Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
- 3rd side (hint)
What is a computer? |
A computer is anything that has: -Input -Storage -Process -Output |
ISPO
|
|
Why is reliability important? |
Because computers are always used! People can lose money via banks, e-mails can be lost, and people can get hurt if a driverless car breaks. |
Think about what would happen if a computer broke
|
|
Name three standards. |
There are three types of standards: -Open -Proprietary -De facto |
OPD
|
|
What are standards? |
Standards allow, or dont allow, people to copy a product. |
|
|
What is the purpose of a CPU?
|
It is used to carry out processing in the computer by fetching data and instructions from the memory then decoding and executing them.
|
FDE |
|
Memory Management
|
It is necessary to enable lots of programs to use memory without overwriting or corrupting each other
|
Overwriting and corrupting
|
|
Peripheral management |
Devices external to the computer - Keyboard, printer, scanners |
External |
|
Multi-Tasking |
Completing multiple tasks at once |
Think- "MULTI" |
|
User Interface |
It allows the user to interact with the operating system |
|
|
Security |
The OS needs to make sure that the users data and programs are protected. Many operating systems come built in with firewalls and anti-virus systems |
|
|
Viruses |
Viruses are types of malware that create copies of themselves and spread across many computers |
|
|
Spyware |
Spyware is malware that monitors what you are doing on your computer - The websites you visit and even the keys you press |
Think "Spying" - Watching? |
|
Firewall |
A firewall is malware that sits between you and your network to filter out any malicious packages |
|
|
Formatting |
Formatting means preparing a disk for initial use |
|
|
File transfer |
File transfer means moving files and data between different locations |
|
|
De-Fragmentation |
When files are written to a hard drive, not all parts of the file are placed together. De-Frag moves all of the disks contents around so that all the parts of a file are next to each other |
|
|
System diagnosis |
System diagnosis gives you key information about the computer |
|
|
Clean up tools |
Clean up tools try to improve the computers performance by removing icons and programs that are rarely used |
|
|
Auto Update |
Auto update on the OS checks the manufacturers website to see if there is an update. |
|
|
Bespoke software |
Software created directly for the user |
|
|
Off the shelf software |
Widely available for anyone |
|
|
Bitmap Images |
Binary can be used tocreate bitmap images.Bitmap images aremade up of a grid(or map) of pixels.Each pixel is assigneda binary code torepresent it’s colour.
|
|
|
Resolution |
The concentration of pixels in a bitmap is called its resolution.The higher the resolution (the more pixels it has) the more detailed an image is but the more space it takes up on disk.
|
|
|
Meta Data |
As well as the binary value of each pixel a bitmap image holds:
- The height of the image in pixels - The width of the image in pixels - The number of bits used for each pixel This helps the computer structure the image, otherwise it just has a string of bits. |
|
|
What is a database? |
A persistent, organised, structured store of data. |
Database - Think 'Data' and 'Base' - where everything is held? |
|
Data handling software |
Data handling software (like Microsoft Access or BaseBear) is used to create databases, add new information or edit existing information. |
|
|
What is DBMS? |
DataBase Management System: Used to manage the database by creating tables, inserting data, executing queries etc. |
DBMS - Abbreviation! |
|
Separating the application and Database |
Separating the application and the database means that the database can be accessed from lots of different applications. |
|
|
Customized data handling applications |
Using the DBMS to create a set of tools for setting up and maintaining a specific database. |
|
|
What is a relational database? |
A database which contains multiple tables linked by primary and foreign keys. |
Relational - Linked? |
|
What is an entity? |
A real world object about which data is being held. |
|
|
Tables |
Tables hold data about a specific entity, i.e a student. |
Tables - Charts? |
|
Forms |
A form is an input screen that allows data to be displayed and edited. |
|
|
Queries |
A query is a command that is used to search the database and return relevant results: SELECT*FROM students WHERE age>17 |
|
|
Report |
An output of data in the database in a specific format, usually printed. |
|
|
Modules |
Used to add functionality to a database. Modules contain statements and subroutines that are stored together as a unit and can be executed by the user. |
|
|
Logical operators in database queries |
< - Less than > - Greater than NOT AND OR |
|
|
Primary and Foreign keys |
Primary and Foreign keys are used to link related records in different tables. Primary key is a unique identifier. Foreign key is a value which is the primary key of a record in another table. |
|
|
Data validation |
Data Validation is used to make sure the data entered meets set results. |
Validation - Is it correct? |
|
Length Check |
Data entered is the correct length eg 6 characters for a password |
Length - How long? |
|
Format Check |
Data is in the correct format eg dd/mm/yyy |
Format - Correct type? |
|
Range check |
Data is within a specific range eg age is between 1 and 150. |
Range - Think maths |
|
Presence check |
Data has been entered e.g user must enter a password |
Presence - is it there? |
|
Match Check |
Data must be one of a number of specific options, e.g. Male or Female. |
|
|
Computers and the Environment |
When they are created: They are made of lots of minerals like gold which need to be mined and plastics which come from oil. When they are used: They are powered by electricity which is created by burning fossil fuels. When they are disposed of: They contain lots of toxic chemicals like lead and mercury that can get into water supplies and harm the environment. |
|
|
Computer Misuse Act (1990) |
Makes it illegal to access computers without permission (hacking). |
|
|
Data protection act (1980) |
Makes it illegal for people to sell on personal data without the subject's permission. |
|
|
Regulation of investigatory powers act (RIPA) |
Makes it legal for the government to read your e-mails and tap your phone. |
|
|
Health & safety at work act |
Means employers have to provide equipment (eg adjustable chairs) so employees don't get hurt whilst using computers. |
|
|
Copyright Act |
Makes it illegal to distribute artistic works (like music) without the owner's permission. |
|