1/121
work test
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is Information Technology (IT)?
The study/use of computers and telecommunications systems for storing, retrieving, and sending information. Includes hardware, software, and communication systems.
List some advantages of technology in education.
Stay motivated, availability of data, speed and flexibility, caters to different learning styles, encourages communication and collaboration.
What are some disadvantages of technology in education?
Distraction, loss of critical thinking, potential for cheating, disengagement from the classroom, inability to distinguish reliable resources, affordability issues, medical problems, time management issues, dependency for information recall.
Give some examples of communication methods facilitated by technology.
Mobile phones, social media, video conferencing, mobile apps, internet.
What are the main advantages of technology in communication?
Fast, easy, and quick communication, instant communication with anyone worldwide.
What are the main disadvantages of technology in communication?
Lack of personal skills, inability to communicate face-to-face.
What are some advantages of technology in healthcare?
Better medical records, improved testing and imaging, reduced over-prescribing of medication, improved communication among medical professionals.
What are some disadvantages of technology in healthcare?
Self-diagnosis, potential for miscommunication, over-dependency on technology, privacy issues.
What are the two categories of computers?
General purpose and Special purpose.
What is a supercomputer?
A type of computer with the architecture, resources, and components to achieve massive computing power.
What are some key characteristics of mainframes?
Large size, large storage capacity, high processing power, and high reliability. Used by large organizations for mission-critical applications.
What is a desktop system?
A personal computer designed to fit under or on a desk
What are the main characteristics of mobile devices
Small form factor, designed to operate wirelessly, local non-removable data storage, and powered by a self-contained power source.
What is an embedded device?
Part of a larger system and serves a specific purpose. An independent device responsible for executing a particular task or set of tasks.
What is hardware?
Any physical part of the computer system, including peripheral devices and core architecture components.
What is the motherboard?
The main board that integrates all the physical components of a computer system to communicate and operate together.
What is the CPU?
The central processing unit, or "processor", interprets and carries out instructions given by the user.
What are the two types of memory?
Main memory (RAM) and secondary storage.
Explain "access time" in relation to memory.
The interval between when a request is made and when the data transfer is completed.
What is the function of a graphics card (GPU)?
Processes data from the motherboard and sends information to the computer's screen for display.
What is the main purpose of a Hard Disk Drive (HDD)?
To store all your information for retrieval at any time, including the operating system.
How does a Solid State Drive (SSD) differ from a Hard Disk Drive (HDD)?
An SSD has no moving parts and uses flash memory to store data. SSDs are faster and less easily damaged.
What is the function of a Power Supply Unit (PSU)?
Converts AC mains supply from a wall socket and supplies the correct DC voltages to all the components inside the computer.
Distinguish between data and information.
Data has no specific meaning or application. Information is processed data that has context and meaning.
What is a turnaround document?
document that is returned for processing a second time. For example, a multiple-choice sheet
What is a source document?
The original form or paper from which data was taken. Examples: time cards, order forms, invoices.
What is a Human Readable Document?
Refers to a document such as a letter, form, application, sign and so on that a human can fully read and understand.
What is verification?
The process of determining whether the data was entered correctly or not.
What is validation?
The process of determining if the data is correct. Ensures data meets requirements, but does not guarantee accuracy.
Give two examples of Data Verification checks.
Visual checks or proofreading; Double data entry; Check digits
Describe the characteristics of sequential file ordering.
A file that is sorted using the data in one of the fields so that all the records are sorted in order.
What is random file organization?
Uses a special formula to find the position of a record on a direct access medium such as a hard disk.
What is Indexed Sequential?
Uses an index file to speed up searches on a large sequential of files. Used with direct access media such as hard disks.
List four characteristics of useful information.
Timely, accurate, complete, comprehensive
What are the four phases of the information processing cycle?
Input, Processing, Storage, Output
Name three types of data processing methods.
Manual, mechanical, electronic
Name four processing methods.
Batch processing, online processing, real-time processing, distributed processing.
Explain the function of secondary storage.
Assist with storage of data and instructions during a current process. Hold data, information, and instructions permanently
Name 4 types of secondary storage.
Hard disk drive, Solid state drive, Magnetic tape, Flash drive
What are some pros and cons to hard drives compared to flash drives?
Hard Drives are generally cheeper and store more data, Flash Drives are small and more durable
What is cloud storage?
A cloud-computing model where data is stored on remote servers accessed through the internet.
What is the main function of Input Devices?
Input Devices send data and information to a computer. It allows you to interact with a computer System
What is the main function of Output Devices?
Output Devices send data and information from a computer to be seen by the user.
Name some types of input devices
Keyboard, Mouse, Microphone, joystick, scanner, webcam
Name some types of output devices
Monitor, printer, headphones, projectors
How does manual data entry differ from automated data capture?
Manual data entry: Data is enter by a user, Automated data capture: entry directly into the system with little or no intervention by user e.g. Scanner, barcode reader, voice response unit.
Describe command line user interfaces.
Based on DOS, requires the user to type in commands using a special language.
Describe graphical user interfaces (GUI).
Allows for visual interaction with the computer using windows, icons, pointers, and menus (WIMP).
Name the 6 steps of troubleshooting.
Gather information, describe the problem, determine the most probable cause, create a plan of action and test a solution, implement the solution, analyze the results, document the process.
What is Authenticity when concerning online sources?
