computer science end of year exam

?
  • Created by: crawb
  • Created on: 03-05-17 10:13
EU COOKIE LAW
Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer. This allows the server
1 of 18
FIREWALLS
Firewalls are software programs or hardware devices that filter the traffic that flows into you PC or your network through a internet connection. They sift through the data flow & block that which they deem (based on how & for what you have tuned the
2 of 18
PERIPHERAL DEVICES
A peripheral device is defined as a computer device, such as a keyboard or printer, that is not part of the essential computer (i.e., the memory and microprocessor). These auxiliary devices are intended to be connected to the computer and used.
3 of 18
INPUT DEVICES
An input device is any piece of computer hardware used to provide data to a computer system. Examples include: keyboard mouse scanner digital camera webcam
4 of 18
OUTPUT DEVICES
An output device is any piece of computer hardware used to communicate the results of data that has been processed. Examples include: monitor printer speaker headphones
5 of 18
COMPUTING
A computer buzzword that refers to a program or device's ability to link with other programs and devices. For example, a program that can import data from a wide variety of other programs and can export data in many different formats is said to have
6 of 18
BANDWITH
Bandwidth is also defined as the amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second.
7 of 18
LATENCY
Latency is the delay from input into a system to desired outcome; the term is understood slightly differently in various contexts and latency issues also vary from one system to another.
8 of 18
WPA
Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.
9 of 18
COMMUNICATION PROTOCOLS
All communications between devices require that the devices agree on the format of the data. The set of rules defining a format is called a protocol.
10 of 18
POP
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
11 of 18
IMPA
IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
12 of 18
ADVANTAGES OF COMPUTING NETWORKS
Connectivity and Communication: Networks connect computers and the users of those computers. Individuals within a building or work group can be connected into local area networks (LANs); LANs in distant locations can be interconnected into larger wid
13 of 18
DISADVANTAGES OF COMPUTING NETWORKS
Purchasing the network cabling and file servers can be expensive. Managing a large network is complicated, requires training and a network manager usually needs to be employed. If the file server breaks down the files on the file server become inacce
14 of 18
NETWORK SECURITY
"Network security" refers to any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of
15 of 18
TYPES OF SECURITY
Anti-virus software, firewalls, secure passwords, encryptions
16 of 18
benifits of vle
VLE can help teachers and support staff manage and deliver a variety of daily tasks, including: general class administration and organisation. the creation of lesson plans using existing resources. assessment and monitoring of students.
17 of 18
online auctions
n online auction is a service in which auction users or participants sell or bid for products or services via the Internet. Virtual auctions facilitate online activities between buyers and sellers in different locations or geographical areas.
18 of 18

Other cards in this set

Card 2

Front

Firewalls are software programs or hardware devices that filter the traffic that flows into you PC or your network through a internet connection. They sift through the data flow & block that which they deem (based on how & for what you have tuned the

Back

FIREWALLS

Card 3

Front

A peripheral device is defined as a computer device, such as a keyboard or printer, that is not part of the essential computer (i.e., the memory and microprocessor). These auxiliary devices are intended to be connected to the computer and used.

Back

Preview of the back of card 3

Card 4

Front

An input device is any piece of computer hardware used to provide data to a computer system. Examples include: keyboard mouse scanner digital camera webcam

Back

Preview of the back of card 4

Card 5

Front

An output device is any piece of computer hardware used to communicate the results of data that has been processed. Examples include: monitor printer speaker headphones

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Computer systems resources »