Operating Systems and Audio Technology Quiz
49 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the effect of increasing the sample rate in audio files?

  • Higher audio quality (correct)
  • Lower audio quality
  • No effect on audio quality
  • Increased file size with no effect

A bit rate of 128 kbps means lower quality audio than 256 kbps.

True (A)

What does bit depth refer to in audio files?

The number of bits allocated to a sample.

VoIP typically uses a sample rate of _______ kHz for acceptable voice quality.

<p>8</p> Signup and view all the answers

Match the following terms related to audio compression with their correct descriptions:

<p>Sample Rate = Number of audio samples captured every second Bit Depth = Number of bits allocated to a sample Bit Rate = Number of bits processed per second MP3 Compression = A method of reducing file size for audio files</p> Signup and view all the answers

What is the primary function of an operating system?

<p>Allows interaction between user and applications (D)</p> Signup and view all the answers

The BIOS is responsible for loading the user interface of the operating system.

<p>False (B)</p> Signup and view all the answers

What does POST stand for?

<p>Power-On Self Test</p> Signup and view all the answers

___ checks the validity of the operating system to ensure it is free from malware during the boot process.

<p>Secure boot</p> Signup and view all the answers

Match the following components with their roles:

<p>Kernel = Core of the operating system CMOS = Stores hardware settings UEFI = Modern boot firmware Hyperthreading = Simultaneous execution appearance</p> Signup and view all the answers

Which of the following statements about battery life in smaller devices is true?

<p>Smaller devices have smaller batteries but less charging time. (C)</p> Signup and view all the answers

Multithreading allows multiple CPU cores to execute different tasks at the same time.

<p>False (B)</p> Signup and view all the answers

What is the function of the boot loader?

<p>It performs the initial operations when a computer is turned on.</p> Signup and view all the answers

Lower voltages are used by ___ to save power when not in use.

<p>CPU chips</p> Signup and view all the answers

What technology is commonly used to write hybrid mobile apps?

<p>HTML, CSS, and JavaScript (B)</p> Signup and view all the answers

Extensions are preferred over plug-ins for web browser customization.

<p>True (A)</p> Signup and view all the answers

What is a common example of a plug-in?

<p>Adobe Flash Player</p> Signup and view all the answers

Mobile devices often face limitations due to limited ______.

<p>storage</p> Signup and view all the answers

Match the following items with their definitions:

<p>Plug-In = Adds special features to existing software Extension = Customisation for web browsers Hybrid Mobile App = Blends native and web solutions Bandwidth = Rate of data transfer in a network</p> Signup and view all the answers

Which of the following factors affects user interaction with a mobile app?

<p>Screen sensitivity (C)</p> Signup and view all the answers

Higher screen resolution in mobile applications is less power-intensive.

<p>False (B)</p> Signup and view all the answers

What is a significant consideration regarding bandwidth for mobile apps?

<p>Location-based services</p> Signup and view all the answers

What is a Wi-Fi hotspot?

<p>A site that offers internet access over a LAN (C)</p> Signup and view all the answers

Wi-Fi is more reliable than Ethernet due to less susceptibility to interference.

<p>False (B)</p> Signup and view all the answers

What is the primary advantage of using fibre optic for a LAN backbone?

<p>Speed and lack of attenuation</p> Signup and view all the answers

In a centralised network, the _______ is responsible for processing applications and data storage.

<p>server</p> Signup and view all the answers

Match the following types of clients with their descriptions:

<p>Thin Clients = Are connected to a server and have no local storage Fat Clients = Have most software installed locally and less network traffic Smart Clients = Access data remotely while using local processing Decentralised Network = Distributes workloads among multiple machines</p> Signup and view all the answers

Which of the following statements about Wi-Fi is true?

<p>Wi-Fi is typically more convenient than Ethernet. (A)</p> Signup and view all the answers

Ethernet requires data to be encrypted for secure connections.

<p>False (B)</p> Signup and view all the answers

What is meant by 'distributed processing'?

