1/42
Flashcards for AT3 Digital Tech Knowledge Test Prevision, covering key coding, cybersecurity, memory, peripherals, and data privacy terms.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Method
A block of code that performs a specific task.
Variable
A storage location that holds a value.
Loops
A sequence of instructions that is repeated until a certain condition is reached.
Indexing
A method used to access items in a list.
Snake case
A naming convention where words are separated by underscores (e.g., snake_case).
Event
An action or occurrence recognized by software, often handled by an event handler.
Casting
Converting a variable from one data type to another.
Dictionary
A data structure that stores key-value pairs.
Lists
An ordered collection of items.
Input
Data received by a program.
Output
Data sent from a program.
Components
Reusable software elements or modules.
OOP
Object-Oriented Programming; a programming paradigm based on objects.
Properties
Attributes or characteristics of an object.
Int
Integer; a data type representing whole numbers.
Data Types
The classification of data (e.g., integer, string, float, boolean).
Str
String; a data type representing text.
Float
A data type representing numbers with decimal points.
Boolean
A data type representing true or false values.
2FA
Two-Factor Authentication; a security process in which the user provides two authentication factors.
RAM
Random Access Memory; a type of computer memory that can be accessed randomly.
Function
A block of organized, reusable code that is used to perform a single, related action.
Concatenation
The operation of joining character strings end-to-end.
Database
An organized collection of structured information, or data, typically stored electronically in a computer system.
Operators
Symbols or characters that represent actions or operations to be performed.
Conditional statements
Features of a programming language, which perform different computations or actions depending on whether a programmer-specified boolean condition evaluates to true or false.
Hard Drive, SSD, USB
Data storage devices.
Threats
Potential sources of harm (e.g., malware, phishing).
VPN
Virtual Private Network; a secure network connection method for privacy.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Patches
Updates to software that fix vulnerabilities.
Software
A set of instructions, data or programs used to operate computers and execute specific tasks.
Operating system
System software that manages computer hardware and software resources and provides common services for computer programs.
Data compression
Reducing the size of data.
Lossy
A class of data encoding methods that uses inexact approximations and partial data discarding to represent the content.
Lossless
A class of data compression algorithms that allows the original data to be perfectly reconstructed from the compressed data.
Peripherals
External hardware devices (e.g., keyboard, mouse).
Output
Devices used to display data (e.g., speaker, printer).
Input
Devices used to enter data (e.g., keyboard, mic).
Utility Software
Software designed to help analyze, configure, optimize or maintain a computer.
Application Software
Software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. Examples of an application include a word processor, a spreadsheet, an accounting application, a web browser, a media player, an aeronautical flight simulator, a console game or a photo editor.
Cage Tech memory
Primary (Temporary storage) and Secondary (Permanent storage).
Data Privacy Principles
Guidelines regulating the collection, use, storage, and disclosure of personal information, governed by policies like the Australian Privacy Principles (APP).