Cambridge Technical Level 3 IT

  • Created by: aboy
  • Created on: 22-12-20 12:20
Input device
A device which is plugged in or connected to a computer
1 of 70
Output device
A signal which comes out from the computer
2 of 70
Central Processing Unit (CPU)
Unit that controls the actions of the Computer and manipulates required tasks
3 of 70
A circuit board that connects the CPU to the memory and the all other hardware.
4 of 70
Random Access Memory (RAM)
RAM is volatile memory; the computer storage saved by the RAM is only maintained while the computer is powered.
5 of 70
Read Only Memory (ROM)
ROM is non-volatile memory; the computer will maintain instructions even when the computer is shut down.
6 of 70
Universal Serial Bus (USB)
Most common computer port

(Printer, Camera/camcorder, and mobile phone)

Digital communication of short distance
7 of 70
Links devices which need high speed transfer of large amounts data

e.g. DVD player
8 of 70
Serial Advanced Technology Attachement (SATA)
Connects optical and hard disk to computer
9 of 70
Ethernet port
Used for cable based networks which links directly to the computer's network card (NIC)
10 of 70
The physical components of a computer
11 of 70
A program that run on the computer which manages hardware
12 of 70
Solid State Drive (SSD)
internal computer storage device

Non-volatile memory

Fast read and write speed
no moving parts
13 of 70
Flash Memory
Low cost


No moving parts


e.g. USB and SD Card
14 of 70
Cloud Storage
Low cost

Easier management

Enables sharing and access from anywhere
15 of 70
Copper wired connection
Twisted Pair (TP)

Commonly used in telephone systems

Several twisted pairs bought together to form a twisted cable

Untwisted pair (UTP)& Shielded Twisted pair
16 of 70
Fibre Optic Cables
The fastest delivery by a cable.

The thinner the cable the better the signal.

The signal is sent down a glass rod/core, as a beam of light ; Optical fibre lamp
17 of 70
Coaxial Cable
Copper wire based connector. This wire can be used to link television set to an aerial socket (Sky TV)
18 of 70
Wireless connection
Do not use cable but use Radio Frequency (RF) to transmit data or instructions between devices

e.g. computer, printer, certain credit cards and payment terminals
19 of 70
Connecting devices via a network hub

Up to 92 meters depending on frequency and obstruction
20 of 70
Laser networks
Sending data using a light beam to devices in a line of sight.

e.g. Satellite communication

Up to 10km but can be blocked by fog or haze
21 of 70
Infarared technology
LED - emitting received by a photodiode in the receiving of a device

e.g. TV remote control
22 of 70
Microwave Communication
Short radio waves to send signals via microwave towers

Can provide analogue or digital format

Must be in a sight with no obstruction
23 of 70
Network Hub it
A node that broadcasts data to every computer or Ethernet-based device connect to it
24 of 70
A switch is a device in a computer network that connect other devices together.
Multiple data cables are plugged into a switch to enable communication between different networked devices.
25 of 70
Hybrid network
Any computer network that uses more than one type of connecting technology or topology

e.g. both Wi-fi and Ethernet cables to connect a computer router
26 of 70
Enables connection between network, switches to communicate between devices. To transfer data packets across the network.
27 of 70
Open Source Software
Software that is dedicated to a community who will provide help and support

free or very low cost

users can upgrade or change the software

may not have a user-friendly interface
28 of 70
Proprietary Software
Developed and professionally tested

There is a technical support platform (help service)

user licences apply
29 of 70
Application software
Designed to carry out tasks

Account management, text creation and editing, presentation preparation and design drawing
30 of 70
Utility Software
System software designed to help analyse, configure, optimise or maintain a computer

e.g. anti-virus software, backup software
31 of 70
A set of rules in which computers communicate with each other
32 of 70
Web transfer protocol
33 of 70
Transmission Control Protocol/Internet Protocol (TCP/IP)
The set of protocols used over the internet

It organises how packets are communicated and if they have the following source
34 of 70
Voiceover Internet Protocol (VoIP)
Method of digital telephone, video - conferencing and teleconferencing

Converts analogue sound to digital sound
35 of 70
One physical computer performing the function of multiple computers
This is to create a simulated/ virtual network
36 of 70
Hypervisor/Virtual Machine Monitor (VMM)
A piece of computer software, firmware or hardware
It creates and runs a virtual machine.
37 of 70
A server is a computer that provides data to other computers.