<p>Utilizing multiple processors/computers to run a single application</p> Signup and view all the answers

Ethernet connections are typically considered to have lower ______ compared to Wi-Fi.

<p>latency</p> Signup and view all the answers

What is a key characteristic of a fat client?

<p>Has most software installed locally (C)</p> Signup and view all the answers

Which of the following statements is true about a WAN?

<p>A WAN usually employs third parties for connections. (D)</p> Signup and view all the answers

Google Drive is a web-based application.

<p>False (B)</p> Signup and view all the answers

What type of device provides a connection between two or more network segments?

<p>Gateway</p> Signup and view all the answers

The WAN port of a Wi-Fi router connects to a high-speed _____ that links the network to the Internet.

<p>modem</p> Signup and view all the answers

Match the internet connection technology with its characteristic:

<p>3G = Improves data transfer but has slow speed 4G = Higher speeds than 3G LTE = Slight improvement over 3G 5G = Smarter and more efficient with low latency</p> Signup and view all the answers

Which of the following is NOT a component of WANs?

<p>Wireless LAN (C)</p> Signup and view all the answers

Satellite communications are always the most cost-effective option for WAN connections.

<p>False (B)</p> Signup and view all the answers

What is the primary purpose of a router in a home network?

<p>To create a network inside the house and connect to the internet.</p> Signup and view all the answers

Wi-Fi calling allows users to make phone calls over the _____ with no data cost.

<p>internet</p> Signup and view all the answers

Which connection technology is known for requiring more base stations for a reliable connection?

<p>5G (D)</p> Signup and view all the answers

What is the purpose of a public key?

<p>To encrypt data that anyone can send to the user (D)</p> Signup and view all the answers

A digital certificate binds a public key to the information about its true owner.

<p>True (A)</p> Signup and view all the answers

The protocol that is most commonly used for secure communication over the Internet is called _______.

<p>TLS</p> Signup and view all the answers

What happens during the SSL Handshake?

<p>The server's SSL certificate is authenticated (D)</p> Signup and view all the answers

Match the following components with their corresponding descriptions:

<p>Public Key = Encrypts messages sent to the user Private Key = Decrypts messages encrypted with the public key Digital Signature = Signing a document using a private key Certificate Authority (CA) = Issues digital certificates</p> Signup and view all the answers

A user can safely share their private key with others.

<p>False (B)</p> Signup and view all the answers

What is one key element included in a digital certificate?

<p>Domain name</p> Signup and view all the answers

Flashcards

App Self-Sufficiency

Mobile apps must handle all their functions and data within the app itself.

Boot Sequence

The initial set of operations a computer performs when turned on, including hardware checks and OS loading.

Operating System (OS)

Software that manages computer hardware and software resources, providing an interface between user applications and the hardware.

BIOS (Basic Input Output System)

Low-level software in firmware that performs the power-on self-test (POST) and loads the OS.

Signup and view all the flashcards

Kernel

The core of the operating system that resides in RAM and translates I/O requests to CPU instructions.

Signup and view all the flashcards

CMOS

Non-volatile memory storing hardware and software settings, backed by a battery.

Signup and view all the flashcards

Hyperthreading

A CPU technique making it seem like multiple threads are running simultaneously.

Signup and view all the flashcards

Multiprocessing

Using multiple CPUs to process tasks.

Signup and view all the flashcards

Multitasking

The operating system quickly switching between running tasks to make them seem simultaneous.

Signup and view all the flashcards

Multithreading

Executing multiple parts of a task simultaneously.

Signup and view all the flashcards

Sample Rate

The number of audio samples captured every second.

Signup and view all the flashcards

Bit Depth

The number of bits allocated to a sample.

Signup and view all the flashcards

Bit Rate

Number of bits processed per second in audio files (in kbps).

Signup and view all the flashcards

Lossy Compression

Compression that discards some audio information.

Signup and view all the flashcards

8kHz Sample Rate

A lower sample rate suitable for voice but unacceptable for music.

