IT

¡Supera tus tareas y exámenes ahora con Quizwiz!

Protocol

Two networks connected by a bridge must use the same...

Workstation

A single computer on a network is known as a ....

Real time

A system where it is essential that requests are dealt with instantaneously

Bluetooth

A technology allowing devices to communicate with other devices or peripherals over short distances wirelessly using radiowaves

Record

All of the data about one thing is stored in a...

VoIP

Allows you to have real time verbal communication over the internet

Text

Alphanumeric refers to ... data type

Optical

An ....... mark reader captures marks from a piece of paper

Plasma

An ideal type of screen for fixing to the wall in order to watch TV

Multi-user

An operating system that can be used by many people at a time

Single user

An operating system that can only be used by one person at a time

Network

An operating system used when computers are joined together and use a central server

Multitasking

An operating system which allows a user to have many applications and windows open at the same time

Online

An operating system which allows you to use applications via the web

Lost

Any data stored in the RAM will be .... when the computer is turned off

Bus

Best network topology for temporary networks

Optical

CDs and DVDs are known as .... storage media

ISP

Company that provide internet access for a monthly fee

Hub

Connects devices in a network and allows them to share data packets

Logger

Software that records every keyboard key you press is called a key....

Training

Speech and sound interfaces often require ... so that they better understand the user's commands

Volatile

Temporary memory is also known as ..... memory

Motherboard

The ROM chip is attached to the ...

Primary key

Used to uniquely identify every record in a table

Roaming

Using your phone abroad

virtual learning environment

VLE stands for...

Solid

Flash memory is known as .... state memory

media access control

MAC stands for...

Multimedia messaging service

MMS stands for...

Trojan

Malware that disguises itself as something else

Firewall

Name of software used to prevent unauthorised access to data

Puff suck switch

Name of the device used to allow users to control a computer with their mouth

Foot mouse

Name of the device used when users cannot control the mouse with their hands

Eye typer

Name of the feature used when the user uses their eyes instead of a keyboard

Layout

Network topology refers to the ... of the network

Star

Network topology that uses the most amount of cable

Permanently

Non volatile memory means that the data is stored on the chip ......

Optical character recognition

OCR is a feature of a scanner and stands for...

Star

On which network topology can a hub be used?

Field

One piece of data in a database is known as a...

Memory

Operating systems control ... management

White

Person employed by the company to find loopholes is called a .... hacker

Short messaging service

SMS stands for...

Star

Seen as most reliable network topology

Bluejacking

Sending anonymous messages to users who leave Bluetooth on

Phishing

Setting up a fake website to trick people into giving you their details

Bit

Short for binary digit

Deep vein thrombosis

Sitting at a desk for long periods can cause... in the legs

Repeater

What hardware device can be used to connect wires and boost signal strength?

Bridge

What hardware device can connect two networks?

Feedback

When output affects input, this is known as...

Table

Where all the data about a particular category is stored in a database

Bus

Which network topology has terminators to stop signals bouncing back and forth?

router

connects all the computer in a network to the modem

access rights

control what you do on a network

spreadsheet

data is often analysed in a...

flowchart

diagram often used to show a control system

year

electrical equipment should be safety tested every...

Third party payment processor

paypal is an example of a (4 words)

logging

the automatic transfer of data over time is data...

Digital divide

the gap between people with access to digital technology and those who do

Transactional data

the information collected about a sale or purchase

data

the most valuable resource owned by a company

check digit

the number used to verify barcodes

logging period

the period of time over which measurements are automatically taken by sensors

database

the price of an item is normally stored in a...

Metadata

the small text file stored with each image on a camera giving its details

overload

when the sheer volume of information is overwhelming, it is called information...

covert

when you don't know information is being collected it is... data collection

Remote server

where files are stored when a user uses the cloud to sync their devices

Speech

A ... interface allows you to interact with your environment by giving verbal commands

Compact

A .... disk can hold approximately 650 megabytes of data

Menu

A .... interface lets you interact with a device by working your way through a list of options

Touch

A .... sensitive interface is being used for many new smartphones

Graphical

A ..... User Interface makes use of pictures, graphics and icons

Concept

A ..... keyboard has images which epresent the available options from which to choose

Line

A Command ..... Interface is too complex for normal users to be able to use

WIMP

A GUI interface is sometimes also referred to as a ... interface

motion sensors

... allow hands free gaming

RFID tags

... are used in shops to track high value items

credit

... cards allow customers to borrow money and pay it back later

debit

... cards let the customer withdraw money from their own account

Proprietary

... software is developed by a company

Open source

... software is developed by the public who gradually improve it

Serial

..... access is where you have to search for data from the beginning until you get to what you need

Flash

..... memory is used in USB sticks, digital cameras and notebooks

Access

..... rights control what you can and can't see on your computer

Internal

..... storage devices are inside the computer case

Magnetic

........ tape is often used to back up company systems overnight

Icons

A WIMP interface consists of Windows, ...., Menus and Pointers

Peripherals

A computer network enables hardware ... to be shared

Local

A computer network that is in a single building is usually a .... area network

Wide

A computer network that is spread over a large geographical distance is called a .... area network

Standalone

A computer not connected to a network is known as a .... .... machine

Nibble

A group of 4 bits is called a ...

