IT Grade 11 IT Theory

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 27

flashcard set

Earn XP

Description and Tags

It

28 Terms

1

Self-Directed Learning

An educational process where learners take the initiative to identify their learning needs, set goals, find resources, and assess their progress. This approach fosters independence as students become responsible for their own education. An example could be a student choosing to learn a programming language online by finding tutorials, completing exercises, and creating personal projects.

New cards
2

Motherboard

The main printed circuit board (PCB) in a computer that links various components and peripherals. It provides the necessary electrical circuits to connect the CPU, memory, storage, and other hardware while managing power and data transfer. Examples of motherboards include ATX, microATX, and mini-ITX formats used in personal computers.

New cards
3

CPU Socket

A Zero Insertion Force (ZIF) socket on the motherboard that securely holds the Central Processing Unit (CPU) in place while allowing easy removal or replacement. The CPU socket type must match the specific CPU model, such as LGA 1151 or AM4.

New cards
4

DIMM Slot

Dual In-line Memory Module (DIMM) slots are connectors on a motherboard used for installing RAM (Random Access Memory). Depending on the motherboard, there can be multiple DIMM slots, allowing for expansion of memory capacity, the typical arrangement being two or four slots.

New cards
5

System Clock

A crucial hardware component that generates a consistent signal, synchronizing all activities within the computer. It determines the speed at which the CPU and other components operate, often measured in megahertz (MHz) or gigahertz (GHz). An example is a CPU with a 3.5 GHz clock speed.

New cards
6

Bus

A set of electrical pathways (wires) that connect various components of a computer system, allowing data to be transmitted. Different types of buses include the data bus, address bus, and control bus, which work together to facilitate communication between the CPU, memory, and peripherals.

New cards
7

RAM (Random Access Memory)

A type of volatile memory used to temporarily store data and programs that are actively being used by the computer. The primary function of RAM is to allow quick read and write access to a storage medium, making it essential for multitasking and application performance. An example is a computer with 16GB of DDR4 RAM.

New cards
8

Firmware

A specialized type of software stored on Non-Volatile Read-Only Memory (ROM) that controls and manages hardware components during the boot process and operation of a device. Firmware updates can enhance functionality or patch security vulnerabilities; for example, a firmware update for a router may improve network performance.

New cards
9

Cache

A smaller, faster type of volatile memory that temporarily stores frequently accessed data to speed up processing. Cache memory is divided into levels (L1, L2, L3) based on proximity to the CPU. For example, an Intel processor with 256KB of L1 cache is designed for speedy access to the most critical data.

New cards
10

Malware

Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems. Types of malware include viruses, worms, trojans, ransomware, and spyware, which can steal personal information or disrupt system operations. An example of malware is the WannaCry ransomware that affected thousands of computers worldwide.

New cards
11

Phishing

An online scam that aims to acquire sensitive information by masquerading as a trustworthy entity in electronic communications. Phishing attempts often involve deceptive emails or websites designed to trick recipients into revealing personal information like passwords or credit card numbers. An example is a fraudulent email that appears to come from a bank, asking users to verify their account credentials.

New cards
12

Database Management System (DBMS)

Software that enables the creation, manipulation, and management of databases. A DBMS allows users to efficiently store, retrieve, and manage data while ensuring data integrity and security. Examples include MySQL, Oracle, and Microsoft SQL Server.

New cards
13

Data Integrity

The accuracy and consistency of data over its lifecycle, ensuring that the data remains unchanged and dependable throughout its storage and processing phases. Techniques such as checksums and validation rules are often employed to maintain data integrity in databases.

New cards
14

Virtual Machines

Software-based emulations of physical computers that enable multiple operating systems to run concurrently on a single hardware platform. This technology allows users to create isolated environments for testing software or running applications cross-platform. An example is running a Windows virtual machine on a Mac using software like VMware or VirtualBox.

