ICT Section 4

HideShow resource information
  • Created by: Faolan
  • Created on: 05-05-16 15:19
What is internet censorship?
This is the control or suppression of the publishing or accessing of information on the internet. The legal issues are similar to offline censorship.
1 of 77
What is plagiarism?
Plagiarism is not copyright infringement. Plagiarism is concerned with the unearned increment to the plagiarizing authors reputation that is achieved through false claims of authorship.
2 of 77
What does internet security involve?
The protection of a computer's internet account and files from intrusion of an outside user. Basic security meausres involve protection by well selected passwords, change of field permissions and back up of computer's data.
3 of 77
What is the purpose of Anti-Virus?
This is refering to software that can detect the presence of a virus within a computer file and warn you there is a problem. The anti-virus software may then offer to 'quarantine' the file so it cannot be used to spread the virus.
4 of 77
What is a worm?
A program which replicates itself from system to system without the use of a host file. Worms generally exist inside of other files. A worm will pass on a document infected using up more and more memory.
5 of 77
What is a macro virus?
A virus written in macro language which is part of many software applications such as a word processor. The Virus' code is embedded in the document and is activated each time the document is opened
6 of 77
What is a logic bomb?
A logic bomb lies dormant until a specific piece of program code is activated. A typical activator for a logic bomb is a date. The logic bomb checks the systems date and does nothing until a preprogrammed date or time is reached.
7 of 77
What is Malware?
Can be classified as trojans with a limited pay load and are often not detected by most anti-virus software. They may require the use of other SW designed to detect other classes of malware, including spyware.
8 of 77
What is Anti-spyware?
This is when free SW is downloaded by the user. However this spyware conceals its real intentions. Spyware collects and relays data of a computer to the manufacturer, and continues to do so even if the program is never used.
9 of 77
What are the features of HTML?
HTML is a programming language. HTML can be used to create and edit web pages and insert multimedia elements./ edit the layout of a page/ insert hyperlinks/ insert frames/ use tags
10 of 77
What are the main features of paypal?
PayPal safeguards the buyer's and seller's bank details The buyer and seller must each have a paypal account. Pay pal transfers money from the buyers account to the seller's so the that buyers confidential info is withheld and vice versa.
11 of 77
What is encryption?
Encryption means to scramble a message in such a way that only the people who are meant to read it can do so.
12 of 77
How does encryption work?
Encryption works by both people making use of a secret 'key' that only they know. The original message is mixed in with the key to create a secret message. This is done by some very crafty mathematics so that it is ery very hard for someone to crack
13 of 77
Where can encryption be used?
Credit card details over the web/ Usernames and passwords/ Private emails/ sensitive info
14 of 77
How can the internet be an advantage to a business?
Low Start up costs/ Quick and easy to set up/ Huge market/Run from anywhere/ High profits/ No employees/ Easy selling
15 of 77
What are the advantages of the internet to the customer?
Cheap goods for the customer/ don't have to leave the house/ Can buy from anywhere in the world/ can buy goods 24/7
16 of 77
What are the disadvantages of the internet to the business?
difficulty attracting Customers/ Difficulty in evaluating legitimacy of transaction/ Salesperson and customer are isolated.
17 of 77
What are the main features of the health and safety act relating to ICT?
It defines legal standards for computer equipment and identifies steps to minimise risks/ Places most responsibility with the employer/ Employees can receive damages for injuries caused through use of ICT./ Typical issues relate to vision and muscle
18 of 77
What are the uses of ICT in manufacturing?
Order entry and processing systems/ Project management SW/ Expert systems/CAD/CAM/ Robots
19 of 77
What are the advantages of CAD SW?
Drawing can be resized/ There is a very high degree of accuracy/Images can be rotated or zoomed in/
20 of 77
How do robots work?
Sensors capture data/ A microprocessor processes the data. Actuators produce movement.
21 of 77
What can a robot be used for?
Spray painting/ spot welding/ security/ underwater oil rig maintenance/ Vehicle in space exploration
22 of 77
What are the advantages of robots?
They can tirelessly perform monotonous and repetitive tasks. They can perform dangerous tasks/ They can work in extreme conditions/ Consistent quality of work
23 of 77
What are the disadvantages of robots?
Robots reduce the need for human labour- loss of jobs/ Robots are not well- suited to tasks that require initiative or flexibility.
24 of 77
What is CAD?
Short for "Computer Aided Design". A CAD software package allows a designer to create technical drawings and schematics.
25 of 77
What are the different type of CAD?
