Information Technology Theory Grade 12

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts in the Information Technology Theory for Grade 12.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Data Mining

The process used to identify trends and patterns in large data sets.

2
New cards

Database Management System (DBMS)

Software responsible for creating, managing and organizing databases.

3
New cards

Data Redundancy

The storage of the same piece of data in multiple places within a database.

4
New cards

Normalization

The process of organizing data to minimize redundancy and improve integrity.

5
New cards

Cloud Computing

Using the internet to access and store data and applications instead of on local servers.

6
New cards

Virtual Reality (VR)

A simulated environment created by computer technology that can mimic real or imagined environments.

7
New cards

Augmented Reality (AR)

Technology that overlays digital information onto the real world.

8
New cards

User Rights

Permissions set by administrators that define what users can do in a network or database.

9
New cards

SaaS (Software as a Service)

Cloud-based applications that are accessed via the internet and not installed locally.

10
New cards

Router

A device that connects multiple networks and routes data between them.

11
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on security rules.

12
New cards

Phishing

A cybercrime where attackers impersonate legitimate institutions to steal sensitive information.

13
New cards

Malware

Malicious software designed to harm or exploit any programmable device or network.

14
New cards

Cookies

Small data files stored on a user's computer that hold information about their browsing activity.

15
New cards

Cybercrime

Criminal activities carried out by means of computers or the internet.

16
New cards

VPN (Virtual Private Network)

A service that encrypts your internet traffic and creates a private network from a public internet connection.

17
New cards

BitTorrent

A peer-to-peer file sharing protocol used for distributing data over the internet.

18
New cards

SQL (Structured Query Language)

A standard programming language used for managing and manipulating databases.

19
New cards

Access Control

The selective restriction of access to a place or other resource.

20
New cards

Remote Access

The ability to access a computer or a network remotely over a network connection.

21
New cards

Data Breach

An incident in which unauthorized access to data occurs, potentially compromising the confidentiality and integrity of that data.

22
New cards

Identity Theft

The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

23
New cards

Social Engineering

Manipulation techniques that exploit human psychology to gain confidential information.