ISDD Notes lol N5 Flashcards
descending
largest-smallest/last-first; Z-A; 9-0
example of a web browser
internet explorer, Mozilla Firefox and google chrome
example of a compound primary key
Firstname Lastname
ways a virus can affect your computer (3)
deleting and altering files displaying unwanted messages and websites using up storage in your computer system
what do GUIs use? (4)
Windows Icons Menus Pointers
example of a search engine
google, yahoo!, Bing and ask.
Define: standalone
a computer that is not connected to any other computer system
Define: Online fraud/ identity theft
the act of deceiving someone to take advantage of them. catfishing as the person to buy goods
Define: solid state storage
devices that have no moving parts that are more robust
Define: linear navigation
screens are shown in a sequence, one after the other like a PowerPoint
name 4 validation checks
presence, restricted choice, length and range
Define: hierarchical navigation
there is a main page and all the topics are grouped
larger files take
longer time to download and display
example of restricted choice
U, PG, 12, 12A, 15, 18 only
pro and con of wireless
pro- no trailing wires con- less secure and more subject to interference
which storage device has the slowest read/write speed?
CD 7.2MB/s
[use, compressibility, lossy/lossless & size] .bmp
[use, compressibility, lossy/lossless & size] images, no, lossless, very large
Define: database
a structured set of data held in tables
2 5 8 19 34 is in what order
asc
examples of magnetic storage (2)
magnetic tape hard disc drive
what 2 things are illegal because of the computer misuse act
Unauthorised access like hacking. Unauthorised modification, changing data without permission or infecting a computer with a virus deliberately.
Define: client side scripting
processing is done on the user’s computer adding interactivity
Define: compound primary key
a primary key that may have 2 or more parts
databaSeS are good at?
Searching - for a particular record (maybe using AND, OR, NOT operators) Sorting - on a field (ascending or descending)
Define: virus
programs that have been written to copy their code into other programs, meaning they ‘spread’ by themselves
ROM stands for
read only memory
Define: data controller
the person or organisation that stores the data
what does the OS do (5)
provides the HCI to the user provides security keeps track of memory and filing reports errors controls input and output devices
.jpeg meaning
joint photographic experts group
Define: relational database
a database that has more than one table that are linked
the copyright - designs and patents act makes it illegal to (3)
make/run unauthorised copies of software use software without a licence when it requires one plagiarise peoples work
the communications act makes it illegal to: (2)
use other neighbour’s/company’s internet access without permission send offensive electronic messages
.png meaning
portable network graphic
Define: PDF
allows documents to be shared across different computer systems
ascending
smallest-largest/first-last; A-Z; 0-9
Define: search engine
websites that have indexed billions of pages to make it easier to find a specific website in an instant
Define: phishing
an attempt by someone to get you to enter personal information such as usernames, passwords, emails and bank account details
to reduce file size (audio/video)
lower number of samples/frames but quality will decrease too
Define: hacking
a person who gains unauthorised entry to computer systems
Example of ISDD: time field
03:45
pro and con of wired
pro- fast connection speeds con- wires must be installed
Define: Website
a collection of pages with hyperlinks connecting them
[use, compressibility, lossy/lossless & size] .gif
[use, compressibility, lossy/lossless & size] cartoons, logos, buttons; yes; lossless; small
exceptions to rights of data
police and other agencies can refuse access to data if there is a threat to national security
name the 3 types of connections:
wired optical wireless
What does it do: presence check
check data exists in a field - fields may not be left blank
What are the 3 kinds of storage device types?
built in external portable
built in -
internal hard drives
Define: information system
a computerised system which allows users to input and store data, then allows the data to be processed into useful information.
pros of relational(2)
no duplication or inconsistency
Expert User
Can type quickly and are familiar with keyboard commands and shortcuts.
