computing s3 sxam Flashcards
noob Muhammad cringe think juice world sold soul
What are end-user requirements
The end-user requirements of a website are the tasks that the user would want to be able to carry out.
what are the functional requirements noob
The processes that the website has to perform
what does a navigational structure look like
All of the pages that will be part of the website
Links between internal pages using arrows to indicate link direction
Links to external pages using arrows to indicate link direction.
what are wireframes
wireframes are simplified versions of a website
why do we use wireframes
we use wireframes so the client can get a good understanding of all the structures of the website
what is the importance of the copyright law?
To ensure people are rewarded for their work
To give the copyright holder protection from their work being copied or stole
what are the 3 ways you can test a website
1) Checking that the web pages match the user interface design.
2) Ensuring that all links and navigation work correctly.
3) Ensuring that all text, graphics, and video display correctly.
How do you tell if a website is fit for its purpose
A website is fit for purpose if it meets the end-user requirements and the functional requirements set out at the analysis stage.
what values can a computer only work with
binary
find the mantissa 1573237 x 104
1573237
find the exponent 1573237 x 10₄
4
Attributes of vector graphics
co-ordinates
fill color
line color
what are the parts of the processor
the control unit (CU) arithmetic logic unit (ALU) registers. cache. buses. clock.
Ways to reduce electricity consumption
Reduce the brightness on monitors
Avoid using a screen saver
Auto power down monitor if not in use for a period of time
Use standby mode or hibernate mode to reduce power to the computer when not in use
Ways to secure your computer
Encryption is the process of converting data and messages into a format that cannot be read by unauthorized people
Encrypted data is called cipher text
A secret key is required in order to convert the cipher text back to the original data
Public key encryption requires two keys - a public key, and a secret private key