Crunch Notes Grade 11 Flashcards

1
Q

BIOS

A

Basic Input Output System – the essential start-up
instructions of a computer, in ROM chips on the
motherboard, and representing the lowest level of
programming firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BUS

A

A set of electrical paths etched on a motherboard, used to
transfer data between different parts, e.g. between an
expansion card and RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Caching

A

A method used to compensate for the loss of efficient, or
‘bottleneck’, that becomes inevitable when a faster medium
tries to communicate with a slower medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CMOS

A

Complementary Metal Oxide Semiconductor – the type of
memory that stores the BIOS settings that can be updated or
changed. This memory is kept ‘alive’ by a small battery on
the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPU

A

Central Processing Unit – a chip that can contain more than
on ‘core’ (complete processor) and which connects to the
motherboard using the ZIF socket. Responsible for all the
processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CPU Cache

A

Special type of high-speed memory built into the CPU, used
to maximise CPU productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disk Cache

A

A certain amount of high-speed memory built into every
hard drive. Used to cache data from the (slower) disk, and
thereby speed up subsequent calls for the same ‘chunk’ of
code or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EEPROM

A

Electronically Erasable Programmable Read Only Memory –
a type of ROM that can be erased electronically, after which
a new ‘image’ of upgraded contents can be written back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Expansion slots

A

Slots on the motherboard for attaching additional circuit
boards in order to ‘expand’ the capabilities of the computer
– mostly dedicated video and sound cards for high-end
gaming and design work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

External Connectors

A

Situated both ad the bac and the front of the casing, e.g USB
ports, VGA port for monitor, RJ45 port for Ethernet network
cabling, speaker and microphone jacks, ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewire

A

A type of port that can transfer data faster that USB. It
usually used where high speed data transfer is desirable,
such as videos from a video camera, and data to or from an
external hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firmware

A

Software that is permanently installed, or ‘hard-coded’ on a
ROM chip, and used to control the basic operation of a
device, e.g a printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Flashing the ROM

A

The process whereby the existing contents of firmware is
wiped and replaced with an updated version – always to be
performed with great care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GPU

A

Graphics Processing Unit – dedicated graphics processor on
a graphics card, used to provide extra processing power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware Interrupt (IQR)

A

A dedicated communication channel, or means, whereby a
device can request the immediate attention of the CPU, in
order to process a given function, e.g a mouse click or a
keystroke.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machine Cycle

A

Steps taken by the CPU in carrying out instructions:
 Fetching instructions and data from the
memory (RAM)
 Decoding the instructions
 Executing the instructions
 Transferring data back to the memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Point-To-Point connections

A

Dedicated connection between two components (e.g
between RAM and CPU that is not shared with other
components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

POST

A

Power On Selft Test – start-up test performed by the Bios to
ensure that all essential hardware (RAM, keyboard ect) is
present and in working order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SATA Connectors

A

Connectors on the motherboard for attaching cables for
storage devices, such as hard drives and optical drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

System Clock

A

A small quartz crystal that pulses at a regular frequency
measured in GHz; used to coordinate activates on a
motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Thunderbolt

A

A new superfast connection technology, which can support
multiple simultaneous connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

USB

A

Universal Serial Bus – the most widely used connection
option for attaching devices to a computer, via a USB port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Web caching

A

The process of storing recently accessed web pages locally
on the relatively much faster hard drive so that they are
quicker to retrieve the next time they are needed. Retrievals
from local storage are much faster than Internet downloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ZIF socket

A

Zero Insertion Force – a type of socket on the motherboard
for connecting a CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

API

A

Application Programming Interface – an interface between
the operating system and the programming language / end
user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Assembler

A

A program that translates assembler code to machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Compilers

A

Software that translates programming instructions written in
a high-level language into standalone ‘executable files’ (with
an .exe extension) that can be run independently of the
programming language or compiler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

High-Level Programming languages

A

Programming languages that are easier for humans to write
and understand, that rely on extensive pre-written libraries
to execute complex instructions with just a few lines of code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Interpreters

A

Software that translates programming instructions into
machine code one line at a time. Does not generate
executable files. Programs written for interpreters can only
run if the interpreter (or a special ‘runtime’ module of the
interpreter) is installed on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Low-level programming languages

