Information System Design and Development Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Malware

A

Short for malicious software. Designed to disrupt or damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interface

A

Combination of hardware and software that allows the processor and peripherals to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometrics

A

Makes use of our unique physical characteristics and features to identify us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Range Check

A

Makes sure data is entered within certain limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Hardware

A

Network Interface Card

Router

Hub

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Solid State Devices

A

SD cards

USB flash drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WAN

A

Wide Area Network. Covers a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

External Hyperlink

A

Direct user to a different page on a different website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bit Depth

A

Representation of how many colours each pixel can store.

No. of colours = 2n where n is bit-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prescence Check

A

Makes the person using the database enter something in this field. Cannot be left blank!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Foreign Key

A

A primary key from one table that appears in another table to link the two together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reducing Carbon Footprint

A

Install equipment which reduces emissions

Generate your own renewable energy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File

A

Stores all the information on a particular subject. It is made up of records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Field

A

Stores one particular piece of information about all the people/things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

img src=”image” alt=”image”

A

Adds image to webpage. If image doesn’t display, text displayed instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Input AND Output Devices

A

Touchscreen

Interactive White Board

Games Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Interface Examples

A

USB 2.0 + 3.0

Firewire 800

Thunderbolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Local Advantages

A

One fixed price

Upload/Download almost instantaneous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Human Computer Interface (HCI)

A

Things like windows, menus, icons and pointers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Keylogger Security Risk

A

Programmer can gain access to:

  • Usernames
  • Passwords
  • Credit Card Numbers
  • Email Addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Capacity

A

How much data a storage device can store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Output Device

A

Devices the computer system uses to send out or display information from the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trojan Horse Examples

A

‘Free’ online games you can download

Browser helper toolbars

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud Storage

A

Storage you can upload onto a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Rtf

A

Rich Text Format. Stores text and formatting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

p…./p

A

States where new paragraphs of text begin and end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Reducing Typing in Forms

A

Radio Buttons

Calender Picker

Autocomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HTML uses

A

Set where text should be placed

Describe the structure of text

Create hyperlinks

Embed Images

Create sections within the page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Field Length

A

Restricts the number of characters user is able to type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Magnetic Storage

A

Magnetic Tape

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Restricted Choice

A

Cuts down on mistakes by only letting you select an option from a menu or list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Svg

A

Scalable Vector Graphics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Lossy

A

Method of compression

  • Reduces file size substantially
  • Media becomes very pixelated the more it’s compressed
  • Used on JPEG files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Txt

A

Plain text file. Only stores text, meaning formatting isn’t saved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Recycling

A

Computers contain finite resources like gold, silver and palladium. To sustain our use of these devices, materials need to be recovered and reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Networks Allow People To

A

Send/Recieve emails

Share Peripherals (printer)

Work Simultaneously on Tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Validation Checks

A

Prescence Check

Restricted Choice

Field Length

Range Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Copyright, Designs and Patents Act

A

Protects the creative work of individuals or businesses by making it a crime for anyone to download their work without paying or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Router

A

Needed to connect two different networks, most commonly a home or business network to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Virus

A

Program that is written to copy their code into other programs. ‘spread’ themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Type of Biometric

A

Retina Scanning

Fingertip Recognition

Palm Print Recognition

Face Recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Lifetime Carbon Footprint of Device

A

Comes from:

Manufacturing

Use

Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Jpeg

A

Joint Photographic Experts Group. Uses lossy compression. Supports 24-bit colour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

a href=”link”.. Link .. /a

A

Creates hyperlink to a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Arithmetic Logic Unit (ALU)

A

Performs Calculations (x,+,÷)

Makes logic decisions(=,if,>)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Object Field

A

Stores different types of ‘document’. Could be spreadsheet files, text documents or html webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Wireless Connection Disadvnatages

A

Others can access if connection is insecure

There could be interference from other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

URL

A

Uniform Resource Locator. Address of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

HTML

A

Hyper Text Markup Language. Most commonly used markup language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Local Disadvantages

A

You are responsible for backups

Must have system with you to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Wired Connection Disadvantages

A

Can leave many wires around an office

Large amount of cabling/network hubs may be needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Data Protection Act

A

Aims to protect anyone who has personal information stored on a computer system. Outlines a set of responsibilities for person who stores the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Mp4

A

Video equivalent of mp3. Compressed video file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Latest HTML Version

A

HTML 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Input Device Examples

A

Keyboard

Mouse

Track Pad

Webcam

Microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Lossless

A

Method of Compression

  • Reduces file size a little
  • Little data removed, no visible effect
  • Used on TIFF,PNG,GIF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Trojan Horse

A

Malware that disguises itself as a useful program whilst secretly performing another function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

LAN

A

Local Area Network. A network which covers a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Password Flaws

A

Users often have simple passwords that are easy to guess

Users often have the same password for multiple accounts

Computer programs can randomly generate millions of passwords and unlock them

Can be forgotten

60
Q

Record

A

Stores all the information about one person/thing. It usually consists of several different fields

61
Q

Primary Key

A

Used to uniquely identify every record in the database

62
Q

Gif

A

Graphics Interchange Format. Lossless Compression. Supports 8 bit colour. Designed for internet transfer of images

63
Q

Vector Graphics

A

Stores a series of attributes (size,colour,location) about shapes.

