Podcast
Questions and Answers
The term 'Spam' in computing refers to unsolicited electronic messages and is related to a tinned meat product.
The term 'Spam' in computing refers to unsolicited electronic messages and is related to a tinned meat product.
True (A)
A virus can only spread through direct user actions and cannot propagate automatically.
A virus can only spread through direct user actions and cannot propagate automatically.
False (B)
Output refers to data that is sent to a computer for processing.
Output refers to data that is sent to a computer for processing.
False (B)
Computer data can include factual information that is used for analysis or decision-making.
Computer data can include factual information that is used for analysis or decision-making.
A system is defined as a single component that performs a function in isolation.
A system is defined as a single component that performs a function in isolation.
An algorithm is a structured set of rules defining a logical solution to a problem.
An algorithm is a structured set of rules defining a logical solution to a problem.
A chip is another term for a computer's keyboard.
A chip is another term for a computer's keyboard.
A ROM chip is a type of volatile memory that can be changed.
A ROM chip is a type of volatile memory that can be changed.
The CPU is often referred to as the 'brains' of the computer.
The CPU is often referred to as the 'brains' of the computer.
Compiling refers to converting machine language code into a higher level language code.
Compiling refers to converting machine language code into a higher level language code.
The definition of a computer program includes a microprogramme.
The definition of a computer program includes a microprogramme.
The Computer Misuse Act 1990 defines what a computer program is.
The Computer Misuse Act 1990 defines what a computer program is.
An integrated circuit can be permanently fixed or volatile.
An integrated circuit can be permanently fixed or volatile.
A computer hacker originally referred to someone who was very enthusiastic about computers.
A computer hacker originally referred to someone who was very enthusiastic about computers.
Operating system software is specifically designed to perform functions such as creating documents and spreadsheets.
Operating system software is specifically designed to perform functions such as creating documents and spreadsheets.
High-level languages are closer to machine language than low-level languages.
High-level languages are closer to machine language than low-level languages.
Machine language consists of a set of instructions that control the computer directly.
Machine language consists of a set of instructions that control the computer directly.
An interpreter is used to convert high-level language code directly into binary code.
An interpreter is used to convert high-level language code directly into binary code.
Applications software provides the basic functionalities required by the operating system.
Applications software provides the basic functionalities required by the operating system.
Spam refers to unsolicited emails that are often seen as junk.
Spam refers to unsolicited emails that are often seen as junk.
Bespoke software is software created specifically for a client rather than being sold 'off-the-shelf'.
Bespoke software is software created specifically for a client rather than being sold 'off-the-shelf'.
The goal of the Preliminary Investigation is to define the symptoms of the problem rather than the problem itself.
The goal of the Preliminary Investigation is to define the symptoms of the problem rather than the problem itself.
System requirements are established only after a thorough analysis of the existing system.
System requirements are established only after a thorough analysis of the existing system.
In the Analysis phase of the SDLC, a data flow diagram (DFD) is one of the tools used to analyze data.
In the Analysis phase of the SDLC, a data flow diagram (DFD) is one of the tools used to analyze data.
The design phase of the SDLC consists of only one step to create the new system.
The design phase of the SDLC consists of only one step to create the new system.
A prototype in the design phase is a fully functional version of the final system.
A prototype in the design phase is a fully functional version of the final system.
Interviews are the only method used for data gathering during the analysis phase.
Interviews are the only method used for data gathering during the analysis phase.
Recommendation for the next step is part of the report to management during the Analysis phase.
Recommendation for the next step is part of the report to management during the Analysis phase.
The feasibility study is a key component of the Analysis phase in the SDLC.
The feasibility study is a key component of the Analysis phase in the SDLC.
The modem converts signals from the receiving computer into a format that can be understood by the sending computer.
The modem converts signals from the receiving computer into a format that can be understood by the sending computer.
Computer Based Training (CBT) programs are typically delivered through USB drives.
Computer Based Training (CBT) programs are typically delivered through USB drives.
Automation in car factories involves the use of computer-controlled robots for vehicle assembly.
Automation in car factories involves the use of computer-controlled robots for vehicle assembly.
Stock control systems in many companies are still mainly manual.
Stock control systems in many companies are still mainly manual.
Working from home is one of the common uses of computers within the home environment.
Working from home is one of the common uses of computers within the home environment.
The provision of adequate lighting and ventilation is unnecessary for creating a good working environment.
