Podcast
Questions and Answers
Match the following descriptions with the correct type of memory:
Match the following descriptions with the correct type of memory:
RAM = Data is stored temporarily ROM = Data is read but cannot be easily written
Match the following devices with their typical usage environments:
Match the following devices with their typical usage environments:
Desktop = Static environment; typically used in one place Laptop = Mobile devices with a large keyboard and display Smartphone = Highly portable; designed for use on the go
Match the following software types with their functions:
Match the following software types with their functions:
Application software = Examples include word processor, video editing software, apps. System software = Examples include compilers, operating systems, device drivers.
Match each input device to its corresponding application:
Match each input device to its corresponding application:
Match each output device to its corresponding function:
Match each output device to its corresponding function:
Match the printer type with the way it creates images:
Match the printer type with the way it creates images:
Match the correct storage media for each use case:
Match the correct storage media for each use case:
Match the network type with its description:
Match the network type with its description:
Match the following descriptions with the correct method of data input:
Match the following descriptions with the correct method of data input:
Match the video conference advantage with its main benefit:
Match the video conference advantage with its main benefit:
Match the Bluetooth/WiFi characteristic to a suitable purpose:
Match the Bluetooth/WiFi characteristic to a suitable purpose:
Match the increased job sector with an ICT advancement:
Match the increased job sector with an ICT advancement:
Match the application of sensors in monitoring process:
Match the application of sensors in monitoring process:
Match the implementation method with it's best use case:
Match the implementation method with it's best use case:
Match the following descriptions to the type of documentation they represent:
Match the following descriptions to the type of documentation they represent:
Match the term to its definition:
Match the term to its definition:
Match the security threat with its method:
Match the security threat with its method:
Match IT health problem with a solution:
Match IT health problem with a solution:
Match an advantage with biometrics rather than traditional security methods:
Match an advantage with biometrics rather than traditional security methods:
Match the area with cookies:
Match the area with cookies:
Match the following advantages to each method of cloud data storage:
Match the following advantages to each method of cloud data storage:
Match the following arguments for internet control with their intended results:
Match the following arguments for internet control with their intended results:
Match the following elements to the blog web:
Match the following elements to the blog web:
Match each stage of the online booking process with its description:
Match each stage of the online booking process with its description:
Match the type of web display to the information needed and displayed:
Match the type of web display to the information needed and displayed:
Match the action with the type of copyright infringement:
Match the action with the type of copyright infringement:
Match the result to it's respective method of protecting against software piracy:
Match the result to it's respective method of protecting against software piracy:
Match the method for creating a strong password to what it prevents.
Match the method for creating a strong password to what it prevents.
Match the type of ICT data with its requirement for storage:
Match the type of ICT data with its requirement for storage:
Match the health risk listed with the correct way to minimize or eliminate the hazard:
Match the health risk listed with the correct way to minimize or eliminate the hazard:
Match each type of biometrics with it's definition:
Match each type of biometrics with it's definition:
Email VS Fax, when do you use each?
Email VS Fax, when do you use each?
Match the type of website with the method information is reliable or not:
Match the type of website with the method information is reliable or not:
Flashcards
What is hardware?
What is hardware?
Physical components that constitute a computer system.
What is software?
What is software?
Programs controlling computer systems and processing data; includes application and system types.
What is GUI (Graphical User Interface)?
What is GUI (Graphical User Interface)?
User-friendly interface utilizing icons; fewer commands to learn.
What is CLI (Command Line Interface)?
What is CLI (Command Line Interface)?
Signup and view all the flashcards
What is RAM?
What is RAM?
Signup and view all the flashcards
What is ROM?
What is ROM?
Signup and view all the flashcards
What is application software?
What is application software?
Signup and view all the flashcards
What is system software?
What is system software?
Signup and view all the flashcards
What is virtual reality?
What is virtual reality?
Signup and view all the flashcards
What is MICR?
What is MICR?
