ICT aqa shortcourse

?
  • Created by: Lauren
  • Created on: 05-06-13 17:59
Hardware
Physical Components e.g. keyboard,mouse
1 of 64
Software
Gives hardware a list of instructions to accomplish a task e.g. video game
2 of 64
Input Devices
allow users to enter data e.g.Keyboard,mouse,magnetic stipe,joystick,sensor,bar-code reader
3 of 64
Output Devices
Allows the system to transfer/display data
4 of 64
Difference between software and hardware
Software used hardware for input processing,memory and output
5 of 64
OCR
Optical Character Reader, software which can be used to interpret text from a handwritten document and export it to a word processor or data file
6 of 64
OMR
Optical Mark Reader,fast data entry for high volume data, multiple choice exams,national lottery
7 of 64
ROM
Read Only Memory, memory that cannt be changed through a program or user,retains memory even when computer turned off, stores instructions for the computer to start up
8 of 64
RAM
Random Access Memory,fast temporary memory in which programs,applications and data are stored
9 of 64
What is stored in a RAM?
operating system, applications,Graphical user interface (GUI)
10 of 64
LAN
Local Area Network,homes,connected by wires and cables
11 of 64
WAN
Wide Area Network,cover a large area ( made of several LANS connected together), satellite/wireless
12 of 64
Encryption
Method of scrambling data,putting it into a code, can only be read by people who have 'secret key'
13 of 64
Network Devices
Broadband, dial-up modern, mobile device, email server, file server
14 of 64
Data
Raw facts of figure no meaning
15 of 64
Information
Data with meaning/context
16 of 64
Authentication
when a message or a source are belived to me genuine, user name and password
17 of 64
Life Cycle
Feasible study, analysis, test plan, implementation, testing, documentation/user,evaluation and maintenance/monitoring
18 of 64
Feasible Study
interview,questionnaire,observe current procedures
19 of 64
Analysis
listing desired outcomes and performance criteria
20 of 64
Test plan
Draw out what new system will look like
21 of 64
Implementation
concert old system/install new system,aqquire hardware and software
22 of 64
Testing
Entering test data into the new system-check it works
23 of 64
Documentation
Produce document to inform user
24 of 64
Evaluation
review effectiveness of system
25 of 64
Maintenance
pefect,adapt,improve,maintain
26 of 64
Validation
range,presence,look-up,digit,length check
27 of 64
Verification
double entry and visual checks
28 of 64
Collecting data
data capture form,questionnaire, online form,chip and pin,FFID tags
29 of 64
Data capture form
info directly entered into a form by person completing it. A-fast and specific D-possible errors when inputting data and poor handwriting correct data
30 of 64
Questionnaire
User enters info into the format of a laid out questionaire A-accurate answers and if coded answers can be turned into results instantly D-user may misinterpret a question and poor handwriting incorrect data
31 of 64
Chip and Pin
Chip in one device, and pin acknowledged y device chip is in A-secure,only 4 digits D-chips can be damaged and pins forgotten
32 of 64
Biometrics
recognize physical attributes or behaviors A-accurate,reliable and portable D- methods intrusive and expensive to implicate
33 of 64
RFID
Radio frequency ID tags applied to animals/products for identification A-chips are secure D-more expensive than bar codes and vulnerable to damage
34 of 64
Barcode Scanner
Horizontal lines represent a number that coverts into information for a product A-fast identification and faster D-code can be damaged and stock database mist be kept up to date otherwise barcode obsolete
35 of 64
Compression techniques
compression covert to a Zip folder also convert file type
36 of 64
Effectiveness of ICT (benifits)
Time (fast), Convient (portable), Presentation (so many styles e.g. font), versatile (produce document on laptop put on phone), import and export to different software and cost low
37 of 64
GUI (user interface)
Microsoft Windows ,WIMP Windows,Icons,Menus,Pointers
38 of 64
Proprietary
software which you need to purchase a license to use (Microsoft office) reliable and professional but expensive and cannot be modified
39 of 64
Open Source
software where the source code is freely available, firefox, developers can modify code to their need
40 of 64
Hosted application software
available on internet
41 of 64
Software features
copy, paste,font,word art,page breaks,cut,crop,wrap,print screen
42 of 64
Word processor vs DTP
Word processor-text documents DTP-text and graphic publications
43 of 64
data types
numerical,alphanumeric,Boolean
44 of 64
Cell types
font formats,style,size,colour,text wrap, merge cell
45 of 64
SPREADSHEET SOFTWARE FEATURES
CELLS,CELL REFERENCE,ROWS,COLUMNS,SORTING ROWS AND COLUMNS
46 of 64
DATA CAN BE EXTRACTED FROM A DATABASE TO PRODUCE DIFFERENT TYPES OF REPORTS
mail merge-letter,invoice, membership
47 of 64
ISP
Internet service provider, broadband, sky
48 of 64
preventing unauthorized acces
user accounts,authentication,passwords(kept secret), security question, image recognition
49 of 64
prevention from hacking
fire wall,intrusion device
50 of 64
Firewall
program or hardware device that filters the information coming through the internet connection
51 of 64
Health Problems
RSI (repetitive strain injury), wrist problems,back,neck,stress,eye problems and tripping over cables
52 of 64
soltions
breaks,appropriate lighting, eye tests,wrist rests,adjustable seating,foot stall,
53 of 64
commercial patterns
automated production lines with fewer workers, more standard products,automated stock control, less high street shops, internet shopping, new'Industries' and GLOBALISATION
54 of 64
Online hazards
phishing emails,scamming,look a like websites, avoid sending viruses
55 of 64
methods of hacking
online bank card readers, financial security method
56 of 64
safeguards
firewalls,encryption,back ups,secure sites
57 of 64
operating systems
manage computer hardware and support running of applications of software
58 of 64
Computer misuse Act 1990
Level 1- unauthorized access to computer programs of data Level 2-unauthorized access with intent to damage for malicious purposes Level 3-unauthorized modification of computer data
59 of 64
computer misuse act involves
deliberate planting of a virus,unauthorized work in work time,copying programs illegally,changing info and computer fraud
60 of 64
Data protection act 1998
allows individuals to access info held about them and have it deleted/edited
61 of 64
personal data can be processed if
data subject gives consent or is a legal obligation
62 of 64
how many principals does it have
eight
63 of 64
Copyright Law 1988
covers plagiarism,illegal media sharing/file (pirate bay)
64 of 64

Other cards in this set

Card 2

Front

Software

Back

Gives hardware a list of instructions to accomplish a task e.g. video game

Card 3

Front

Input Devices

Back

Preview of the front of card 3

Card 4

Front

Output Devices

Back

Preview of the front of card 4

Card 5

Front

Difference between software and hardware

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »