Information technology terminologies

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/51

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

52 Terms

1
New cards

FTP (File Transfer Protocol)

Is a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet.

2
New cards

Transmission Control Protocol (TCP)

Is a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

3
New cards

The difference between FTP and TCP in it

FTP (File Transfer Protocol)

  • Manages the commands (e.g., GET, PUT) and data streams for file operations.

  • Layer: Operates at the Application Layer of the TCP/IP model. 

TCP (Transmission Control Protocol)

  • Function: Breaks data into packets, numbers them, sends them, and reassembles them at the destination, managing flow and retransmitting lost packets.

  • Layer: Operates at the Transport Layer. 

  • Basically TCP is everything that happens in between of transferring files

4
New cards

Difference between TCP and IP

They're often mentioned together as "TCP/IP" because they work as a team—IP gets packets to the right destination, while TCP makes sure the data arrives correctly and completely.

5
New cards

Telnet

Which is a network protocol that lets you remotely access and control another computer over a network or the internet.

Telnet works like a virtual terminal—you can connect to a remote machine and type commands as if you were sitting right in front of it. It was widely used in the early days of the internet for remote administration of servers and network devices.

Largely replaced by SSH (Secure Shell), which encrypts all communication

6
New cards

Ports

They are essentially virtual "doors" or endpoints on a computer that allow different network services and applications to communicate simultaneously over the same network connection.

7
New cards

Why we need ports:

Your computer has only one IP address, but you might be running multiple network applications at once—web browsing, email, gaming, video calls, etc. Ports let your computer keep track of which data belongs to which application.

8
New cards

Port numbers:

  • Range from 0 to 65535

  • 0-1023: Well-known ports (reserved for common services)

  • 1024-49151: Registered ports (assigned to specific applications)

  • 49152-65535: Dynamic/private ports (used temporarily by applications)

9
New cards

SSH (Secure Shell)

Is a protocol for securely connecting to and controlling remote computers over a network. It's the modern, secure replacement for Telnet.

10
New cards

The browser (web browser)

Is the application you use to access and view websites on the internet—like Chrome, Firefox, Safari, Edge, or others.

11
New cards

Internet telephony (also called VoIP - Voice over Internet Protocol)

Is technology that lets you make voice and video calls over the internet instead of traditional phone lines.

12
New cards

Range check

This is a type of validation rule that ensures data entered into a field falls within a specified minimum and maximum value.

Purpose: It prevents invalid or unrealistic data from being stored in the database by checking if a value is within acceptable boundaries.

Examples:

Age field:

  • Range: 0 to 120

  • Rejects entries like -5 or 200

Exam score:

  • Range: 0 to 100

  • Rejects entries like 150 or -10

13
New cards

Sequential Organization

Files are stored in order, one record after another, typically sorted by a key field (like ID number or date). To find a record, you must search from the beginning until you find it.

  • Advantages: Simple, efficient for processing all records in order, good for batch processing

  • Disadvantages: Slow for searching specific records, inefficient for updating or inserting records

14
New cards

Indexed Sequential Organization

Combines sequential storage with an index (like a book's index). Records are stored sequentially, but an index points to the location of specific records.

  • Advantages: Faster searching than pure sequential, supports both sequential and direct access

  • Disadvantages: Requires maintaining the index, uses extra storage space

15
New cards

Direct/Random Organization (Hashing)

Records are stored at locations calculated using a hash function based on the key field. You can go directly to a record's location.

  • Advantages: Very fast access to specific records, efficient for lookups

  • Disadvantages: Not suitable for sequential processing, collision handling needed, wasted space

16
New cards

Indexed Organization

Uses separate index files to locate records quickly. Multiple indexes can exist for different fields.

  • Advantages: Fast searching on indexed fields, flexible

  • Disadvantages: Overhead of maintaining indexes, uses extra storage

17
New cards

Serial Organization

Records stored in the order they arrive, with no particular sorting.