Advantages:

  • Can zoom in without losing quality
  • Smaller storage size

Disadvantages:

  • Can’t be as easily manipulated at pixel level,not very detailed
  • Can’t represent many irregular shapes that can be drawn
64
Q

Wav

A

Uncompressed Audio File. Higher quality but greater file size

65
Q

Cloud Advantages

A

Regularly backed up. Don’t have to save it yourself.

Can access anywhere with internet

66
Q

Operating System

A

Controls all the different tasks a computer system carries out:

  • Providing human computer interface to user
  • Providing Security
  • Keeping track of filing system and where items are stored in memory
  • Controlling Input and Output devices
67
Q

Markup Languages

A

Used to tell a browser how to set out a web page

68
Q

Complex Sort

A

Sort which takes place in more than one field

69
Q

Wired Connection Advantages

A

Normally more secure

Connection speed normally faster

70
Q

Phishing

A

Attempt by someone to get you to send personal information to them

71
Q

Internal Hyperlink

A

Directs user to a different page on the same website

72
Q

Methods of Reducing Energy Use

A

Use energy efficient monitors

Reduce brightness on monitors

Activate standby settings on monitors after 15 minutes of inactivity

Activate sleep/standby settings for laptop/desktop

Only switch peripherals on when needed

73
Q

Text Field

A

Stores words, numbers and other characters. Similar to a string variable

74
Q

Electronic Database Advantages

A

Easy to add new information

Easy to sort information

Easy to search information

Takes up very little space

75
Q

Calculated Field

A

Could have type like number/text. Database works out what to put in there using a formula usually based on the contents of other fields in the record

76
Q

Computer Misuse Act

A

Determines whether people are allowed to access computers and modify the data on the system

77
Q

Regulation of Investigatory Powers Act (RIPA)

A

Allows security organisations such as MI5 to monitor peoples emails etc.

78
Q

Clock Speed

A

Measured in Herts(Hz). Good indication of how quickly a processor can complete tasks

79
Q

Registers

A

Temporary storage locations within the processor

Stores addresses, data or instructions

80
Q

Increase Interactivity

A

Include sounds, animations, images

Avoid long passages of text

Use quizzes, polls and games

81
Q

Wireless Connection Advantages

A

No wires to be stood on/tripped over

Connection can be made anywhere

82
Q

Firewalls

A

Used to check packets of data as they are received by a computer system. If packet is not acceptable it’s not allowed to pass

83
Q

True Colour

A

24 bit-depth image that can store around 16 million colours. Contains more colours than the human eye can detect.

84
Q

DVD-R

A

Recordable. Data can be written on this device once

85
Q

RAM

A

Random Access Memory. Data that will be processed by the processor is temporarily stored in RAM. When program is closed or computer shuts down the data held in RAM is deleted

86
Q

Avi

A

Uncompressed video format used by Microsoft

87
Q

Anti-Virus Software

A

Helps protect computer from threat of viruses by:

  • Scanning files for known virus signatures
  • Performing calculations on files to check for unauthorised changes
  • Monitoring main memory for files behaving like a virus
88
Q

Number

A

Stores whole numbers (integers) and decimal (real) numbers

89
Q

Interface Jobs

A

Buffering/Compensating for different speeds in devices

Data format Conversion(Digital-Analogue,Parrallel-Serial,Wired-Wireless)

Handling status signals from peripherals

90
Q

Solid State Storage

A

No moving parts.

  • Smaller
  • Use less battery power
  • More robust
91
Q

Bandwith

A

Data transfe rate when sending data on a computer network. Speeds in megabits(Mb)

92
Q

Processor

A

Part of the computer system that handles the instructions used to ensure the hardware and software responds as expected

93
Q

Optical Storage

A

Makes use of a laser to shine and reflect lights to read the data stored.

  • CD’s
  • DVD’s
  • Blu-Ray
94
Q

Flat File Database

A

Consists of one table. As a result it may have data which is unecessarily repeated several times in the same table

95
Q

Types of Malware

A

Viruses

Trojan Horses

Worms

Spyware

96
Q

Link Field

A

Allows user to click link which takes them to a specific place

97
Q

Identity Theft

A

Someone else pretends to be you

98
Q

Piggybacking

A

Using someone elses wifi

99
Q

h1 …. /h1

#

A

Creates headings. h1 largest, h6 smallest

100
Q

Internet

A

A network of networks all connected together. Allows us to access informationon other computer systems

101
Q

Graphics Calculations

A

Dimensions - length x breadth x bit depth

DPI - length x breadth x dpi2 x bit depth

  1. Divide by 8 to get size in Bytes(B)
  2. DIvide by 1024 to get size in Kilobytes(kB)
  3. Divide by 1024 to get size in Megabytes(MB)
  4. Divide by 1024 to get size in Gigabytes(GB)
102
Q