The provision of adequate lighting and ventilation is unnecessary for creating a good working environment.
Computer Aided Design (CAD) is utilized to create detailed specifications and drawings for new products.
Computer Aided Design (CAD) is utilized to create detailed specifications and drawings for new products.
Smart ID cards are not considered a use of computers in daily life.
Smart ID cards are not considered a use of computers in daily life.
Regular backups of information stored on the computer are not essential.
Regular backups of information stored on the computer are not essential.
Good ventilation and a clean environment are beneficial for the performance of computers.
Good ventilation and a clean environment are beneficial for the performance of computers.
A UPS (Un-interruptible Power Supply) helps to prevent data loss during power outages.
A UPS (Un-interruptible Power Supply) helps to prevent data loss during power outages.
Computer viruses can only infect disks but cannot spread through computer networks.
Computer viruses can only infect disks but cannot spread through computer networks.
Incremental backups only save changes made since the last backup.
Incremental backups only save changes made since the last backup.
Placing objects on top of monitors is acceptable for maintaining a clutter-free workspace.
Placing objects on top of monitors is acceptable for maintaining a clutter-free workspace.
Using virus detection software is unnecessary if you believe your computer is safe.
Using virus detection software is unnecessary if you believe your computer is safe.
Repetitive Strain Injury (RSI) is a concern associated with poor posture while working on computers.
Repetitive Strain Injury (RSI) is a concern associated with poor posture while working on computers.
Flashcards
Virus
Virus
A program that replicates itself and can cause harm to computer systems.
Computer data
Computer data
Information in a form that a computer can process.
Input
Input
Any information sent to a computer for processing.
Output
Output
Signup and view all the flashcards
System
System
Signup and view all the flashcards
Algorithm
Algorithm
Signup and view all the flashcards
Chip
Chip
Signup and view all the flashcards
ROM (Read Only Memory)
ROM (Read Only Memory)
Signup and view all the flashcards
RAM (Random Access Memory)
RAM (Random Access Memory)
Signup and view all the flashcards
EPROM (Erasable Programmable Read Only Memory)
EPROM (Erasable Programmable Read Only Memory)
Signup and view all the flashcards
CPU (Central Processing Unit)
CPU (Central Processing Unit)
Signup and view all the flashcards
Compiler
Compiler
Signup and view all the flashcards
Computer
Computer
Signup and view all the flashcards
Hardware
Hardware
Signup and view all the flashcards
Software
Software
Signup and view all the flashcards
High-level language
High-level language
Signup and view all the flashcards
Low-level language
Low-level language
Signup and view all the flashcards
Machine language
Machine language
Signup and view all the flashcards
Operating system
Operating system
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Why take backups?
Why take backups?
Signup and view all the flashcards
What does a computer like?
What does a computer like?
Signup and view all the flashcards
What is a computer virus?
What is a computer virus?
Signup and view all the flashcards
How do viruses spread?
How do viruses spread?
Signup and view all the flashcards
How to prevent virus damage?
How to prevent virus damage?
Signup and view all the flashcards
What is RSI?
What is RSI?
Signup and view all the flashcards
Why is screen glare bad?
Why is screen glare bad?
Signup and view all the flashcards
Why is good posture important?
Why is good posture important?
Signup and view all the flashcards
SDLC (Systems Development Life Cycle)
SDLC (Systems Development Life Cycle)
Signup and view all the flashcards
Preliminary Investigation
Preliminary Investigation
Signup and view all the flashcards
Feasibility Study
Feasibility Study
Signup and view all the flashcards
Analysis (SDLC)
Analysis (SDLC)
Signup and view all the flashcards
Data Gathering (Analysis)
Data Gathering (Analysis)
Signup and view all the flashcards
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
Signup and view all the flashcards
Design (SDLC)
Design (SDLC)
Signup and view all the flashcards
Prototype (Design)
Prototype (Design)
Signup and view all the flashcards
Modem
Modem
Signup and view all the flashcards
CBT (Computer Based Training)
CBT (Computer Based Training)
Signup and view all the flashcards
Automated Production Systems
Automated Production Systems
Signup and view all the flashcards
Stock Control
Stock Control
Signup and view all the flashcards
Accounts / Payroll
Accounts / Payroll
Signup and view all the flashcards
CAD (Computer Aided Design)
CAD (Computer Aided Design)
Signup and view all the flashcards
Working from home (Tele-working)
Working from home (Tele-working)
Signup and view all the flashcards
Create a Good Working Environment
Create a Good Working Environment
Signup and view all the flashcards
Study Notes
Computer Crime
- Algorithm: A set of rules to solve a problem or achieve a goal. Often expressed as a flow chart.