  • Advantages: Fast insertion, simple

  • Disadvantages: Very slow searching, inefficient for most operations

18
New cards

A hash function

This is a mathematical algorithm that takes input data (like a name, ID number, or any value) and converts it into a fixed-size number called a hash value or hash code. This number is then used to determine where to store or find that data.

How it works: Input → Hash Function → Hash Value (storage location)

Simple example: Let's say you're storing student records by ID number, and you have 100 storage locations (0-99).

Simple hash function: ID % 100 (modulo operation—remainder after division)

  • Student ID 12345 → 12345 % 100 = 45 (store at location 45)

  • Student ID 98721 → 98721 % 100 = 21 (store at location 21)

  • Student ID 50003 → 50003 % 100 = 3 (store at location 3)

19
New cards

A key field (or just key)

This is a field in a database table or file that uniquely identifies each record, allowing you to find and reference specific records.

Main purpose: To distinguish one record from all others and provide a way to quickly locate, update, or delete specific records.

20
New cards

Index files

These are separate files that work like a book's index—they contain pointers that help you quickly find records in the main data file without having to search through everything sequentially.

How they work: The index file stores pairs of values:

  • Key field value (like StudentID or Name)

  • Pointer/address to where that record is located in the main data file

21
New cards

Transaction processing

This is a method of organizing and managing database operations where related actions are grouped together as a single unit of work called a transaction. The system ensures that either all parts of the transaction complete successfully, or none of them do.

22
New cards

What is a transaction?

A sequence of database operations that must be completed as one atomic unit. If any part fails, the entire transaction is rolled back (undone).

Classic example - Bank transfer: Transferring $100 from Account A to Account B involves:

  1. Deduct $100 from Account A

  2. Add $100 to Account B

23
New cards

Atomic unit

An atomic unit means something that is indivisible

24
New cards

Types of transaction processing systems:

Batch processing: Transactions collected and processed together at scheduled times (like processing all day's checks at night)

Real-time/Online processing: Transactions processed immediately as they occur (like ATM withdrawals, online shopping)

25
New cards

Query by Example (QBE)

Is a visual, user-friendly method of querying databases where you specify what you want by filling in example values in a table-like grid, rather than writing code or complex query language.

26
New cards

Data Definition Language (DDL)

is a subset of SQL commands used to define and manage the structure of a database—creating, modifying, and deleting database objects like tables, indexes, and schemas.

Key point: DDL deals with the structure of the database, not the data inside it.

27
New cards

What DDL defines:

  • Tables: Structure with columns and data types

  • Constraints: Rules like PRIMARY KEY, FOREIGN KEY, UNIQUE, NOT NULL, CHECK

  • Indexes: For faster searching

  • Views: Virtual tables based on queries

  • Schemas: Overall database structure

28
New cards

DDL vs DML (Data Manipulation Language):

DDL (structure):

  • CREATE, ALTER, DROP, TRUNCATE

  • Defines HOW data is stored

  • Example: Creating a Students table

DML (data):

  • SELECT, INSERT, UPDATE, DELETE

  • Works WITH the data

  • Example: Adding a new student record

Real-world analogy: Think of building a house:

  • DDL = Designing and building the structure (rooms, walls, plumbing layout)

  • DML = Moving furniture in and out, decorating, living in it

29
New cards

SQL (Structured Query Language)

The standard language for managing and querying databases—uses commands like SELECT, INSERT, CREATE, etc.

30
New cards

DATA QUALITY ATTRIBUTES

1. Data Integrity Accuracy, consistency, and reliability of data throughout its lifecycle. Ensures data is correct and trustworthy.

2. Data Consistency Data is uniform and doesn't contradict itself across the database. Same data stored in multiple places has the same value.

