Csec Information Technology

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/121

flashcard set

Earn XP

Description and Tags

work test

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

122 Terms

1
New cards

What is Information Technology (IT)?

The study/use of computers and telecommunications systems for storing, retrieving, and sending information. Includes hardware, software, and communication systems.

2
New cards

List some advantages of technology in education.

Stay motivated, availability of data, speed and flexibility, caters to different learning styles, encourages communication and collaboration.

3
New cards

What are some disadvantages of technology in education?

Distraction, loss of critical thinking, potential for cheating, disengagement from the classroom, inability to distinguish reliable resources, affordability issues, medical problems, time management issues, dependency for information recall.

4
New cards

Give some examples of communication methods facilitated by technology.

Mobile phones, social media, video conferencing, mobile apps, internet.

5
New cards

What are the main advantages of technology in communication?

Fast, easy, and quick communication, instant communication with anyone worldwide.

6
New cards

What are the main disadvantages of technology in communication?

Lack of personal skills, inability to communicate face-to-face.

7
New cards

What are some advantages of technology in healthcare?

Better medical records, improved testing and imaging, reduced over-prescribing of medication, improved communication among medical professionals.

8
New cards

What are some disadvantages of technology in healthcare?

Self-diagnosis, potential for miscommunication, over-dependency on technology, privacy issues.

9
New cards

What are the two categories of computers?

General purpose and Special purpose.

10
New cards

What is a supercomputer?

A type of computer with the architecture, resources, and components to achieve massive computing power.

11
New cards

What are some key characteristics of mainframes?

Large size, large storage capacity, high processing power, and high reliability. Used by large organizations for mission-critical applications.

12
New cards

What is a desktop system?

A personal computer designed to fit under or on a desk

13
New cards

What are the main characteristics of mobile devices

Small form factor, designed to operate wirelessly, local non-removable data storage, and powered by a self-contained power source.

14
New cards

What is an embedded device?

Part of a larger system and serves a specific purpose. An independent device responsible for executing a particular task or set of tasks.

15
New cards

What is hardware?

Any physical part of the computer system, including peripheral devices and core architecture components.

16
New cards

What is the motherboard?

The main board that integrates all the physical components of a computer system to communicate and operate together.

17
New cards

What is the CPU?

The central processing unit, or "processor", interprets and carries out instructions given by the user.

18
New cards

What are the two types of memory?

Main memory (RAM) and secondary storage.

19
New cards

Explain "access time" in relation to memory.

The interval between when a request is made and when the data transfer is completed.

20
New cards

What is the function of a graphics card (GPU)?

Processes data from the motherboard and sends information to the computer's screen for display.

21
New cards

What is the main purpose of a Hard Disk Drive (HDD)?

To store all your information for retrieval at any time, including the operating system.

22
New cards

How does a Solid State Drive (SSD) differ from a Hard Disk Drive (HDD)?

An SSD has no moving parts and uses flash memory to store data. SSDs are faster and less easily damaged.

23
New cards

What is the function of a Power Supply Unit (PSU)?

Converts AC mains supply from a wall socket and supplies the correct DC voltages to all the components inside the computer.

24
New cards

Distinguish between data and information.

Data has no specific meaning or application. Information is processed data that has context and meaning.

25
New cards

What is a turnaround document?

document that is returned for processing a second time. For example, a multiple-choice sheet

26
New cards

What is a source document?

The original form or paper from which data was taken. Examples: time cards, order forms, invoices.

27
New cards

What is a Human Readable Document?

Refers to a document such as a letter, form, application, sign and so on that a human can fully read and understand.

28
New cards

What is verification?

The process of determining whether the data was entered correctly or not.

29
New cards

What is validation?

The process of determining if the data is correct. Ensures data meets requirements, but does not guarantee accuracy.

30
New cards

Give two examples of Data Verification checks.

Visual checks or proofreading; Double data entry; Check digits

31
New cards

Describe the characteristics of sequential file ordering.

A file that is sorted using the data in one of the fields so that all the records are sorted in order.

32
New cards

What is random file organization?

Uses a special formula to find the position of a record on a direct access medium such as a hard disk.