Signup and view all the flashcards
What is OCR?
What is OCR?
Signup and view all the flashcards
What is OMR?
What is OMR?
Signup and view all the flashcards
What are input devices?
What are input devices?
Signup and view all the flashcards
What are output devices?
What are output devices?
Signup and view all the flashcards
How data is read from the RFID chip?
How data is read from the RFID chip?
Signup and view all the flashcards
What does a laser printer use?
What does a laser printer use?
Signup and view all the flashcards
Which printer uses continuous stationery?
Which printer uses continuous stationery?
Signup and view all the flashcards
What is encryption?
What is encryption?
Signup and view all the flashcards
How a router is routed?
How a router is routed?
Signup and view all the flashcards
Areas where ICT has decreased employment?
Areas where ICT has decreased employment?
Signup and view all the flashcards
Areas where ICT has increased employment?
Areas where ICT has increased employment?
Signup and view all the flashcards
Data protection act principle?
Data protection act principle?
Signup and view all the flashcards
How to minimize spam likelihood?
How to minimize spam likelihood?
Signup and view all the flashcards
What are types of biometrics?
What are types of biometrics?
Signup and view all the flashcards
What is smishing?
What is smishing?
Signup and view all the flashcards
What is phishing?
What is phishing?
Signup and view all the flashcards
What is pharming?
What is pharming?
Signup and view all the flashcards
What is double entry verification?
What is double entry verification?
Signup and view all the flashcards
What is visual check verification?
What is visual check verification?
Signup and view all the flashcards
What is hacking?
What is hacking?
Signup and view all the flashcards
Way to protect from hacking?
Way to protect from hacking?
Signup and view all the flashcards
What is cookie?
What is cookie?
Signup and view all the flashcards
What is meant by software copyright?
What is meant by software copyright?
Signup and view all the flashcards
How to protect software from piracy?
How to protect software from piracy?
Signup and view all the flashcards
What is VOIP?
What is VOIP?
Signup and view all the flashcards
Study Notes
Chapter 1
- Hardware constitutes the physical components to create a computer system.
- Software refers to the programs to control a computer system and process data.
- Software types include application software and system software.
GUI vs CLI
- GUI (Graphical User Interface) does not require users to learn commands.
- CLI (Command Line Interface) requires users to learn commands for operations.
- GUI is more user-friendly, utilizing icons to represent applications.
- CLI requires commands to be typed accurately.
- CLI needs remembering the exact path and application name.
- GUI offers direct help menus to choose actions.
- CLI needs users to understand computer workings.
RAM vs ROM
- RAM (Random Access Memory) temporarily stores data.
- ROM (Read-Only Memory) permanently stores information.
- RAM memory can be written and read, ROM can only be read.
- RAM data is lost when a computer is turned off.
- ROM data is retained when there is no power.
- RAM is volatile memory.
- ROM is non-volatile memory.
Laptops vs Desktops vs Smartphones
- Desktop computers are typically stationary.
- Desktop computers need to be connected to a power source.
- Smartphones are compact enough to fit in a pocket.
- Laptops are mobile devices with a screen and large keyboard.
Application Software
- Application software assists users in performing specific tasks.
- A word processor, database, and photo/video editing software are examples of application software.
System Software
- System software programs enable hardware to run correctly.
- System software allows users to communicate with the computer.
- Compilers, linkers, and operating systems, are examples of system software.
Virtual Reality
- Virtual reality refers to an artificial environment for user interaction.
- Virtual reality helps train pilots, surgeons, and architects.
VR Equipment
- Virtual reality general equipment includes: eye goggles, gloves, headphones, sensors, and powerful computers.
Chapter 2
OMR, OCR and MICR
- MICR (Magnetic Ink Character Recognition) is used to read magnetic data on cheques.
- OCR (Optical Character Recognition) is used when entering handwritten text and to read car number plates.
- OMR (Optical Mark Recognition) is used to read multiple-choice exams using the position of marks compared to a memory template.