3. Data Accuracy Data correctly represents the real-world values it's supposed to model.

4. Data Validity Data conforms to defined formats, types, and ranges (validation rules).

5. Data Completeness All required data is present with no missing values where they're needed.

6. Data Redundancy Duplicate storage of the same data (usually something to minimize through normalization).

7. Data Independence Ability to change data storage structure without affecting applications that use the data.

31
New cards

DATABASE SECURITY CONCEPTS:

8. Data Security Protection of data from unauthorized access, corruption, or theft.

9. Data Privacy Controlling who can access personal or sensitive information.

10. Access Control Managing user permissions (who can read, write, update, delete data).

32
New cards

DATA MANAGEMENT CONCEPTS:

11. Data Redundancy (mentioned above) Storing the same data multiple times.

12. Data Atomicity Operations are indivisible—they either complete fully or not at all (part of ACID properties).

13. Data Durability Once data is committed, it remains saved even after system failures.

14. Data Isolation Concurrent transactions don't interfere with each other.

15. Data Concurrency Multiple users can access data simultaneously without conflicts.

16. Data Recovery Ability to restore data after system failures or errors.

17. Data Backup Creating copies of data for protection against loss.

33
New cards

1. TITLE BAR

The horizontal bar at the very top of a window that displays the window's title (name of the document or application).

Features:

  • Shows program/document name (e.g., "Document1 - Microsoft Word")

  • Usually contains window control buttons (minimize, maximize, close)

  • Can be dragged to move the window

34
New cards

2. MENU BAR

The bar directly below the title bar containing drop-down menus with commands and options.

Examples:

  • File, Edit, View, Insert, Format, Tools, Help

35
New cards

3. TOOL BAR (or Toolbar)

A bar containing buttons and icons for quick access to commonly used commands.

Features:

  • Icons/buttons for actions like Save, Print, Cut, Copy, Paste, Bold, Italic

36
New cards

4. SCROLL BAR

Vertical or horizontal bars on the edges of a window that let you navigate through content that doesn't fit on screen.

Types:

  • Vertical scroll bar: Right side, scrolls up/down

  • Horizontal scroll bar: Bottom, scrolls left/right

37
New cards

5. STATUS BAR

The bar at the bottom of a window displaying information about the current state or selected item.

Examples of what it shows:

  • Page number and word count (in Word)

  • File size and number of items (in File Explorer)

38
New cards

6. TASK BAR

The bar at the bottom (or side) of your screen in the operating system (Windows), not inside individual windows.

Features:

  • Shows currently running programs/applications

  • Contains the Start button (Windows)

39
New cards

7. SIZING BAR

The edges and corners of a window that you can drag to resize the window.

40
New cards

8. WINDOW TITLE

This is the same as Title Bar—the text displayed at the top of a window showing the application or document name.

41
New cards

COMMON HTML TAGS:

Document Structure:

  • <html> - Root element of the page

  • <head> - Contains metadata (not displayed)

  • <title> - Page title (shows in browser tab)

  • <body> - Main content area (what users see)

Headings:

  • <h1> - Largest heading

  • <h2> - Second level heading

  • <h3> through <h6> - Progressively smaller headings

Text Formatting:

  • <p> - Paragraph

  • <br> - Line break (self-closing)

  • <hr> - Horizontal line (self-closing)

  • <strong> or <b> - Bold text

  • <em> or <i> - Italic text

  • <u> - Underlined text

  • <mark> - Highlighted text

  • <small> - Smaller text

  • <del> - Strikethrough text

  • <sup> - Superscript

  • <sub> - Subscript

Lists:

  • <ul> - Unordered (bulleted) list

  • <ol> - Ordered (numbered) list

  • <li> - List item

Links:

  • <a href="url"> - Hyperlink

Images:

  • <img src="url" alt="description"> - Image (self-closing)

  • <table> - Table

  • <tr> - Table row

  • <th> - Table header cell

  • <td> - Table data cell

Forms:

  • <form> - Form container

  • <input> - Input field

  • <textarea> - Multi-line text input

  • <button> - Button

  • <select> - Dropdown menu

  • <label> - Form label

Input Types:

  • type="text" - Text field

  • type="password" - Password field

  • type="email" - Email field

  • type="number" - Number field

  • type="checkbox" - Checkbox

  • type="radio" - Radio button

  • type="submit" - Submit button

Divisions and Sections:

  • <div> - Generic container (block-level)

  • <span> - Generic container (inline)

  • <header> - Header section

  • <nav> - Navigation section

  • <main> - Main content

  • <section> - Content section

  • <article> - Independent content

  • <aside> - Sidebar content

  • <footer> - Footer section

Media:

  • <video> - Video player

  • <audio> - Audio player

  • <iframe> - Embedded frame (for other web pages.