HCI
Human Computer Interface
upload/download speed of cloud and local
cloud depends on internet connection and file sizes local should be instantaneous but may take longer from backing storage
utility programs or security suites features: (3/4/5)
anti-virus software backup storage disk defragmentation software updates data deletion encryption/decryption system clean-up security formatting
a field is a row or column?
column
z u t s q k is in what order
desc
Define: foreign key
a field, usually a primary key in another table used to form a link
price of using cloud and local
cloud can be expensive to store data on local has no cost
example of range check
drivers must be >25 and <70 to hire a car
Define: network
two or more computer systems connected to allow them to communicate and share information
Novice User
requires a HCI which allow less confident users to use the system. Usually uses a GUI.
what does R data mean?
data can be written once and only once
Define: record
a record contains all the data held for a particular subject (e.g. person).
graphic formats (4)
jpeg, bmp, gif, png
Define: external link
will link you to another website
audio formats (2)
wav, mp3
what does html do
processes and present text and graphics on a web page
[use, compressibility, lossy/lossless & size] .jpeg
[use, compressibility, lossy/lossless & size] images, yes, lossy, large
Pros of information systems (3)
saves using paper - saves money and space quicker and easier to search and sort data than going through paper sheets. reports are easy and quick to prepare and can be easily tailored to the users needs
www
world wide web
Define: surrogate primary key
a key that has been made up for each record
example of presence check
primary key
portable -
flash drives and CDs
which storage device stores the most?
solid state hard disc 512 GB / (magnetic hard disc 4TB)
storage devices each have different (4)
Capacity Accessibility Portability Speed of access
pro and con of optical
pro- high speed connection con- expensive
Health and Safety at Work Act means employers must: (6)
provide regular eye tests for staff who work on systems provide suitable lighting provide adjustable seating with posture support provide equipment like adjustable screens and ergonomic devices to reduce the chance of repetitive strain injury provide regular breaks tidy wires away to prevent injury
examples of optical storage (3)
CDs, DVDs, Blu-ray
Define: optical storage
makes use of a laser to shine and reflect light to read data stored
how do you test the user interface design? (web, 4)
if it matches specifications check for spelling errors scroll, audio/video, buttons work consistency
html means
hyper text mark-up language
Define: data subject
the person who the data is stored about
Define: field
an item of data for a record (e.g. name, address).
.pdf meaning
portable document format
Define: cloud storage + its accessibility
storage that can be uploaded to a web server. can be accessed as long as you have internet. PORTABLE
What does it do: restricted choice
choose from a list
to reduce carbon footprint (3)
use energy saving equipment put documents online rather than printing and email instead of letters recycling old unwanted computers
Define: lossless compression
no data is lost and original can be restored
each page on a website has its own
URL
security risk! data can be: (5)
corrupted, lost, deleted, hacked, damaged
name 5 tags from html
there are more
Define: server side scripting
processing is done on the web server and sends page to user
Define: web browser
a software application used to navigate the www letting you retrieve and view information
Define: DOS attacks
Denial of Service attacks are where the attacker creates a program to flood the server with many requests for data from websites. this means genuine visitors cannot access it and as a consequence, companies can lose a lot of money.
a d g j p t y is in what order
asc
the more processors on the chip (core) the -
more powerful the computer and the more tasks it can complete at once
Define: file
a collection of related records
external -
large capacity network drives
[use, compressibility, lossy/lossless & size] .png
[use, compressibility, lossy/lossless & size] web images, yes, lossless, medium
link field can link to? (3)
to another file, email or web address
name 2/3 output devices
monitor speaker printer projector plotter
.RTF
rich text format - supports some formatting such as bold and underline; can also include images
Define: trojan
pretends to be a useful program but is secretly performing another function like monitoring your activity
Define: hyperlinks
allow you to link to other pages
Example of ISDD: calculated field
total = cost1 + cost2
Define: spyware
programs that secretly record what you do on your computer. usually used to get passwords and bank details
resolution =
spacing of pixels, measured in dpi
name 3/4 input devices
keyboard mouse track pad graphics tablet webcam microphone scanner
frequency of backups cloud and local
cloud will regularly back up meaning you dont have to save it yourself local means you are responsible for backup copies required
Define: P2P
a peer to peer network is where all the connected computers are of equal status and connect with all the other computers in a ring
Define: Update error
if there is more than one record with the same address and it needs updated - therefore all records (with the same address) need updated
example of a surrogate primary key
SQA number
Define: Deletion error
deleting a record may remove more data than expected
Example of ISDD: date field
6/03/2018
energy use measures to use less energy for companies: (3)
computer systems should be turned off when not in use low energy ‘green machines’ should be used when possible power saving modes should be used to cut down on electricity
disposal measures of IT equipment (3)
old electronic equipment should be disposed of properly companies need to erase sensitive information on equipment before disposal companies who make or sell equipment must provide ways for their customers to dispose of the equipment
Example of ISDD: boolean field
true/false yes/no
a firewall controls -
incoming and outgoing traffic and checks if it should be allowed through or not.
