Section 4: Applications and Implications of Information and Communication Technology Flashcards

1
Q

Data Communication

A

This is the transmission (movement) of data from one point to another for direct use or for further processing e.g. from one computer to another, from a cell phone to computer or vice-versa, or from a computer to fax machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bandwidth

A

The volume of data that can be transmitted in a given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Narrow-band

A

A Narrow-band channel transmits data at a slow speed of about 10 to 30 characters per second (cps). An example of this is the telegraph system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Voice-band

A

A Voice-band channel transmits data at a rate of 1000 to 8000 cps. An example of this is the telephone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Broadband

A

A Broadband channel transmits large volumes of data at speeds of over 100 000 cps. An example of this is a communication satellite, fibre optic cables, coaxial cable, microwaves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmission media

A

These are the ways and/or materials used to move data. Media can be cabled/wired or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Twisted pair cable

A

Used for home networking where there is no great need for speed. It is a cheap convenient method of connecting computers and peripherals in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Coaxial cable

A

Used in medium-sized networks to transmit voice, video and data at moderate speeds. This is more expensive than twisted pair because the transmission capabilities are higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fibre optic cable

A

Used to transmit large volumes of digital data at extremely high speed virtually error-free. These are relatively expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Communications satellite

A

Communications satellite is a space station that receives microwave signals from an earth-based station, amplifies (strengthens) the signals, and broadcasts the signals back over a wide area to any number of earth-based stations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microwaves

A

Microwaves are radio waves that provide a high speed signal transmission. It is also called fixed wireless and involves sending signals from one microwave station to another. A microwave station is an earth-based reflective dish that contains the antenna, transceivers and other equipment necessary for microwave communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrared

A

Infrared is a wireless transmission medium that sends signals using infrared light waves. Mobile computers and devices , such as mouse, printer, and smart phones often have IrDa ports that enables the transfer of data from one device to another using infrared light waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hot spot

A

Hot spot is a wireless network that provides Internet connections to mobile computers and other devices. They are used by mobile users to check e-mail, browse the Web and access any service on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bluetooth

A

Bluetooth is a standard developed by electronic manufacturers that allow any sort of electronic equipment (computers, digital video cameras, cell phones, PDAs, etc to automatically make their connections without wires, cables or any direct action from a user. One disadvantage of Bluetooth is it cannot transmit signals through walls and distances of over 3 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wi-Fi

A

Wi-Fi is short for wireless fidelity. It is a type of broadband Internet connection that uses radio signals to provide Internet connection to wireless computers and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Communication modes

A

The lines that transmit data are also classified according to the direction in which data flows through them. There are three (3) types of lines:

  • A simplex line permits data to flow in only one direction. You can send data or receive data, but not both.
  • A half-duplex line can alternately send and receive data. That means that at any particular time you can either send data but not receive it, or receive data but not send it.
  • A full-duplex line can simultaneously send and receive data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Networks

A

A network is group of two or more computers linked together so that they can share resources (hardware, software and data) and can communicate with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Local Area Network (LAN)

A

LANs consists of a collection of microcomputers, such as in an office building, department or school that can share peripherals, files and programs and communicate with each other on the network. Each microcomputer that forms part of the network is connected either by cables or by a wireless link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Wide Area Network (WAN)

A

This network connects mainframes, LANs and PCs across a large geographical area such as a city, a country or the world using a combination of many types of media such a telephone lines, cables microwave links, satellite links. WANs are used mainly by universities, research centres and large organizations with branches in different countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Metropolitan Network (MAN)

A

This network connects LANs in a metropolitan area such as a city, state or town. It includes one or more LANs but covers a smaller geographical area than a WAN. It is usually managed by a single network provider that sells the service to users. Telephone companies and cable television operators provide connections to the MAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intranet

A

This network is a micro-version of the Internet within a company or organization. It offers the same features of the global Internet but limited to a small area such as a factory site or an office. Authorized users within the company can use the company’s intranet to find information easily and quickly. The documents in the intranet have links to other documents in the network or outside the wider Internet. This network uses browsers and software just like those used on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Extranet

A

This is an Intranet that allows limited access to it by people outside the company. A company may set up an extranet, for example, to provide technical support information to its customers based on products it sells or services it provides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Internet

A

This is the world’s largest WAN. It is a network of networks that connects computers worldwide via a huge set of telecommunication links. The Internet does not have a central authority. No one is in charge of the Internet.

24
Q

Modem

A

A standard telephone line can transmit only analogue data, whereas data emitted from a computer is in a digital form. A modem (modulator/demodulator) is a device used to convert the digital data emitted from the computer into analogue data that can be transmitted over a telephone line. When the data gets to the other end of the line, a modem converts the analogue data back into digital data for the computer at that end of the line to process. The data transmitted can be sound, pictures, video or text. Modems can be external or internal (attached to the mother board).

