1/82
Flashcards for Year 10 Pre-VCE Applied Computing Revision Booklet
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a Digital System?
A system that processes digital signals or data using binary numbers (0s and 1s).
What is an Input Device?
Devices used to provide data and instructions to a computer.
What is an Output Device?
Hardware components that convey information from a computer to the user.
What is the role of the Processor (CPU)?
Transforms the input into an output.
What is RAM (Random Access Memory)?
Temporary memory used for running applications; can be modified.
What is ROM (Read-Only Memory)?
Permanent memory that stores critical startup instructions and cannot be easily changed.
What is System Software?
Manages hardware (e.g., operating systems).
What is Application Software?
Used for specific tasks (e.g., MS Word).
What is an Operating System?
Manages hardware and software resources in a computer.
What is an advantage of using a network?
Enables resource sharing.
What is a LAN (Local Area Network)?
A system that connects multiple computers in a small area.
What is a Client-Server Network?
A network model where a central server provides resources and services to multiple clients.
What is a Peer-to-Peer (P2P) Network?
Devices communicate directly without a central server.
What is a Router?
Connects multiple networks together and directs data packets between them.
What is a Switch?
Connects devices in a network and forwards data only to the device it is intended for.
What is a Hub?
Sends every message to every other connected device, creating a lot of unnecessary traffic.
What is a Bridge?
Connects local networks together to form Wide Area Networks (WAN).
What is a Network Interface Card (NIC)?
A component that connects a computer to a network.
How are Network speeds measured?
Measured in bits per second.
What is a Star Topology?
Managed from a central hub.
What is a Bus Topology?
Simple layout, easy to add more devices, less cable used.
What is a Ring Topology?
Offers faster speeds due to all packets moving in the same direction.
What is a Mesh Topology?
Very reliable, as faults in single cables or nodes don't affect other nodes.
What is a Network Protocol?
A set of rules for communication between devices in a network.
What is HTTP (Hypertext Transfer Protocol)?
Used to access hypertext (text with links) on the World Wide Web. This is not a secure protocol.
What is HTTPS (Hypertext Transfer Protocol Secure)?
A secure type of HTTP connection where data is encrypted when exchanged with these pages.
What is TCP/IP (Transmission Control Protocol/Internet Protocol)?
The combined protocols that control much of the data transferred over the internet.
What is FTP (File Transfer Protocol)?
A method of transferring files over a network.
What is DHCP (Dynamic Host Configuration Protocol)?
Configures IP addresses for devices plugged into a home Wi-Fi network.
What is SMTP (Simple Mail Transfer Protocol)?
Transfers email messages from the sender to the recipient's mail server.
What is Ethernet?
Transmits data in digital packets over a LAN.
What is an IP Address?
A unique identifier for a device on a network.
What are two advantages of cloud storage?
Accessible from anywhere with internet, reduces the need for physical storage devices and supports data backup.
What is Encryption?
A security technique that converts readable data into an encoded format to prevent unauthorized access.
What is a Firewall?
A program that checks and filters all the data passing into your system from a network.
What problems are caused by computer viruses?
System slowdowns, data loss, unauthorized access and security breaches.
How are viruses spread?
Downloading infected email attachments, clicking on malicious links, or being transferred on removable media like USB drives.
What is Ransomware?
Encrypts files, demands payment.
What are Bots?
Take control of computers, form botnets for destructive means.
What is reCAPTCHA?
A security service that protects websites that post spam and steal data.
What is a Hacker?
A person who gains unauthorised access to computer data.
What is a Backdoor?
An unauthorised (or undocumented) way of accessing a computer.
What is the data size order, from smallest to largest?
Kilo, Mega, Giga, Tera, Peta, Exa, Zeta.
What is a Database?
A structured collection of data; often defined as organised data.
What is a Table?
A structured set of data stored in tables.
What is a Record?
A row in a table, representing a single entity.
What is a Field?
A column in a table, representing an attribute of the entity.
What is a Primary Key?
Uniquely identifies each record in a table.
What is a Foreign Key?
A field in one table that refers to the primary key in another table.
What is the importance of related tables?
Using multiple related tables instead of putting all data in one table helps avoid repetition (data redundancy) and organize data better.
What is SQL (Structured Query Language)?
A language used to interact with databases to retrieve, update, and manage data efficiently.
What is the purpose of the SELECT command in SQL?
Used to retrieve data from a database.
What is the purpose of the INSERT INTO command in SQL?
Used to add new records into a table.
What is the purpose of the UPDATE command in SQL?
Used to modify existing records in a table.
What is the purpose of the DELETE FROM command in SQL?
Used to remove records from a table.
What is the purpose of the WHERE clause in SQL?
Used to filter records based on a specified condition.
What is the purpose of the ORDER BY clause in SQL?
Used to sort data.
What is the purpose of the JOIN (INNER JOIN) clause in SQL?
Used to combine rows from two or more tables based on a related column between them.
What is a Database Form (e.g., Microsoft Access Form) used for?
Used for entering and viewing data easily.
What are the key principles of database design?
Identify main entities, determine key fields for each table, establish relationships using primary and foreign keys, normalize data, ensure data validation and implement security measures.
What is HTML (HyperText Markup Language)?
The language used to structure web pages, defining the content and structure of documents online.
Creates hyperlinks, allowing users to navigate to other pages or resources.
Displays an image on a webpage.
What is the purpose of the
Used to embed content from another source into a webpage.
What is the purpose of HTML comments (``)?
Used to add notes within the HTML code that do not appear on the webpage itself.
What is the role of a Web Browser?
Interprets and displays HTML/CSS and allows navigation via hyperlinks and URLs.
What is a good reason to use a footer on a webpage?
To provide contact information.
What are the most important features for accessibility in web design?
Using easy-to-read fonts and good contrast.
What is Qualitative Data?
Used for categorising different items of data and gathers detailed personal experiences and emotions.
What is Quantitative Data?
Used for ranking counts of items and things.
What are some examples of Digital Data?
Text and documents, messages, images, videos and sound.
What is Information (often defined as)?
Organised data.
What is Primary Data?
Collected by the researcher himself.
What is Secondary Data?
Collected from other people's collections.
What is a Focus Group?
Individuals discuss a topic in a group setting, guided by a moderator.
What is an Online Survey?
Participants answer a set of questions without interviewer interaction.
What does Data Bias involve?
Involves manipulating data to present an unfair view.
What are the major risks of Big Data?
Privacy concerns and security breaches.
What is Data Privacy?
Concerns how private data is stored and shared, involving transparency and allowing anonymity where possible.
What is Data Security?
Protecting data from people who shouldn't have access to it. Includes creating passwords, using secure folders, and not sharing files indiscriminately.
What is Ethical Responsibility in computing?
Acting within society's values, doing the right thing by others.
What is Legal Responsibility in computing?
Ensuring that everything is carried out within the law.