If this is too long,you can waster valuable time. But if it’s too short,you might miss some important data.

30
Q

What is a Logging Interval?

A

The time between one measurement and the next.

31
Q

How do you work out the Number of Readings?

A

Logging Period/Logging Interval

32
Q

What are the advantages and disadvantages of Data Logging?

A

Ad: Can record information in places where humans find it hard to operate;
Data can be collected over very long or short periods;
Intervals between measurements can be more accurate;
Can work 24/7

DisAd: Hardware used is expensive; People will need training to use the data-logging equipment properly

33
Q

What is a Feedback Loop?

A

When information from a sensor is used to control the output of a device. E.g Burglar Alarms

34
Q

What is a simulation?

A

When a model is used to carry out an activity that mimics real life.

35
Q

What is a Robot?

A

An automated piece of equipment designed to carry out routine repetitive tasks.

36
Q

What is the Internet?

A

An international Network of computers.

37
Q

How do you get connected to the Internet?

A

Data from the ISP is sent through a modem,to convert it into a form that can be transmitted. For example,along telephone lines. Then a modem converts it back into a form your computer you can understand.
Mobile Broadband can also be used to access the Internet.

38
Q

What is Hacking?

A

Accessing a computer system and its files without permission.

39
Q

What are the three types of Network?

A

Bus Network,Star Network,Ring Network

40
Q

What is the advantages of instant messaging over the Internet?

A

Ad: Simultaneous;
Webcams can be used;
You’re in control of who can contact you

41
Q

What are the seven points of the Data Protection Act?

A

Data Protection Act (1998):
Obtained and processed Lawfully and Fairly.
Only be held for specific and lawful purposes.
Should be kept no longer than necessary.
Must be processed in according to the rights of the data subject.
Security Measures need to be taken against unauthorised access.
Personal data cannot be transferred to countries outside the EU unless adequate treaty.
Data should be relevant.

42
Q

What is the Computer Misuse Act?

A

Computer Misuse Act (1990):
Unauthorised accessing of computer data.
With the intention of commuting further offences.
With unauthorised alterations to computer materials.

43
Q

What is the Copyright,Designs and Patent act?

A

(1988)
Using software illegally,this breaching license regulations.
Replicate digital files without authorisation.
Distribute and sell files without authorisation.

44
Q

What is Encryption?

A

Scrambles data,so that it cannot be understood unless it is unscrambled using a decryption key.

45
Q

What is a virus?

A

A software which copies itself and transmits itself to other computers without the user’s knowledge or permission. It can alter,delete or damage data stored.

46
Q

What is RAM?

A

Temporary memory.
Two types: Volatile and non Volatile.
Volatile only keeps its contents when power is supplied to it.

47
Q

What is ROM?

A

Permanent Memory.

Contains the instructions for the operating system to turn on.

48
Q

What is a file?

A

A block of data under one name.

49
Q

What is Chip and Pin/ Magnetic Mark Recognition?

A

A magnetic stop is a thin band of magnetic tape that is often found on the back of credit cards,debit cards etc.

50
Q

What is Bluetooth?

A

A short range wireless connectivity standard used for telecommunications and connecting computing devices.

51
Q

What is a RFID tag?

A

Radio frequency identification tag-are fixed to products.