Term 1 Flashcards
What is a CVS file? (comma separated values)
Takes data in table and saves it in text form, separates items with commas.
What is a txt file?
Not formatted can be opened in any word processor.
What is rich text formatting? (rtf)
Only save some of the formatting within text
What is graphics interchange format? (Gif)
Stores still or moving images using smaller file size.
What is joint Photographic expert group? (jpg)
Stores still images only - not moving
What is portable document format? (pdf)
Document converted into images read on most computers. Can protect document
-pdf software writing can be used for editing.
What is a portable network graphics? (PNG)
Compress image files without loss of image quality (lossless compression)
What is moving picture experts group layer 4? (MP4)
Can store video, still images, audio
-used to transfer video files on the internet.
What is moving picture experts group layer 3? (MP3)
-stores audio files
-no images
-small file sizes
What is a cascading style sheet? (CSS)
Attached to webpages to define formatting
What is a ZIP? (zipped file)
-files in compressed format
-saves storage, space and reduces transmission time.
Why reduce files sizes?
-Limited storage, efficient use is important
-speed at which files are transmitted, depends on the size
-the larger the file size the more time it takes to send
What is resizing and resampling?
-resizing changes the dimensions
-resampling changes the quality
What are some solutions to ye strain because of computer use?
-dont use monitors that flicker
-use a screen filter
-take regular breaks- at least 5 minutes every hour
-keep your eyes at least 18 inches away from the screen
What is repetitive strain injury? (RSI)
Damage to the fingers, wrists and other parts of the body due to repeated movements over a long period of time.
What are the causes of RSI?
Typing or using a mouse for long periods of time
-Using too much force on your fingers when typing
-using a poorly designed keyboard
-workstation or chair is in the wrong height so arms are in an unnatural position.
What are the solutions to RSI?
-Ensure workstation and chair are correct height
-support wrists by using wrist rests
-keep elbows close to your sides
-five minute break from typing attest every hour.
What is deep vein thrombosis? (DTV)
Clot forming in a leg vein
What are some symptoms of DTV?
-Swelling in the affected leg
-Localised heat in the affected leg
-Pain in the affected leg
What can you do to prevent DTV?
-Take regular breaks
-Stand up and move around to allow the blood flow in your legs to return to normal
-Use an adjustable chair and ensure that your feet are firmly on the floor.
-Sit with a suitable posture - do not cross your legs long periods
What is a hacker?
Breaks codes and passwords to gain unauthorised entry to computer systems.
What are stand alone computers not affected by hackers?
Computers as part of networks or those with external links, are in danger from hackers
What are the consequences of loss of data due to hacking?
-affects a business
-affects personal data
-comprises data privacy
-damage company reputation
What are physical protecting systems?
-keeping servers or mainframes in locked rooms
-posting security guards
-security locks, smart cards
-using alarm systems and videos
What is software used to protect computers?
Data encryption - data is being scrambled before being transmitted
firewalls- block access from outside
Access rights
User IDs and passwords
What is a virus?
a software program that is designed to copy itself over and over again attach itself to other programs.
What is the most common way of getting computer viruses?
-email attachments
-infected web pages
-memory stick
-downloading a file
How can viruses be removed?
Anti-virus software
How does anti-virus software work?
We detected,
-alert the user, and ask them whether they want to remove the virus and clean the systems.
-or whether they simply want to ‘quarantine’ the virus
What is a trojan?
an application that appears to do something useful such as a computer game but quietly, behind the scenes it is doing something with ill-intent.
How does a trojan work?
-log all your keystrokes
-Allow someone else to take control of your computer whilst you are online
-Capture screen shots and send them to a remote computer
What is a worm?
Like a computer virus but they spread on their own though computer networks.
What its spyware?
programs designed to keep track of which adverts you click on and then they send specific adverts to your browser.
What is online crime?
Criminal activity directly related to the use of computers.
What are some reasons for online crime?
-steal money
–steal data or information
-steal someones identity
-cause general havoc for fun
What are some consequences of theft of data?
-can stop business running
-losing customers
-losing sales
-Can damage the reputation of the company
What is fraud?
Trying to trick someone in order to gain an advantage.
What are the most common forms of computer fraud?
-posing as someone from an official organisation
-stealing your identity
-phishing (sending emails to get you to give over your personal or account details or getting you to download a data key logger.)
-promising a get rich scheme
What is piracy?
copying software, music or film DVDs.
What are some advantages of social networking?
-it is usually free
-You can post interesting things online
-The site makes it simpler to get in touch with long lost friends
-very easy to keep in contact with people with similar interests
What are some disadvantages of social networking.
-you lose privacy compared to not being on social network
-Online bullying can be a problem if someone posts untrue or unkind thing about you
-A real distraction and time waster. Some people spend many hours on social media instead of studying or working
-Some people may use a fake profile and say untrue things about themselves.