1/52
Vocabulary-style flashcards based on Grade 12 Computer Applications Technology exam notes covering hardware, software, networking, and social implications.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Drop Cap
A decorative letter that often takes up two or more lines of text, usually in the first paragraph or section of a document.
Peripheral
A device connected to a computer; a motherboard is NOT an example of one.
Resource Sharing
A primary motivation for installing a network to save costs and manage data security.
URL
A way for users to identify a website on the internet.
Compression
Reduces the size of data files by encoding information more efficiently.
Plagiarism
The use of resource material without acknowledgement or passing off someone else’s work as your own.
Power User
A user who typically uses specialised software that requires high resolution graphics.
Digital Divide
The gap between those with access to ICT devices and those without, which can be reduced by increasing access for all people.
LAN
A type of network that covers a small area, such as an office building.
Firewall
A system that restricts unauthorised access to and from a computer network.
GIGO
An acronym illustrating that human error has an influence on computer output.
Digital Footprint
The electronic record or trail of data a person leaves behind while using the internet.
Patch
Software used to fix a specific programming problem in software.
AI
Machines that can perform tasks autonomously that would normally require human action.
VPN
Used to encrypt and secure your internet traffic.
Broadband
A high-speed internet connection, which is referred to as ‘always on’.
Piggybacking
Gaining unauthorised access to and connecting to an unsecured WI-FI network.
CSV
A text file which uses commas to separate the values in each column.
Beta Software
Preliminary (pre-sale) versions of software released by developers to be tested by the general public.
ROM
A type of memory needed to store permanent data and instructions.
Metadata
Additional data stored about a file that describes its contents, such as the name of the author.
Fragmentation
The problem when parts of files become scattered across the disk, causing the computer to become slower.
IoT
A trend whereby all sorts of devices and appliances are connected to the internet.
Accelerometer
Input device in smartphones and tablets used to detect how the device is held or moved.
Virtual Reality (VR)
Technology where a person interacts with a simulation of a 3D environment in a seemingly real way.
Secondary Memory
Memory used for storing all programs and data permanently.
Ergonomics
The study of the impact of technology on users and the design of devices to make working safer and more comfortable.
Backward Compatibility
The ability of software to open and use files created in previous or older versions.
Biometric Security
Using unique biological features, such as fingerprints or facial recognition, to access devices or systems.
User Interface (UI)
A way to interact with your operating system or programs.
UPS
A device with a battery backup system that provides power during outages and protects against power surges.
Convergence
The integration of multiple technologies into a single device, such as a smartphone.
Defragmentation
Reorganizing scattered data on a hard disk to improve performance and efficiency.
Grid Computing
A system where complex calculations are performed by using idle resources of multiple computers in parallel.
SSD
Stands for Solid State Drive; operates faster than traditional hard drives by storing data electronically.
Virtual Memory
A portion of hard drive space which acts as memory when available RAM is insufficient.
Ransomware
Malware that encrypts data until the user pays a ransom fee to the hacker.
Throttling
The process where an ISP slows down a user's internet connection for exceeding a data cap.
Shaping
A technique where certain network services like emails are prioritized over others like social networking.
Wireless Access Point
A device that allows other wireless devices to connect to a wired or wireless network.
Cloud Computing
Storing and accessing data over the internet, allowing for accessibility from anywhere and backup functions.
4IR
Stands for the Fourth Industrial Revolution; the integration of technologies in the physical, digital, and biological worlds.
Augmented Reality
Technology that adapts to and is applied to the specific environment the user sees.
DDoS Attack
Using bots to flood a website with traffic until it is no longer available.
Social Engineering
Obtaining confidential information by abusing the trusting nature of people.
Green Computing
Using computers in a way that is not harmful to the environment.
Click-jacking
A threat where a user is redirected to a malicious page after clicking a link.
OCR
Software used to produce an editable soft copy from a scanned document.
NFC Payments
Tapping bank cards or devices in close contact to a POS to transfer data wirelessly.
Crowdfunding
An online method used to raise small amounts of money from a large number of people.
Autonomous Car
A self-driving car that senses its environment and moves with little or no human input.
Unit of Measurement (Storage)
GB
VLOOKUP Error Correction
Requires the column argument to be correctly set, e.g., =VLOOKUP(D2,A2:B39,2,FALSE)