Crunch Notes Grade 10 Flashcards

1
Q

Abstract solution

A

A solution which makes use of general concepts and variables in solving a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm

A

A sequence of steps that can be followed in order to solve a specific problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Concrete solution

A

A solution which makes use of fixed, specific values and steps in solving a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Flow chart

A

Diagrammatic visual representation of the sequence of steps required to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Problem solving

A

Working out the steps required to reach a desired state based on a given set of starting values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pseudo code

A

A structured, language-based way of presenting an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Applications software

A

Software that is used to do productive work and accomplish specific tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer

A

A multi-purpose electronic tool that can receive data, process the data, produce results and output the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data

A

Raw, unprocessed facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Freeware

A

Software which is distributed freely. You do not receive the source code. There is no limitation in the time of functionality included

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware

A

Physical components and device. The parts of a computer that you can physically touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICT system

A

A combination of hardware, software, data, processes and people with the purpose to collect, manipulate, convey, store and retrieve data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information

A

The results of processing data. It should be useful and meaningful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Input

A

The way of getting both data and instructions to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPO model

A

The input, processing and output model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IT

A

IT is a term that refers to all technology involved it’s the collecting, processing and storing of data / information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ICT

A

A term that expands IT to include the transmission of data using communications technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Open source software

A

Software made available with a license that allows you to access and modify the source code, but not sell the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Output

A

A way of allowing the computer to show the results of the processing it has done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

POS System

A

Point of Sale System - Specialised software and hardware designed to be used at the till point. It manages stock and creates reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Proprietary software

A

Software developed by a certain software house. Users have to pay a license fee to be allowed to use the software. No access to the source code is provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Shareware

A

Software which is distributed freely, but either it can only be used for a limited time, or limited capabilities are available. You do not receive the source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software

A

The programs - set of instructions - that tells the device / computer what to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Source code

