Theory Flashcards
reasons an operating system is required
(1) To manage software/programs
(2) To manage hardware (input and output devices) and resources
(3) Provide a user interface for interacting with the program and hardware
(4) Security (usernames and passwords)
(5) File management/Housekeeping tasks
(6) Communication between devices etc.
Definition of resolution
Resolution refers to image quality: the number of pixels an
image is made of
disadvantages of online storage
(1) Dependent on having an internet connection
(2) Additional cost for uploading and downloading files
(3) Security and privacy concerns with some service providers
(4) Fee for additional storage space
(5) Service providers may close down and your data may be lost
locations to create shortcuts
(1) Desktop
(2) Taskbar
(3) Start menu
(4) Quick access in File Explorer
(5) Within another folder
example of multitasking
(1) Auto spellcheck while typing
(2) Listen to music while working
(3) Printing while continuing typing,
ways to safeguard data
(1) Make regular/automatic backups/archive
(2) Store backups in offsite locations
(3) Add restricted access rights to the data (password/encrypt, etc.)
(4) Make files read-only
(5) Three generations of data are kept on backups
advantages of web-based applications
(1) Can access from anywhere/any time/any device
(2) Updated automatically/regularly/access to new features
(3) Allows for sharing/collaboration amongst users
(4) Make use of the service provider’s processing power
(5) Provide security
(6) No need to install/buy software/Save space on the local device
(7) No compatibility issues
examples of utility programs
(1) Disc Cleanup
(2) Antivirus
(3) Backup/Recovery
(4) Defragment/System optimise
(5) Error checking/Scan disc/System config
(6) File/Device Management
(7) Compression tools
(8) Task scheduler
(9) Recycle bin
reasons why video buffers while streaming
(1) Not enough bandwidth/High resolution video
(2) Bad/Slow connection
(3) Too much traffic on the network
(4) Throttling/Shaping
(5) Limited processing power/outdated hardware
(6) Background applications running using processing power
reasons to use a server in a school network
(1) Sharing of hardware resources
(2) Sharing of software resources
(3) Improved security/Control user access
(4) Network administration
(5) Centralised storage/Access files from any workstation
(6) Provide specialised functions (i.e. intranet)
Definition of a blog
(1) Websites that are updated often with the most recent entry at the top
(2) A website that posts short informal/formal stories about any
topic that is updated regularly
(3) A website that contains information like diary or journal entries
advantages of podcasts
(1) Ways to directly communicate with audience (stream or downloaded)
(2) Allows users to listen at recorded material after broadcast
(3) Wide range of topics
(4) Can listen to it through various mediums – smartphones, etc.
(5) Save on traveling cost/distributing and production cost
(6) Accessible for people with disabilities – visually impaired people
(7) Can listen any time and place – during your commute, doing
house chores, etc.
Factors that impact internet data usage
(1) The time you spend online
(2) What you do on the internet e.g. shopping, gaming, content
creator
(3) Quality/resolution of streaming/downloading
(4) Size of uploading/downloading files
(5) CAP limits influence the user’s habits
(6) Line speed (bits per second)/Throttling
(7) Proxy server
uses for grid computing
(1) Weather forecasting
(2) Earthquake simulation
(3) Complex calculations performed in science experiments
(4) Scientific/Genetic and cancer research
(5) Financial analysis
(6) Engineering and design
(7) Gaming and entertainment
guidelines for communicating with teacher on social
media
(1) Use good language and sentence construction
(2) Keep content relevant/clear and concise
(3) Do not use all uppercase
(4) Message in acceptable hours
(5) Be polite and respectful
reasons why ISP block certain e-mails
(1) Attachment seen/marked as malicious
(2) Attachment seen/marked as spam
(3) Attachment is too large
(4) Flagged file extensions used e.g. .exe
(5) Unrecognised file extensions used
Definition of sifting information
(1) The finding of relevant information
(2) To sort out what is useful or valuable information to solve a
certain problem
ways spreadsheet charts can enhance a PAT
(1) Visual representation of data
(2) Easy to read and understand/Simple to interpret
(3) Easy to see what happens at specific intervals/View trend analysis
(4) Supports the findings, etc.
requirements when setting research questions
(1) Type of questions (facts, exploring, informative, predictive)/ Level of the questions – level 1, 2, 3 etc.