A

Assembler type languages that typically use fewer
commands, but correspondingly more simple instructions, to
produce very fast and efficient code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Machine code

A

Instructions in binary format (0’s and 1’s) that the CPU can
directly execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Multiprocessing

A

The type of processing that takes place when the operating
system divides the programs/threads/processes between
multiple CPUs (Physical chips or cores).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Multitasking

A

The operating system splits the CPU time between multiple
programs, and so the computer seems to be doing more
than one task at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Multithreading

A

The ability of an operating system to allow programs to split
themselves into multiple tasks (or threads) that can be run
at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Process Management

A

The task of making sure that each process gets enough CPU
time and access to hardware resources so that it can work
without interfering with or being interfered with by other
processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Thread

A

A part of a larger program that runs independently by
simultaneously with other parts of the same program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Virtual Memory

A

An area of storage or disk space that the operating system
keeps for its own use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Virtualisation

A

Creating an entity (memory, storage, machine ect) that only
exists in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Biometric security

A

Security based on measurement and identification of unique
physical characteristics of a person, e.g fingerprints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Data validation

A

Checking for the correctness of data from a computer
perspective, i.e with reference to a defined set of criteria, or
allowable values, which the computer program will either
accept or reject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Data verification

A

Checking for the accuracy of data from a human perspective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Defensive programming

A

A technique whereby the programmer makes pro-active
provision for possible errors made by the user, in the
interest of correct data entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Disk imaging

A

Creating a backup ‘image’ of the entire hard drive, including
all data and programs, to be used for re-installation in the
case of complete hard drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Encryption

A

The ‘scrambling’ of text or data according to a specified set
of rules to ensure the privacy of data during communication,
or for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Firewall

A

Hardware or software that monitors the traffic between a
computer and the internet, to safeguard against breaches in
security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

GIGO

A

‘Garbage In, Garbage Out’ the quality of the output for any
computer system is directly related to the quality of the
input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Incremental backup

A

Backup schedule whereby backups are made only on new
files and files that have changed since the last backup,
resulting in greater backup efficient (saving in disk space and
backup time), and allowing selective data recovery from an
earlier date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Malware

A

Malware (malicious software) is a general term used to
describe malicious software that is specifically designed to
install itself without the user’s knowledge to negatively
affect or ‘harm’ a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Online backup

A

The backing up of data on a server on the Internet (‘the
cloud’), with the advantages of data synchronisation, sharing
and portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Raid

A

Redundant Array of Inexpensive/Independent Disks – the
configuration of two or more hard drives, designed to
minimise the possibility of data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Rootkit

A

Collection of programs designed to use administrator rights
to gain and control of a computer for dangerous purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Social Engineering

A

Any attempt to manipulate or ‘con’ someone into installing
malware or giving out sensitive or personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Software bug

A

A logical programming error that can cause unexpected
program behaviour, incorrect output or invalid data
processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Spyware

A

A form of malware that tries to monitor and track the way
you use your computer to discover confidential information,
and then relay this to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Trojan

A

A form of malware disguised as a useful program, but in
reality designed to do harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

UPS

A

Uninterruptible Power Supply – a hardware device used to
protect against power supply problems, consisting
essentially of a constantly charged battery between the
computer and the wall plug.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Access Point

A

Also called a base station, consists of a server/transceiver
and an antenna, which transmits and receives radio waves
so that the devices that are wireless enabled are able to
communicate with one another and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

HAN

A

Home Area Network - A small network within a home environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Hotspot

A

An area, usually in a public space such as an airport,
restaurant or hotel lobby, where people may receive and be
granted WiFi access from an access point to connect
wirelessly to the Internet via a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Location Based computing

A

Computing where the physical location of objects and
people are determined and used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Network Interface controller

A

A device that allows a computer to communicate with a
network either wirelessly or via a cable connecting the
network to the NIC in the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

PAN

A

Personal Area Network - A computer network with a range of a few metres that is organised around an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Topology

A

The layout of the physical connection of the computers in a
network.

64
Q

VPN

A

A network implemented via a public network such as the
Internet. This enables the user to log onto a network from a
remote location with the same benefits of privacy and
security as a LAN.

65
Q

VoIP

A

A protocol or special set of rules for communication
between devices that allows telephone calls to be made
over LANs, WANs and the Internet.