A

The programming code used to develop a specific application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
System software
Software that is used to control and maintain your computer r
26
Biometric scanners
Scanners specifically designed for security and read and identify unique identifying characteristics of people, like fingerprints or the pattern of an iris
27
CPU
The part of the computer that does all the processing
28
Data projector
A data projector connects to your computer and projects what is on your monitor on a screen or wall so that everyone can see a larger version of what would be on your monitor
29
DIMM
Dual Inline Memory Module - Electric circuits with RAM on
30
Dot Matrix Printers
A very old technology using pins hitting ink ribbons to create images on paper
31
FireWire
Devices can be connected to this port for data transfer. Mainly used for transferring video but is being used less and less
32
Inkjet printer
Sprays drops of ink on paper
33
Laser printer
Works by melting toner into the paper
34
Magnetic storage
Stores data by means of magnetic fields
35
Modem
Device that converts the signal from a computer to a format that can be transmitted over a communication channel 3G modem - To transfer data over a cellular network ADSL modem - For high-speed data transfer over digital telephone networks
36
Modular design of computers
Means that computers consist of a variety of separate components for ease of upgrading and maintenance
37
Motherboard
A large piece of circuitry with slots and connnectors for different components and peripherals to connect to it
38
Optical storage
Store data by means of laser
39
Peripherals
Devices connected to a computer
40
RAM
Where any program that is run is loaded and temporarily stored, and where files that are open are temporarily stored
41
ROM
Computer memory chips containing permanent or semi-permanent data. Non-volatile - contents of ROM will remain even with no power
42
Router
Makes communication between networks over the internet possible by helping to direct data to its correct destination
43
SSD
A type of disk that stores data electronically
44
Synchronise
The process of getting two sets of the same data files on two different devices updated with the latest copy of the files
45
Touch pad
Rectangular pressure sensitive areas built into the laptop. Input devices that can be used instead of a mouse
46
USB
Universal Serial Bus - Port that a variety of devices can be connected to
47
USB Hub
Connects to a USB port and expands it to 4 or more ports that devices can connect to
48
Device drivers
Programs that allow the operating system to communicate with and control hardware devices
49
Disk management
A function of an operating system whereby it manages storage
50
Embedded operating system
Stored on internal memory chips. Not loaded from a disk
51
GUI
Makes use of visual controls to allow the user to interact with the computer and use programs on the computer
52
Input / output management
Function of an operating system where it manages input and output of the computer and how programs use the input and output devices
53
Memory Management
Function of an operating system whereby it manages the memory to control how programs use it
54
Network operating system
An operating system which has extra features that give it additional ability to control and manage shared resources and users on a network
55
Process and task management
A function of an operating system whereby it manages the CPU and how it runs programs
56
System software
Software that is intended to control, support or operate the computer
57
Utilities
Programs that are part of system software and do maintenance and administrative tasks
58
Administrator account
A special account which allows the account holder to make any changes they wish to the system
59
Archiving
To store files that are static, usually onto a secondary system
60
Disk cleanup
A utility that removes: Temporary files downloaded from the internet Deleted files and folders permanently by emptying the recycle bin Temporary files created by Windows Components of Windows that you are not using Installed programs that you no longer or seldom use
61
Disk defragmentation
To reorganise the parts of files and speed your computer up again
62
Disk fragmentation
Files and parts of files are scattered on the disk
63
Firewall
Software that allows you to control which programs access the internet - and tries to hide your computer from the others “out there”
64
Installation wizard
A program that presents you with options and performs an installation based on your choices and preferences
65
Plug and play
The technology whereby devices that are added or connected to a PC are automatically ‘detected’ and the PC is configured for their use, provided drivers are available for the devices
66
WinZip
The most widely-used utility program to compress files
67
Adobe Reader Plug-in
Allows you to view and print contents of PDF documents directly within your browser
68
Flash Players
Multimedia Plug-ins enable users to experience a very wide range of applications and multimedia web content in any browser, irrespective of operation system Examples include Adobe Flash Player
69
Java
Programming language used to write plug-in programs for other applications
70
Media player plug-ins
A plug-in such as QuickTime which allows you to play embedded audio and video on web pages without needing to have or open the Windows Media Player
71
PDF
Portable Document Format - A popular format to distribute documents electronically
72
Plug-In
Software which adds functionality to a bigger program, often used when browsing the web
73
Clients
Computers that use but do not provide network resources
74
E-mail servers
Servers used Ito handle all the e-mail needs of the organisation
75
Extranet
A network where access is provided to the organisation’s private network to use from outside the organisation
76
Fat clients
Run most of their applications from their local hard drives and make little use of network services
77
Internet or proxy server
Users connect to the internet via this server so security control can be implemented at one central point
78
Intranet
An organisation’s private enter on and is an internet-like environment consisting of websites relating to the organisation’s business
79
Local area network
A privately owned network connecting computers in a small area
80
Network
A collection of computers or other computing devices that are connected by some sort of communication media to allow users to share software, hardware, data and information
81
Network security
Policies put in place to ensure the security of a network by preventing unauthorised access and misuse of the computer network
82
Peers
Computers that both use and provide network resources
83
Peer-to-peer network
A local area network in which network resources are shared amongst workstations without a dedicated server
84
Print servers
Used to handle all the printing requirements of a network with a large number of computers