New cards
15

IoT (Internet of Things)

A network of interconnected devices that collect, exchange, and act on data using the internet. IoT devices can range from everyday household items, such as smart refrigerators and thermostats, to industrial machinery that monitors performance metrics.

New cards
16

VPN (Virtual Private Network)

A secure connection created over the Internet that allows remote users to access a private network, encrypting data to protect confidentiality and privacy. VPNs are commonly used for secure remote work, with examples including NordVPN and ExpressVPN.

New cards
17

Social Engineering

A psychological manipulation technique that exploits human behavior to trick individuals into divulging confidential information, such as passwords or financial details. Common forms of social engineering include phone scams and phishing attacks.

New cards
18

Encryption

The process of transforming data into a coded format to prevent unauthorized access. Encryption employs algorithms to secure data, such as AES (Advanced Encryption Standard) or RSA (Rivest–Shamir–Adleman), ensuring that only authorized parties can decrypt and access the information.

New cards
19

Multi-layer Verification

An authentication method that requires users to provide multiple forms of information for access, typically combining something they know (password), something they have (smartphone app), and something they are (biometric verification). This enhances security significantly; for example, using a bank app that requires both a password and a fingerprint scan.

New cards
20

Digital Forensics

The process of collecting, analyzing, and preserving digital evidence from computers, networks, and other digital devices for use in legal investigations and prosecutions. This field plays a crucial role in investigating cybercrimes, such as uncovering evidence of data breaches or fraud.

New cards
21

Open Source Software (OSS)

Software for which the original source code is made publicly available, allowing anyone to inspect, modify, and distribute the code. Examples of open source software include the Linux operating system and the Mozilla Firefox web browser.

New cards
22

Backups

Copies of data that are stored separately to ensure recovery in case the original data is lost, corrupted, or compromised. Backup methods range from file-based backups to full disk images, with common tools including Acronis Backup and Windows Backup.

New cards
23

Streaming

The delivery of audio and video content over the internet in real-time without the need for prior download. Examples include Netflix for video content and Spotify for music streaming.

New cards
24

Compression Technology

Techniques used to reduce the size of files while preserving their quality, making storage and transmission more efficient. Examples of compression formats include JPEG for images and ZIP for file archives.

New cards
25

Cybercrime

Criminal activities carried out through computers or the internet, including hacking, identity theft, and online fraud. Cybercrime can have devastating impacts, leading to financial loss and legal consequences for victims.

New cards
26

Password Strength

Indicators of how secure a password is, determined by factors such as length, complexity, and unpredictability. Strong passwords combine uppercase and lowercase letters, numbers, and special characters; an example of a strong password is 'G!fT7c#19zR!ĐŸsR'.

New cards
27

Firewall

A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewalls can be hardware-based or software-based, with examples including Cisco ASA firewalls and Windows Firewall.

New cards
28

Data Verification

The process of checking the accuracy and reliability of data through various methods, such as validation checks or cross-referencing with trusted sources. Data verification is crucial in maintaining data integrity, especially in critical applications like financial systems.

New cards

Explore top notes

note Note
studied byStudied by 10 people
646 days ago
5.0(1)
note Note
studied byStudied by 25 people
798 days ago
4.5(2)
note Note
studied byStudied by 27 people
852 days ago
5.0(1)
note Note
studied byStudied by 9 people
186 days ago
5.0(1)
note Note
studied byStudied by 4 people
633 days ago
5.0(1)
note Note
studied byStudied by 2 people
16 days ago
5.0(1)
note Note
studied byStudied by 9 people
760 days ago
5.0(1)
note Note
studied byStudied by 87 people
703 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (132)
studied byStudied by 15 people
330 days ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 12 people
714 days ago
5.0(1)
flashcards Flashcard (61)
studied byStudied by 139 people
379 days ago
5.0(1)
flashcards Flashcard (351)
studied byStudied by 1 person
557 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 5 people
831 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 24 people
400 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 8 people
695 days ago
4.0(1)
flashcards Flashcard (76)
studied byStudied by 3 people
15 days ago
5.0(1)
robot