The process of ensuring that a message received is the same message that was sent and has not been tampered with or altered.
When evaluating an online source what should you look for concerning the author?
What are the author's credentials?, Does he/she have expertise in this field?, Is biographical information provided?
List 2 methods used for Date Validation
Range Check and Presence Check
What is the Double entry process when concerning Data Verification?
Entering the data twice, either by the same user entering the data on two separate occasions or by having two different operators enter the data from the form
What is a network?
Two or more computers linked in order to share resources, exchange files, or allow electronic communications.
Give examples of Local Area Networks (LAN).
Computer network at a single site useful for sharing resources e.g programs and files. Can be inexpensive using hubs, network adapters and ethernet cables.
What is a Wide Area Network (WAN)?
A computer network that connects computers within a large geographical area mostly public, leased or privately - owned networks
What is a Metropolitan Area Network (MAN)?
Network which is larger than a LAN but smaller WAN, combination of several LAN through point to point connections it sometimes involves connection of fiber optics wires.
List 4 examples of ways mobile networks are used.
Airlines, Banking, Education, Healthcare.
What is Bluetooth?
A wireless technology standard used for exchanging data between fixed and mobile devices over short distances using short - wavelength.
What is Wi-Fi?
A wireless network that utilizes one of the IEEE 802.11 wireless standards to achieve a wireless connection to a network.
What are transmission media?
The connection or interface or pathway that information travels between a transmitter and receiver.
Name 3 examples of wired transmission media.
Twisted Pair, Coaxial, Fiber
Name 3 examples of wireless transmission media.
Infrared waves, Microwave, Satellite
What is web technology?
Tools and techniques used for communication between different types of devices over the Internet.
What is a web browser?
Application software to explore www. It provides an interface between the server and the client and requests to the server for web documents and services.
What is HTML?
Basic scripting language used by web browsers to render pages on the World Wide Web.
What is a URL?
Uniform Resource Locator. The address of a given unique resource on the Web.
What is Computer security?
The protection of a computer's hardware and the data that it holds. Implemented using passwords, encryption, and firewalls.
Name 4 types of Computer Security
Application Security, Information Security, Network Security and Endpoint Security
What is Cybersecurity?
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
What is computer misuse?
Entering a computer system without permission (hacking), unauthorized access to a computer’s materials with intent to commit a futher crime
Explain Risk Reduction
The process of managing cybersecurity risks though systems, policies, and technology. Minimizes the impact of data breaches
What are some examples of risk reduction practices?
Installing security systems or alarms, installing sprinklers and smoke detectors.
Describe White Hat Hackers
Hackers utilize their programming aptitudes for a good and lawful reason. Perform network penetration tests in an attempt to compromise networks to discover network vulnerabilities
Question: Describe Black Hat Hackers
Unethical criminals who violate network security for personal gain. They misuse vulnerabilities to bargain PC frameworks.
Describe Computer Misconduct
Use of a computer to carry out any illegal act
List 3 physical counter measures to mitigate threats.
backup and recovery procedures, Biometrics, Hardware firewall
Explain Biometrics
The identification of a person by the measurement of their biological features
List 3 Software counter measures to mitigate threats.
Effective passwords, Authentication systems, Encryption of data
List 3 best personal security practices
Log off public computers, Secure your laptop and phone, Keep personal information safe
Name the 3 types of Automation
Fixed, Programmable, and Flexible
Give 3 challenges faced during automation?
High initial cost, Interoperability and Limited flexibility
What are the possible negative impact to the Job Market?
Job Losses, Income inequality and Job displacement
What is a Net Work Engineer?
Responsible for designing, maintaining, implementing, and troubleshooting an organization's computer networks
What is a Computer Programmer?
A skilled professional who codes, tests, debugs, and maintains the comprehensive instructions known as computer programs
What is a Computer Support Specialist?
Evaluate and test existing network systems, providing IT support to an organization’s staff or customers, and diagnosing and repairing problems with hardware and software.
What is a Computer Systems Analyst?
Specializes in analyzing an organization’s current computer systems and procedures, then designing and implementing new systems and processes to improve productivity, efficiency, and overall performance.
What is the role of Network Administrator?
IT professional who ensures that an organization’s computer networks are operating to meet the needs of the organization
What is a Database Administrator (DBA)?
Person responsible for controlling, maintaining, coordinating, and operating a database management system
What is a Software Developer?
Job requires the employer to do researching, designing, implementing, and managing software programs.
What is a Web Developer?
Carry out everything that goes into developing, making, and maintaining a website.
What is a Social Media Specialist?
Responsible for creating and publishing content on all social media platforms, including Facebook, Twitter, and Instagram, to grow an audience, build brand awareness, and ultimately, boost sales.
What are some impact points of ICT on Education?
ICT can be credited with many developments in education as it can make learning more interactive and easier for both students and teachers .
What are some positive impact points of ICT on Business?
ICT Systems Are Used In Businesses To Improve Communication, Collaboration, And Efficiency
How is law enforcement useing technology today?
Smart Devices, Artificial Intelligence, Cloud Computing and Body Cameras
R.A.M
Random Access memory
R.O.M
Read-Only Memory
P.R.O.M
Programmable read-only memory
E.P.R.O.M
Erasable Read-only memory
E.E.P.R.O.M
Electrically erasable programmable read-only memory