AT3 Digital Tech Knowledge Test Prevision

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

Flashcards for AT3 Digital Tech Knowledge Test Prevision, covering key coding, cybersecurity, memory, peripherals, and data privacy terms.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Method

A block of code that performs a specific task.

2
New cards

Variable

A storage location that holds a value.

3
New cards

Loops

A sequence of instructions that is repeated until a certain condition is reached.

4
New cards

Indexing

A method used to access items in a list.

5
New cards

Snake case

A naming convention where words are separated by underscores (e.g., snake_case).

6
New cards

Event

An action or occurrence recognized by software, often handled by an event handler.

7
New cards

Casting

Converting a variable from one data type to another.

8
New cards

Dictionary

A data structure that stores key-value pairs.

9
New cards

Lists

An ordered collection of items.

10
New cards

Input

Data received by a program.

11
New cards

Output

Data sent from a program.

12
New cards

Components

Reusable software elements or modules.

13
New cards

OOP

Object-Oriented Programming; a programming paradigm based on objects.

14
New cards

Properties

Attributes or characteristics of an object.

15
New cards

Int

Integer; a data type representing whole numbers.

16
New cards

Data Types

The classification of data (e.g., integer, string, float, boolean).

17
New cards

Str

String; a data type representing text.

18
New cards

Float

A data type representing numbers with decimal points.

19
New cards

Boolean

A data type representing true or false values.

20
New cards

2FA

Two-Factor Authentication; a security process in which the user provides two authentication factors.

21
New cards

RAM

Random Access Memory; a type of computer memory that can be accessed randomly.

22
New cards

Function

A block of organized, reusable code that is used to perform a single, related action.

23
New cards

Concatenation

The operation of joining character strings end-to-end.

24
New cards

Database

An organized collection of structured information, or data, typically stored electronically in a computer system.

25
New cards

Operators

Symbols or characters that represent actions or operations to be performed.

26
New cards

Conditional statements

Features of a programming language, which perform different computations or actions depending on whether a programmer-specified boolean condition evaluates to true or false.

27
New cards

Hard Drive, SSD, USB

Data storage devices.

28
New cards

Threats

Potential sources of harm (e.g., malware, phishing).

29
New cards

VPN

Virtual Private Network; a secure network connection method for privacy.

30
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

31
New cards

Patches

Updates to software that fix vulnerabilities.

32
New cards

Software

A set of instructions, data or programs used to operate computers and execute specific tasks.

33
New cards

Operating system

System software that manages computer hardware and software resources and provides common services for computer programs.

34
New cards

Data compression

Reducing the size of data.

35
New cards

Lossy

A class of data encoding methods that uses inexact approximations and partial data discarding to represent the content.

36
New cards

Lossless

A class of data compression algorithms that allows the original data to be perfectly reconstructed from the compressed data.

37
New cards

Peripherals

External hardware devices (e.g., keyboard, mouse).

38
New cards

Output

Devices used to display data (e.g., speaker, printer).

39
New cards

Input

Devices used to enter data (e.g., keyboard, mic).

40
New cards

Utility Software

Software designed to help analyze, configure, optimize or maintain a computer.

41
New cards

Application Software

Software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. Examples of an application include a word processor, a spreadsheet, an accounting application, a web browser, a media player, an aeronautical flight simulator, a console game or a photo editor.

42
New cards

Cage Tech memory

Primary (Temporary storage) and Secondary (Permanent storage).

43
New cards

Data Privacy Principles

Guidelines regulating the collection, use, storage, and disclosure of personal information, governed by policies like the Australian Privacy Principles (APP).