(2) Variety/number of different (level)
questions
(3) Relevant to a specific topic/issue
advantages of ICT’s on the society
(1) Global communication
(2) E-learning/M-learning
(3) Extended business opportunities
(4) Health care
(5) Comfortable living
(6) Increase productivity
(7) Ease of travel arrangements, etc.
effects of a bot/zombie computer
(1) Spreading spam/phishing e-mail
(2) Launching DDoS attacks/slow system performance
(3) Bots can steal sensitive information
(4) Sell information to competitors
Definition of information overload
(1) Overwhelming content
(2) Too much information to process
impacts of information overload
(1) Unable to cope with volume/difficulty focusing
(2) Can cause stress/anxiety/health related issues
(3) Lead to limiting social interactions
(4) Feelings of helplessness
(5) Leads to unproductivity
(6) Impact job satisfaction
(7) Affects decision making
Describe Identity theft
(1) Illegally obtain/Stealing personal information
(2) Impersonating a person
ways to prevent identity theft
(1) Don’t give out your personal information
(2) Protect personal documents like e-mail
(3) Use good security like firewalls/user names/passwords
(4) Antivirus/Antispyware
(5) Secure browser/Select secure websites
reasons why no values appear in combo box
(1) Row source type was not linked to value list
(2) No values were entered into the row source/cells of the wizard
(3) No values in the field of the Table/Query
examples of functions
(1) Sum
(2) Average (AVG)
(3) Max
(4) Min
(5) Count
(6) Date/Now
hardware specifications for basic computer
(1) Processor capabilities – CPU
(2) Storage type/capacity – HDD/SSD
(3) Amount of RAM
(4) Connectivity options (WIFI; Bluetooth; NFC, USB; etc.)
factors for selecting an operating system
(1) Compatibility to hardware/system requirements
(2) Ease of use/familiarity
(3) (Cost) Free-/Open-source
reasons to use wireless network
(1) Mobility
(2) No need for cables/No clutter of cables
(3) Ease of connection when in range of any wireless connection
(4) Easy to add devices, etc.
other criteria for printer selection (besides colour and costs)
(1) Resolution/DPI/Quality of the printouts
(2) Printer speed/PPM
(3) Connectivity options, e.g., wireless, USB, etc.
(4) Duty cycle
(5) Multifunction ability, e.g., copying, scanning, etc.
(6) Paper size/Borderless printing
(7) User interface options
(8) Duplex/Two-sided printing option
(9) Type of printer
Explain the duty cycle of a printer
Maximum amount of print outs per month without the printer getting damaged or failing
Use of input mask
(1) To prevent mistakes
(2) Consistent format
(3) Correct data format
Method to capture dates
Use the Date picker
reasons why Add-ons are needed
(1) Enhance functionality
(2) Allows for multi-media effects
(3) Easier for users to customise
(4) Might provide support or installation assistance
alternative ways to display a URL
(1) URL shortening
(2) QR code
(3) Hyperlink
(4) Make use of the IP address etc.
Definition of an interactive whiteboard
Combination of input and output technologies
disadvantages of an interactive whiteboard
(1) Specialised software/equipment is required
(2) Needs additional training
(3) Susceptible to outside input (cloths/dust, etc.)
(4) Expensive to maintain
(5) Technical glitches: Needs to be calibrated/connectivity
issues/software malfunctions
(6) Health issues (e.g. eye strain)
safety measures using mobile device at a hotel or airport
(1) Do not access private content in a public area
(2) Be aware of criminals
(3) Make sure the connection to the hotspot is secure/Look for a secure network/lock icon
(4) Activate VPN
advantages of video conferencing
(1) Able to connect people, in one meeting/session, from different
locations all over the world
(2) Real-time connection with family and friends at home
(3) Have conversations where they can all see each other while they are in different locations
(4) Save on travelling and accommodation cost
Reason to remove metadata from public photos
(1) Location can be tracked
(2) Prevent stalking
(3) Model and make of equipment are listed,
devices needed to experience Virtual Reality
(1) Head gear/Helmet with screen/VR Goggles
(2) Headphones
(3) Gaming console
(4) Smartphones/Mobile device
(5) Gloves/Body suit with sensors/controllers
Negative effect of Virtual Reality
(1) Motion sickness/Cyber sickness
(2) Blurred vision/Eye strain
(3) Headache
(4) Muscle fatigue
(5) Injuries (Neck/Back strain, etc.)