42
New cards

HTML ATTRIBUTES:

Tags can have attributes that provide additional information

Common attributes:

  • id="unique-name" - Unique identifier

  • class="classname" - CSS class for styling

  • style="" - Inline CSS styling

  • href="url" - Link destination

  • src="url" - Image/media source

  • alt="description" - Alternative text

  • width="100" - Width

  • height="100" - Height

  • title="tooltip" - Tooltip text


COMMENTS:

html

<!-- This is a comment, not displayed on the page -->

43
New cards

PROCESS

This is a series of actions or steps taken to achieve a particular result or goal.

44
New cards

FORMULA

This is a mathematical rule or relationship expressed using symbols, numbers, and operators.

45
New cards

FUNCTION

This is a reusable block of code or a predefined operation that performs a specific task and can return a value.

46
New cards

PARAMETER

Also called argument is a value or variable that is passed into a function or formula to customize its behaviour.

<p>Also called <strong>argument</strong> is a value or variable that is passed into a function or formula to customize its behaviour.</p>
47
New cards

TELNET SERVICES

These are network services that can be accessed remotely using the Telnet protocol.

What they include:

  • Remote login: Access a remote computer's command line

  • Remote system administration: Manage servers from anywhere

  • Accessing specific services: Connect to mail servers, web servers, databases

  • BBS (Bulletin Board Systems): Early online communities accessed via Telnet

  • MUD games (Multi-User Dungeons): Text-based multiplayer games

48
New cards

INTERNET PORTALS

These are websites that serve as gateways or starting points to the internet, aggregating various services and information in one place.

Characteristics:

  • Single entry point to multiple services

  • Personalized content

  • Search functionality

  • News, email, weather, stocks

  • Links to various resources

49
New cards

MESSAGE BOARDS (also called Forums or Discussion Boards)

These are online discussion platforms where users can post messages, reply to others, and have threaded conversations.

Structure:

  • Categories: Broad topic areas

  • Forums: Specific subtopics within categories

  • Threads: Individual discussion topics

  • Posts: Individual messages within threads

50
New cards

AUTHORING TOOLS

These are software applications used to create digital content, particularly for web pages, e-learning courses, multimedia presentations, and interactive content.

Types of authoring tools:

1. Web Authoring Tools: Create websites and web pages

2. Multimedia Authoring Tools: Create interactive presentations and media

3. E-Learning Authoring Tools: Create educational and training content

4. Document Authoring eg google docs

5. Graphics Authoring eg canva

51
New cards

Terms used to assess and analyze content, information, websites, and media

CURRENCY How recent or up-to-date the information is.

DESIGN Visual layout, organization, and usability.

COVERAGE (SCOPE) Depth and breadth of information; how thoroughly a topic is covered.

AUDIENCE The intended readers or users; who it's designed for.

OBJECTIVITY Presenting information fairly without bias or personal opinions.

ACCURACY Information is correct, error-free, and verifiable.

AUTHORITY (CREDIBILITY) Expertise and trustworthiness of the author or source.

PURPOSE The reason content was created (inform, persuade, sell, entertain, educate).

RELIABILITY Consistency and dependability; can be trusted.

RELEVANCE How closely information relates to your needs or topic.

ACCESSIBILITY How easy it is to obtain and use the information.

COMPLETENESS Information is thorough with all necessary details.

READABILITY How easy the content is to read and understand.

PERSPECTIVE (POINT OF VIEW) The angle or viewpoint from which information is presented.

TONE The attitude or mood conveyed in the writing (formal, casual, serious, humorous).

USABILITY How easy and intuitive it is to use (mainly for websites/apps).

STABILITY Whether information and source will remain available over time.

52
New cards