CIE IGCSE Info & Comm. Tech. Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terminology from the CIE IGCSE Information and Communication Technology syllabus.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Hardware

Tangible physical components of a computer system that can be touched, such as processors, RAM, and monitors.

2
New cards

Software

Programs that control computer systems and provide a set of instructions for hardware to execute.

3
New cards

CPU

Central Processing Unit, the primary component responsible for processing instructions in a computer.

4
New cards

RAM

Random Access Memory, temporary storage that holds data and program instructions currently in use.

5
New cards

ROM

Read Only Memory, permanent storage that holds critical data such as the BIOS.

6
New cards

Input Device

Equipment used to provide data to a computer system, e.g., keyboard and mouse.

7
New cards

Output Device

Equipment that presents data to the user, e.g., monitor and printer.

8
New cards

Operating System

System software that manages computer hardware and provides an environment for applications to run.

9
New cards

CLI

Command Line Interface, a text-based method of interacting with a computer.

10
New cards

GUI

Graphical User Interface, a visual way of interacting with a computer using windows and icons.

11
New cards

Desktop Computer

A general-purpose computer designed to be used at a desk, consisting of separate components.

12
New cards

Laptop Computer

A portable computer that integrates the display, keyboard, and processing unit into a single unit.

13
New cards

Microprocessor

A single integrated circuit that contains the CPU.

14
New cards

AI

Artificial Intelligence, technology designed to simulate human intelligence.

15
New cards

Biometrics

Authentication techniques that measure unique biological characteristics, such as fingerprints or iris patterns.

16
New cards

Data Encryption

The process of converting information into a secure format that cannot be easily understood without the correct key.

17
New cards

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy source.

18
New cards

Firewall

A security system that controls incoming and outgoing network traffic based on predetermined security rules.

19
New cards

Network Interface Card (NIC)

Hardware that connects a computer to a network.

20
New cards

HTTP

HyperText Transfer Protocol, a protocol used for transmitting data over the World Wide Web.

21
New cards

HTTPS

HyperText Transfer Protocol Secure, an extension of HTTP that provides secure communication over a computer network.

22
New cards

URL

Uniform Resource Locator, the address used to access resources on the internet.

23
New cards

Cloud Storage

A model of computer data storage in which digital data is stored in logical pools, the physical storage spans multiple servers.

24
New cards

Spam

Unsolicited or unwanted emails, often sent in bulk for advertising purposes.

25
New cards

Optical Character Recognition (OCR)

Technology that converts different types of documents, such as scanned paper documents, into editable and searchable data.

26
New cards

User Authentication

The process of verifying the identity of a user before granting access to a system.