IT
Protocol
Two networks connected by a bridge must use the same...
Workstation
A single computer on a network is known as a ....
Real time
A system where it is essential that requests are dealt with instantaneously
Bluetooth
A technology allowing devices to communicate with other devices or peripherals over short distances wirelessly using radiowaves
Record
All of the data about one thing is stored in a...
VoIP
Allows you to have real time verbal communication over the internet
Text
Alphanumeric refers to ... data type
Optical
An ....... mark reader captures marks from a piece of paper
Plasma
An ideal type of screen for fixing to the wall in order to watch TV
Multi-user
An operating system that can be used by many people at a time
Single user
An operating system that can only be used by one person at a time
Network
An operating system used when computers are joined together and use a central server
Multitasking
An operating system which allows a user to have many applications and windows open at the same time
Online
An operating system which allows you to use applications via the web
Lost
Any data stored in the RAM will be .... when the computer is turned off
Bus
Best network topology for temporary networks
Optical
CDs and DVDs are known as .... storage media
ISP
Company that provide internet access for a monthly fee
Hub
Connects devices in a network and allows them to share data packets
Logger
Software that records every keyboard key you press is called a key....
Training
Speech and sound interfaces often require ... so that they better understand the user's commands
Volatile
Temporary memory is also known as ..... memory
Motherboard
The ROM chip is attached to the ...
Primary key
Used to uniquely identify every record in a table
Roaming
Using your phone abroad
virtual learning environment
VLE stands for...
Solid
Flash memory is known as .... state memory
media access control
MAC stands for...
Multimedia messaging service
MMS stands for...
Trojan
Malware that disguises itself as something else
Firewall
Name of software used to prevent unauthorised access to data
Puff suck switch
Name of the device used to allow users to control a computer with their mouth
Foot mouse
Name of the device used when users cannot control the mouse with their hands
Eye typer
Name of the feature used when the user uses their eyes instead of a keyboard
Layout
Network topology refers to the ... of the network
Star
Network topology that uses the most amount of cable
Permanently
Non volatile memory means that the data is stored on the chip ......
Optical character recognition
OCR is a feature of a scanner and stands for...
Star
On which network topology can a hub be used?
Field
One piece of data in a database is known as a...
Memory
Operating systems control ... management
White
Person employed by the company to find loopholes is called a .... hacker
Short messaging service
SMS stands for...
Star
Seen as most reliable network topology
Bluejacking
Sending anonymous messages to users who leave Bluetooth on
Phishing
Setting up a fake website to trick people into giving you their details
Bit
Short for binary digit
Deep vein thrombosis
Sitting at a desk for long periods can cause... in the legs
Repeater
What hardware device can be used to connect wires and boost signal strength?
Bridge
What hardware device can connect two networks?
Feedback
When output affects input, this is known as...
Table
Where all the data about a particular category is stored in a database
Bus
Which network topology has terminators to stop signals bouncing back and forth?
router
connects all the computer in a network to the modem
access rights
control what you do on a network
spreadsheet
data is often analysed in a...
flowchart
diagram often used to show a control system
year
electrical equipment should be safety tested every...
Third party payment processor
paypal is an example of a (4 words)
logging
the automatic transfer of data over time is data...
Digital divide
the gap between people with access to digital technology and those who do
Transactional data
the information collected about a sale or purchase
data
the most valuable resource owned by a company
check digit
the number used to verify barcodes
logging period
the period of time over which measurements are automatically taken by sensors
database
the price of an item is normally stored in a...
Metadata
the small text file stored with each image on a camera giving its details
overload
when the sheer volume of information is overwhelming, it is called information...
covert
when you don't know information is being collected it is... data collection
Remote server
where files are stored when a user uses the cloud to sync their devices
Speech
A ... interface allows you to interact with your environment by giving verbal commands
Compact
A .... disk can hold approximately 650 megabytes of data
Menu
A .... interface lets you interact with a device by working your way through a list of options
Touch
A .... sensitive interface is being used for many new smartphones
Graphical
A ..... User Interface makes use of pictures, graphics and icons
Concept
A ..... keyboard has images which epresent the available options from which to choose
Line
A Command ..... Interface is too complex for normal users to be able to use
WIMP
A GUI interface is sometimes also referred to as a ... interface
motion sensors
... allow hands free gaming
RFID tags
... are used in shops to track high value items
credit
... cards allow customers to borrow money and pay it back later
debit
... cards let the customer withdraw money from their own account
Proprietary
... software is developed by a company
Open source
... software is developed by the public who gradually improve it
Serial
..... access is where you have to search for data from the beginning until you get to what you need
Flash
..... memory is used in USB sticks, digital cameras and notebooks
Access
..... rights control what you can and can't see on your computer
Internal
..... storage devices are inside the computer case
Magnetic
........ tape is often used to back up company systems overnight
Icons
A WIMP interface consists of Windows, ...., Menus and Pointers
Peripherals
A computer network enables hardware ... to be shared
Local
A computer network that is in a single building is usually a .... area network
Wide
A computer network that is spread over a large geographical distance is called a .... area network
Standalone
A computer not connected to a network is known as a .... .... machine
Nibble
A group of 4 bits is called a ...