Platters

A hard disk has a number of .... which spin very fast. These are where the data is stored.

Direct

A hard disk provides ... access to the data it stores

Bus network

A network where each computer is linked to a shared cable

Star network

A network where each computer is linked to a shared server

Ring network

A network where each computer is linked to another computer and the last is linked to the first

Modem

Converts the digital data from a computer into analogue data for a telephone line

Information

Data is processed into...

Global positioning system

GPS stands for...

8

How many bits are in a byte?

1024

How many bytes are in a kilobyte?

1024

How many gigabytes are in a terabyte?

1024

How many megabytes are in a gigabyte?

1024

How many megabytes are in a kilobyte?

8

How many principles are in the data protection act?

Virtual

If your RAM is full up the hard disk can create an area of temporary memory known as .... memory

Processed

In order for data to be turned into information, it must be...

Windows

RAM allows you to have multiple ..... open

Access

RAM stands for Random ..... Memory

Modules

RAM stores the application ... .that you are currently using

Repetitive strain injury

RSI stands for...

Plotter

The best output device for printing large posters and blueprints

Boolean

The data type with only 2 values- true/false, yes/no, on/off etc.

False

The internet is just made up of websites- true or false?

Data

The most valuable resource owned by a company

Unix

The operating system most mainstream computers use

Subject

The person data is collected about is called a data....

Controller

The person in an organisation who ensures the data protection act is followed is called the data...

Resolution

The quality of a mobile phone camera is measured by its...

Ergonomics

The science of designing safe and comfortable machines

Batch

The type of processing used in a bank to create monthly statements for customers

Processor

There is a ... in every digital device to control all the device's functions

Embedded

This is a computer which is part of other equipment such as a kettle or washing machine

ROM

This memory stores instructions which the computer uses when it boots up

feasibility

a ... study tests whether something would be possible to develop

multifunctional

a device that can perform several functions is called a.... device

actuator

a device whose movement is controlled by a computer

bandwidth

a measurement of capacity, the number of bits that can go through a network per second

privacy policy

a policy you should be able to view on most websites which tells you how the site uses cookies

Systems Life Cycle

a process of stages that occur in the development of a new system

virus

a program designed to cause other computer programs to malfunction

captcha

a test to check you are human which asks you to type in the numbers or letters shown

Cloud

allows users to access their files from all of their digital devices

hotspot

another name for a wireless access point

ASDL

broadband is the same as...

closed circuit television

cctv stands for

SDXC

extra capacity storage card that stores up to 2TB

SDHC

high capacity storage card that stores up to 32GB

7

if you want to return goods online you must inform them within... days

program

instructions written to control something

image

jpeg, gif and png are... files

latency

measurement of delay between a bit leaving a device and arriving at the other

audio

mp3 and wma are... files

video

mpeg-4 and wmv are... files

PNC

national network used by the police

resolution

relates to the number of pixels, and therefore the picture quality

encryption

scrambling data so that only computers with the right key can read it

cookies

small text files sent to your computer by websites to track what you do on that website

DRM software

software that prevents you from making copies of files you have downloaded to your personal media player

key logging

software that record all your keystrokes so that hackers can find out personal and financial information as you enter it into the keyboard

network interface card

to connect to the internet you need an NIP which stands for...

browser

to view internet pages you need a web...

RSI

typing for long periods can cause...

audit log

used to view every action that took place when a hacker gains unauthorised access to a system

data

viruses are often designed to cause harm to... files

viral marketing

when an organisation creates marketing content that is entertaining so people will share it with their friends and it will spread across the internet

high

you want a (high/low) bandwidth for better connection

low

you want a (high/low) latency for better connection


Conjuntos de estudio relacionados

Supreme Court Cases: commerce clause

View Set

Med Surg HESI Practice Questions

View Set

Chapter 12 Stress and Adaptation(Davis)

View Set

Chapter 6: Learners with Learning Disabilities

View Set

GEOL 310 - Final Exam Study (Quizzes)

View Set

Evaluating Expressions with Grouping Symbols

View Set