Crunch Notes Grade 12 Flashcards
Convergence
Trend whereby separate technologies and functions from
multiple devices are combined into a single multi-purpose
device.
Core
A single complete working CPU circuit – relevant because
modern chips are ‘multi-core’ and contain more than one
‘core’ in a single physical CPU ‘chip’.
E-Book
Eletronic version of a book, read by using an e-reader or
other e-book software.
E-Reader
Single-purpose device designed to allow you to read e-books
(and have a portable library of e-books).
Laptop
A complete computer in a case that includes a screen,
keyboard, pointing device, WiFi and a battery to power the
device when away from a fixed power source.
Netbook
A low-power, low-spec version of a laptop (i.e with a small
screen, and less RAM, storage and processing power)
designed for very basic computer tasks such as web
browsing and e-mail (hence the name netbook). Largely
discontinued, replaced by tablets.
Power Users
Users who need high end computer specifications for their
job or special interest. They may also need specific hardware
related to the task, and will typically use most of the
advanced functions of the software they use.
Smartwatch
A watch that offers additional computing power/sensors as
well and can interface with your
smartphone/tablet/computer.
SOHO
An acronym for Small Office Home Office, used to describe
smaller business organisations and to differentiate them
from large corporations.
Tablet
A larger (7” and up) version of a smartphone, runs the same
OS and has all the same technologies (except the ability to
be used as a phone); with the added advantage of a larger
screen area for greater productivity.
Cloud Applications
Software where most of the processing is done ‘in the cloud’
– i.e by one or more servers on the Internet.
Cloud Computing
The use of resources offered as services over the Internet
and shared between many users. Including online file
storage services and the running of programs.
SAAS (Software As A Service)
The concept of ‘renting’ software instead of buying a license
to use it forever. You have the right to use the latest version
of a program for as long as you are paying a monthly
subscription fee.
Virtual Memory
An area of storage or disk space that the operating system
keeps for its own use.
Virtualisation
Either splitting resources of very powerful machines
between multiple users, or combining the resources of many
machines to create a super powerful service – in each case
the illusion is created of a single computer, but which is in
reality a ‘virtual machine’. A technology heavily relied upon
in cloud computing.
BitTorrent
A peer-to-peer protocol used to transfer and share large files
across a network such as the internet.
User Rights
Set of rights and permissions defining what a user is allowed
to do with files (e.g. read, write, modify). Set up by an
administrator using a network operating system.
Digital Certificate
A certificate issued by a trusted third party to verify the
identity of a person or organization, so that the person or
organisation may be trusted for communication of sensitive
information. An essential part of the SSL encryption
protocol.
Digital Signature
An electronic ‘signature’ used to identify and validate the
sender of an electronic message (e-mail) or the ‘signer’ of an
electronic document.
DRM (Digital Rights Management)
A way of protecting digital books, movies, games etc. by
using some form of encryption to control access to the
content (copying, viewing, printing, changing ect).
Public Key Encryption
A type of encryption where a generally available public key is
used to encrypt data, but a different private key is needed to
decrypt and read the data.
SSL (Secure Socket Layer)
An encryption protocol, which encrypts data, sent over the
Internet. Used by websites for communicating sensitive
information (e.g banking details).
Applications Of The Web
The trend for information that was previously accessed
through conventional web pages and a browser, to be
accessed via dedicated apps on mobile devices. Driven by
increasing reliance on mobile devices for interaction with
web services, with benefits of the speed, ease of use,
singleness of purpose, ect.
Context-Aware Search
A search in which context (e.g one’s immediate physical
location) is used as criteria to make search results more
relevant. Inevitable downside is loss of privacy – the higher
the relevance of the search, the greater the sacrifice of the
personal privacy.