ICT GCSE

?
what is ict
ICT stands for Information and communication technology and it is a study to the ways of which data is collected, stored, what processes that can be done to it and the way it can be sent to other computers.
1 of 10
what is data
data consists of raw facts and figures
2 of 10
what is information
If we were then told that these numbers were the temperatures gathered from IT4/IT5. Over the course of the school day, then this data becomes information, as it now has meaning and purpose.
3 of 10
validation in a database
An important part of creating a database table is to set validation rules for some fields. As the data is entered it is checked to see that it obeys the rules; any data that does not obey the rules is not accepted.
4 of 10
Software methods for keeping data secure
Password system – One way of identifying a user if a password system. Every authorised user of a computer system is given a username, which is recognised by the system.
5 of 10
email advantages
Emails arrive within seconds. The postal service takes a day or two and is sometimes referred to as “snail mail”.
6 of 10
Email disadvantages
Objects cannot be sent, for example, you cannot send a parcel by email.
7 of 10
copyright law 1
Anything what has been produced by someone and is based on their own ideas can be subject to copyright laws of this country. Literally, if you have the copyright of something then you are the only one allowed to copy it.
8 of 10
Copyright Law (2)
The most common form of breaking copyright laws is in the illegal copying of CDs, DVDs and computer games.
9 of 10
Copyright Law (3)
Computer software companies have a big problem. People obtain illegal copies of their software without paying for it, either by making a copy of someone else’s disk or by downloading it from the Internet.
10 of 10

Other cards in this set

Card 2

Front

what is data

Back

data consists of raw facts and figures

Card 3

Front

what is information

Back

Preview of the front of card 3

Card 4

Front

validation in a database

Back

Preview of the front of card 4

Card 5

Front

Software methods for keeping data secure

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Computer systems resources »