66
Q

WLAN

A

A method of connecting to an existing network wirelessly, by
using radio waves to send and receive data.

67
Q

WiMax

A

An upgrade of WiFi technology, allowing for more secure
communication over a wider area.

68
Q

WLAN

A

A LAN which uses wireless technology (radio waves) rather
than cables to communicate.

69
Q

Blogs

A

Websites updated regularly with news and events in
chronological order. A blog reads like a journal with the most
recent entry at the top.

70
Q

Bluetooth

A

A wireless technology that allows devices such as mice,
printers and cell phones to communicate over a relatively
short distance, typically less than 10m.

71
Q

GPS

A

Global Positioning System - A navigation system that uses signals received from geo-stationary satellites to determine accurately within 5m) the position of a receiving device.

72
Q

HTTPS

A

HyperText Transfer Protocol Secure - The protocol used for secure, encrypted communications over the internet. It is used on websites, which require a user to enter confidential or personal information such as passwords or banking details.

73
Q

IM

A

Internet based alternative to text messaging, in which
multimedia content can be exchanged in real time via
applications such as WhatsApp, BBM and Mxit.

74
Q

Microblogging

A

The posting of short text entries usually via a cellphone or a
smartphone, on a platform like Twitter.

75
Q

Mobile Browser

A

Browser designed for the use on mobile devices,
incorporating innovations to accommodate the smaller
screen sizes, also the lower power profiles and processing
abilities of these devices.

76
Q

Podcast

A

An audio file (often in MP3 format) made available for
download from the Internet; more often pre-recorded radio
chat shows and talks, rather than music.

77
Q

POP3

A

Post Office Protocol 3 - The most common protocol used for downloading e-mail via the Internet from POP3 servers.

78
Q

Protocol

A

A set of rules for encoding and decoding data for
transmissions across a network.

79
Q

Smartphones

A

Cellphones with a mobile operating system and the ability to
run third-party software or ‘apps’. They generally include a
touch screen interface and multiple sensors for advanced
functions such as GPS, accelerometer, ect.

80
Q

SMS

A

Short Message Service - SMS-ing (or texting) is sending short text messages from one cell phone to another, popular and convenient because it allows one to communicate directly without making a phone call.

81
Q

SMTP

A

Simple Mail Transfer Protocol
The most common protocol used for sending e-mail via
SMTP servers on the Internet.

82
Q

Vlog

A

A form of blog, which uses video as the medium. Entries
normally combine video supported by text and images.

83
Q

Vodcast

A

A form of podcast which includes video clips or photos and is
downloaded and played as a movie.

84
Q

Audio and Video On Demand (AVOD)

A

Video on Demand (VOD) and Audio and Video on Demand
(AVOD) are systems which allow users to watch video
content and listen to audio content on demand.

85
Q

Downloading

A

Transferring and saving an audio or video file from the
Internet onto a computer, smartphone or tablet. You can
then play the file at a later stage, or more than once,
without being connected to the Internet.

86
Q

Fixed location internet access

A

High speed data transmission to homes and businesses using
cabled technologies such as ADSL. This is often referred to as
a fixed broadband access.

87
Q

Internet Protocol television (IPTV)

A

The delivery of television services over the Internet instead
of through traditional satellite systems such as South Africa’s
DSTV.

88
Q

JPEG

A

The most common file format used for digital photos or
graphics, also widely used for graphics on websites. (JPEG
files are also known as JPG files.)

89
Q

Live broadcasts

A

The broadcasting (Streaming) of different types of media in
real-time without any significant delay, allowing users to
witness events as they are happening.

90
Q

Lossless compression

A

Compressing data without losing any portion of the data. It
allows the exact original data to be reconstructed.

91
Q

Lossy compression

A

Compressing data by sacrificing some insignificant or
virtually indetectable portion of the data.

92
Q

Mobile internet access

A

The ability to connect to the Internet using wireless
networks such as the cellular phone network. This is often
referred to as mobile broadband Internet Access.

93
Q

MP3 (MPEG-1 Audio Layer-3)

A

The most common digital music file format, combing
efficient compression with excellent sound quality. The
current standard for storing digital music.

94
Q

MPEG

A

Moving Picture Experts Group
A reference to the digital compression standards and file
formats developed by the group.

