1/22
These flashcards cover key vocabulary and concepts from the lecture notes on computer systems and applications, aiding in exam preparation.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
GPS (Global Positioning System)
A navigation system that allows a device to determine its precise location on Earth using signals from satellites.
GIS (Geographic Information System)
A system that allows users to model, analyze, and create interactive queries with spatial data, combining maps, graphics, and databases.
Online Booking System
A digital system that allows users to make, change, or cancel bookings via the internet, often faster and more efficiently than manual systems.
Social Networking
Platforms that allow users to interact, share content, and communicate in a more public setting compared to traditional emails.
A method of exchanging digital messages between people using electronic devices.
RFID (Radio-Frequency Identification)
A technology used to automatically identify and track tags attached to objects using radio waves.
ATM (Automated Teller Machine)
A banking machine that allows customers to perform financial transactions such as deposits, withdrawals, and balance inquiries without human assistance.
Data Validation
The process of ensuring that a program or system operates on clean, correct, and useful data.
Cloud Storage
A model of computer data storage in which the digital data is stored in logical pools, the physical storage is often owned and managed by a hosting company.
Smartwatch
A wearable device that not only tells time but also connects to smartphone notifications and often includes GPS functionality.
Microprocessor
The brain of a computer that performs calculations and processes instructions.
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Virtual Reality
A computer-generated environment that allows a user to interact with a three-dimensional world.
Voice over Internet Protocol (VoIP)
Technology that allows users to make voice calls using a broadband internet connection instead of a regular phone line.
Data Encryption
The process of converting information or data into a code, especially to prevent unauthorized access.
E-Safety
The practice of protecting yourself and others from risks in the digital environment, particularly with regard to personal data.
Digital Certificate
An electronic document used to prove the ownership of a public key.
Phishing
A method of trying to gather personal information using deceptive emails and websites.
Spam
Unwanted or unsolicited digital communications, often for advertising purposes.
Backup
The process of making copies of data to ensure that it can be restored in case of data loss.
Interactivity
The ability of a computer system to allow two-way communication between the user and the system.
Bandwidth
The maximum rate of data transfer across a network.
Smart Cards
Plastic cards with an embedded microchip that can be used for transactions, identification, or access control.