Crunch Notes Grade 12 Flashcards

1
Q

Convergence

A

Trend whereby separate technologies and functions from
multiple devices are combined into a single multi-purpose
device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Core

A

A single complete working CPU circuit – relevant because
modern chips are ‘multi-core’ and contain more than one
‘core’ in a single physical CPU ‘chip’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

E-Book

A

Eletronic version of a book, read by using an e-reader or
other e-book software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

E-Reader

A

Single-purpose device designed to allow you to read e-books
(and have a portable library of e-books).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Laptop

A

A complete computer in a case that includes a screen,
keyboard, pointing device, WiFi and a battery to power the
device when away from a fixed power source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Netbook

A

A low-power, low-spec version of a laptop (i.e with a small
screen, and less RAM, storage and processing power)
designed for very basic computer tasks such as web
browsing and e-mail (hence the name netbook). Largely
discontinued, replaced by tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Power Users

A

Users who need high end computer specifications for their
job or special interest. They may also need specific hardware
related to the task, and will typically use most of the
advanced functions of the software they use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smartwatch

A

A watch that offers additional computing power/sensors as
well and can interface with your
smartphone/tablet/computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOHO

A

An acronym for Small Office Home Office, used to describe
smaller business organisations and to differentiate them
from large corporations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tablet

A

A larger (7” and up) version of a smartphone, runs the same
OS and has all the same technologies (except the ability to
be used as a phone); with the added advantage of a larger
screen area for greater productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Applications

A

Software where most of the processing is done ‘in the cloud’
– i.e by one or more servers on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Computing

A

The use of resources offered as services over the Internet
and shared between many users. Including online file
storage services and the running of programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SAAS (Software As A Service)

A

The concept of ‘renting’ software instead of buying a license
to use it forever. You have the right to use the latest version
of a program for as long as you are paying a monthly
subscription fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Memory

A

An area of storage or disk space that the operating system
keeps for its own use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtualisation

A

Either splitting resources of very powerful machines
between multiple users, or combining the resources of many
machines to create a super powerful service – in each case
the illusion is created of a single computer, but which is in
reality a ‘virtual machine’. A technology heavily relied upon
in cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BitTorrent

A

A peer-to-peer protocol used to transfer and share large files
across a network such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

User Rights

A

Set of rights and permissions defining what a user is allowed
to do with files (e.g. read, write, modify). Set up by an
administrator using a network operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Digital Certificate

A

A certificate issued by a trusted third party to verify the
identity of a person or organization, so that the person or
organisation may be trusted for communication of sensitive
information. An essential part of the SSL encryption
protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Digital Signature

A

An electronic ‘signature’ used to identify and validate the
sender of an electronic message (e-mail) or the ‘signer’ of an
electronic document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DRM (Digital Rights Management)

A

A way of protecting digital books, movies, games etc. by
using some form of encryption to control access to the
content (copying, viewing, printing, changing ect).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Public Key Encryption

A

A type of encryption where a generally available public key is
used to encrypt data, but a different private key is needed to
decrypt and read the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SSL (Secure Socket Layer)

A

An encryption protocol, which encrypts data, sent over the
Internet. Used by websites for communicating sensitive
information (e.g banking details).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Applications Of The Web

A

The trend for information that was previously accessed
through conventional web pages and a browser, to be
accessed via dedicated apps on mobile devices. Driven by
increasing reliance on mobile devices for interaction with
web services, with benefits of the speed, ease of use,
singleness of purpose, ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Context-Aware Search