33
New cards

What is Indexed Sequential?

Uses an index file to speed up searches on a large sequential of files. Used with direct access media such as hard disks.

34
New cards

List four characteristics of useful information.

Timely, accurate, complete, comprehensive

35
New cards

What are the four phases of the information processing cycle?

Input, Processing, Storage, Output

36
New cards

Name three types of data processing methods.

Manual, mechanical, electronic

37
New cards

Name four processing methods.

Batch processing, online processing, real-time processing, distributed processing.

38
New cards

Explain the function of secondary storage.

Assist with storage of data and instructions during a current process. Hold data, information, and instructions permanently

39
New cards

Name 4 types of secondary storage.

Hard disk drive, Solid state drive, Magnetic tape, Flash drive

40
New cards

What are some pros and cons to hard drives compared to flash drives?

Hard Drives are generally cheeper and store more data, Flash Drives are small and more durable

41
New cards

What is cloud storage?

A cloud-computing model where data is stored on remote servers accessed through the internet.

42
New cards

What is the main function of Input Devices?

Input Devices send data and information to a computer. It allows you to interact with a computer System

43
New cards

What is the main function of Output Devices?

Output Devices send data and information from a computer to be seen by the user.

44
New cards

Name some types of input devices

Keyboard, Mouse, Microphone, joystick, scanner, webcam

45
New cards

Name some types of output devices

Monitor, printer, headphones, projectors

46
New cards

How does manual data entry differ from automated data capture?

Manual data entry: Data is enter by a user, Automated data capture: entry directly into the system with little or no intervention by user e.g. Scanner, barcode reader, voice response unit.

47
New cards

Describe command line user interfaces.

Based on DOS, requires the user to type in commands using a special language.

48
New cards

Describe graphical user interfaces (GUI).

Allows for visual interaction with the computer using windows, icons, pointers, and menus (WIMP).

49
New cards

Name the 6 steps of troubleshooting.

Gather information, describe the problem, determine the most probable cause, create a plan of action and test a solution, implement the solution, analyze the results, document the process.

50
New cards

What is Authenticity when concerning online sources?

The process of ensuring that a message received is the same message that was sent and has not been tampered with or altered.

51
New cards

When evaluating an online source what should you look for concerning the author?

What are the author's credentials?, Does he/she have expertise in this field?, Is biographical information provided?

52
New cards

List 2 methods used for Date Validation

Range Check and Presence Check

53
New cards

What is the Double entry process when concerning Data Verification?

Entering the data twice, either by the same user entering the data on two separate occasions or by having two different operators enter the data from the form

54
New cards

What is a network?

Two or more computers linked in order to share resources, exchange files, or allow electronic communications.

55
New cards

Give examples of Local Area Networks (LAN).

Computer network at a single site useful for sharing resources e.g programs and files. Can be inexpensive using hubs, network adapters and ethernet cables.

56
New cards

What is a Wide Area Network (WAN)?

A computer network that connects computers within a large geographical area mostly public, leased or privately - owned networks

57
New cards

What is a Metropolitan Area Network (MAN)?

Network which is larger than a LAN but smaller WAN, combination of several LAN through point to point connections it sometimes involves connection of fiber optics wires.

58
New cards

List 4 examples of ways mobile networks are used.

Airlines, Banking, Education, Healthcare.

59
New cards

What is Bluetooth?

A wireless technology standard used for exchanging data between fixed and mobile devices over short distances using short - wavelength.

60
New cards

What is Wi-Fi?

A wireless network that utilizes one of the IEEE 802.11 wireless standards to achieve a wireless connection to a network.

61
New cards

What are transmission media?

The connection or interface or pathway that information travels between a transmitter and receiver.

62
New cards

Name 3 examples of wired transmission media.

Twisted Pair, Coaxial, Fiber

63
New cards

Name 3 examples of wireless transmission media.

Infrared waves, Microwave, Satellite

64
New cards

What is web technology?

Tools and techniques used for communication between different types of devices over the Internet.

65
New cards

What is a web browser?

Application software to explore www. It provides an interface between the server and the client and requests to the server for web documents and services.