Signup and view all the flashcards

Wireless Router

A device that allows multiple networks to connect to the same network and provides access to the internet.

Signup and view all the flashcards

Wi-Fi

A facility for wireless internet connection and communication within a specific area.

Signup and view all the flashcards

Hotspot

A location providing internet access through a router or WAP to connect with an ISP(Internet Service Provider).

Signup and view all the flashcards

Ethernet

A wired networking technology that is faster and more reliable but more cumbersome than Wi-Fi.

Signup and view all the flashcards

Fibre Optic Backbone

A high-speed network connection that links various parts of a network, allowing information to share between them.

Signup and view all the flashcards

Centralised Network

A network that uses a single server for processing and data storage. Workstations, thin clients, connect to that server.

Signup and view all the flashcards

Decentralised Network

A network that distributes workloads among several machines, using more powerful workstations, not relying on one centralized computer.

Signup and view all the flashcards

Thin Client

A computer with limited processing power that stores only a small amount of data on its local hard drive; network resources mostly accessed through the server.

Signup and view all the flashcards

Fat Client

A computer that stores and runs most of its software locally, and on a hard drive, not relying heavily on the server.

Signup and view all the flashcards

Smart Client

A computer that mostly accesses its applications' data remotely via an internet connection, using the local drive for computation.

Signup and view all the flashcards

Wide Area Network (WAN)

A network connecting multiple Local Area Networks (LANs) or other networks across a large geographic area.

Signup and view all the flashcards

Gateway

A device that connects two or more network segments, often translating between different network protocols.

Signup and view all the flashcards

Router

A device that forwards data packets between networks, potentially acting as a gateway between networks using the same protocol.

Signup and view all the flashcards

Wi-Fi Router

A router specifically for wireless networking, typically with a WAN port for internet connection and LAN ports for local devices.

Signup and view all the flashcards

Satellite Communication

Transmission of data using satellites in orbit, covering long distances.

Signup and view all the flashcards

Microwave

Transmission using electromagnetic waves in the microwave range.

Signup and view all the flashcards

Cellular Technology

Mobile phone networks divided into cells, each with a base station, enabling connections.

Signup and view all the flashcards

3G

Third Generation mobile technology, improving data transfer of formats like standard HTML, videos, and music, but with slow speeds.

Signup and view all the flashcards

4G LTE

Fourth Generation Long-Term Evolution mobile technology providing faster speeds.

Signup and view all the flashcards

5G

Fifth Generation mobile technology with low latency and high speeds, requiring more base stations.

Signup and view all the flashcards

Hybrid Mobile Apps

Apps that combine features of both native and web apps, offering a platform-independent solution.

Signup and view all the flashcards

Plug-Ins & Extensions

Software modules that add features to existing programs or web browsers.

Signup and view all the flashcards

Plug-In

A software module that adds special features to an existing program, often requiring executable code, to customize its behavior or functionality.

Signup and view all the flashcards

Extension

A software module that adds features specifically for web browsers, often using source code, for greater user control.

Signup and view all the flashcards

Touch Sensitivity

A factor in mobile design, influencing how users interact with apps and websites.

Signup and view all the flashcards

Screen Resolution Quality

The clarity and detail of a mobile device screen, impacting app design and performance.

Signup and view all the flashcards

Processing Demands

The amount of processing power a mobile app requires, influencing its performance and battery life.

Signup and view all the flashcards

Bandwidth Requirements

The amount of data a mobile app uses for its operations, affecting its speed and potentially its cost.

Signup and view all the flashcards

Public Key

A publicly available code used to encrypt messages. Only the corresponding private key can decrypt it, ensuring secure communication.

Signup and view all the flashcards

Private Key

A secret code used to decrypt messages encrypted with the corresponding public key.

Signup and view all the flashcards

What is 'signing' a document using cryptography?

Encrypting a document with your private key, proving its authenticity and integrity.