85
Server
A computer that provides shared resources such as files, e-mail and internet facilities or printing to the network users
86
Switch
Hardware device used to connect computers on a network so that communication can occur
87
Thin clients
Have no hard-drives, but depend almost entirely on a server to run applications and store data files
88
Wide area network
A network spread over a wide geographical area
89
Wireless LAN
A LAN which communicates using high-frequency radio waves rather than cables to communicate
90
Cap
The amount of data an ISP allows a person to upload and download in a month
91
Electronic communication
All communication via electronic means
92
Electronic mail
Composing, sending and receiving messages electronically over a network including the internet
93
Instant messaging
An online, text-based communication usually between two people using two devices
94
Internet service provider
A company that has permanent, fast connection to the internet and sells internet access to individuals or businesses for a monthly fee
95
ISP Based Email
When you are able to access emails using software such as Microsoft outlook on the PC or laptop where your details have been entered
96
Messaging
The exchange of brief typed messages between cellphones. Can be SMS (Short Message Service) and can contain images, sound and video content using MMS (Multimedia Message Service)
97
Online Chat
An application that gives two or more people the ability to have a conversation by typing on a device using the internet
98
Social networking site
A site where individuals can post their likes, dislikes, interests and activities for friends to see and read
99
Video conferencing
The ability to hold an online conference between two or more people at different locations using a computer network
100
Voice over internet protocol
A technology that allows telephone calls to be made over networks
101
Web based email
A service that allows you to access an email account through a web browser from any location that has internet access
102
3G
The newest generation of mobile phone technologies (5G exists now?)
103
Asymmetric digital subscriber line
Permanent digital connection to the internet using a telephone line
104
Bandwidth
Refers to the total amount of data that can be carried from one point to another in a given period
105
Broadband
Any permanent, high speed, high bandwidth connection to the internet
106
Data terminating device
A modem
107
File transfer protocol (FTP)
A protocol used for the fast, easy transfer of files between remote computers that have an internet connection
108
FTP Server
A computer allowing people to use FTP to upload or download files
109
Home Page
The first page of a website and contains information about the website’s purpose and content. Also provides links to other web pages, websites and documents
110
Hyperlink
A built-in connection to another related web page, and is indicated as text underlined in blue
111
Hypertext Transfer Protocol (HTTP)
The protocol that defines how pages are transferred on the web
112
Internet
A worldwide computer network, consisting of devices and networks that are linked using communication media for sharing resources and communicsting
113
Internet protocol (IP)
The protocol used for communication over a network or the internet
114
Internet protocol address (IP address)
Every computer that connects to the internet or in a network must have its own unique internet protocol address
115
Search Engine
A program that is used to search for documents on the internet by using keywords or phrases entered by the user
116
Uniform resources locator
The unique address of a webpage
117
Web browser
A software application that allows one to view and explore web labels on the Web either via hyperlinks or in the case where the URL is known, by typing the URL in the address bar
118
Web Pages
Electronic documents on the Web, can include text graphics, sound, video and links to other web pages
119
Web server
A computer that hosts websites and is connected to the web
120
Website
Consists of related web pages
121
World Wide Web
A service that runs on the internet and is a vast collection of interlinked, interactive documents stored on computers all over the world, accessed via the internet
122
World Wide Web Consortium
An organisation founded by Tim Berners-Lee. Its function is to develop standards so that the WWW reaches its full potential and to ensure the long-term growth of the Web
123
HTML
HyperText Markup Language - a set of formatting codes, placed in a text file to change the way a browser displays text
124
Tags
Formatting codes placed between ‘<‘ and ‘>’ in a text file
125
Text file
A file that contains ASCII text only and no formatting
126
Typography
The placing and formatting of text. The choice and use of fonts
127
ASCII
ASCII (American Standard Code for Information Interchange) is a coding system which is limited to 256 different characters.
128
Binary
The base 2 number system that consists of just two digits, namely a 0 and a 1.
129
Byte
A collection of 8bits – the smallest unit of storage in a computer system.
130
Coding scheme
Schemes used to represent or store text or characters by giving each character a unique numerical code.
131
Decimal
The base 10 number system that consists of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9.
132
Hexadecimal
The base 16 number system that consists of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F.
133
Octal
The base 8 number system that consists of the digits 0, 1, 2, 3, 4, 5, 6 and 7.
134
Overflow
An error condition that occurs when there are not enough bits available to represent an integer value accurately.
135
Primitive data type
The core types of a programming language. Variables are declared and used to store a particular type of data.
136
Truncation
The misrepresentation of a string variable because there are not enough bytes available to store all the characters in the string.
137
Audio files
Files that contain sound or music. Common audio file formats include MP3, MP4, WAV, CDA, WMA.
138
Compiler
A program that checks to see that the code adheres to all the rules of the programming language and creates an executable file which can be ‘run’ or executed.
139
Compressed Files
A file format used for files that contain files or folders in compressed format to save space. Typical file extensions include rar and zip.
140
Data hierarchy
Refers to the two levels of data storage – the lower bits and bytes level and the higher levels of files, databases and data warehouses.
141
Data warehouse
A data warehouse is a vast collection of data fathered from a variety of databases and other data sources. It is specifically designed to determine trends and patters within the data and it is designed for reporting and querying.
142
DLL files
DLL or Dynamic Link Libraries are files that contain code or routines that can be called and used by programs.
143
File