Input Devices
- Input examples: keyboards, mouse, touchpad, tracker ball, remote control, joystick, driving wheel, touchscreens, scanners, cameras, microphone, sensors, graphic tablet, webcams, light pen, magnetic stripe readers, contactless card readers, chip and pin readers, radio frequency ID readers or magnetic ink/optical character/mark/barcode readers.
Output Devices
- Output examples: CRT, TFT, LCD and LED monitors, multimedia projectors, printers, speakers and control applications like actuators and heaters.
RFID Chips
- Data is read by a washing machine by sending out radio signals.
- RFID chips function like passive transponders.
Printers
- 3D printers, laser printers, inkjet printers and dot matrix printers all fulfill different printing needs.
Chapter 3
Storage Options
- Fixed hard disks are commonly used for storing databases in school libraries.
- Memory cards are suitable for storing digital camera photographs.
- Blu-ray discs are used by companies to distribute HD movies.
- Magnetic tape is used for backing up file servers.
CD-R vs Pen Drive
- Both pen drives and CD-Rs are storage devices
- Both pen drives and CD-Rs are portable
- Most PCs have a USB port; Not every computer has a CD drive
- Pen drives are more robust
- Pen drives have more data
- Pen drives are solid state
- CD-Rs are optical
SSD vs HDD
- Solid State Drives (SSDs) have moving parts, thus are more reliable.
- SSDs are thinner, and lighter than HDDs.
- SSDs consume less power and run cooler.
Chapter 4
Internet vs. Intranet
- The internet is public while an intranet is private, operating within an organization.
- The internet is global; the intranet is policed or managed.
- The internet has more information.
- Data on the intranet is more relevant and internally reliable.
Networks
- WANs (Wide Area Networks) connects computers geographically separated and is used by banks.
- WLANs (Wireless Local Area Networks) provide wireless communication over short distances
- Bluetooth and WIFI are primary technologies to form a WLAN.
- LANs (Local Area Networks) networks cover a small geographic area and connect hubs or switches through cables.
Video Conferencing
- Accessing documents/experts is easier.
- Holding conferences at short notice is simple with lower travel costs.
Web Conferencing
- Web conferencing occurs via the internet using a computer and stable internet connection.
- Web conferencing is the same as online group chats, more formal.
- Participants can join/leave at will.
- Sending instant messages is the primary mode of communication in web conferences.
- Images or videos can be shared using webcams.
- Documents can be shared before a conference.
- Minimum hardware includes: Web camera, screen, speakers, and a microphone.
Bluetooth and WIFI
- Bluetooth facilitates data transfer between two devices.
- WIFI is suited to full scale networks.
- Devices connected via Bluetooth need proximity; WIFI offers a larger range.
- Bluetooth uses a lower bandwidth.
- WIFI has better security.
Encryption
- Encryption turns data into a 'secret key' meaningless information to unauthorized parties.
Routers and Data Routing
- Routers forward data packets using IP addresses between networks.
- Routers determine and send packets via a data best routes.
Chapter 5
ICT Employment effect
- ICT has decreased employment in repetitive jobs, shop work, telephone exchanges and bank cashiers.
- ICT has increased employment for web designers, system analysts, Network managers/ technicians and computer engineers.
Microprocessors
- Microprocessors reduce manual tasks, give people time for leisure activities.
- Microprocessors can make people lazy and cause unhealthy lifestyles.
Microprocessor Use
- Microprocessors switch on/off central heating can be controlled with a smartphone.
- Burglar alarms can people feel more secure.
- Smart fridges and freezers leads to a healthy lifestyle.
- Programmed devices save energy and can be managed with QR codes.
- Some people are not be familiar with certain technologies; and some electronics are irreparable.
Chapter 6
Online Benefits
- Online booking, shopping, and banking don't need travel.
- Online activity reduces costs and time.
