Grade 12 Computer Applications Technology Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards based on Grade 12 Computer Applications Technology exam notes covering hardware, software, networking, and social implications.

Last updated 9:14 PM on 5/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

53 Terms

1
New cards

Drop Cap

A decorative letter that often takes up two or more lines of text, usually in the first paragraph or section of a document.

2
New cards

Peripheral

A device connected to a computer; a motherboard is NOT an example of one.

3
New cards

Resource Sharing

A primary motivation for installing a network to save costs and manage data security.

4
New cards

URL

A way for users to identify a website on the internet.

5
New cards

Compression

Reduces the size of data files by encoding information more efficiently.

6
New cards

Plagiarism

The use of resource material without acknowledgement or passing off someone else’s work as your own.

7
New cards

Power User

A user who typically uses specialised software that requires high resolution graphics.

8
New cards

Digital Divide

The gap between those with access to ICT devices and those without, which can be reduced by increasing access for all people.

9
New cards

LAN

A type of network that covers a small area, such as an office building.

10
New cards

Firewall

A system that restricts unauthorised access to and from a computer network.

11
New cards

GIGO

An acronym illustrating that human error has an influence on computer output.

12
New cards

Digital Footprint

The electronic record or trail of data a person leaves behind while using the internet.

13
New cards

Patch

Software used to fix a specific programming problem in software.

14
New cards

AI

Machines that can perform tasks autonomously that would normally require human action.

15
New cards

VPN

Used to encrypt and secure your internet traffic.

16
New cards

Broadband

A high-speed internet connection, which is referred to as ‘always on’.

17
New cards

Piggybacking

Gaining unauthorised access to and connecting to an unsecured WI-FI network.

18
New cards

CSV

A text file which uses commas to separate the values in each column.

19
New cards

Beta Software

Preliminary (pre-sale) versions of software released by developers to be tested by the general public.

20
New cards

ROM

A type of memory needed to store permanent data and instructions.

21
New cards

Metadata

Additional data stored about a file that describes its contents, such as the name of the author.

22
New cards

Fragmentation

The problem when parts of files become scattered across the disk, causing the computer to become slower.

23
New cards

IoT

A trend whereby all sorts of devices and appliances are connected to the internet.

24
New cards

Accelerometer

Input device in smartphones and tablets used to detect how the device is held or moved.

25
New cards

Virtual Reality (VR)

Technology where a person interacts with a simulation of a 3D environment in a seemingly real way.

26
New cards

Secondary Memory

Memory used for storing all programs and data permanently.

27
New cards

Ergonomics

The study of the impact of technology on users and the design of devices to make working safer and more comfortable.

28
New cards

Backward Compatibility

The ability of software to open and use files created in previous or older versions.

29
New cards

Biometric Security

Using unique biological features, such as fingerprints or facial recognition, to access devices or systems.

30
New cards

User Interface (UI)

A way to interact with your operating system or programs.

31
New cards

UPS

A device with a battery backup system that provides power during outages and protects against power surges.

32
New cards

Convergence

The integration of multiple technologies into a single device, such as a smartphone.

33
New cards

Defragmentation

Reorganizing scattered data on a hard disk to improve performance and efficiency.

34
New cards

Grid Computing

A system where complex calculations are performed by using idle resources of multiple computers in parallel.

35
New cards

SSD

Stands for Solid State Drive; operates faster than traditional hard drives by storing data electronically.

36
New cards

Virtual Memory

A portion of hard drive space which acts as memory when available RAM is insufficient.

37
New cards

Ransomware

Malware that encrypts data until the user pays a ransom fee to the hacker.

38
New cards

Throttling

The process where an ISP slows down a user's internet connection for exceeding a data cap.

39
New cards

Shaping

A technique where certain network services like emails are prioritized over others like social networking.

40
New cards

Wireless Access Point

A device that allows other wireless devices to connect to a wired or wireless network.

41
New cards

Cloud Computing

Storing and accessing data over the internet, allowing for accessibility from anywhere and backup functions.

42
New cards

4IR

Stands for the Fourth Industrial Revolution; the integration of technologies in the physical, digital, and biological worlds.

43
New cards

Augmented Reality

Technology that adapts to and is applied to the specific environment the user sees.

44
New cards

DDoS Attack

Using bots to flood a website with traffic until it is no longer available.

45
New cards

Social Engineering

Obtaining confidential information by abusing the trusting nature of people.

46
New cards

Green Computing

Using computers in a way that is not harmful to the environment.

47
New cards

Click-jacking

A threat where a user is redirected to a malicious page after clicking a link.

48
New cards

OCR

Software used to produce an editable soft copy from a scanned document.

49
New cards

NFC Payments

Tapping bank cards or devices in close contact to a POS to transfer data wirelessly.

50
New cards

Crowdfunding

An online method used to raise small amounts of money from a large number of people.

51
New cards

Autonomous Car

A self-driving car that senses its environment and moves with little or no human input.

52
New cards

Unit of Measurement (Storage)

GBGB

53
New cards

VLOOKUP Error Correction

Requires the column argument to be correctly set, e.g., =VLOOKUP(D2,A2:B39,2,FALSE)=VLOOKUP(D2,A2:B39,2,FALSE)