DVD-RW

A

Rewritable. Data can be written on this device and then changed several times

103
Q

Date Field

A

Stores dates like someones D.O.B

104
Q

Improving Readability

A

Break up long passages of text, using headings and subheadings

Use readable fonts and font sizes

Use quizzes, polls and games

105
Q

Getting a Virus

A

Downloading movies/games from pirate websites

Using infected CDs/USB flash drives

Opening links in emails fom untrustworthy sources

Downloading infected files in email atttachments

106
Q

Mp3

A

Compressed audio file. Smaller file size but lower quality

107
Q

ROM

A

Read Only Memory. Data on this device is permanent and connot be changed

108
Q

Computer Misuse Act Implications

A

Makes ‘Unauthorised Access’ illegal

‘Unauthorised Access’ with intent to commit further offences treated as a more serious crime.

109
Q

Storage Devices

A

USB Memory Stick

Cloud-based Services

Writable DVD/CD

External Hard Drive

110
Q

Keylogger

A

Records all the keys pressed on your computer system

111
Q

Files can be

A

Corrupted

Lost

Destroyed

Deleted

Hacked

Damaged

112
Q

Communications Act Protects Against

A

Piggybacking

Threatening behaviour online

Offensive and Indecent Images

113
Q

Hacker

A

Someone who tries to gain access to a computer system without permission

114
Q

Control Unit

A

Controls all the other parts of the processor and makes sure instructions are executed in the correct order. Responsible for managing the clock and the read, write, reset and interrupt lines

115
Q

Boolean

A

Stores two data options (Yes/No, True/False)

116
Q

Relational Database

A

Two different tables linked by a foreign key

117
Q

Switch

A

Designed to make sure data can be sent around a network. More efficient than a hub as uses MAC address to make sure data packets are only sent to certain devices

118
Q

Time Field

A

Stores a specific time

119
Q

Optical

A

Data sent through strands of glass

Incredibly fast transfer speeds

120
Q

Copyright, Designs and Patents Act Protects Against

A

Software Piracy

Use of software without relevant liscense

Theft of Intellectual property

Using/Downloading images without copyright holder’s permisiion

Illegal Download of Video and Audio Files

121
Q

Getting a Keylogger

A

Can be installed by viruses or trojan horses. Can also be plugged between USB socket and keyboard USB

122
Q

Data Holder Requirements

A

Store Data no longer than necessary

Takes measures to protect users’ data(passwords, encryption)

Store only relevant information

Ensure data is accurate and up to date

Only use data for purpose agreed wih user

123
Q

Bitmap Graphic

A

The colour of every individual pixel is stored in a 2D array

124
Q

link href=”theme.css” rel=”stylesheet” type=”text/css” /

A

Links to a CSS file

125
Q

Hub

A

Takes data it receives from the router or server and sends it to every device its connected to.

Innefficient and increases network traffic

126
Q

Data Subject Rights

A

Allowed to see any information held on them

Can sk to have data changed if they feel it;s incorrect

Claim compensation if rights are broken

Prevent auomated decision making

127
Q

Graphic Field

A

Stores pictures and images

128
Q

Input Devices

A

Anything that is used to control a computer system or to send data to it

129
Q

Best Password Format

A

Choose at least 8 characters, with upper and lower case, a special symbol and a numeric character

130
Q

Online Fraud

A

Deceiving someone to take advantage of them online. Often getting personal details and credit card numbers to use maliciously

131
Q

Network

A

Two or more computer systems connected to allow them to communicate and share information

132
Q

Local Storage

A

A storage device that is used on the computer system you are working on

133
Q

How Viruses Affect your System

A

Deleting and Altering files

Displaying unwanted sounds and messages (pop ups)

Redirecting weblinks to web sites you don’t intend to visit

Copying themselves and using up resources

134
Q

Complex Search

A

Search which takes place in more than one field

135
Q

Hyperlink

A

Used to move around the web from page to page

136
Q

Web Browser

A

Downloads pages from a web server and then interprets the code to run the commands used to generate the web page

137
Q

Output Device Examples

A

Monitor

Speaker

Printer

Projector

138
Q

Cloud Disadvantages

A

Can’t access if website is down

May come with cost-per-storage

Upload/Download speed depends on connection. Large files may take a long time

139
Q

Ways to Spot Phishing Scams

A

Spelling errors

Lack of personalisation

Link appears to go to one site but directs to another

140
Q

Denial of Service (DoS)

A

Attempt to prevent legitimate users from accessing a server by one computer

141
Q

DDoS

A

Attempt to prevent legitimate users from accessing a server by multiple computers

142
Q

Relative Links

A

Link to a location in the same directory. Usually shorter (e.g. /picture1.jpeg)

143
Q

Absolute Links

A

Completely fixed. Do not change and point to a specific location to access

(e.g. http://www.bbc.co.uk/scotland/)

144
Q

Client-Server

A

The relationship between two computers in which one, the client, makes a service request from another, the server.

145
Q

Peer to Peer

A

No single provider is responsible for being the server.