Information System Design and Development Flashcards
Malware
Short for malicious software. Designed to disrupt or damage a computer system
Interface
Combination of hardware and software that allows the processor and peripherals to communicate
Biometrics
Makes use of our unique physical characteristics and features to identify us
Range Check
Makes sure data is entered within certain limits
Network Hardware
Network Interface Card
Router
Hub
Switch
Solid State Devices
SD cards
USB flash drives
WAN
Wide Area Network. Covers a large geographical area
External Hyperlink
Direct user to a different page on a different website
Bit Depth
Representation of how many colours each pixel can store.
No. of colours = 2n where n is bit-depth
Prescence Check
Makes the person using the database enter something in this field. Cannot be left blank!
Foreign Key
A primary key from one table that appears in another table to link the two together
Reducing Carbon Footprint
Install equipment which reduces emissions
Generate your own renewable energy
File
Stores all the information on a particular subject. It is made up of records.
Field
Stores one particular piece of information about all the people/things
img src=”image” alt=”image”
Adds image to webpage. If image doesn’t display, text displayed instead
Input AND Output Devices
Touchscreen
Interactive White Board
Games Controller
Interface Examples
USB 2.0 + 3.0
Firewire 800
Thunderbolt
Local Advantages
One fixed price
Upload/Download almost instantaneous
Human Computer Interface (HCI)
Things like windows, menus, icons and pointers
Keylogger Security Risk
Programmer can gain access to:
- Usernames
- Passwords
- Credit Card Numbers
- Email Addresses
Capacity
How much data a storage device can store
Output Device
Devices the computer system uses to send out or display information from the processor
Trojan Horse Examples
‘Free’ online games you can download
Browser helper toolbars
Antivirus Software
Cloud Storage
Storage you can upload onto a web server
Rtf
Rich Text Format. Stores text and formatting information
p…./p
States where new paragraphs of text begin and end
Reducing Typing in Forms
Radio Buttons
Calender Picker
Autocomplete
HTML uses
Set where text should be placed
Describe the structure of text
Create hyperlinks
Embed Images
Create sections within the page
Field Length
Restricts the number of characters user is able to type
Magnetic Storage
Magnetic Tape
Hard Disk Drive
Restricted Choice
Cuts down on mistakes by only letting you select an option from a menu or list
Svg
Scalable Vector Graphics.
Lossy
Method of compression
- Reduces file size substantially
- Media becomes very pixelated the more it’s compressed
- Used on JPEG files
Txt
Plain text file. Only stores text, meaning formatting isn’t saved
Recycling
Computers contain finite resources like gold, silver and palladium. To sustain our use of these devices, materials need to be recovered and reused
Networks Allow People To
Send/Recieve emails
Share Peripherals (printer)
Work Simultaneously on Tasks
Validation Checks
Prescence Check
Restricted Choice
Field Length
Range Check
Copyright, Designs and Patents Act
Protects the creative work of individuals or businesses by making it a crime for anyone to download their work without paying or permission
Router
Needed to connect two different networks, most commonly a home or business network to the internet
Virus
Program that is written to copy their code into other programs. ‘spread’ themselves
Type of Biometric
Retina Scanning
Fingertip Recognition
Palm Print Recognition
Face Recognition
Lifetime Carbon Footprint of Device
Comes from:
Manufacturing
Use
Disposal
Jpeg
Joint Photographic Experts Group. Uses lossy compression. Supports 24-bit colour
a href=”link”.. Link .. /a
Creates hyperlink to a website
Arithmetic Logic Unit (ALU)
Performs Calculations (x,+,÷)
Makes logic decisions(=,if,>)
Object Field
Stores different types of ‘document’. Could be spreadsheet files, text documents or html webpages
Wireless Connection Disadvnatages
Others can access if connection is insecure
There could be interference from other devices
URL
Uniform Resource Locator. Address of a website
HTML
Hyper Text Markup Language. Most commonly used markup language
Local Disadvantages
You are responsible for backups
Must have system with you to access
Wired Connection Disadvantages
Can leave many wires around an office
Large amount of cabling/network hubs may be needed
Data Protection Act
Aims to protect anyone who has personal information stored on a computer system. Outlines a set of responsibilities for person who stores the data
Mp4
Video equivalent of mp3. Compressed video file
Latest HTML Version
HTML 5
Input Device Examples
Keyboard
Mouse
Track Pad
Webcam
Microphone
Lossless
Method of Compression
- Reduces file size a little
- Little data removed, no visible effect
- Used on TIFF,PNG,GIF
Trojan Horse
Malware that disguises itself as a useful program whilst secretly performing another function
LAN
Local Area Network. A network which covers a small geographical area