- Worldwide market access for cheaper products
- Those with mobility issues are more able to shop
- Online shopping and banking is available 24/7
- Online shopping saves time compared to the supermarket.
- Internet banking saves time and reduces staffing needs.
Online Pitfalls
- There is possible isolation because people stay in home.
- Online activity has health risks and security issues.
- A computer and internet access is needed.
- Products might not portray the exact color.
- High street shops are closing, leading to 'ghost towns'.
- It's easier to make errors with online banking.
Robots
- Robots give advantages in productivity, consistency and are not prone to boredom.
- Set up costs and new task programming are disadvantages to robots.
- Microprocessors act like tiny CPUs; in devices like automatic cookers, which feature temperature sensors.
- The cooker then checks end time against current time, the cooking process is stopped, and heating data is sent from a sensor to turn off cooking.
Sensor Data
- Computers read key vital signs.
- The data is converted into digital and stored in the computer.
- The computer compares vitals and outputs graphs
- Activates an alarm if anything is wrong.
- Devices monitor until turned off
Expert System
- Expert systems give fewer mistakes from greater knowledge and are more consistent/cheaper
- Expert systems cannot provide sound judgement and need lots of training to use
Chapter 7
EFT
- Reader checks the amount to pay
- Data is read using RFID / NFC
- Banks are contacted
- Check if valid and process transaction
- The price of the meal is deducted from the customer's account and paid to the restaurant.
Online Booking
- Clients click on their performance
- Type in a date and time
- Enter seat numbers
- Shown seating displays
- Select seats and click confirm.
- Database searched to check seats.
- If available, the show price with seating number
- Then select confirm
Implementation
- Direct implementation stops the old system overnight and disaster may happen if the new system fails
- Parallel implementation runs both side by side until ready but means extra staff needed
- Phased implementation fails a little at a time but will evaluate separate
Verification
- Double entry is when data is entered twice by two people.
- Visual check is to compare what is entered and what data is
Documentation
- Technical documentation is needed.
- User documentation: How things work, layouts, requirements, examples
Pre-Implementation
- System is tested along with everything else such as checking meter readings or bills.
Research
- Find out by observing, interviewing, questionarring and examine what docs exist.
Interviewing
- Takes time but allows more open answers by analysts
Chapter 8
Data Protection Act
- Data must be fairly processed, accurate, relevant, secure, not kept too long and processed for its purpose.
Spam E-mail
- Can used spam filters, do not reply or click links, use disposables, use complex names do not give out accounts and read in tests.
Biometrics
- Biometrics include fingerprint scans, signature recognition, retina scans, iris recognition, face and voice recognition.
Biometrics vs Traditional security
- Security can be copied
- Harder to forge
- They cannot sign without infringement
- Eyes and fingerprints are always read
Personal and Personnel Data
- Personal includes name, birthday, address and banking history
- Ensure you trust people you talk to
- Maintain privacy and use recommendations
- Only share people you know and who have been recommended
Chapter 9
Socila Messaging
- Avoid by not using, and trusting settings and people
Health with computers
- Sit in correct positions
- Chairs and footrests can help
- Correct positions and wristrests can help
- Exercise and proper keybaords can assist
Chapter 10
Health Problems
- Eyestriain, headaches and irritations with lighting effects.
- Electrocutions from cheap equipment, wires or drinking.
- Fire is always an high risk
Passwords
- Use numbers and letters (Caps as well)
- Avoid name brands
Prevention
- Unauthorized access is needed with firewalls, strong passwords, encryption and software
Cookies
- Great to store passwords, preferences and tailored options
Chapter 10 - 11
Media Forms
- Email and Fax transfer data
Evaluating information
- Setup website and is accurate
- Sites are designed to sell. Mostly reliable with .gov or .org
Storing Data
- Easy access, you don't pay for storage and are backed up.
- Everything is updated and helps collaboration
- Affected by connection
Internet Security
- Prevents things and reduces information
File Sharing
- Blogs, wikis and voip, helps research
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.