Platters
A hard disk has a number of .... which spin very fast. These are where the data is stored.
Direct
A hard disk provides ... access to the data it stores
Bus network
A network where each computer is linked to a shared cable
Star network
A network where each computer is linked to a shared server
Ring network
A network where each computer is linked to another computer and the last is linked to the first
Modem
Converts the digital data from a computer into analogue data for a telephone line
Information
Data is processed into...
Global positioning system
GPS stands for...
8
How many bits are in a byte?
1024
How many bytes are in a kilobyte?
1024
How many gigabytes are in a terabyte?
1024
How many megabytes are in a gigabyte?
1024
How many megabytes are in a kilobyte?
8
How many principles are in the data protection act?
Virtual
If your RAM is full up the hard disk can create an area of temporary memory known as .... memory
Processed
In order for data to be turned into information, it must be...
Windows
RAM allows you to have multiple ..... open
Access
RAM stands for Random ..... Memory
Modules
RAM stores the application ... .that you are currently using
Repetitive strain injury
RSI stands for...
Plotter
The best output device for printing large posters and blueprints
Boolean
The data type with only 2 values- true/false, yes/no, on/off etc.
False
The internet is just made up of websites- true or false?
Data
The most valuable resource owned by a company
Unix
The operating system most mainstream computers use
Subject
The person data is collected about is called a data....
Controller
The person in an organisation who ensures the data protection act is followed is called the data...
Resolution
The quality of a mobile phone camera is measured by its...
Ergonomics
The science of designing safe and comfortable machines
Batch
The type of processing used in a bank to create monthly statements for customers
Processor
There is a ... in every digital device to control all the device's functions
Embedded
This is a computer which is part of other equipment such as a kettle or washing machine
ROM
This memory stores instructions which the computer uses when it boots up
feasibility
a ... study tests whether something would be possible to develop
multifunctional
a device that can perform several functions is called a.... device
actuator
a device whose movement is controlled by a computer
bandwidth
a measurement of capacity, the number of bits that can go through a network per second
privacy policy
a policy you should be able to view on most websites which tells you how the site uses cookies
Systems Life Cycle
a process of stages that occur in the development of a new system
virus
a program designed to cause other computer programs to malfunction
captcha
a test to check you are human which asks you to type in the numbers or letters shown
Cloud
allows users to access their files from all of their digital devices
hotspot
another name for a wireless access point
ASDL
broadband is the same as...
closed circuit television
cctv stands for
SDXC
extra capacity storage card that stores up to 2TB
SDHC
high capacity storage card that stores up to 32GB
7
if you want to return goods online you must inform them within... days
program
instructions written to control something
image
jpeg, gif and png are... files
latency
measurement of delay between a bit leaving a device and arriving at the other
audio
mp3 and wma are... files
video
mpeg-4 and wmv are... files
PNC
national network used by the police
resolution
relates to the number of pixels, and therefore the picture quality
encryption
scrambling data so that only computers with the right key can read it
cookies
small text files sent to your computer by websites to track what you do on that website
DRM software
software that prevents you from making copies of files you have downloaded to your personal media player
key logging
software that record all your keystrokes so that hackers can find out personal and financial information as you enter it into the keyboard
network interface card
to connect to the internet you need an NIP which stands for...
browser
to view internet pages you need a web...
RSI
typing for long periods can cause...
audit log
used to view every action that took place when a hacker gains unauthorised access to a system
data
viruses are often designed to cause harm to... files
viral marketing
when an organisation creates marketing content that is entertaining so people will share it with their friends and it will spread across the internet
high
you want a (high/low) bandwidth for better connection
low
you want a (high/low) latency for better connection