HideShow resource information
1 Terabyte (TB) is equal to
1000 Gigabytes
1 of 51
Benefits of flash memory are
it doesn't lose data when turned off, has no moving parts and data can be transfered
2 of 51
connection types
wired-USB, ethinet cable, firewire Wireless-bluetooth, Wi-Fi, infra red
3 of 51
network interface card, needed for an internet connection
4 of 51
Internet service provider, oftern supply a router and modem
5 of 51
Cloud computing allows you to
store data on a remote server to be accessed from various devices
6 of 51
Health risks of didgital devises and hot to stop them
Eye strain-take brakes, screen filter RSI- take brakes, Back problems- ajustable seats
7 of 51
Digital zoom
crops and enlarges images, reduces quality
8 of 51
Optical zoom
moves the lens closer to the subject, no effect on quality
9 of 51
a signal from three or more satellites is used to tringulate your location
10 of 51
Your location, the exact longitude and latitude, is recorded as a small text file with your photo
11 of 51
high tech treasue hunt using GPS to find containers or geocaches
12 of 51
Downloading vs Streaming
Downloading-can view anytime, quality not depdant on connection Streaming- faster, less storage used
13 of 51
Digital living network alliance, devices are compatible
14 of 51
Smart TVs
can stream from the internet or use cloud computing
15 of 51
connects devices to the modem by giving them an internal IP adress
16 of 51
Wired vs Wireless network
Wired- faster, more secure, no interference Wireless-only need a router, cheaper, access from anywhere in the house
17 of 51
Securing wireless networks
change the admin password, set up an encryption, set up MAC, hide the router, turn off the router when not in use
18 of 51
bandwidth and latnecy
bandwidth-number of bits that go through the netowrk per seconf Latency-delay between bits arriving and leaving a device, High bandwidth and low latency is best
19 of 51
WiFi vs Mobile broadband (3G, 4G)
WiFi-need a wireless access point, ok range, widely available, hackers can set up open hotspots to steal info Mobile broadband- more coverage, more secure, roaming charges, limited download, lower bandwidth
20 of 51
Peer to peer networks
digital devices communicate wirelessly without a transmitter, Examples are bluetooth and WiFi direct
21 of 51
WiFi direct vs bluetooth
WiFi direct has a higher bandwidth and lower latency than bluetooth
22 of 51
Voice over internet protocol- transmitting audio messages over the internet
23 of 51
used for sending and receiving emails
24 of 51
Email is sent from the email client to the email server then the recipient's server
25 of 51
Email is read then downloaded by the server to the computer then deleted from the server, can be read offline
26 of 51
Email is read by the server but not deleted, can be accessed from any device with an internet connection
27 of 51
when you type a web address, your browser uses HTTP to ask the web server to send the files needed to load the page
28 of 51
sending secure info, browser check site's certificate then the web server and browser decide on encryptions that they can understand next the browser and server send encryption codes finally the server and browser communicate
29 of 51
Digital certificate
if you double click the green padlock you can view a site's certificate, they are issued from companies like Norton and identify the website but can be faked
30 of 51
Network risks
security- remote access, intercpting data, illegal access can be stopped by up to date firewalls, encryption and a strong password, Physical- theft, physical access, can be stopped by security doors and locks, CCTV, alarms
31 of 51
The internet
Huge network that links networks of digital devices, communicate with the same protocol, need a (NIC) and (ISP)
32 of 51
World Wide Web
A service on the internet, uses HTTP to allow users to access interlinked hypertext documents (web pages)
33 of 51
Security messures
security questions- enter a personel question, Captcha- checks for bots and stop spam
34 of 51
fake emails that request personel info, to spot them look for spelling, threats, impersnal greetings, a bad e-mail, a request for info or call your bank
35 of 51
Data protection act (1998) companies
companies holding data must- keep i secure, only obtain necessary info, not keep it for longer than needed, keep it accurate, use it for the specified purpose
36 of 51
Date protection act (1998) users
Users have the right to- check the data held, demand data is correct, demand your data is not used for direct marketing
37 of 51
Computer misuse act (1990)
lists hree levels of crime- Unauthorised access to material, unauthorised modification of material, unauthorised computer access
38 of 51
Copyright, Designs and Patents act
protects original work, only the creator has the right to reproduce, adapt or sell it, braking the act can cuase prosecution, restriction or imprisionment
39 of 51
Online auction
Create account, seller supplies description, highest bid wins, winner must buy the item, seller and bidder exchange email to arrange payment
40 of 51
Transactional data
Uses cookies, collects info on viewed pages, purchase price, purchased product, used for understanding customer needs (market research) target marketing
41 of 51
Credit/ debit cards
Online payments ask for- card number, expiry date, CCV, cardholder name
42 of 51
Third party payment
Buyers bank to third party payment to sellers bank
43 of 51
Consumer rights
The item must be- of satisfactory quality,fit for purpose, be as described
44 of 51
Search techniques
More key words to narrow down the search, type of object eg maps, advanced search like date, search by location, more than one search engine
45 of 51
Data protection act
Protects against misuse of personal data
46 of 51
Computer misuse act
Covers the misuse of computer equipment and illegal access to files
47 of 51
Copyright designs and patents act
Illegal to copy or steal other peoples work
48 of 51
Digital economy act
Stops illegal download of media
49 of 51
Digital divide
Gap between people who do and don't have access to digital technology
50 of 51
Issues- E waste, pollution, finite resources Solutions-Recycle, reduce impact, renewable energy
51 of 51

Other cards in this set

Card 2


Benefits of flash memory are


it doesn't lose data when turned off, has no moving parts and data can be transfered

Card 3


connection types


Preview of the front of card 3

Card 4




Preview of the front of card 4

Card 5




Preview of the front of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all All of ICT resources »