IT KEYWORDS

HideShow resource information
  • Created by: Ria22
  • Created on: 26-04-15 12:37
Secondary Storage
used to back-up and take copies of data, they are non-volatile and are expensive
1 of 51
Backing-up
coping files so they are preserved if the computer breaks or crashes
2 of 51
Virtual memory
It increases the amount of memory on a computer
3 of 51
Online storage
allows you to upload and store files, so you can access it everywhere
4 of 51
hardware
all parts of the computer that you can physically touch
5 of 51
Software
all of the programs and other operating information in a computer
6 of 51
System software
any software that manages and controls the hardware
7 of 51
Application software
software which allows the computer to be applied to a particular problem
8 of 51
input device
hardware used to enter data n to the computer e.g. keyboard
9 of 51
output device
hardware used to display the result of a data process
10 of 51
General purpose computer
a computer designed to perform in an efficient manner
11 of 51
storage device
any device at stores data
12 of 51
ROM
Read-only-memory: permanent memory that wont be lost in a power cut, it is non-volatile
13 of 51
RAM
Random-access-memory: memory that can be read or written on, volatile RAMs content it lost when the power is cut, where as non-volatile RAM stores content even when the power is cut
14 of 51
Network
a collection of computer devices interconnected together
15 of 51
local area network (LAN)
a group of computers connected together within a single building
16 of 51
Wide area network (WAN)
accessing data from all around the world
17 of 51
Bus network
all devices are connected by a cable, signals are sent along the cable
18 of 51
Star network
a central point that connects all devices on the network
19 of 51
ring network
all workstations are connected in a closed loop configuration
20 of 51
metal wires
offer high transmission speed, types: shielded twisted pair, unshielded twisted pair non-metal cable
21 of 51
fibre optic cables
data being processed is encoded as pulse of light though thin glass fibres
22 of 51
wireless
allows people to connect to the internet or LAN without a wire
23 of 51
broadband
high speed of transmission, where large amount of data is transmitted
24 of 51
information
a collection of facts and data
25 of 51
systems life cycle
the process of developing a new computer software
26 of 51
operating system
core system that allows a computer to run as a useful device
27 of 51
user interface
allows the user to interact with the computer system
28 of 51
micro-compressor
a chip on the circuit board that controls everything, it processes all of the data
29 of 51
stages of the systems life cycle
definition, investigation, design, implementation, testing, installation, documentation, evaluation, maintenance
30 of 51
what is coding data?
Usually means shortening original data, often by taking out some letters. eg: monday = mon
31 of 51
why do we code data?
speeding up data entry, increases accuracy of data entry, use of validation, less storage space is required, you can search for data faster
32 of 51
what are the problems with coding data?
Coarsening of data (in the process data can be lost), coding can make the data obscure
33 of 51
advantages of coding data...
Data entry can be faster More accurate, Validation can further improve accuracy, Less storage space, Faster searching for data, Coded data more secure if people don’t understand what it means
34 of 51
disadvantages of coding data...
Coarsening of data, Meaning can be obscured, Value judgements difficult to code, If people don’t know code can slow data entry, If codes complicated can be entered incorrectly, Code combinations can run out
35 of 51
Propriety software
Proprietary software or closed source software is computer software licensed to a copyright holder.
36 of 51
Open Source software
Software that has been developed by volunteer programmers with the intention of distributing the software free of charge.
37 of 51
Hosted Applications
Instead of purchasing and installing software applications, users are now using hosted applications.
38 of 51
database
A collection of data or information which is held together in a logical and organised manner
39 of 51
flat file database
A database whereby all your data and information is stored in one large table.
40 of 51
Relational database
A database whereby the data is split into useful/separate tables or groups. Once a database and its tables have been set up, you can link the tables together causing what's known as a relationship between the two tables.
41 of 51
Data Redundancy
Data redundancy in a database means that the same data is present in more than one table. Or in the case of a flat file database, there are records with partly duplicated data.
42 of 51
mail merge
They use a process called mail merge. This is where you write one letter or document which you then use as a template. Where data needs to be inserted for names and address you instead insert a merge field. This merge field is linked to a field in th
43 of 51
purposes of mail merge
Send personalised letters to customers/clients, Print address labels for envelopes, Posting/sending out school reports to parents, Adding names to degree certificates, Printing exam result slips, Sending promotional material to customers.
44 of 51
benefits of mail merge
Much quicker than writing individual letters/documents, More professional, Customers like the individual/personalised touch, Easier to proof read, Easier to edit and make changes, Reduces the risk of errors, Documents can be reused.
45 of 51
email
Electronic Mail,Users are now able to send electronic messages which contain text and images to other people who have an email address. You can also add and send attachments.
46 of 51
advantages of email
File attachments can be sent, Messages sent and received instantly, Open 24/7, Low cost or free, People don’t have to be present to receive mail,
47 of 51
disadvantages of email
Spam, You and the recipient need to have email addresses, People changing email addresses, Attachments can contain viruses, You may have to wait a long time for a reply, Hackers, Email scams.
48 of 51
E-Commerce
The sale of goods and services over electronic systems (i.e. the internet)
49 of 51
Security & Payment
ways to protect data =Encryption- personal information is scrambled up by a secret code and unscrambled by the shop computer Secure Site- a website using encryption will be a secure site, you can tell a secure site by https in the address bar and th
50 of 51
machines at home that contain micro-compressors
microwave ovens washing machine dishwashers central heating boilers
51 of 51

Other cards in this set

Card 2

Front

coping files so they are preserved if the computer breaks or crashes

Back

Backing-up

Card 3

Front

It increases the amount of memory on a computer

Back

Preview of the back of card 3

Card 4

Front

allows you to upload and store files, so you can access it everywhere

Back

Preview of the back of card 4

Card 5

Front

all parts of the computer that you can physically touch

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Keywords resources »