Term 1 Flashcards

1
Q

What is a CVS file? (comma separated values)

A

Takes data in table and saves it in text form, separates items with commas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a txt file?

A

Not formatted can be opened in any word processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is rich text formatting? (rtf)

A

Only save some of the formatting within text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is graphics interchange format? (Gif)

A

Stores still or moving images using smaller file size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is joint Photographic expert group? (jpg)

A

Stores still images only - not moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is portable document format? (pdf)

A

Document converted into images read on most computers. Can protect document
-pdf software writing can be used for editing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a portable network graphics? (PNG)

A

Compress image files without loss of image quality (lossless compression)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is moving picture experts group layer 4? (MP4)

A

Can store video, still images, audio
-used to transfer video files on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is moving picture experts group layer 3? (MP3)

A

-stores audio files
-no images
-small file sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cascading style sheet? (CSS)

A

Attached to webpages to define formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a ZIP? (zipped file)

A

-files in compressed format
-saves storage, space and reduces transmission time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why reduce files sizes?

A

-Limited storage, efficient use is important
-speed at which files are transmitted, depends on the size
-the larger the file size the more time it takes to send

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is resizing and resampling?

A

-resizing changes the dimensions
-resampling changes the quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some solutions to ye strain because of computer use?

A

-dont use monitors that flicker
-use a screen filter
-take regular breaks- at least 5 minutes every hour
-keep your eyes at least 18 inches away from the screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is repetitive strain injury? (RSI)

A

Damage to the fingers, wrists and other parts of the body due to repeated movements over a long period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the causes of RSI?

A

Typing or using a mouse for long periods of time
-Using too much force on your fingers when typing
-using a poorly designed keyboard
-workstation or chair is in the wrong height so arms are in an unnatural position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the solutions to RSI?

A

-Ensure workstation and chair are correct height
-support wrists by using wrist rests
-keep elbows close to your sides
-five minute break from typing attest every hour.

18
Q

What is deep vein thrombosis? (DTV)

A

Clot forming in a leg vein

19
Q

What are some symptoms of DTV?

A

-Swelling in the affected leg
-Localised heat in the affected leg
-Pain in the affected leg

20
Q

What can you do to prevent DTV?

A

-Take regular breaks
-Stand up and move around to allow the blood flow in your legs to return to normal
-Use an adjustable chair and ensure that your feet are firmly on the floor.
-Sit with a suitable posture - do not cross your legs long periods

21
Q

What is a hacker?

A

Breaks codes and passwords to gain unauthorised entry to computer systems.

22
Q

What are stand alone computers not affected by hackers?

A

Computers as part of networks or those with external links, are in danger from hackers

23
Q

What are the consequences of loss of data due to hacking?

A

-affects a business
-affects personal data
-comprises data privacy
-damage company reputation

24
Q

What are physical protecting systems?

A

-keeping servers or mainframes in locked rooms
-posting security guards
-security locks, smart cards
-using alarm systems and videos

25
Q

What is software used to protect computers?

A

Data encryption - data is being scrambled before being transmitted

firewalls- block access from outside

Access rights

User IDs and passwords

26
Q

What is a virus?

A

a software program that is designed to copy itself over and over again attach itself to other programs.

27
Q

What is the most common way of getting computer viruses?

A

-email attachments
-infected web pages
-memory stick
-downloading a file

28
Q

How can viruses be removed?

A

Anti-virus software

29
Q

How does anti-virus software work?

A

We detected,
-alert the user, and ask them whether they want to remove the virus and clean the systems.
-or whether they simply want to ‘quarantine’ the virus

30
Q

What is a trojan?

A

an application that appears to do something useful such as a computer game but quietly, behind the scenes it is doing something with ill-intent.

31
Q

How does a trojan work?

A

-log all your keystrokes
-Allow someone else to take control of your computer whilst you are online
-Capture screen shots and send them to a remote computer

32
Q

What is a worm?

A

Like a computer virus but they spread on their own though computer networks.

33
Q

What its spyware?

A

programs designed to keep track of which adverts you click on and then they send specific adverts to your browser.

34
Q

What is online crime?

A

Criminal activity directly related to the use of computers.

35
Q

What are some reasons for online crime?

A

-steal money
–steal data or information
-steal someones identity
-cause general havoc for fun

36
Q

What are some consequences of theft of data?

A

-can stop business running
-losing customers
-losing sales
-Can damage the reputation of the company

37
Q

What is fraud?

A

Trying to trick someone in order to gain an advantage.

38
Q

What are the most common forms of computer fraud?

A

-posing as someone from an official organisation
-stealing your identity
-phishing (sending emails to get you to give over your personal or account details or getting you to download a data key logger.)
-promising a get rich scheme

39
Q

What is piracy?

A

copying software, music or film DVDs.

40
Q

What are some advantages of social networking?

A

-it is usually free
-You can post interesting things online
-The site makes it simpler to get in touch with long lost friends
-very easy to keep in contact with people with similar interests

41
Q

What are some disadvantages of social networking.

A

-you lose privacy compared to not being on social network
-Online bullying can be a problem if someone posts untrue or unkind thing about you
-A real distraction and time waster. Some people spend many hours on social media instead of studying or working
-Some people may use a fake profile and say untrue things about themselves.