Information System Design and Development Flashcards
Malware
Short for malicious software. Designed to disrupt or damage a computer system
Interface
Combination of hardware and software that allows the processor and peripherals to communicate
Biometrics
Makes use of our unique physical characteristics and features to identify us
Range Check
Makes sure data is entered within certain limits
Network Hardware
Network Interface Card
Router
Hub
Switch
Solid State Devices
SD cards
USB flash drives
WAN
Wide Area Network. Covers a large geographical area
External Hyperlink
Direct user to a different page on a different website
Bit Depth
Representation of how many colours each pixel can store.
No. of colours = 2n where n is bit-depth
Prescence Check
Makes the person using the database enter something in this field. Cannot be left blank!
Foreign Key
A primary key from one table that appears in another table to link the two together
Reducing Carbon Footprint
Install equipment which reduces emissions
Generate your own renewable energy
File
Stores all the information on a particular subject. It is made up of records.
Field
Stores one particular piece of information about all the people/things
img src=”image” alt=”image”
Adds image to webpage. If image doesn’t display, text displayed instead
Input AND Output Devices
Touchscreen
Interactive White Board
Games Controller
Interface Examples
USB 2.0 + 3.0
Firewire 800
Thunderbolt
Local Advantages
One fixed price
Upload/Download almost instantaneous
Human Computer Interface (HCI)
Things like windows, menus, icons and pointers
Keylogger Security Risk
Programmer can gain access to:
- Usernames
- Passwords
- Credit Card Numbers
- Email Addresses
Capacity
How much data a storage device can store
Output Device
Devices the computer system uses to send out or display information from the processor
Trojan Horse Examples
‘Free’ online games you can download
Browser helper toolbars
Antivirus Software
Cloud Storage
Storage you can upload onto a web server
Rtf
Rich Text Format. Stores text and formatting information
p…./p
States where new paragraphs of text begin and end
Reducing Typing in Forms
Radio Buttons
Calender Picker
Autocomplete
HTML uses
Set where text should be placed
Describe the structure of text
Create hyperlinks
Embed Images
Create sections within the page
Field Length
Restricts the number of characters user is able to type
Magnetic Storage
Magnetic Tape
Hard Disk Drive
Restricted Choice
Cuts down on mistakes by only letting you select an option from a menu or list
Svg
Scalable Vector Graphics.
Lossy
Method of compression
- Reduces file size substantially
- Media becomes very pixelated the more it’s compressed
- Used on JPEG files
Txt
Plain text file. Only stores text, meaning formatting isn’t saved
Recycling
Computers contain finite resources like gold, silver and palladium. To sustain our use of these devices, materials need to be recovered and reused
Networks Allow People To
Send/Recieve emails
Share Peripherals (printer)
Work Simultaneously on Tasks
Validation Checks
Prescence Check
Restricted Choice
Field Length
Range Check
Copyright, Designs and Patents Act
Protects the creative work of individuals or businesses by making it a crime for anyone to download their work without paying or permission
Router
Needed to connect two different networks, most commonly a home or business network to the internet
Virus
Program that is written to copy their code into other programs. ‘spread’ themselves
Type of Biometric
Retina Scanning
Fingertip Recognition
Palm Print Recognition
Face Recognition
Lifetime Carbon Footprint of Device
Comes from:
Manufacturing
Use
Disposal
Jpeg
Joint Photographic Experts Group. Uses lossy compression. Supports 24-bit colour
a href=”link”.. Link .. /a
Creates hyperlink to a website
Arithmetic Logic Unit (ALU)
Performs Calculations (x,+,÷)
Makes logic decisions(=,if,>)
Object Field
Stores different types of ‘document’. Could be spreadsheet files, text documents or html webpages
Wireless Connection Disadvnatages
Others can access if connection is insecure
There could be interference from other devices
URL
Uniform Resource Locator. Address of a website
HTML
Hyper Text Markup Language. Most commonly used markup language
Local Disadvantages
You are responsible for backups
Must have system with you to access
Wired Connection Disadvantages
Can leave many wires around an office
Large amount of cabling/network hubs may be needed
Data Protection Act
Aims to protect anyone who has personal information stored on a computer system. Outlines a set of responsibilities for person who stores the data
Mp4
Video equivalent of mp3. Compressed video file
Latest HTML Version
HTML 5
Input Device Examples
Keyboard
Mouse
Track Pad
Webcam
Microphone
Lossless
Method of Compression
- Reduces file size a little
- Little data removed, no visible effect
- Used on TIFF,PNG,GIF
Trojan Horse
Malware that disguises itself as a useful program whilst secretly performing another function
LAN
Local Area Network. A network which covers a small geographical area
Password Flaws
Users often have simple passwords that are easy to guess
Users often have the same password for multiple accounts
Computer programs can randomly generate millions of passwords and unlock them
Can be forgotten
Record
Stores all the information about one person/thing. It usually consists of several different fields
Primary Key
Used to uniquely identify every record in the database
Gif
Graphics Interchange Format. Lossless Compression. Supports 8 bit colour. Designed for internet transfer of images
Vector Graphics
Stores a series of attributes (size,colour,location) about shapes.