A file is a collection of data or information that is stored on a computer under a single name. They are represented as icons on the computer.
144
File extension
This set of characters (usually 3-5) is added to the end of a file name and it identifies the type of file e.g. docx is the file extension of a Microsoft Word file.
145
File format
How data is structured or organised within a file. Each program has its own file structure for its files. Some programs can interpret or read files that have a different file structure to the one they use.
146
File manager
A utility program like Windows Explorer that comes as part of the operating system. It allows the user to manage their files and folders.
147
Font Files
Files containing fonts that can be used by programs on the computer where the fonts are installed. They typically have a file extension of TTF or OTF.
148
Graphics Files
Files that contain images or graphics. Common graphics formats include JPEG, BMP, GIF, WMF, TIF, PNG.
149
HTML Files
Hypertext Markup Language files are used to define the structure and layout of web page.
150
Path
The ‘sequence’ of folders that lead to the location of a specific file. The backslash character is used to separate the ‘list’ of folders in the path e.g. D:\Documents\Invoices\
151
PDF Files
Portable Document Format files are used to distribute document files, as they do not require the program in which the document was created to be installed to read. You just need a free utility program called Adobe Reader to read it.
152
Plain text files
A text file that contains lines of plain text. The file extension .txt is associated with text files. Text files can be opened by any word processing application or simple text editing utilities such as WordPad and Notepad.
153
Program files
These are actual programs, not data files, that run (execute) when opened. They normally have a .COM or .EXE file extension.
154
Programming languages
Programs such as Delphi, Java and C# that allow one to construct and specify a set of programming instructions or source code.
155
Rich text files
Rich Text format files support ‘rich text’, which includes text formatting, such as bold and italics, fonts and font sizes, page setup and tab settings and even images.
156
Wildcards
Characters that represent one or more characters. For example Windows allows us to use an asterisk (*) to represent any number of characters or a question mark (?) to represent one single character when searching for files or folders.
157
Copyleft
A type of Copyright law which allows people to use and distribute work whilst still allowing the creator some control over where and how it can be used.
158
Copyright
A law designed to protect intellectual property by creating legal limits on who can copy, sell and use types of work such as photos, documents, books or poems.
159
Creative commons
A copyright license that allows you to use parts of, copy and distribute work for non-profit purposes. Creative commons is a Copyleft-style license.
160
Digital divide
The gap between people that have access to computers and technology and people that do not.
161
EULA
End User License Agreement - A license agreement (which is a legally binding contract) in which you agree to use software only according to the software company’s terms. These terms and conditions differ from license to license, but they mostly involve things such as the number of computers you may install the software on, and whether you may distribute the software or not.
162
GNU / GPL
Is a license specifically for software that allows people to distribute the software for free or even charge for it so long as the source code is made available.
163
Intellectual property
The idea behind any original creation is the property of its creator, and not only the physical objects which express that idea. If, for example, you were to write a poem or a book, or take a photo, and someone were to make a copy of it without asking your permission or compensating you, that person would have stolen your intellectual property, even if he didn’t steal your physical exemplar of the work.
164
Piracy
The act of stealing intellectual property. i.e. using or making a copy of the kind of work protected by copyright law.
165
Carpal Tunnel Syndrome
This is caused by inflammation of the tendons in the wrist, causing pressure on the nerves in the wrist, resulting in pain and sometimes weakness in parts of the hand.
166
E-Waste
The broken, old, outdated and discarded hardware that we don’t want and don’t need.
167
Ergonomics
Studies of the human body to try to design products so they better fit the way that we actually function.
168
Green Computing
Green computing refers to initiatives to design, use and disposal of technology in an environmentally or eco-friendly way.
169
RSI
Repetitive Strain injury - A class of injuries (to tendons, ect) caused by repetitive actions.
170
Adware
Adware is software that downloads and bombards your computer with adverts that pop-up whenever you are connected to the Internet. It is more of a nuisance than a threat.
171
Anti-Virus software
A computer program that scans computer files for viruses and eliminates them.
172
Computer virus
A computer virus is a program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
173
Computer worm
A computer worm is malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program.
174
E-Mail spoofing
E-mail spoofing is the changing of an e-mail header so that the origin of the e-mail appears to be from a different source.
175
Identity theft
Identity theft is when someone steals your personal details such as your ID number, credit card details or driver’s license to commit fraud or another crime.
176
Internet Hoax
An internet hoax is an e-mail message or article intended to deceive or defraud others.
177
Netiquette
Netiquette (Internet + Etiquette), is the name given to the use of good manners and showing respect for other user when using the Internet.
178
Pharming
Pharming is an identity theft scam, where the user’s computer is infiltrated so that they are automatically redirected to another (fake) website, even if they type in the correct URL for that website.
179
Phishing
Phishing refers to attempts from people to con the user into giving out personal, confidential details such as PIN numbers and passwords, by posing as a legitimate organisation, usually via e-mail.
180
Secure URL
A secure URL begins with https:// or has a small closed lock displayed somewhere on the page, often next to the URL.
181
Spam
Spam is the electronic equivalent of ‘junk mail’. It is an e- mail being sent to you in the form of advertising of products that you did not request.
182
Spyware
Spyware is software that tries to monitor and track the way you use your computer. It is installed on user’s computers without their knowledge.
183
Trojan
A Trojan is a destructive program disguised as an useful application.
184
Virus Signature (Definition)
A virus signature or definition is the pattern that uniquely identifies a virus.