Signup and view all the flashcards

Digital Certificate

A digital file that verifies an organization's identity, binding their public key to their information.

Signup and view all the flashcards

Certificate Authority (CA)

A trusted organization that issues digital certificates to verify the identities of website owners.

Signup and view all the flashcards

SSL (Secure Sockets Layer)

A protocol ensuring secure communication between websites and users, protecting data transmitted over the internet.

Signup and view all the flashcards

TLS (Transport Layer Security)

The most advanced and widely used protocol for securing communication over the internet, replacing SSL.

Signup and view all the flashcards

SSL Handshake

The initial exchange of information between the server and client to establish a secure connection using SSL or TLS.

Signup and view all the flashcards

Study Notes

Information Technology (IEB) Exam Prep

  • This document is a compilation of various sources' definitions and explanations to assist in IT preparation. No claim is made to its originality or intellectual property.
  • It adheres to the IEB's SAGS document (Appendix G) as of 2022.

System Technologies

Hardware and Software

  • Hardware is the physical components of a computer, including CPU and RAM
  • Software is a set of computer programs and associated documentation and data, or a set of instructions that tell a computer what to do (e.g., Microsoft Word)
  • ICT systems use electronic technologies and techniques to manage, capture, transmit, and display information and knowledge.
  • Computers are devices that process data according to instructions, typically electronic.
  • Input Processing Output (IPO) Model describes a system with input, processing, and output stages
    • Input involves providing data to the system
    • Processing occurs when the computer interprets and executes the input
    • Output is the result after processing.
  • Advantages of Using Computers
    • Speed
    • Accuracy
    • Repetitiveness
    • Versatility
  • Disadvantages of Using Computers
    • High cost
    • Takes over human jobs
    • Waste produced by computers
    • Health problems (eyes, neck, back)

Data

  • Data is a collection of facts.
  • Raw and unorganized, meaningless on its own
  • Information is data put into context.
    • Organized and analyzed
    • Meaningful

System Types

  • Laptops = Portable personal computers (PC)
  • Desktops = PCs for regular use at a single location
  • Servers = computers or programs that manage central resources or services in a network

Embedded Computers

  • Hardware and software that performs a specific function (e.g., camera in a washing machine)
  • Smart wear = Wearable technology for monitoring activity and condition
  • Tablets = Portable touchscreen devices
  • Smartphones = Portable computing devices combining mobile and telephone functions
  • Single Board Computers (SBC) = Complete computers on a single circuit board (e.g., Raspberry Pi, Arduino)

Processing Power

  • Processing power, from highest to lowest: server, supercomputer, desktop, mobile.

Operating Systems

  • The main control program in a user's device.
  • Creates a user interface.
  • Loads and runs programs.
  • Manages resources
  • Acts as an interface between hardware and application programs (e.g., Windows, macOS, Android, iOS)

Application Software

  • Stand-alone applications (e.g., Notepad, MS Word) need no other applications to run.
  • Network applications (e.g., web browser) communicate with other applications on different hosts.

Main Hardware Components

  • CPU: made up of the control unit (CU), arithmetic logic unit (ALU), and registers
  • Primary Storage: RAM, BIOS, ROM
  • Secondary Storage: HDDs, SSDs, SD cards, flash drives
  • Input devices: pointing devices (mouse), keyboards, scanners, microphones, biometric devices
  • Output devices: monitors, printers, speakers
  • Ports: USB, HDMI
  • Motherboard: connects components and devices

CPU Design

  • Registers
    • Stores current instructions and data
    • Instructions are broken down and individually stored in segments
  • Control Unit (CU): Controls the execution of instructions, sends read/write signals to memory
  • Arithmetic Logic Unit (ALU): Performs calculations and logical comparisons. Data loaded from RAM is processed and saved.