25
Q

Browser

A

In order to navigate (go through) the World Wide Web (WWW), you need a web browser. A web browser is a program that resides in your computer and enables you to find, retrieve, view and send hypertext and hypermedia documents over the web. Popular browsers are MS Internet Explorer and Mozilla Firefox.

26
Q

Internet Protocol (IP) addresses

A

Each computer on the Internet has a unique address that identifies it as a node so that information can be sent to it. This unique address is really a number consisting of four sets of up to three digits each, separated by full stops.

27
Q

World Wide Web (WWW)

A

The WWW also called W3 is part of the Internet. It consists of hypertext and hypermedia documents called web pages.

28
Q

Web page

A

This is a collection of text and multimedia documents.

29
Q

Website

A

A group of related web pages on the same web server.

30
Q

Web server

A

A computer that stores and makes available hypertext and hypermedia documents.

31
Q

Hypertext documents

A

A hypertext document is any document that contains hyperlinks to another document located on the same computer or on another computer on another part of the world.

32
Q

Hyperlink

A

This is an element in a document (text or graphics) that allows you to move easily from one document to the next or to another position in the document.

33
Q

Hypermedia

A

Hypermedia is the name given to documents that contains links to text, graphics, sound or video files.

34
Q

Hypertext mark-up language (HTML)

A

This is a programming language used to create hypertext and hypermedia documents. HTML specifies how a web page is structured and how it looks when it is displayed in the browser. HTML is used to create the hyperlinks.

35
Q

Hypertext transfer protocol

A

Hypertext transfer protocol (HTTP) is a set of rules that controls how data travels between the web server and client.

36
Q

Search engines

A

A search engine is also called a web portal. It is a website that allows users to find information quickly and easily. Each search engine has a database (collection) of web documents. Some popular search engines are Yahoo, Excite, MSN, AltaVista, Lycos, Askjeeves and Google.

37
Q

Uniform Resource Locator (URL)

A

This is the address of a website.

38
Q

Data Security

A

This refers to the physical, hardware and software methods used to protect data from unauthorized access and corruption. Data security ensures that data integrity is maintained.

39
Q

Data Integrity

A

This refers to the accuracy and completeness of data as it enters the system and its consistency after it has been processed.

40
Q

Date Security Methods

A

Data security methods may be classified into two types:

  1. Physical access restrictions - Locks, Security guards, Burglar alarms
  2. Software restrictions - Passwords, Firewall, Access logs,
41
Q

Access logs

A

records of system activities – what files are accessed, how often they were accessed and by whom.

42
Q

Data Encryption

A

The scrambling of data during storage or transmission so it cannot be understood by someone who does not have the encryption key or software to convert it back to the original form.

43
Q

Firewall

A

A program, hardware or a combination of both that filters information entering your network, from the Internet.

44
Q

Anti-virus software

A

Software used to remove or deactivate viruses on storage devices such as diskettes, hard disks and memory sticks.

45
Q

Backup

A

A backup file is a copy of a file that you can use if the original file is damaged or not available. It must not be stored on the same storage medium as the original and it should be stored somewhere safe. Backups can be done for a single system or an entire network.

46
Q

Full backup

A

The computer or network can be set up so that it automatically makes a backup of everything on a regular basis.

47
Q

Incremental backup

A

Only the files that have been changed since the last backup is copied. Incremental backups are much quicker than full backups and can be done during normal work.

48
Q

Proprietary software

A

This is software that is owned by a commercial company and available to anyone to buy and use under license.

49
Q

Data privacy

A

This term refers to an individual’s rights to determine what information is stored about them and how that information will be used.

50
Q

Computer Surveillance

A

This involves accessing the storage mechanism of an individual’s computer, or monitoring an individual’s operation of a computer, without their knowledge. It can be done using both hardware and software methods.

51
Q

Hardware Key logging or keystroke logging

A

This is a hardware method of computer surveillance. A key logger is a device that plugs in between your keyboard and computer and stores all data entered using the keyboard in its memory.

52
Q

Spyware

A

This is software used for computer surveillance. It is secretly installed on a computer and covertly monitors the user’s actions without his or her knowledge. It saves its findings on the computer being spied on or transmits them to someone else.

53
Q

Electronic Eavesdropping

A

This is the act of secretly listening to the private conversation of others without their consent.

54
Q

Automated Teller Machine (ATM)

A

This machine, together with a ATM card (debit card) allows you to perform a number of banking transactions (deposit and withdraw money, obtain balances, transfer funds and pay bills), 24 hours a day.

55
Q

E-commerce

A

Electronic commerce consists of buying, selling, marketing and servicing of products and services over computer networks. It also includes the transfer of funds in the buying process.