1/22
These flashcards cover key terms and concepts in the Information Technology Theory for Grade 12.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Data Mining
The process used to identify trends and patterns in large data sets.
Database Management System (DBMS)
Software responsible for creating, managing and organizing databases.
Data Redundancy
The storage of the same piece of data in multiple places within a database.
Normalization
The process of organizing data to minimize redundancy and improve integrity.
Cloud Computing
Using the internet to access and store data and applications instead of on local servers.
Virtual Reality (VR)
A simulated environment created by computer technology that can mimic real or imagined environments.
Augmented Reality (AR)
Technology that overlays digital information onto the real world.
User Rights
Permissions set by administrators that define what users can do in a network or database.
SaaS (Software as a Service)
Cloud-based applications that are accessed via the internet and not installed locally.
Router
A device that connects multiple networks and routes data between them.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on security rules.
Phishing
A cybercrime where attackers impersonate legitimate institutions to steal sensitive information.
Malware
Malicious software designed to harm or exploit any programmable device or network.
Cookies
Small data files stored on a user's computer that hold information about their browsing activity.
Cybercrime
Criminal activities carried out by means of computers or the internet.
VPN (Virtual Private Network)
A service that encrypts your internet traffic and creates a private network from a public internet connection.
BitTorrent
A peer-to-peer file sharing protocol used for distributing data over the internet.
SQL (Structured Query Language)
A standard programming language used for managing and manipulating databases.
Access Control
The selective restriction of access to a place or other resource.
Remote Access
The ability to access a computer or a network remotely over a network connection.
Data Breach
An incident in which unauthorized access to data occurs, potentially compromising the confidentiality and integrity of that data.
Identity Theft
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Social Engineering
Manipulation techniques that exploit human psychology to gain confidential information.