name 2 devices that are both input and output
touchscreen interactive white board games controller haptic glove
how do you test linking and navigation? (web, 3)
making sure there aren’t broken links transitions are smooth hyperlinks work correctly
sharing resources in p2p and client server
client: all clients access the same p2p: each workstation has its own resources
What does it do: length check
checks how many characters are needed or are allowed in a field
data users must (5)
have the subjects agree to the data used it must be for the stated purpose Secure the data from being hacked Accurate - check it is and up to date Delete the data when it is no longer needed
Define: LAN
Local Area Network where the network exists in a single building or organisation
video formats (2)
mp4, avi
as # of samples/frames increase
quality increases; file size increases
name all 6 storage devices
magnetic hard disc USB DVD CD solid state hard disc memory card
RW stands for
rewritable
GUIs
graphical user interfaces
name 5 ISDD field types
any 5 from: text number(real or integer) date/time graphic object (OLE) calculated link boolean
Example of ISDD: number field
INTEGER(WHOLE): 1,67,4324 REAL(DECIMAL): 1.23, 658.232
cons of flat file(2)
when data is changed it may become inconsistent and duplicated in some cases.
doubling resolution
makes the file size quadruple
.bmp meaning
bitmap
Define: GUIs
make it easier for users to see software and access information
Define: lossy compression
data is lost and cannot be restored
the data subject has the right to (3)
see the data held on them have it correct if incorrect be awarded compensation if they have suffered as a result of wrong data
a relational database uses what to link tables
foreign keys
Define: local storage + its accessibility
storage that is used on the computer system you are using. the files are stored on the hard drive of that computer system and can only be accessed on it. MAY BE PORTABLE DEPENDING ON STORAGE DEVICE
Define: internal link
will link you to a page on the same website
good ISDD design avoids (3)
modification errors (insertion errors, update errors deletion errors)
What does it do: range check
checks data is within limits
what do scripting languages do (when implemented)
they tailor the system to the specific need of users and add functionality
which storage device has the fastest read/write speed?
magnetic hard disc 140MB/s
Define: Insertion error
when there is more than one copy of a record due to error
a good user interface considers these: (6)
Selection Consistency Readability Interactivity Navigation Visual layout
Define: flat file database
a database with a single table
networks allow us to (3)
communicate share hardware and software
why do we compress files?
less backing storage is needed it is faster to download from the internet
file size can be reduced by (3)
decreasing resolution (dpi) decreasing colour depth using compression
what is stored in ROM
programs like the operating system
Pro of biometrics (2)
avoids having to remember passwords hard to forge
examples of solid state storage (3)
USBs, memory cards, solid state hard drives
Example of ISDD: text field
text, symbols, numbers (anything you can type)
Define: URL
the uniform resource locator is the location of the page
Define: magnetic storage
uses magnetisable coating with dots on the surface is readable by small electromagnets.
Define: worms
copy themselves over and over again using all the storage space available
900 87 76 25 23 12 is in what order
desc
Define: client server
the server provides data and files for all the computers
Define: data users
the people who use the data
R stands for
recordable
sound/video is stored as
a number of samples/frames played one after the other
a record is a row or column?
row
.gif meaning
graphic interchange format
security in p2p and client server
client: usernames and passwords required to login p2p: difficult to manage and individual usernames and passwords for each system.
Define: SSL protocol
Secure sockets layer protocol is a method of creating encrypted connections for sending personal data.
the data controller must (3)
register with the data protection commissioner apply for permission to store the data state what they want to keep, the purpose of it and who is accessing it.
.txt
unformatted text - transferable and many devices recognise it
Define: keylogging
all the keys you press are recorded and sent back to the programmer
which storage device stores the least?
CD 700MB / (magnetic hard disc 500 MB)
Define: primary key
identifies one unique record