File server
Print server
Application & database Sever
Web, Mail and Hypervisor
38 of 70
Computer Networks
The interconnection of computer to communicate and share files and resources

LAN - Local Area Network
WAN - Wide Area Network
CAN - Campus Area Network
MAN - Metropolitan Area Network
HAN - Home area Network
39 of 70
Network toplogies
Logical layout of devices connected to a network

Bus - Single main cable to which computers are connected to

Ring - All computers are connected in a circle

Star - All computers have their own link to a central computer

Mesh - Where each computer can
40 of 70
Peer to Peer
Each computer is responsible for providing data. Each computer stores files and acts as a server.
E.g. Lime wire and Pirate Bay
41 of 70
Client Server
A relationship between two computers where the client makes a request to the server

e.g. Web Server - A web browser is the client which makes a request to the server and sends the website to the browser
42 of 70
The amount of data that can be carried at once

Transmission speed - Measured in Mbps (Megabits per Second) or Gbps (Gigabits per Second)
43 of 70
Business system
Designed to connect all the organisations's intricate (complex) parts and interconnected steps to work together to achieve a business strategy
44 of 70
Management Information System (MIS)
The processing of information through computers and other intelligent device
45 of 70
Customer Relations Manager (CRM)
An approach to managing a company's interaction with current potential customers
46 of 70
Standard Operations Procedure (SOP)
A set of step-by-step instruction complied by an organisation to help carry out complex routine operations.
47 of 70
A resource intended to provide the customer or end user with information and support relating to products and services.
48 of 70
A set of moral principles that governs a person's behavior or the conduction of an activity
49 of 70
The practice of reporting abuses at work on a small or large scale for the hope of something being done about it
50 of 70
Disability/gender/sexuality discrimination - under the Equal opportunities act
51 of 70
Operational Issues
The issue that affects the daily or routine operations carried out by a business in order to fully function
52 of 70
Security Information
This is about making sure all information stored by a company is secure and where necessary backups have been made.
53 of 70
The use of backups & the restoration of the data are critical in ensuring the data is safe and secure.
54 of 70
Health and Safety
Governed by Health & Safety at Work Act 1974, employers are legally obliged to look after the safety of their customers and staff.

Eye - Strain

Back and Neck Ache

Repetitive Strain Injury
55 of 70
The act of informing of staff of how to do things and polices are in place.
56 of 70
This is the process of updating and informing staff of legal issues in their workplaces
57 of 70
The act of making a company safe, wheelchair access, barriers, clothing, training on safety measures, fire tests, ladder climbing, object lifting. Procedures are practiced reviewed and improved regularly.
58 of 70
Disaster and Planning & Recovery
The process and procedure a company puts in place to ensure that essential functions can continue during and after a disaster
59 of 70
An e-mail fraud method which the perpetrator sends out legitimate- looking email.
60 of 70
The process by which a Hacker gains unauthorised access to a computer system or a network.

Hacking can be carried out for reason such as data theft and simply testing organisation security.
61 of 70
A computer program that is designed to replicating itself by copying itself into the other programs stored in a computer.
62 of 70
• Trojans are stealth applications which are designed to allow others to access your system
63 of 70
This is where an unauthorised party gain access to an asset.

It is a direct threat to confidentiality and this can have major repercussions for a company e.g. poor image and reputation. to capture data on a network.
64 of 70
An electronic attack where digital communications are intercepted by an individual who they are not intended.
65 of 70
Data Theft
The theft of data that can be used for malicious purposes.
66 of 70
Social Engineering
The context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
67 of 70
Lock & Key
This is defined as 'when essential systems are held in rooms and buildings which are secured under lock and key'

You will see a slot at the side where a padlocked chain can be placed to secure a device.
68 of 70
Digital Keypads
These can be reprogrammed at regular intervals but cannot prevent access by observation or by colleagues passing the codes onto others.
69 of 70
The implementation of technology to use biological information about ourselves as a method of unique identification.

Rentinal Scan

Fingerprint Recognition

Voice Recognition
70 of 70

Other cards in this set

Card 2


A signal which comes out from the computer


Output device

Card 3


Unit that controls the actions of the Computer and manipulates required tasks


Preview of the back of card 3

Card 4


A circuit board that connects the CPU to the memory and the all other hardware.


Preview of the back of card 4

Card 5


RAM is volatile memory; the computer storage saved by the RAM is only maintained while the computer is powered.


Preview of the back of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Fundermentals of IT resources »