Advantages:
- Can zoom in without losing quality
- Smaller storage size
Disadvantages:
- Can’t be as easily manipulated at pixel level,not very detailed
- Can’t represent many irregular shapes that can be drawn
Wav
Uncompressed Audio File. Higher quality but greater file size
Cloud Advantages
Regularly backed up. Don’t have to save it yourself.
Can access anywhere with internet
Operating System
Controls all the different tasks a computer system carries out:
- Providing human computer interface to user
- Providing Security
- Keeping track of filing system and where items are stored in memory
- Controlling Input and Output devices
Markup Languages
Used to tell a browser how to set out a web page
Complex Sort
Sort which takes place in more than one field
Wired Connection Advantages
Normally more secure
Connection speed normally faster
Phishing
Attempt by someone to get you to send personal information to them
Internal Hyperlink
Directs user to a different page on the same website
Methods of Reducing Energy Use
Use energy efficient monitors
Reduce brightness on monitors
Activate standby settings on monitors after 15 minutes of inactivity
Activate sleep/standby settings for laptop/desktop
Only switch peripherals on when needed
Text Field
Stores words, numbers and other characters. Similar to a string variable
Electronic Database Advantages
Easy to add new information
Easy to sort information
Easy to search information
Takes up very little space
Calculated Field
Could have type like number/text. Database works out what to put in there using a formula usually based on the contents of other fields in the record
Computer Misuse Act
Determines whether people are allowed to access computers and modify the data on the system
Regulation of Investigatory Powers Act (RIPA)
Allows security organisations such as MI5 to monitor peoples emails etc.
Clock Speed
Measured in Herts(Hz). Good indication of how quickly a processor can complete tasks
Registers
Temporary storage locations within the processor
Stores addresses, data or instructions
Increase Interactivity
Include sounds, animations, images
Avoid long passages of text
Use quizzes, polls and games
Wireless Connection Advantages
No wires to be stood on/tripped over
Connection can be made anywhere
Firewalls
Used to check packets of data as they are received by a computer system. If packet is not acceptable it’s not allowed to pass
True Colour
24 bit-depth image that can store around 16 million colours. Contains more colours than the human eye can detect.
DVD-R
Recordable. Data can be written on this device once
RAM
Random Access Memory. Data that will be processed by the processor is temporarily stored in RAM. When program is closed or computer shuts down the data held in RAM is deleted
Avi
Uncompressed video format used by Microsoft
Anti-Virus Software
Helps protect computer from threat of viruses by:
- Scanning files for known virus signatures
- Performing calculations on files to check for unauthorised changes
- Monitoring main memory for files behaving like a virus
Number
Stores whole numbers (integers) and decimal (real) numbers
Interface Jobs
Buffering/Compensating for different speeds in devices
Data format Conversion(Digital-Analogue,Parrallel-Serial,Wired-Wireless)
Handling status signals from peripherals
Solid State Storage
No moving parts.
- Smaller
- Use less battery power
- More robust
Bandwith
Data transfe rate when sending data on a computer network. Speeds in megabits(Mb)
Processor
Part of the computer system that handles the instructions used to ensure the hardware and software responds as expected
Optical Storage
Makes use of a laser to shine and reflect lights to read the data stored.
