1/84
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Input Devices
Used to enter data into a computer system e.g. keyboards, mice, and scanners.
Output Devices
Used to present data from a computer system, including monitors, printers, and speakers.
Biometic Devices
Fingerprints or iris scans, for identification and access control.
Processor
The main component of a computer that executes instructions and processes data
Motherboard
The circuit board that connects and allows communication between various components of a computer
Power Supply Unit
The component that converts AC to DC for the computer to be able to process
RAM
Memory that allows for temporary data storage and quick access by the processor
ROM
A type of non-volatile memory that retains data even when the power is turned off
Cache
A type of high-speed memory that provides faster data access to the processor by storing frequently accessed data and instructions.
Magnetic Storage
Storage that uses magnetic fields to store and retrieve digital data, typically found in hard drives and magnetic tapes.
Magnetic Storage Advantages
Large capacity, durability, and cost-effectiveness for data storage compared to other mediums.
Magnetic Storage Disadvantages
Slower data access speeds, susceptibility to physical damage, and the risk of data loss due to magnetic interference.
Optical Storage
Storage that uses lasers and optical technology to read and write data, commonly found in CDs, DVDs, and Blu-ray discs.
Optical Storage Advantages
Durability, portability, and resistance to magnetic fields.
Optical Storage Disadvantages
Limited data rewrite cycles, lower storage capacity compared to magnetic storage, and sensitivity to scratches and light.
Solid State
Drive technology that uses flash memory to store data instead of spinning disks.
Solid State Advantages
Fastest storage, durability, lower power consumption, and silent operation.
Solid State Disadvantages
Expensive, limited read/write cycles
Cloud Storage
Storage in which digital data is stored on remote servers accessed via the internet
Cloud Storage Advantages
Accessibility, cost-effectiveness
Cloud Storage Disadvantages
Security risks, potential downtime, and limited control over data.
SCSI
Set of standards for connecting and transferring data between computers
SAS
(Serial Attached SCSI) is a point-to-point serial protocol that replaces the parallel SCSI standard for connecting storage devices to computers, offering faster data transfer rates and improved performance.
Graphics Card
A hardware component that generates and renders images, animations, and video for display on a computer screen
Sound Card
A hardware component that processes audio data, allowing a computer to output sound through speakers and input sound through microphones, essential for music production and gaming.
Network Interface Card
A hardware component that connects a computer to a network,
Fibre Channel Card
A hardware component that provides high-speed network connections between storage devices and servers, facilitating data transfer in storage area networks (SANs).
Storage Controller Card
A hardware component that manages data flow to and from storage devices, optimizing performance and reliability in storage area networks (SANs) and direct-attached storage.
Copper Cables Advantages
Offer low cost, ease of installation, flexibility, and sufficient bandwidth for many applications, making them suitable for standard networking needs.
Copper Cable Disadvantages
Are limited by distance, susceptible to electromagnetic interference, and have lower bandwidth compared to fiber optics, which can affect performance in high-demand environments.
Fibre Optic Cables Advantages
Provide higher bandwidth, longer transmission distances, immunity to electromagnetic interference, and enhanced security, making them ideal for high-speed data communication.
Fibre Optic Cables Disadvantages
Can be more expensive, require special installation skills, are fragile, and may pose challenges in terms of bending and connections.
Hub
Receives data packets from a connected device and transfers a copy to all connected nodes
Switch
Receives data packets, processes them and transfers them onto a device specifically listed in the destination address
Router
Transfers data packets between networks
Modem
Sends data across the telephone network, can only transfer analog signals so a modem is used to convert a computer’s digital data into an analog signal
WAP
provides link between wireless/wired networks
Open Source Software Advantages
Source code available to edit, unwanted features removed, shared with public, low in price
Open Source Software Disadvantages
Security risks, prone to errors, technical skill
Closed Source Software Advantages
Well tested, support is often provided
Closed Source Software Disadvantages
Not free, can’t modify
Off The Shelf Software Advantages
Tested throughly, cheap, may trust company
Off The Shelf Software Disadvantages
Expensive, additional features
Bespoke Software Advantages
Personalised, unwanted features removed
Bespoke Software Disadvantages
Expensive to develop, may need training, needs original programmers
Shareware
Software with trial period
Freeware
Freely available to download
Application Software
Productivity, Development, Business software
Antivirus Software
Locates and deletes viruses
Firewall
Each data packet is processed to check whether it should be given access to the network
Defragmentation
Rearranges files so that all fragments are back together in order
Compression
Decreases the size of a file
Operating systems
manage: inp/out devices, printing, secondary storage, memory, processes, security
Letters Advantages
Physical evidence, can be used for formal occasions
Letters Disadvantages
Postage cost, days to recieve, no attachments e.g. videos
Text Message
Can reach large audience, good for short messages
Text Message Disadvantages
Limited characters, can cost money for messages
Email Advantages
Can send to many people at once, attachments included, can send targetted emails
Email Disadvantages
Can be lost, phising scams
Instant Messaging Advantages
real-time, recieved instantly, attachments included
Instant Messaging Disadvantages
Can’t be used for formal occasions, ineternet access can be disruptive
Cellular Advantages
Can hear how something is said, fastest method of communication
Cellular Disadvantages
Impacted by reception, cant see body language
Teleconferences Advantages
Multiple people at once, can be across the world
Teleconferences Disadvantages
Quality of call may be affected by reception, may be a delay
VoIP Advantages
Can make calls over internet, cheaper
VoIP Disadvantages
Relies on good connection, less secure
Video Conferences Advantages
Can connect remotely saving time and money, can see body language, can share information visually
Video Conferences Disadvantages
High bandwidth connection required, impacted by connection
Social Media Advantages
Quick to share information, in different formats, direct messages
Social Media Disadvantages
Requires social media manager, cautious about what they post
Communication Skills
Interpersonal, Verbal, Questioning, Written
Personal Attributes
Self-motivation, leadership, respect, dependability, punctuality, problem solving..
Professional Body
An organisation that seeks to develop and support workers in a certain profession
Industry Certification
Professional bodies exist to provide trainees with industry certification
Industry Certification Advantages
Develop IT skills, Access resources, Professional development opportunities
Industry Certification Disadvantages
Cost, no guarantees, time and dedication
Phising
Using emails to bait people into sending sensitive information
Hacking
Exploiting weaknesses in a system
Trojan Horse
Pretemds to be a reputatble source in order to gain access to your system
Eavesdropping
Listening in on calls
Social Engineering
Tricking individuals into sensitive information
Virus
Replicates itself and spreads by attaching to infected files
Physical Security
Privacy screens, shredding, tokens, locks
Digital Security
Passwords, anti-malware, firewall, encryption, permissions