66
New cards

What is HTML?

Basic scripting language used by web browsers to render pages on the World Wide Web.

67
New cards

What is a URL?

Uniform Resource Locator. The address of a given unique resource on the Web.

68
New cards

What is Computer security?

The protection of a computer's hardware and the data that it holds. Implemented using passwords, encryption, and firewalls.

69
New cards

Name 4 types of Computer Security

Application Security, Information Security, Network Security and Endpoint Security

70
New cards

What is Cybersecurity?

Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.

71
New cards

What is computer misuse?

Entering a computer system without permission (hacking), unauthorized access to a computer’s materials with intent to commit a futher crime

72
New cards

Explain Risk Reduction

The process of managing cybersecurity risks though systems, policies, and technology. Minimizes the impact of data breaches

73
New cards

What are some examples of risk reduction practices?

Installing security systems or alarms, installing sprinklers and smoke detectors.

74
New cards

Describe White Hat Hackers

Hackers utilize their programming aptitudes for a good and lawful reason. Perform network penetration tests in an attempt to compromise networks to discover network vulnerabilities

75
New cards

Question: Describe Black Hat Hackers

Unethical criminals who violate network security for personal gain. They misuse vulnerabilities to bargain PC frameworks.

76
New cards

Describe Computer Misconduct

Use of a computer to carry out any illegal act

77
New cards

List 3 physical counter measures to mitigate threats.

backup and recovery procedures, Biometrics, Hardware firewall

78
New cards

Explain Biometrics

The identification of a person by the measurement of their biological features

79
New cards

List 3 Software counter measures to mitigate threats.

Effective passwords, Authentication systems, Encryption of data

80
New cards

List 3 best personal security practices

Log off public computers, Secure your laptop and phone, Keep personal information safe

81
New cards

Name the 3 types of Automation

Fixed, Programmable, and Flexible

82
New cards

Give 3 challenges faced during automation?

High initial cost, Interoperability and Limited flexibility

83
New cards

What are the possible negative impact to the Job Market?

Job Losses, Income inequality and Job displacement

84
New cards

What is a Net Work Engineer?

Responsible for designing, maintaining, implementing, and troubleshooting an organization's computer networks

85
New cards

What is a Computer Programmer?

A skilled professional who codes, tests, debugs, and maintains the comprehensive instructions known as computer programs

86
New cards

What is a Computer Support Specialist?

Evaluate and test existing network systems, providing IT support to an organization’s staff or customers, and diagnosing and repairing problems with hardware and software.

87
New cards

What is a Computer Systems Analyst?

Specializes in analyzing an organization’s current computer systems and procedures, then designing and implementing new systems and processes to improve productivity, efficiency, and overall performance.

88
New cards

What is the role of Network Administrator?

IT professional who ensures that an organization’s computer networks are operating to meet the needs of the organization

89
New cards

What is a Database Administrator (DBA)?

Person responsible for controlling, maintaining, coordinating, and operating a database management system

90
New cards

What is a Software Developer?

Job requires the employer to do researching, designing, implementing, and managing software programs.

91
New cards

What is a Web Developer?

Carry out everything that goes into developing, making, and maintaining a website.

92
New cards

What is a Social Media Specialist?

Responsible for creating and publishing content on all social media platforms, including Facebook, Twitter, and Instagram, to grow an audience, build brand awareness, and ultimately, boost sales.

93
New cards

What are some impact points of ICT on Education?

ICT can be credited with many developments in education as it can make learning more interactive and easier for both students and teachers .

94
New cards

What are some positive impact points of ICT on Business?

ICT Systems Are Used In Businesses To Improve Communication, Collaboration, And Efficiency

95
New cards

How is law enforcement useing technology today?

Smart Devices, Artificial Intelligence, Cloud Computing and Body Cameras

96
New cards

R.A.M

Random Access memory

97
New cards

R.O.M

Read-Only Memory

98
New cards

P.R.O.M

Programmable read-only memory

99
New cards

E.P.R.O.M

Erasable Read-only memory

100
New cards

E.E.P.R.O.M

Electrically erasable programmable read-only memory