There are two main types of packages - 2D (two dimensional)which concentrate on 'flat' drawings having width and height, for example, a garden design program. The other type of CAD package is 3D (three dimensional) which allow you to deal with depth.
26 of 77
What is CAM?
Short for 'Computer Aided Manufacturing'. This means to use a computer to program, direct, and control production equipment in order to manufacture products.
27 of 77
How does CAM work?
The computer controls a manufacturing machine such as a Miller or a Lathe. The control computer is loaded with the software commands to cut or shape the material loaded into the lathe or miller. The material could be a metal billet or a plastic block
28 of 77
What are benefits of CAD?
Increase in productivity and accuracy/ Can use templates/ Designs can be edited electronically/ designs can be input directly./Can be tested before production
29 of 77
What are the benefits of CAM?
Increase in productivity accuracy or precision. Reduction in man power levels/ Can be programmed and canes can be implemented by modifying the program.
30 of 77
What is computer modelling?
They are used to predict how a system will behave given a certain set of conditions. They are created through the mathematical formulas.
31 of 77
What are the advantages of computer modelling?
Expensive prototypes don't need to be built. No equipment damaged. People are not put in danger. Easy to make modifications.
32 of 77
What are the disadvantages of computer modelling?
Results depend on how good the model is.Simulations can't completely re-create real-life situations.
33 of 77
What is simulation?
Simulation is a method of representing a real-life situation or phenomenon. A model is built based on rules and mathematical formulae. The computer then runs the simulation to see what will happen when time is speeded up or slowed down.
34 of 77
How is simulation used?
Simulation is used to see what will happen to weather patterns, how passengers might be injured in a car crash, to train pilots without them learning in real planes and for computer games.
35 of 77
What are the advantages of simulation?
Expensive prototypes don't need to be built. No equipment is damaged. People are not put in any danger. Mods can her made easy.
36 of 77
What are the disadvantages of simulation?
Results depend on how good the model is. Simulation can't completely re-create real-life situations.
37 of 77
What is Virtual reality?
Virtual reality is a 3-D environment which is created artifically by using computer hardware and software.
38 of 77
How does Virtual reality work?
The user wears special gloves, headset and goggles, sometimes they might wear a full body suit. The clothing contains sensors which picks up the users position and movement and integrates them into the virtual environment.
39 of 77
What is e-commerce?
The buying and selling of goods on the WWW.
40 of 77
What are the advantages of shopping online for a customer?
Shopping can be carried out in the comfort of the home/ Open 24/7. / Easier for elderly or disabled/ wider variety/ Competitive prices.
41 of 77
What are the advantages of shopping online for the business?
Website is open 24/7 / Website can be accessed from anywhere/ no need to rent large premises.
42 of 77
What are the concerns for the customer?
Not all have internet/ Not all have ICT skills/ Could be defrauded if website is insecure/ Not all website are authentic/Mistakes are harder to rectify.
43 of 77
What are the disadvantages for the business?
Cost of setting up e-commerce sites/ Not everybody has access to the internet/ Not everyone has internet/Lost working hours
44 of 77
What is needed in terms of ICT to set up a small business?
PC with peripherals- to run the SW/ Fax machine- to communicate/ The internet/ Email/ Online banking/ Telephone.
45 of 77
What software may a small business need?
Spreadsheet/ Graphics/ Word processing/ DTP/ Database
46 of 77
How does banking rely on ICT?
Telephone banking/ internet banking/ ATMs/ MICR/ Smartcards
47 of 77
What is EFT?
This means the electronic transfer of money from one financial institution to another.
48 of 77
What is POS?
This is Point of sale and it scans in barcode using a laser scanner the till then sends the barcode number to the central computer which searches its database and sends the price back to POS till.
49 of 77
What is EPOS
Electronic Point of sale. It is a computerized till which can be used for stock take.
50 of 77
What is EFTPOS?
'Electronic Funds At the Point of Sale'. This refers to the technology which enables you to pay for goods using a credit or debit card. It also enables the shop to electronically contact the bank to check your card.
51 of 77
How does EFTPOS work?
You insert your electronic card into a terminal device and enter the PIN number to verify that it is your card.Once payment has been authorised by the bank the money will be removed from your account and electronically paid into the shop's bank.
52 of 77
What are the advantages of EFT to the customer?
Don't have to carry cash/ Quicker to use/ Cash back can be used.
53 of 77
What is the advantages of EFT to the shop?
Money is instantly transferred between accounts. No delays as with cheques/ Less cash to be dealt with/ More efficient sales procedure- less queues
54 of 77