- CD’s
- DVD’s
- Blu-Ray
Flat File Database
Consists of one table. As a result it may have data which is unecessarily repeated several times in the same table
Types of Malware
Viruses
Trojan Horses
Worms
Spyware
Link Field
Allows user to click link which takes them to a specific place
Identity Theft
Someone else pretends to be you
Piggybacking
Using someone elses wifi
h1 …. /h1
#
Creates headings. h1 largest, h6 smallest
Internet
A network of networks all connected together. Allows us to access informationon other computer systems
Graphics Calculations
Dimensions - length x breadth x bit depth
DPI - length x breadth x dpi2 x bit depth
- Divide by 8 to get size in Bytes(B)
- DIvide by 1024 to get size in Kilobytes(kB)
- Divide by 1024 to get size in Megabytes(MB)
- Divide by 1024 to get size in Gigabytes(GB)
DVD-RW
Rewritable. Data can be written on this device and then changed several times
Date Field
Stores dates like someones D.O.B
Improving Readability
Break up long passages of text, using headings and subheadings
Use readable fonts and font sizes
Use quizzes, polls and games
Getting a Virus
Downloading movies/games from pirate websites
Using infected CDs/USB flash drives
Opening links in emails fom untrustworthy sources
Downloading infected files in email atttachments
Mp3
Compressed audio file. Smaller file size but lower quality
ROM
Read Only Memory. Data on this device is permanent and connot be changed
Computer Misuse Act Implications
Makes ‘Unauthorised Access’ illegal
‘Unauthorised Access’ with intent to commit further offences treated as a more serious crime.
Storage Devices
USB Memory Stick
Cloud-based Services
Writable DVD/CD
External Hard Drive
Keylogger
Records all the keys pressed on your computer system
Files can be
Corrupted
Lost
Destroyed
Deleted
Hacked
Damaged
Communications Act Protects Against
Piggybacking
Threatening behaviour online
Offensive and Indecent Images
Hacker
Someone who tries to gain access to a computer system without permission
Control Unit
Controls all the other parts of the processor and makes sure instructions are executed in the correct order. Responsible for managing the clock and the read, write, reset and interrupt lines
Boolean
Stores two data options (Yes/No, True/False)
Relational Database
Two different tables linked by a foreign key
Switch
Designed to make sure data can be sent around a network. More efficient than a hub as uses MAC address to make sure data packets are only sent to certain devices
Time Field
Stores a specific time
Optical
Data sent through strands of glass
Incredibly fast transfer speeds
Copyright, Designs and Patents Act Protects Against
Software Piracy
Use of software without relevant liscense
Theft of Intellectual property
Using/Downloading images without copyright holder’s permisiion
Illegal Download of Video and Audio Files
Getting a Keylogger
Can be installed by viruses or trojan horses. Can also be plugged between USB socket and keyboard USB
Data Holder Requirements
Store Data no longer than necessary
Takes measures to protect users’ data(passwords, encryption)
Store only relevant information
Ensure data is accurate and up to date
Only use data for purpose agreed wih user
Bitmap Graphic
The colour of every individual pixel is stored in a 2D array
link href=”theme.css” rel=”stylesheet” type=”text/css” /
Links to a CSS file
Hub
Takes data it receives from the router or server and sends it to every device its connected to.
Innefficient and increases network traffic
Data Subject Rights
Allowed to see any information held on them
Can sk to have data changed if they feel it;s incorrect
Claim compensation if rights are broken
Prevent auomated decision making
Graphic Field
Stores pictures and images
Input Devices
Anything that is used to control a computer system or to send data to it
Best Password Format
Choose at least 8 characters, with upper and lower case, a special symbol and a numeric character
Online Fraud
Deceiving someone to take advantage of them online. Often getting personal details and credit card numbers to use maliciously
Network
Two or more computer systems connected to allow them to communicate and share information
Local Storage
A storage device that is used on the computer system you are working on
How Viruses Affect your System
Deleting and Altering files
Displaying unwanted sounds and messages (pop ups)
Redirecting weblinks to web sites you don’t intend to visit
Copying themselves and using up resources
Complex Search
Search which takes place in more than one field
Hyperlink
Used to move around the web from page to page
Web Browser
Downloads pages from a web server and then interprets the code to run the commands used to generate the web page
Output Device Examples
Monitor
Speaker
Printer
Projector
Cloud Disadvantages
Can’t access if website is down
May come with cost-per-storage
Upload/Download speed depends on connection. Large files may take a long time
Ways to Spot Phishing Scams
Spelling errors
Lack of personalisation
Link appears to go to one site but directs to another
Denial of Service (DoS)
Attempt to prevent legitimate users from accessing a server by one computer
DDoS
Attempt to prevent legitimate users from accessing a server by multiple computers
Relative Links
Link to a location in the same directory. Usually shorter (e.g. /picture1.jpeg)
Absolute Links
Completely fixed. Do not change and point to a specific location to access
(e.g. http://www.bbc.co.uk/scotland/)
Client-Server
The relationship between two computers in which one, the client, makes a service request from another, the server.
Peer to Peer
No single provider is responsible for being the server.