(6) Unable to distinguish between reality and fiction
Criteria of strong password
(1) Uppercase and lowercase letters
(2) Includes numbers
(3) Special characters
(4) Eight of more characters
advantages of using crypto currency
(1) Able to send and receive worldwide
(2) Minimal or no ‘banking’ charges
(3) Accepted worldwide
(4) Inflation protection
(5) Secure method of banking/transactions
Explanation of blockchain
Sequence of blocks/groups/records of transactions Cannot be removed or altered
Reasons for not using self-driving bus
(1) No control/Possible accidents
(2) Vulnerable to possible hacking
(3) Possible electronic malfunction
(4) Possible machine errors
(5) Trust issues
Definition of Big data
It is very large (structured and unstructured) data sets that are analysed using computers to reveal trends and associations
Use of Augmented Reality
Takes physical world and adds/overlays objects/graphics on a digital interface within the real world
benefits of UPS for a SOHO
1) Backup power for limited time
2) Safe/Automatic shutdown
3) Allows time to save work/Prevents loss of data
4) Protects equipment against power surges/fluctuations
disadvantages of using open source software
1) No regular updates
2) No official support
3) Lack of ‘Help’ features
4) Open to software vulnerabilities, e.g. hacking with malicious code
5) Lack of proper testing of the software for bugs
reason for preferring a virtual keyboard over a physical keyboard
1) Use less physical desk space
2) Improves portability of the device
3) Can customise the keyboard
4) Surface on which virtual keyboard is projected may be easier to clean
reason why a hard disk drive is NOT preferred in a laptop
1) HDD can be easily damaged because of moving parts
2) Heavier than other options
3) Uses more electricity/Depletes battery faster
criteria for selecting a printer for a SOHO
1) Speed: Pages per minute/Productivity
2) Budget consideration: Cost of printer/Cost of printing
3) Print quality: Quality of printouts required/DPI
4) Paper: Variety of paper sizes/thickness required
5) Durability: Maximum printouts per printer life cycle
6) Size of printer: Available physical space/multiple trays
7) Colour: Monochrome or colour printing required
8) Type of printer: Suitability for SOHO, e.g. Multifunction printer
9) Connectivity: Network printer, e.g. Wireless
Concept of communication in the information processing cycle
The result of processing is shared with users/other devices connected to each other
reasons why offline backups are important
1) Backup files are accessible when no internet is available
2) Faster to restore data from a local source
3) Not reliant on a 3rd party for data security
4) Have a backup in case of ransomware
5) No need to pay a subscription
Reason for NOT making a backup on the same device as the original work
The backup can be destroyed/infected/lost/stolen together with the original work
reasons why an accountant should not use a trial version of financial software
1) Lose data when trial expires/Program becomes unusable
2) Unable to upgrade to the full version
3) Not all features are available/limited functionality
4) Could result in loss of income for the business
ways to resolve the problem of a faulty mouse
1) Change the mouse surface/use a mousepad
2) Check connection/cable/Bluetooth/ports
3) Restart/reboot the computer
4) Change batteries/Check for battery corrosion
5) Clean optical sensor
6) Re-install the driver/unpair and re-pair Bluetooth mouse
7) Check if the mouse receiver is working, e.g. wireless mouse
dongle
kinds of metadata information
1) Author/Who last modified
2) Dates/Time created/modified
3) Geographic location
4) File size
5) Revision number
6) Attributes
7) Number of pages/words
Purpose of a QR code
Quick access/link to information
ways software can be used to protect a network from unauthorised users
1) Use a firewall
2) Set up access rights/logins for authorised users (username and password)
3) Use data encryption
Advantage of using https protocol over http protocol
Https indicates that the website is secure/encrypted
advantages of using a VPN
1) Secure connection to a network/internet/application
2) Can virtually change your geographic location
3) Provides privacy by masking your IP address
4) Provide simultaneous access to multiple users and remote users
word processing features to reference a source
1) Bibliography
2) Citation
3) Footnotes/Endnotes
4) Captions
guidelines that can be found in BYOD policy
1) Install an antivirus program
2) Use legal/approved software
3) Do not store sensitive/personal information
4) School has the right to install software on your device
5) Limitation placed on data usage
6) Prescribe times for network connection/device usage
7) School information should be encrypted
8) Limitation on using social
media/software/school resources
9) Conform to required hardware specifications
example of an intellectual property product/(creation)
1) Music
2) Software
3) Art
4) Books
5) Design/Industrial design
6) Podcast etc.
ways to protect your privacy when using a public hotspot
1) Do not perform financial transactions
2) Do not give out/enter personal information/Do not share data over
network
3) Do not login to any apps that have your sensitive information
4) Ensure that nobody is looking at your screen/shoulder surfing
5) Use a VPN/Incognito mode
reason why companies may NOT allow employees to telecommute
1) Security of sensitive information
2) Cannot easily measure their performance/productivity when
employees are not in the office/Too many distractions at home
3) Costly to set up work infrastructure/resources at the office and at
the homes of employees
4) Job description requires physical presence
5) Eliminate professional isolation/Encourages teamwork
negative effects a user can experience if they overuse social media
1) Lack of social interaction/Person becomes anti-social
2) Can become addicted to social media/Neglects important work
3) Addictive behaviour can lead to depression/Body dysmorphia
4) Could affect the normal development of children/Could lead to low self-esteem
5) High data usage may lead to financial strain
6) More likely to become a victim of online harassment/cyberbullying,
Spreadsheet function to determine the number of learners
COUNT / COUNTA / COUNTIF
Spreadsheet feature to copy results without the formula
Paste Special /Paste values
How would you be able to display all the records of URLs ending in ‘.com’ in a
database query?
Use a wildcard
ways to prevent computer hardware theft
1) Install security gates and burglar bars
2) Limit access/employ security companies/guards
3) Install security cameras
4) Install alarm systems
5) Biometric security for entry into the computer lab
reason for using a pie chart
1) All portions of the whole
2) When the total of the numbers is 100%
3) When there are only a few categories/not too many categories/easier to understand