Serial Processing

  • Outdated; one instruction at a time
  • Single-core processors process one set of instructions sequentially

Parallel Processing

  • Simultaneous execution of instructions; using multiple microprocessors

Hyperthreading

  • Developed by Intel in 2002
  • Thread = part of a program, a set of instructions
  • Process = regards the entire program
  • Hyperthreaded CPUs appear as two logical CPUs in the OS but have only one physical CPU
  • Enables simultaneous execution
  • Preloading next instructions into registers while processing the first one

Multiprocessing

  • Multiple cores on a CPU chip.
  • Entire core is duplicated instead of only the registers.
  • Cache stores data for faster requests.

Processor Cache

  • Faster memory close to the CPU.
  • Caches instructions for faster retrieval.

Cache Hit/Miss

  • Cache hit: requested data is found in the cache
  • Cache miss: requested data is not found in the cache.

RAM (Random Access Memory)

  • Most common: DDR SDRAM
  • Double Data Rate (data transferred at the rise and fall of pulses).
  • Faster than previous RAM versions.

Motherboard

  • Connects components and devices.
  • Uses buses, slots and ports for connections.
  • Uses the system clock for timing and synchronization of all computer functions.
  • Speed measured in MHz.

Internal Buses

  • Transfer instructions between CPU and RAM
  • Wider buses mean higher throughput
  • Consist of Data Bus, Address Bus and Control Bus

External Buses

  • Connect external devices to the computer for storage (e.g., PCIe, NVMe, USB, SATA)

SATA (Serial Advanced Technology Attachment)

  • Connects mass storage, like hard drives

USB (Universal Serial Bus)

  • Standardises connections for almost any peripheral

NVMe (Non-Volatile Memory Express)

  • Connects SSDs directly to the motherboard to improve read/write speed.

M.2 Interface

  • Designed for high-speed operations.
  • Consumes less space.

Secondary Storage (HDD vs SSD)

  • HDD (Hard Disk Drive): spinning disks
  • SSD (Solid State Drive): no moving mechanical parts.
  • SSDs run faster, are quieter, and are more resistant to shocks compared to HDDs.

Cloud Storage

  • Data stored remotely on the internet.
  • Cost based on bandwidth and storage space.

Other Caching

  • Disk Cache: Hardware mechanism in a hard drive that stores frequently accessed data in RAM.
  • Browser Cache: stores web pages on a user's hard disk for quicker future access
  • Web/Proxy cache stores recently accessed web pages for faster future access.

Modular Design & Performance

  • Devices can be repaired or upgraded without replacing the entire system.

Clock Manipulation

  • Overclocking increases system clock speed, but may cause excess power consumption.

Expansion Cards

  • Added to a motherboard to provide more functionality.

Co-processors

  • Assist the CPU by taking over some of its workload.

Graphics

  • Translation of digital data into images and colour
  • Graphics Processing Unit (GPU) improves processing speed and resolution for image rendering.
  • Uses Video RAM to improve graphics.

System Clock

  • Regulates timing and synchronisation in computer functions.

Serial Processing

  • Processing instructions one at a time.

Parallel Processing

  • Simulataneous processing of data by different parts of the system (instructions/instructions sections).

Hyperthreading

  • Developed by Intel in 2002
  • Creates two logical processors to optimize performance.

Multiprocessing

  • Multiple cores to increase processing of tasks.

Latency

  • The time taken for RAM to respond to a request.

Latency vs. Throughput

  • Latency represents the delay, while throughput is the rate at which data is transferred.

Buses

  • Internal bus (connects CPU and RAM)
  • External bus (connects to peripherals like hard drives).

Ports

  • Physical connections for external devices (e.g., USB, HDMI, PCIe and SATA)

Internet and Communication Technologies

LANs (Local Area Networks)

  • A group of devices connected in a close proximity for sharing resources.
  • Uses Ethernet to connect devices in a LAN.
  • Network devices: clients, servers, switches, routers.

