IT Flashcards PDF
Document Details
![HarmlessGold4258](https://quizgecko.com/images/avatars/avatar-3.webp)
Uploaded by HarmlessGold4258
Prendergast School
Tags
Summary
This PDF document appears to be flashcards for learning about various aspects of IT, covering topics like computer components, software, and various other technologies. It seems to be for teaching or revision purposes at a secondary or high school level.
Full Transcript
Personal computers typically contain Describe the main components of a personal individual processors, RAM, hard disk computer. components, and expansion ports, allowing for upgrades and enhanced capabilit...
Personal computers typically contain Describe the main components of a personal individual processors, RAM, hard disk computer. components, and expansion ports, allowing for upgrades and enhanced capabilities. Personal computers support a wide range of functions such as word processing and How do personal computers differ from graphics editing, while mobile devices often mobile devices in terms of functionality? lack a keyboard and are less suitable for tasks like word processing. Servers connect to personal computers via ethernet cables or Wi-Fi, providing access to Define the role of servers in relation to resources and typically featuring larger personal computers. storage capacities and higher memory compared to personal computers. A microphone is an audio input device that Describe the function of a microphone in allows users to input sound, commonly used digital communication. for holding VoIP conversations and recording voice. A graphics tablet is a flat boarding pointing device that uses a stylus, allowing users to How does a graphics tablet enhance the user enter data similarly to pen and paper, making experience for digital artists? it ideal for producing logos and digital artwork. A projector is an output device that displays visual content from a computer onto a wall or Define the role of a projector in a classroom screen, making it popular for watching setting. television, films, and for educational purposes in classrooms. Antivirus software detects and removes suspicious software before it can cause Describe the role of antivirus software in problems by scanning the system, although computer security. the scanning process may temporarily slow down the system depending on the size of the data storage. Firewalls monitor incoming and outgoing traffic to prevent unauthorized access from How do firewalls contribute to network hackers or malware, but they can also slow security? down network speeds and affect overall performance. Productivity software consists of applications that allow users to perform various tasks efficiently, such as word processing, data Define productivity software and its purpose. organization in spreadsheets, database management, creating presentations, and graphic design. Factors include costs, efficiency, Describe the factors that influence the choice implementation time, testing, migration of of an IT system. existing data, timescales for delivery, and performance of the system. Efficiency affects how effectively tasks can be How does efficiency impact the choice of completed, potentially reducing the need for digital technology in a business setting? staff. For example, self-service checkouts allow one person to manage multiple tills. Migration refers to the process of transferring Define the term 'migration' in the context of existing data, such as software and files, onto implementing a new IT system. a new system, which can be complex but may be automated. SET is a secure payment system that initially Describe the Secure Electronic Transaction supported MasterCard and VISA, sending card (SET) system. details from the website to the merchant's bank for transaction authorization. The 3D Secure Protocol enhances security by How does the 3D Secure Protocol enhance using XML Protocol and SSL encryption to online payment security? secure data during online transactions for VISA, MasterCard, and American Express. 802.11b supports 11mbps at 2.4GHz, 802.11g Define the key differences between 802.11b, supports 54mbps at 2.4GHz and is backward 802.11g, and 802.11ac wireless compatible, while 802.11ac supports dual- communication protocols. band with 450mbps at 2.4GHz and 1300mbps at 5GHz. Social networking sites are effective for Describe the advantages of social networking organizing events related to specific areas of sites for event organization. interest, allowing users to connect and coordinate activities. Online communities can expose personal data to a wide audience, as users create profiles How can online communities impact personal with various information. If privacy settings privacy? are not managed carefully, this data can be publicly accessible, leading to risks like identity fraud and bullying. Chatrooms allow users to communicate in real-time via short text messages in a shared Define the difference between chatrooms and conversation, while instant messaging is instant messaging. similar but typically involves one-on-one communication. Encryption is used to encode data to prevent Describe the purpose of encryption in data unauthorized access, ensuring that even if security. someone gains access to the device, they cannot read the confidential information. Symmetric encryption, also known as private key encryption, uses the same key for both How does symmetric encryption work in encrypting and decrypting data, typically with securing stored data? key sizes of 128 or 256 bits, converting data into an encoded form called cipher-text.