Cambridge International AS Level Information Technology

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/83

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards for key terms in the textbook.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

84 Terms

1
New cards

Information

Data that has been given meaning.

2
New cards

Direct Data

Data collected for a specific purpose and used only for that purpose.

3
New cards

Indirect Data

Data obtained from a third party and used for a different purpose than originally intended.

4
New cards

Electoral Register

A list of adults who are entitled to vote in an election.

5
New cards

Data Brokers

Companies that collect and analyze some of an individual’s most sensitive personal information and sell it to each other and to advertisers and other organizations without the individual’s knowledge.

6
New cards

Accuracy of Information

Ensuring information is free from errors and mistakes.

7
New cards

Relevance of Information

Ensuring data captured is relevant to the purposes for which it is to be used.

8
New cards

Age of Information

Ensuring information is up-to-date.

9
New cards

Level of Detail of Information

Ensuring information has the right amount of detail.

10
New cards

Completeness of Information

Ensuring information deals with all the relevant parts of a problem.

11
New cards

Encryption

Converting information into a code which is impossible to understand without authorization.

12
New cards

Plaintext

Data before it is encrypted.

13
New cards

Ciphertext

Encrypted data.

14
New cards

Symmetric Encryption

The type of encryption where the sending and receiving computer have the same key to encrypt and decrypt a message.

15
New cards

Asymmetric Encryption

The type of encryption that uses two different keys- public and private.

16
New cards

Encryption Protocol

The set of rules setting out how the algorithms should be used to secure information.

17
New cards

IPsec (internet protocol security)

An encryption protocol suite which allows the authentication of computers and encryption of packets of data in order to provide secure encrypted communication between two computers over an internet protocol (IP) network.

18
New cards

SSH (secure shell)

An encryption protocol used to enable remote logging on to a computer network, securely.

19
New cards

Transport Layer Security (TLS)

The most popular protocol used when accessing web pages securely.

20
New cards

Validation

Ensuring data is reasonable and sensible.

21
New cards

Verification

Ensuring data has been copied or entered correctly.

22
New cards

Presence Check

A validation check to ensure data has been entered in certain fields.

23
New cards

Range Check

A validation check that the data is within a specified range of values.

24
New cards

Type Check

A validation check that ensures data is of a particular data type.

25
New cards

Length Check

A validation check performed on alphanumeric fields to ensure they have the correct number of characters.

26
New cards

Format Check

A validation check that can specify any specific combination of characters that must be followed.

27
New cards

Check Digit

A means of validating data using arithmetic. Used on numerical data stored as alphanumeric data-type.

28
New cards

Lookup Check

A validation check that compares the data that has been entered with a limited number of valid entries.

29
New cards

Consistency Check

A validation check that ensures data across two fields is consistent.

30
New cards

Limit Check

A validation check similar to a range check, but the check is only applied to one boundary.

31
New cards

Visual Checking

Verification carried out by the person entering the data, who visually compares the data they have entered with that on the source document.

32
New cards

Double Data Entry

Verification that involves the entry of data twice.

33
New cards

Parity Check

A verification method that makes sure that all bytes have an even number of 1s.

34
New cards

Checksum

A verification method used to check that data has been transmitted accurately from one device to another. Is used for whole files of data.

35
New cards

Hash Total

A verification method usually found by adding up all the numbers in a specific field or fields.

36
New cards

Control Total

A verification method calculated in exactly the same way as a hash total, but is only carried out on numeric fields.

37
New cards

Batch Processing

Processing large volumes of data that are collected over a period of time, entered, and processed together in one batch.

38
New cards

Master File

Contains all the important data that does not change often.

39
New cards

Transaction File

Contains the data that changes each week.

40
New cards

Sequential Access

When data is searched for in batch processing, each record is looked at one by one until the computer finds the record it is looking for.

41
New cards

Online Processing

The user is in direct communication with a central computer and data is searched using direct access.

42
New cards

Electronic Funds Transfer (EFT)

The electronic transfer of money from one bank account to another using computer based systems, without the direct intervention of bank staff.

43
New cards

Automatic Stock Control

The use of an automated system where stock is controlled by a computer with little human input.

44
New cards

EFTPOS

Electronic Funds Transfer at Point Of Sale.

45
New cards

Electronic Data Interchange (EDI)

A method of exchanging data and documents without using paper. The electronic exchange between computers uses a standard format.