Network Topology Diagrams

  • Star: All devices connect to a central switch. If the switch fails, the network fails.
  • Bus: All devices connect to a single cable. If the cable fails, the network fails.
  • Tree: Combines star and bus topology.
  • Ring: Devices connect in a closed loop, passing through each node. If a node fails, network fails.
  • Mesh: A collection of wireless nodes with access points. All nodes are networked together.

Network Addressing Diagrams

  • IP Address: Numerical label to allow computers to communicate over the internet. Can be static (assigned manually, less likely to change) or dynamic (changes over time). IPv4 uses 32-bits. IPv6 uses 128-bits.
  • MAC Address: Unique hardware identifier for devices in a LAN. This never changes.
  • ARP (Address Resolution Protocol): Links MAC addresses to IP addresses.
  • DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses to devices automatically. Makes IP addressing easier.
  • DNS (Domain Name Servers): translates domain names to IP addresses (internet equivalent to a phonebook).

Internet Protocols

  • HTTP (Hypertext Transfer Protocol): Standard protocol for transferring website pages over the internet.
  • HTTPS (HTTP over Secure Socket Layer): Secure version of HTTP, used for secure transactions (e.g., banking).

Downloading

  • FTP (File Transfer Protocol): Used for transferring files over the internet.
  • WebDAV (Web Distributed Authoring and Versioning): Used for communication between client browsers and web servers.

Cloud Computing

  • Data stored on a remote server, accessible via the internet.

Client-Server Model

  • Data hosted on a remote server and used by clients.

P2P (Peer-to-Peer)

  • Each computer acts as both a client and a server. Files are exchanged across the network.

Mobile Technologies

  • Wearable Tech: Technology worn or near skin used to analyse human data, for health tracking or notification.
  • HMD (Head Mounted Display): A visual display worn on the head (e.g. Oculus VR).
  • Smart Clothing: Technology used in clothes for data collection.

Types of Networks

  • Personal Area Network (PAN): Connects devices from a single user (e.g., tablet, smartphone).
  • Local Area Network (LAN): connects devices within a local area.
  • Metropolitan Area Network (MAN): connects devices in a city or metropolitan area.
  • Wide Area Network (WAN): Connect devices in a large area (e.g. countries or continents).

Mobile Positioning & Services

  • GPS (Global Positioning System)
  • Location Based Services (LBS)

Cloud Computing

  • Store, manage, and process data on remote servers on the Internet.

Cloud Storage

  • Data storage in a remote location.
  • Can be personal, private (company), or public (e.g., Dropbox, iCloud, Google Drive).
  • Accessed via the internet.

Advantages

  • Ease of access
  • Reduced need for local storage

Disadvantages

  • Data theft/loss if not properly secured
  • Reliance on a stable internet connection

Data Misuse

  • Data used for different purposes than collected.
  • Without clear usage guidelines for the data.

Right to Privacy

  • The right of individuals not having their communications and property searched.

Right to Access

  • Public right to information held by government organisations or individuals.

Big Data

  • Extremely large datasets.
  • Requires special techniques for analysis.

Digital Heritage

  • Preserving digital content for future generations.

### Information, Communication & Technology

Multimedia Online

  • Combination of text, graphics, audio and video files for internet communication.
    • Downloading involves copying files to a local storage.
    • Streaming delivers data continuously without copying to a local storage.
  • On-demand media allows users to select and watch/listen to content when they want to.
  • VoIP = Voice over Internet Protocol. Data communication, transferring media using IP networks.

Compression Techniques

  • Lossy compression results in some data loss but reduces file size. Used for images and audio.
    • JPEG
    • MP3
  • Lossless compression maintains all original data, but might not reduce the file size as much. Used for text or documents.
    • ZIP

### Web Browsing

  • Search Engines: Used to retrieve web information (e.g., Google, Bing, Yahoo)
  • Surface Web: Part of the web that is indexed by search engines
  • Deep Web: Content not indexed by surface web search engines (medical, legal, finance records)
  • Dark Web: Hidden part of the Deep Web, with restricted access.

Anonymous Browsing Tools

  • Onion Router (Tor): network that encrypts data to provide anonymous communication (e.g., for privacy).