95
Q

MPEG - 2

A

A standard used for the compression of video files and their
associated audio tracks, and widely used to broadcast digital
television.

96
Q

MPEG - 4

A

The latest and still developing standard used for the
compression of audio and visual digital data through the use
of lossy compression.

97
Q

Streaming

A

The immediate and real-time delivery of media content to a
receiving device, starting from the time at which the media
file is opened. The file is not saved to your device.

98
Q

Web 1

A

Earliest stage in the evolution of the WWW, characterised by
mostly static content and a ‘read-only’ role on the part of
the consumer public.

99
Q

Web 2

A

The next, and current stage in the evolution of the WWW,
characterised by more dynamic content and an interactive
‘read-write’ role on the part of the consumer public. Content
consumers can become content creators as well, for
example, on social networking sites.

100
Q

Web 3

A

The future of the WWW, in which exact directions are still
uncertain, but which will certainly contain elements of
artificial intelligence and a greater emphasis on personalised
content; in other words less ‘reaction’ and more customised
‘prediction’ in favour of users. Web 3.0 will also be
accompanied by enhancements in web-enabled devices,
elimination of incompatibility issues, extensions in mobile
capacity and increases in bandwidth and speed.

101
Q

Webinars

A

Online seminars, which users in remote locations can
participate in, using online conference technologies. These
occur in real-time and allow ‘delegates’ access to interactive
conferences and workshops.

102
Q

WWW

A

A service on the Internet. The WWW consists of a vast global
collection of interlinked, Interactive multimedia documents.

103
Q

DNS

A

Domain Name System
An Internet service that translates domain names to IP
addresses. Domain names consisting of words are easier to
remember than IP addresses. The Internet is based on IP
addresses. When you use a domain name, a DNS service
must translate the name into the corresponding IP address.

104
Q

Dynamic Website

A

A website consisting of web pages designed to be generated
‘on the go’ and which may differ each time, based on who
the user is and what their recorded preferences and options
are.

105
Q

RIA (Rich Internet Applications)

A

A web application that is designed to deliver the functions
and features of a traditional desktop application. Web
browsers are required for access. Unlike traditional
applications, the installation of software is not needed.

106
Q

RSS (Really Simple Syndication)

A

A web or news feed that automatically provides users with
updated content or notifications of new content. This
content can then be accessed from a central application
without having to check each and every website.

107
Q

SEO (Search Engine Optimisation)

A

A strategy or technology used to obtain a high-ranking
placement in the search results page of a search engine such
as Google.

108
Q

Static Website

A

A website consisting of multiple pages – each a single file
that displays exactly the same information every time to the
user just as when it was created.

109
Q

AUP

A

Acceptable Usage Policy – a document drawn up by the
stakeholders concerned, e.g The Governing Body of a school
that outlines the rights and responsibilities of users within a
network environment including the consequences violating
these stipulations.

110
Q

Network Use Policies

A

Software settings defined by the network administrator in
server operating systems, e.g Windows Server 2012, to
control what users can and cannot do with the network.

111
Q

Artificial Intelligence

A

Simulation of human decision-making processes by a
computer system that is programmed to react based on
input gained from sensors.

112
Q

Decentralisation of labour

A

Concept whereby ICT has made it possible for people to
work from remote locations, instead of being tied to a
specific central location.

113
Q

Graphic Designer

A

Someone who designs the ‘look’ of a product or solution,
such as the physical packaging, or the visual/spatial aspects
of a program or website.

114
Q

Mobile Office

A

A concept whereby the tools of your business, e.g your
tablet and smartphone, are carried around with you,
allowing you to perform common office functions while ‘on
the move’.

115
Q

Network Administrator

A

Someone who manages a network from the software
perspective, typically working on a server and using the
management tools provided by a network operating system,
e.g Windows Server 2012

116
Q

Office Automation

A

Process whereby certain routine office processes are carried
out without human intervention.

117
Q

Outsourcing

A

Contracting specialist businesses to run aspects of your own
business that are essential for proper functioning, but that
do not fall within your own area of expertise.

118
Q

PC Technician

A

Someone who assembles, upgrades and repairs computer
hardware.

119
Q

Programmer

A

Someone who writes code to create or maintain software,
often as part of a team with other programmers and IT
specialists.