What is a barcode?
A barcode is a row of thick and thin vertical bars, often with 14 numbers, that can be read by a computer.Barcodes are read by a 'barcode reader' which detects the patterns of light and dark and transmits the data to a computer.
55 of 77
What does a bar code contain?
Description of product/ manufacturer details/ country of origin / Check digit
56 of 77
What is a smart card?
A smart card is a small plastic card (the size of a credit card). It has an embedded microchip which can be used to store data such as a money balance. The card can be used to make electronic payments for things such as telephone calls.
57 of 77
How is a smart card used?
The card is inserted into a device which can read it and deduct the payment from the money balance on the card.
58 of 77
What are the main features of RFID (Radio frequency Identification)?
Data relating to a product is stored on an RFID tag attached to the product/ AN RFID tag carries data programmed into a chip / the tag is activated by radio waves/ tag sends data back to the reader/
59 of 77
What are the advantages of RFID?
The info stored on a barcode is fixed and cant be changed and RFID can be updated/ A barcode must be clean however RFID tags can be read from a greater distance./Barcodes must be on the outside RFID can be inside the packaing/ More data can be stored
60 of 77
What are the functions of the mobile phone?
Contacts/text messages (SMS)/ Check info on the internet/ Calculator/ Alarm clock/ integrate with devices such as MP3s
61 of 77
What is WAP?
Enables mobile phones to access info on the internet. Pages must be written in WML.
62 of 77
What is General Packet Radio Service (GPRS)
Allows mobile phones to access and interact with info and services. It is similar to WAP however GPRS is always on and therefore users get quicker access.
63 of 77
What is a SIM Card (Subscriber identity module)?
It is a smart card that gives users access to a range of subscriber services. The SIM identifies the subscriber to the network system.
64 of 77
What is the network in terms of mobile phone technology?
The country is divided into overlapping cells each using a different set of radio frequencies. At the centre of each sell is a base station connected to an antenna which communicates with all the mobiles in the cell.
65 of 77
What is a digital TV?
This is a television that receives its signal from a satellite or 'freeview' receiver. The signal is digital in nature. Many older televsions are 'analogue' because they take their signal from a tv aerial, which is analogue in nature.
66 of 77
What are the features of a digital TV?
Electronic programme guide/ Interactive/ High quality resolution/
67 of 77
What are the ways in which ICT can be used at home?
Home learning- CAL, internet for research, VLE/ Leisure- Computer games, CD, DVD,Digital TV/ Control- Alarm systems,heating systems/ Internet-shopping, communication, music, live gaming
68 of 77
What are the effect ICT has had on social interaction?
Email/ Online messaging/ wireless phones/ SMS/ Answer machines/ Social media
69 of 77
What is a disaster recovery plan?
Disaster Recovery is having a plan that details how the company will recover from losing all of the data stored on their system. It will include plans for coping with the loss of key members of staff, loss of hardware and loss of data.
70 of 77
What are the threats to companies using ICT?
Natural disasters/ sabotage/ terrorist attack/ Fire/ theft
71 of 77
What are the consequences of these threats to the ICT?
Immeidate loss of business/ Loss of key personnel/ loss of reputation/ Legal action/
72 of 77
What are the main features of a data recovery plan?
It will describe how a company will continue to function after a disaster/ It will identify the main risks/ It will identify the key data and personnel/Identify the procedures to be performed if a disaster occurs and how data can be restored.
73 of 77
What is the health and safety act?
This act specifies legal standards for computer equipment. Employees may receive damages for injuries caused by ICT if the employee forseen the risk and did nothing about it.
74 of 77
What is the computer misuse act?
It is illegal to access computer material without permission. or to modify materials without permission.
75 of 77
What is the data protection act?
The act is designed to protect personal data stored on computers or in an organised paper filing system and it give legal rights to peopls who have info stored about them. it has eight principles
76 of 77
What is the copyright designs and patent act?
Act makes it a criminal offence to copy or steal software, if you copy software illegally then you are depriving the owner of the software of some of their profits and they will be able to sue you.
77 of 77

Other cards in this set

Card 2


What is plagiarism?


Plagiarism is not copyright infringement. Plagiarism is concerned with the unearned increment to the plagiarizing authors reputation that is achieved through false claims of authorship.

Card 3


What does internet security involve?


Preview of the front of card 3

Card 4


What is the purpose of Anti-Virus?


Preview of the front of card 4

Card 5


What is a worm?


Preview of the front of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Section 4 resources »