IT BTEC level 3 unit 1 & 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/166

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:53 PM on 4/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

167 Terms

1
New cards

What is meant by data?

Raw facts and figures that have not been processed

2
New cards

What is meant by information?

Processed data that is meaningful and useful

3
New cards

What is the difference between data and information?

Data is raw, information is processed and meaningful

4
New cards

What is a CPU?

Central Processing Unit that processes instructions and controls operations

5
New cards

What are the two main parts of the CPU?

ALU and Control Unit

6
New cards

What does the ALU do?

Performs arithmetic and logical operations

7
New cards

What does the Control Unit do?

Decodes instructions and controls execution

8
New cards

What is clock speed?

Number of cycles per second measured in GHz

9
New cards

What does cache memory do?

Stores frequently used data for quick access

10
New cards

What is RAM?

Volatile memory used to store data currently in use

11
New cards

What is ROM?

Non-volatile memory storing firmware

12
New cards

What is storage?

Devices used to store data permanently

13
New cards

What is primary storage?

Main memory directly accessed by CPU (RAM, cache)

14
New cards

What is secondary storage?

Long-term storage (HDD, SSD)

15
New cards

What is an HDD?

Magnetic storage device with spinning disks

16
New cards

What is an SSD?

Solid state storage with no moving parts

17
New cards

State one advantage of SSD over HDD

Faster read/write speeds

18
New cards

State one disadvantage of SSD

Higher cost per GB

19
New cards

What is input hardware?

Devices used to enter data into a system

20
New cards

Give two examples of input devices

Keyboard, mouse

21
New cards

What is output hardware?

Devices that present data to the user

22
New cards

Give two examples of output devices

Monitor, printer

23
New cards

What is system software?

Software that manages hardware and system resources

24
New cards

What is an operating system?

Software that manages hardware and provides user interface

25
New cards

Give two functions of an OS

Memory management, process management

26
New cards

What is application software?

Software designed to perform specific tasks

27
New cards

Give examples of application software

Word processor, spreadsheet

28
New cards

What is utility software?

Software that maintains and optimises system performance

29
New cards

Give examples of utility software

Antivirus, disk defragmenter

30
New cards

What is open source software?

Software with source code freely available to modify

31
New cards

What is proprietary software?

Software owned and licensed with restricted use

32
New cards

What is a network?

Two or more devices connected to share resources

33
New cards

What is a LAN?

Local Area Network in a small geographic area

34
New cards

What is a WAN?

Wide Area Network covering large geographic areas

35
New cards

What is bandwidth?

Maximum amount of data transmitted per second

36
New cards

What is latency?

Delay in data transmission

37
New cards

What is a router?

Device that forwards data between networks

38
New cards

What is a switch?

Connects devices within a network using MAC addresses

39
New cards

What is an IP address?

Unique identifier for a device on a network

40
New cards

What is a MAC address?

Unique hardware address assigned to a network interface

41
New cards

What is cloud computing?

Delivery of computing services over the internet

42
New cards

State one advantage of cloud computing

Accessible from anywhere

43
New cards

State one disadvantage of cloud computing

Dependent on internet connection

44
New cards

What is virtualization?

Running multiple virtual systems on one physical machine

45
New cards

What is cyber security?

Protection of systems and data from digital attacks

46
New cards

What is malware?

Malicious software designed to harm systems

47
New cards

Give examples of malware

Virus, worm, trojan, ransomware

48
New cards

What is phishing?

Fraudulent attempt to obtain sensitive information

49
New cards

What is social engineering?

Manipulating people to gain confidential information

50
New cards

What is encryption?

Converting data into unreadable form to protect it

51
New cards

What is authentication?

Verifying identity of a user

52
New cards

What is a firewall?

Security system that monitors and controls network traffic

53
New cards

What is data protection?

Ensuring personal data is used lawfully and securely

54
New cards

What is the purpose of GDPR?

Protect personal data and privacy

55
New cards

State one GDPR principle

Data must be processed lawfully

56
New cards

What is a backup?

Copy of data stored separately

57
New cards

What is the purpose of backups?

Restore data after loss or damage

58
New cards

What is a database?

Structured collection of data

59
New cards

What is a table?

Collection of related records

60
New cards

What is a field?

Single piece of data in a record

61
New cards

What is a record?

Collection of related fields

62
New cards

What is primary key?

Unique identifier for each record

63
New cards

What is validation?

Ensuring data entered is sensible and reasonable

64
New cards

What is verification?

Checking data matches original input

65
New cards

What is a user interface?

Means by which user interacts with system

66
New cards

Give types of user interfaces

GUI, CLI, menu-based

67
New cards

What is accessibility?

Designing systems usable by people with disabilities

68
New cards

Give one accessibility feature

Screen reader

69
New cards

What is sustainability in IT?

Reducing environmental impact of IT systems

70
New cards

Give one method of improving sustainability

Recycling hardware

71
New cards

What is ethical use of IT?

Using IT responsibly and morally

72
New cards

Give one ethical issue

Privacy concerns

73
New cards

What is legal use of IT?

Following laws related to IT

74
New cards

Give one IT law

Data Protection Act

75
New cards

Cyber security definition

Protecting computer systems, networks and data from unauthorized access, damage or theft

76
New cards

Authentication

Process of verifying a user’s identity before access is granted

77
New cards

Encryption

Process of converting plaintext into ciphertext using a key

78
New cards

Risk assessment

Identifying threats, analysing likelihood and impact, and assigning risk levels

79
New cards

Least privilege

Users only have minimum access required for their role

80
New cards

Assume breach

Design systems assuming a breach will occur and focus on detection/recovery

81
New cards

Security through obscurity

Avoid relying on hidden systems instead use strong security controls

82
New cards

ISO 27000

International standard for information security management

83
New cards

Internal threats

Threats originating from within an organisation

84
New cards

Employee sabotage

Employees deliberately damaging or stealing data/equipment

85
New cards

Unauthorized internal access

Employees accessing data or systems without permission

86
New cards

Accidental data loss

Unintentional data loss such as deletion or spills

87
New cards

Unsafe practices

Poor security behaviours like weak passwords

88
New cards

External threats

Threats originating outside the organisation

89
New cards

Malware

Malicious software designed to damage or gain access

90
New cards

Hacking

Exploiting vulnerabilities to gain unauthorized access

91
New cards

Sabotage attacks

Disrupting systems (e.g., DoS or physical damage)

92
New cards

Social engineering

Manipulating people into revealing confidential information

93
New cards

Network vulnerabilities

Weak firewall settings or infected external devices

94
New cards

Organisational vulnerabilities

Weak policies or excessive permissions

95
New cards

Software vulnerabilities

SQL injection and zero-day exploits

96
New cards

Operating system vulnerabilities

Outdated systems or missing patches

97
New cards

Cloud/IoT vulnerabilities

Lack of control or built-in security weaknesses

98
New cards

Virus

Malware that attaches to files and replicates

99
New cards

Worm

Self-replicating malware that spreads across networks

100
New cards

Trojan

Malware disguised as legitimate software