46
New cards

Business-to-Business (B2B)

Refers to buying and selling between two businesses, rather than between a business and an individual customer.

47
New cards

E-Procurement

The process of obtaining goods and services through the internet.

48
New cards

Real-Time Processing

Requires the inputs to go directly to the CPU of the computer, but the response time of the computer must be immediate, with no delay whatsoever.

49
New cards

Real-Time Systems

They are systems where the output affects the input. Unlike other online systems, any output is produced quickly enough so that it affects the system before the next input is received.

50
New cards

Performance Metrics (Mainframe Computers)

Measures used to determine how well, or how fast, the CPU deals with data. Measured in millions of instructions per second.

51
New cards

Performance Metrics (Supercomputers)

Measures how many FLoating point Operations can be carried out Per Second (FLOPS).

52
New cards

Fault Tolerance

A computer with this means that it can continue to operate even if one or more of its components has failed.

53
New cards

System Software

The software that is used to run and control the computer hardware and its software resources.

54
New cards

Compiler

Software (a program) that processes statements written in a high-level programming language and converts them into machine code.

55
New cards

Interpreter

Translates the high-level language program one statement, or line, at a time into an intermediate form, which it then executes.

56
New cards

Linker

Combines object files or modules into one single executable file.

57
New cards

Device Driver

A small program that enables the operating system (OS) and application software to communicate with a hardware device.

58
New cards

Operating System (OS)

System software that manages computer hardware and software resources.

59
New cards

Utility Program

A type of system software that assists users in controlling or maintaining the operation of a computer, its devices or its software.

60
New cards

Formatting

Configuring of a data storage medium such as a hard disk or SSD for initial use.

61
New cards

Disk Defragmentation

Organizes the data on the disk by moving the data blocks around to bring all the parts of a file together so they are contiguous.

62
New cards

Data Compression

Modifying data so that it occupies less storage space on a disk.

63
New cards

Lossless Compression

The file is converted back into its original state, without the loss of a single bit (binary digit) of data.

64
New cards

Lossy Compression

Permanently deletes data bits that are unnecessary.

65
New cards

Back-up Software

A program used to keep copies of files from a computer or copy the content of a server’s backing storage.

66
New cards

Incremental Back-Up

One where only the data that has been added or changed since a specific date and time is backed up.

67
New cards

Differential Back-Up

Only backs up the data which has changed since the last full back-up.

68
New cards

Deleting

A utility program that is a piece of software which deletes the pointers that tell the OS where to find the file.

69
New cards

Anti-Virus Software

A program or set of programs whose function is to detect and remove viruses.

70
New cards

Custom-Written Software

Software which has to be specially written for a particular task and is developed for a specific company or business.

71
New cards

Off-the-Shelf Software

Software which already exists and is available straight away, ready for use.

72
New cards

User Interface

The means by which the computer system interacts with the user.

73
New cards

Command Line Interface (CLI)

A means of interacting with a computer using commands in the form of successive lines of text.

74
New cards

Graphical User Interface (GUI)

Uses windows, icons, menus and pointers (WIMP) to carry out commands.

75
New cards

Dialogue Interface

Allows a user to communicate with a computer or device using their voice.

76
New cards

Gesture-Based Interface

Is designed to interpret human gestures and convert these into commands.

77
New cards

Algorithm

A set of instructions sequenced to solve a problem or to represent a calculation.

78
New cards

Calibration

Making sure that when, for example, a temperature sensor is used to measure the temperature of boiling water, it actually causes the computer to output a value of 100 ºC.

79
New cards

One-Point Calibration

A method of calibration that consists of taking a reading from the sensor in the range being measured, comparing it with either a pre-calibrated sensor or a known value, subtracting the sensor reading from the known value, then adding the 'offset' to every sensor reading.

80
New cards

Two-Point Calibration

This method of calibration enables you to both apply an offset value and account for the slope of a graph.

81
New cards

Multipoint Calibration

A calibration strategy that means using some form of 'curve fitting'.

82
New cards

Gesture

Any physical movement, large or small, that can be interpreted by a computer. Examples of these are the pointing of a finger, nodding the head, or a wave of the hand.

83
New cards

Code Injection

It is any situation in which code is inserted or added into systems that did not intend for that code to be executed, and is now performed by an attacker.

84
New cards

Blacklist

A list a fake or untrustworthy sources.