120
Q

Robotics

A

Performance of physical tasks, commonly repetitive or
dangerous ones, by computer-controlled machines rather
than by human beings.

121
Q

Security Consultant

A

Someone who critically evaluates the security aspects of a
business, then designs or recommends appropriate
solutions.

122
Q

Systems analyst

A

Someone who performs the ‘Interface’ function between
client and programmer, analysing the requirements of the
client as a list of specifications for the programmer, who will
ultimately create the software solution.

123
Q

Telecommuting

A

Working in decentralised locations, e.g from home, but using
modern communication occasionally to ‘check in’ at the
physical office.

124
Q

Virtual Office

A

A fixed physical address, containing minimal office setup
such as a reception desk and meeting room, which is used as
a shared space by people who otherwise work from a mobile
office.

125
Q

Web Author

A

Someone who uses a variety of tools to plan, structure,
create and maintain a website.

126
Q

Accuracy

A

This refers to the fact that the data is ‘right’.

127
Q

Alternate Key

A

A field that identifies each record with a unique value but is
not used as the primary key.

128
Q

Completeness

A

This refers to how comprehensive the data is.

129
Q

Correctness

A

This refers to data being ‘logically correct’ or ‘reasonable’.

130
Q

Currency

A

This relates to how ‘recent’ or up to date the data is.

131
Q

Database

A

A collection of data or facts regarding a specific topic, e.g
details of a CD collection or details concerning clients.

132
Q

Field

A

A single fact or the smallest unit of data.

133
Q

Primary Key

A

A field that identifies each record with a unique value.

134
Q

Query

A

Extracting information according to specified criteria.

135
Q

Record

A

A collection of fields that contains details on a specific entity.

136
Q

Relevance

A

This relates to how closely the data matches your needs.

137
Q

Table

A

Grouping related records in a table where each row
represents a record, and each column a field.

138
Q

Database administrator

A

A person who is responsible for managing and maintaining
databases (usually via DBMs). This involves the allocation
and supervision of users of the database and their access
rights, as well as performing routine maintenance on the
database.

139
Q

Database Analyst

A

A person who is concerned with issues such as the need to
make changes to the underlying database structure,
analysing the efficiency of the system and analysis and
design activities in terms of the new developments and
maintenance of the database.

140
Q

Database Management System

A

Software that allows you to work with electronic databases.
Examples are Microsoft SQL Server, Oracle, Microsoft
Access, Blackfish and MySQL.

141
Q

Database Programmer

A

A person who is responsible for coding the custom-made
software that is the user interface to the database.

142
Q

Desktop Database

A

Database software where the tools that you need to work
with the data are included in a single application and you
need to start that application to be able to work with the
database.

143
Q

Distributed Database

A

A system where parts of a database (the data and the DBMS)
are spread (distributed) across servers in separate locations.

144
Q

Project Manager

A

A person who plans and sets out goals on a timeline to
oversee the progress of a project from beginning to end.

145
Q

Server DBMS Software

A

Database software that is installed on a server and is never
directly accessed by the user but accessed by custom
written client software or applications.

146
Q

Unix Administrator

A

A person who is responsible for installing, configuring and
troubleshooting the DBMS that runs on a Unix operating
system.

147
Q

Anomalies

A

Problems or errors that occur when you try to insert data,
delete data or update data.

148
Q

Composite Keys

A

The combination of more than one field to uniquely identify
a record.

149
Q

Data Independence

A

The same application can be used for data stored on
different media (physical independence), and the application
will not be affected when you add a table to a database or
create extra fields in existing tables (logical independence).

150
Q

Data Integrity

A

The overall completeness, accuracy and consistency of data.
Data integrity is ensured when each record has its own
unique primary key and when a foreign key refers to an
existing record in another table.

151
Q

Data maintenance

A

Adding or deleting records, or updating data.

152
Q

Data Redundancy

A

The unnecessary repetition of data.

153
Q

Data Security

A

The protection of databases against unauthorised access by
users.

154
Q

ER Diagrams

A

Diagrams used to illustrate relationships between entities.

155
Q

Foreign Keys

A

A field (not a primary key) that is used as a ‘link’ to a field in
another table (usually the primary key).

156
Q

Relational Database

A

A database containing many tables linked together in
relationships.