Internet Service Technologies

  • Evolution: Changes in how services connect to the internet.
    • Web 1.0 (static sites, limited user interaction, few developers)
    • Web 2 (dynamic sites, user interaction, social network, wikis, blogs)
    • Web 3 (personalization, real-time data notification, e-commerce, personalized experiences)
    • Web 4 (adaption to surroundings for user device)

Mobile Web Applications

  • Web-based applications that can run using only a web browser.

### Errors, Threats & Security

  • Human errors: wrong inputs, poor understanding of consequences of actions
  • Data corruption: Loss of data.
    • Power failure can cause data to be lost.
    • Malware can steal or corrupt data.

Solutions

  • Verification: Checks for consistency and correctness.
  • Validation: Checks all the data for completeness, relevance and accuracy.
    • Presence: checks if the data item is present.
    • Range: Checks for values within bounds.
    • Uniqueness: checks if the data is already present.
    • Type: Checks if the data is of the correct format.

Security Threats

  • Malicious Software: Viruses, malware, ransomware, phishing and social engineering.
  • SQL Injection: malicious programs insert data into databases to get access.
  • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks: Overloading the server to cause denial to access.
  • Hardware Failure: Faults/damage in hardware, like hard drives, power supplies and network cables.
  • Software Failure: Software bugs can cause data corruption or system crashes.
  • Data theft: Software or data being stolen from systems/users

Safeguards

  • Firewalls: Monitor and control network traffic patterns to prevent malicious activity.
  • Antivirus: Software programs that scan for and eliminate malware.
  • Encryption: Encoding data to protect during transmission and storage.
  • Backups: Creating copies of data on another medium to avoid data loss.
  • UPS (Uninterruptible Power Supply): Prevent data loss due to power failure.

Social & Ethical Issues

  • Economic Reasons: Use of computers to save costs, increase efficiency and accuracy
  • Digital Divide: Unequal access to ICT resources among different demographics and regions.
  • Ergonomics & Health: Use of technology can cause repetitive strain injury (RSI), eye strain, carpal tunnel syndrome.
  • Privacy: Collecting, sharing and misuse of data.
  • Political Effects: Using the internet for campaigning and influencing voters.
  • Environmental Effects: The impact of technology on the environment (electricity use and e-waste)

### Data & Information Management

Database Management System (DBMS)

  • Software for managing data in a database, including permissions, backups, and control of access.

Data Integrity Management

  • Accuracy: Checks to ensure that the stored data conforms to its true value.
  • Currency (Timeliness): Ensures that the data is current, up to date.
  • Correctness: conformity to standards.
  • Completeness: that it meets all the requirements

Data Warehousing

  • Stores data from multiple sources for analysis and reporting.
  • Data transformed from transactional systems for summaries or reports.
  • Data stored in a normalized schema.

Data Types

  • Structured Data: Data that has a predefined structure, such as numerical, textual, dates and times, which can be easily searched and understood.
  • Unstructured Data: Data without a predefined structure, like images, audio, and video, which may be harder to process.
  • Big Data: Datasets too large to be processed by conventional databases. Characteristics are: Volume, Velocity, Variety, Veracity.

Knowledge Discovery in Databases (KDD)

  • Processes to extract useful information from databases for analysis and patterns.

Data Mining

  • Extracting patterns and knowledge from data.

Conclusion:

  • Provides a comprehensive overview of the subject matter, with detailed points and multiple perspectives.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

IT SAGS Notes 2023 PDF

Description

Test your knowledge on audio file characteristics, operating system functions, and technology related to mobile applications. This quiz covers sample rates, bit rates, and the roles of different system components. Challenge yourself with matching terms and concepts in this technical assessment.

More Like This

Audio Technology in Worship
36 questions
Digital Audio Technology - Introduction to Sound
54 questions
Digital Audio Technology: Sound in Production
51 questions
Use Quizgecko on...
Browser
Browser