- Chip (Integrated Circuit): A small piece of semiconductor material (like silicon) with conductive and insulating layers, forming a microcircuit. It contains many electronic devices like transistors, resistors, and diodes.
- ROM (Read Only Memory) Chips: Contain permanently stored data.
- RAM (Random Access Memory) Chips: Data is volatile (lost when power off)
- EPROM (Erasable Programmable Read-Only Memory): Programmable memory that can be erased and reprogrammed.
- CPU (Central Processing Unit): The "brain" of the computer, located on an integrated circuit. It carries out machine language instructions from computer programs.
- Compiler: A program that translates high-level language code to machine language. Its opposite, converting machine language to high-level code, is called decompilation.
- Computer: A programmable machine for storing, retrieving, and processing data, mainly electronically.
- Computer Program: A series of instructions guiding computer operation. Stored in various ways, including integrated circuits, magnetic disks/tapes, and punched cards, loaded into memory as needed. A precise definition is found in the Export of Goods (Control) Order (S.I. 1989 No. 2376) detailing processes executable through electronic computers, also including microprograms.
- Data: Information (facts, numbers) to analyze something.
- Database: A structured collection of data (e.g., client names, addresses). Stored in computers or storage media like magnetic disks.
Systems Analysis and Design
- System: A collection of interrelated components working together to perform a function.
- Systems Analysis: Studying an existing system to understand its workings and user needs.
- Systems Design: Creating a plan for an improved system based on analysis results.
Systems Specialist
- Systems Specialist: A computer professional handling analysis and design.
- Typical Career Path: Programmer → Designer → Systems Analyst
Systems Analyst Functions
- Coordination: Managing and scheduling system-related tasks.
- Personnel Communication: Communicating via presentations or written documents.
- Planning and Design: Creating new systems, from initial planning to deployment.
Project Phases
- Planning: Determining the purpose, process, and steps for system building.
- Analysis: Identifying users, system functions, and usage.
- Design: How the system will work.
- Implementation: Putting the system into operation.
Planning
- Identifying business value: Defining the advantages of the system.
- Analyze feasibility: Evaluating the practicality of the system.
- Develop work plan: Creating a plan to implement the project.
- Staff the project: Choosing the team to work on the project.
- Control and direct project: Keeping the project on track.
Analysis
- Analysis strategy : A plan for completing the analysis phase.
- Gathering business requirements: Collecting information about user needs for the system.
- Requirements Definition Use Cases: Detailed descriptions of interactions users will have with the system.
- Process modeling: Illustrating different processes within the system.
- Data modeling: Identifying different types of data in the system.
Design
- Design selection: Choosing the best approach for designing the system
- Architecture design: Creating the overall structure of the system
- Interface design: Determining user interactions with the system.
- Data storage design: Deciding how data will be stored within the system
- Program design: Planning individual program components
Implementation
- Construction: Developing and testing the programs.
- Installation: Setting up the system and training users.
- Conversion marketing strategy: Focuses on increasing the number of site visitors who complete a specific action (called a conversion).
- Training plan: Creating a plan to train users.
- Support plan: Setting up support channels for users.
SDLC (Systems Development Life Cycle)
- Preliminary investigation: Initial study to define the problem.
- Analysis: Understanding the existing system and determining requirements.
- Design: Creating a detailed plan for the new system.
- Development: Building the software.
- Implementation: Installing and deploying the system.
Preliminary Investigation
- Feasibility Study / System Survey: Assessing the practicality and possibility of the project.
- Determine the problem: Defining the exact problems to be addressed.
- Describe the problem: Clearly articulating the issues.
- Understand management decisions: Determining the organizational structure and related decisions.
- Produces rough plan and what to do: Planning a brief overview and outline of the projected work steps.
- Report: Documenting the steps taken and findings, including recommendations and financial feasibility analysis.
Goal of Preliminary Investigation
- Problem Definition: Determining the exact nature of the problem, isolating it from symptoms, and understanding its scope.
- Scope of the project: Determining the project limits and boundaries.
- Budget and schedule: Determining budget and timeline for the project.
- Objectives of the project: Defining goals and objectives for the project.
- What user thinks system should do: Gathering user expectations for the system's intended functionality.