A

A search in which context (e.g one’s immediate physical
location) is used as criteria to make search results more
relevant. Inevitable downside is loss of privacy – the higher
the relevance of the search, the greater the sacrifice of the
personal privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Mediated Search
A search that is mediated, or ‘managed’, by humans rather than by reliance on algorithms. The search engine acts more like an online directory, returning results fewer in number, but more relevant and useful.
26
Profiled Search
A search in which the results are customised by search engines (like Google) to match one’s profile of interests and activities. The force behind it is commercial – exposure to advertisements and markets that one is more likely to respond to.
27
Semantic Search
A search built on the idea of the (yet unrealised) ‘semantic web’, in which computers will have the ability to interpret metadata on web pages that will allow them to navigate and filter the Web intelligently, without human intervention, by automatically applying the necessary search criteria.
28
The 'Internet Of Things'
The concept that more and more devices and objects are being connected to the Internet, with the ability to communicate with other devices and objects, and to take ‘intelligent’ decisions based on the input received.
29
AJAX
AJAX (Asynchronous JavaScript and XML) combines JavaScript with a browser command to allow the browser to download data without requiring the whole page to refresh.
30
Cookie
A text file (max 4 Kb) used to store customised settings for a website on your local computer.
31
CSS
CSS (Cascading Style Sheets) allow you to define and name styles and then specify the formatting for those styles and save it all into .css file – this makes it easy to apply consistent formatting to the elements of your website.
32
Javascript
A language designed specifically for execution within web browsers.
33
Online Storage
Storage of data in a database by a web server, which manages resource files such as pictures and videos needed to generate web pages. (Distinguish carefully from online file storage, which refers to services offered by sites such as Dropbox, OneDrive, ect.)
34
Server-side instructions / scripting
Server-side instructions make dynamic creation of a web page possible and are written in languages such as Perl, Ruby, ASP.NET, Python and PHP. These instructions are carried out on the server before the .html (page page) file is sent to the browser.
35
SQL-stored procedures
A whole lot of SQL instructions, grouped together and given a unique name, and then stored inside the database for easy reuse later.
36
Web storage specification
A newer alternative to cookies that allows more continuous and flexible local data storage, and larger amounts of it, using JavaScript.
37
XML
XML or Extensible Markup Language is a set of rules that you follow when creating your own codes, to allow you to structure data in a text document in any way that you need to.
38
Patch
An update that can be downloaded to fix a specific bug in software. Most patches are used to fix security vulnerabilities in the software.
39
Service Pack
A collection of fixes, updates and new features since the release of the original software or previous service pack.
40
Botnet
A remotely controlled network of ‘zombie’ PCs (computers infected with malware that enables criminals to use them for launching DDOS attacks, sending out spam, ect.)
41
Cracker
Term no longer in general use, but which refers to a ‘bad’ hacker (‘black hat hacker’) who does illegal things such as stealing or making unauthorised changes to data.
42
Cyberbullying
The use of ICT tools and devices (cellphones, e-mail, social media ect) to malign, mock, embarrass, threaten or intimidate a person.
43
Cyber-Extortion
The use of IT-based blackmail, whereby threads are issues ranging from the personal (e.g. release of unflattering images) to the corporate (e.g DDOS attacks on websites) – unless specified amounts of money are paid over to the extortionist.
44
Cybergang
A group of people who help each other to commit cybercrimes. Each member often specialises in a different task.
45
DDOS
Distributed Denial of Service: an ‘attack’ that makes a website unavailable by the use of thousands or millions of computers to request data from the site at the same time. The servers become overloaded, unresponsive, and effectively unavailable for everyone.
46
Hacker
General term used for any person who uses ICT skills to access computer systems, networks and information illegally. Sometimes differentiated into two subcategories, ‘good’ hackers (‘white hat hackers’) and ‘bad’ hackers (‘black hat hackers’)
47
Identity Theft
When someone steals your details (e.g ID document, driver’s license, PIN code) in order to pretend to be you, and then buys expensive goods in your name, or draws money from your account, ect.
48
Piggybacking
Gaining access to and using someone else’s Internet connection without paying for it, most often through use of an unsecured WiFi network.
49
Script Kiddies
Derogative term used for people who do not know how to create a virus from scratch, but who obtain virus ‘templates’, or pre-created ‘scripts’, which they modify and release.
50
Spammer
Someone who sends out unsolicited (unasked-for / unwanted e-mail – usually in the form of advertisements.
51
Distributed Computing
Sharing and using the resources of many different computers at the same time in order to solve a single problem.
52
DSS (Decision Support System)
A computer system designed to gather information from a wide range of sources, analyse it, and present it in summarised or graphical formats that aid in decision- making.
53
Expert / Knowledge-based system
A rule-based form of Artificial Intelligence where human expertise is coded into a computer system that can take input and arrive at a decision far more quickly than most humans can.
54
Fuzzy logic
A type of reasoning that works with probabilities in order to arrive at a decision.
55
Access Control
The use of software settings and various technologies (e.g passwords, encryption codes, biometric security measures) to control user’s access to data and resources. It also involves control over physical access to equipment.
56
Logical Data integrity
The correctness of data, or data ‘making sense’ in a particular context.
57
Normalisation
A series of steps followed to ensure that a database is an optimal state, with no chance of anomalies (irregularities) – that data is not being repeated and that queries and reports can be created with ease.
58
Physical Data integrity
Overcoming practical issues such as power failures, mechanical failures, natural disasters, ect. And dealing with the physical storage and retrieval of data.
59
Purge
Actually, remove deleted records from a database to compact and streamline the file.
60
Rollback
When the DBMS gets the instruction to reverse a transaction (or series of transactions) and restores the data to its previous state.
61
Transaction processing system
A software system that captures and processes data from everyday business activities.
62
Audit Trail
A record or ‘trail’ that is made to keep track of who made changes to a database when those changes were made.
63
Parallel Data sets / Mirroring
Technique whereby multiple identical copies of data are kept (hence the term mirroring).
64
SQL Injection
A hacking technique where SQL statements are entered into data input fields query parameters instead of data.
65
'Invisible Data Capture
A type of data capture that usually happens when you allow data to be captures for a specific purpose, and other data not strictly required for this purpose is also captured, often without your awareness.
66
Data collection
Any method of obtaining data to be processed. (Distinguish carefully from the process of ‘collecting data’ for academic/research purposes.)
67
Data Mining
The use of complex algorithms to group and arrange ‘big data’ so that interesting and previously unknown patterns emerge – and new information is discovered.
68
Data Warehouse
A huge collection of data, often accumulated from a range of sources such as separate databases within a company.
69
Location-Based Data
Data that is linked to a specific location – usually using co-ordinates captured by a GPS device.
70
RFID
Radio Frequency Identification – a data capture technology designed to store more data and work more interactively than conventional barcode systems.
71
RFID Reader
The component of the RFID System designed to read information in RFID tags when ‘swiped’ past it or brought within suitable reading distance, and then to initiate processing of the data received.
72
RFID Tag
The component of the RFID system designed to be ‘read’ and therefore placed on items that need to be tracked or interacted with.
73
SQL
Structured Query Language – a standard language used for querying and manipulating data in a database.
74
Seeder
A participant in a peer-to-peer (P2P) file-sharing network who has a complete copy of a file and actively shares it with others.