SDLC: Analysis
- Understand the existing system: Determining how the current system functions. Includes gathering and analyzing relevant data.
- Establish system Requirements: Defining the functionalities needed in the new system.
Analysis – Data Gathering
- Written documents: Analyzing existing documentation related to the system.
- Interviews: Gathering information from system users. These can be structured or unstructured.
- Questionnaires: Collecting data through a series of questions.
- Observation: Monitoring system usage through observation. Includes both guided and participant observations.
- Sampling: Utilizing sample data to represent larger trends.
Analysis – Analyze Data
- How the current system works: Understanding the current system's operations.
- Determine system requirements: Identifying the needed aspects of the new system.
- Tools: Employing appropriate tools, including data flow diagrams (DFD) and decision tables.
SDLC: Analysis – Data Flow Diagram
- Illustrates data flow within a system, visually showing data movement and transformations. Includes inputs, outputs, processes, and data stores.
SDLC: Analysis – Decision Tables
- Defines conditions under which system actions should take place.
Analysis – System Requirements
- Detailed specifications of what the system needs to accomplish.
- Basis for all design decisions and must be agreed upon.
Analysis – Report to Management
- Summarizing the problems and requirements.
- Presenting a cost analysis.
- Presenting recommendations for the next steps.
- Requesting authorization for proceeding.
SDLC: Design
- Planning the new system: Overall approach.
- Two Phases: Preliminary design, Detailed Design
Preliminary Design
- Create an overall plan: Creating a blueprint for the project.
- Offer alternatives: Developing multiple ways to address the system needs.
- Explain differences: Documenting the reasoning for choice of alternative.
- Evaluate costs: Assessing the financial implications of implementation and choices between alternatives.
- Build a prototype: Creating a working model of the system. A subset demonstration focused on key features.
- Prototype: Testing implementation with a working model to accommodate feedback.
- CASE Tools (Computer-Aided Software Engineering): Tools aiding in software design tasks.
Detailed design
- Presentation: Presenting developed system details
- All Alternatives: Reviewing all the alternative solutions.
- Selected plan: Choosing the chosen solution amongst all alternatives.
- Prototype of the system: Demonstrating a prototype (working model) of the final design.
- Obtain authorization to proceed: Gaining approval before moving onto the next design stage.
Computer Virus
- What are computer viruses?: Small programs hidden on disks, that replicate.
- How do viruses infect PCs?: Hidden on disk/floppy, and activated when accessed; spreading via infected floppy or computer networks (including the internet).
- How to prevent virus damage?: Utilizing anti-virus software that is kept updated; ensuring that computer software is the latest version.
Software Copyright
- What about software that you find on the Internet?: Freeware, Shareware, Software with licenses are identified and their usage clarified.
- Freeware: Available cost-free.
- Shareware: Initially free for trials, often requiring purchase for continued use.
- Software with licenses: Copyrighted software requiring a license for use.
- If your computer system holds information...: It's important to respect information privacy.
- In a free society...: Protecting privacy rights is crucial, along with their data protection laws.
Other
- Operating System (OS): A special program handling computer operation and advanced features.
- Application Software: Programs like word processors, spreadsheets, etc., that users utilize after the OS loads.
- LAN (Local Area Network): Connecting several computers in a limited area (e.g., office).
- WAN (Wide Area Network): Connecting devices over a much wider range (e.g., globally).
- Modem: Converts computer signals to signals used by phone systems, facilitating data transmission.
- Computer Games, Working from Home, Banking from Home, Connecting to the Web: Common computer uses in a home environment.
- CBT(Computer Based Training): Computer-based training solution. An economical way to train large groups on a single subject.
- Office Applications: Automation through computer-controlled robots and using CAD programs in design.
- Stock Control, Payroll: Examples of office application systems which are computerized.
Additional Points
- Specific examples: Include names of software (e.g., Microsoft Word, Lotus 123, Microsoft Access, etc.).
- Data Flow Diagrams (DFD): Illustrative diagrams.
- Decision Tables: Tabular format clarifying conditions.
- Backup Procedure: Regular backing up of important data to avoid data loss and to properly organize computer systems to aid in the backup procedure.
- Good Working Environment: The physical setup to minimize computer-related health issues such as RSI (Repetitive Strain Injury), glare, bad posture.
- Specific Computer Accessories: Modems, Printers, Keyboards, etc., to support the study notes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.