• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

What is a computer?

A computer is anything that has:


-Input


-Storage


-Process


-Output

ISPO

Why is reliability important?

Because computers are always used! People can lose money via banks, e-mails can be lost, and people can get hurt if a driverless car breaks.

Think about what would happen if a computer broke

Name three standards.

There are three types of standards:


-Open


-Proprietary


-De facto



OPD

What are standards?

Standards allow, or dont allow, people to copy a product.


What is the purpose of a CPU?
It is used to carry out processing in the computer by fetching data and instructions from the memory then decoding and executing them.

FDE

Memory Management
It is necessary to enable lots of programs to use memory without overwriting or corrupting each other
Overwriting and corrupting

Peripheral management

Devices external to the computer - Keyboard, printer, scanners

External

Multi-Tasking

Completing multiple tasks at once

Think- "MULTI"

User Interface

It allows the user to interact with the operating system

Security

The OS needs to make sure that the users data and programs are protected. Many operating systems come built in with firewalls and anti-virus systems

Viruses

Viruses are types of malware that create copies of themselves and spread across many computers

Spyware

Spyware is malware that monitors what you are doing on your computer - The websites you visit and even the keys you press

Think "Spying" - Watching?

Firewall

A firewall is malware that sits between you and your network to filter out any malicious packages

Formatting

Formatting means preparing a disk for initial use

File transfer

File transfer means moving files and data between different locations

De-Fragmentation

When files are written to a hard drive, not all parts of the file are placed together. De-Frag moves all of the disks contents around so that all the parts of a file are next to each other

System diagnosis

System diagnosis gives you key information about the computer

Clean up tools

Clean up tools try to improve the computers performance by removing icons and programs that are rarely used

Auto Update

Auto update on the OS checks the manufacturers website to see if there is an update.

Bespoke software

Software created directly for the user

Off the shelf software

Widely available for anyone

Bitmap Images

Binary can be used tocreate bitmap images.​Bitmap images aremade up of a grid(or map) of pixels.​Each pixel is assigneda binary code torepresent it’s colour.

Resolution

​The concentration of pixels in a bitmap is called its resolution.​The higher the resolution (the more pixels it has) the more detailed an image is but the more space it takes up on disk.

Meta Data

As well as the binary value of each pixel a bitmap image holds:​

- The height of the image in pixels


- The width of the image in pixels


- The number of bits used for each pixel​


This helps the computer structure the image, otherwise it just has a string of bits.

What is a database?

A persistent, organised, structured store of data.

Database - Think 'Data' and 'Base' - where everything is held?

Data handling software

Data handling software (like Microsoft Access or BaseBear) is used to create databases, add new information or edit existing information.

What is DBMS?

DataBase Management System:


Used to manage the database by creating tables, inserting data, executing queries etc.

DBMS - Abbreviation!

Separating the application and Database

Separating the application and the database means that the database can be accessed from lots of different applications.

Customized data handling applications

Using the DBMS to create a set of tools for setting up and maintaining a specific database.

What is a relational database?

A database which contains multiple tables linked by primary and foreign keys.

Relational - Linked?

What is an entity?

A real world object about which data is being held.

Tables

Tables hold data about a specific entity, i.e a student.

Tables - Charts?

Forms

A form is an input screen that allows data to be displayed and edited.

Queries

A query is a command that is used to search the database and return relevant results:


SELECT*FROM students


WHERE age>17

Report

An output of data in the database in a specific format, usually printed.

Modules

Used to add functionality to a database. Modules contain statements and subroutines that are stored together as a unit and can be executed by the user.

Logical operators in database queries

< - Less than


> - Greater than


NOT


AND


OR

Primary and Foreign keys

Primary and Foreign keys are used to link related records in different tables.


​Primary key is a unique identifier.


​Foreign key is a value which is the primary key of a record in another table.

Data validation

Data Validation is used to make sure the data entered meets set results.

Validation - Is it correct?

Length Check

Data entered is the correct length eg 6 characters for a password

Length - How long?

Format Check

Data is in the correct format eg dd/mm/yyy

Format - Correct type?

Range check

Data is within a specific range eg age is between 1 and 150.

Range - Think maths

Presence check

Data has been entered e.g user must enter a password

Presence - is it there?

Match Check

Data must be one of a number of specific options, e.g. Male or Female.

Computers and the Environment

When they are created: They are made of lots of minerals like gold which need to be mined and plastics which come from oil.



When they are used: They are powered by electricity which is created by burning fossil fuels.​




When they are disposed of: They contain lots of toxic chemicals like lead and mercury that can get into water supplies and harm the environment.

Computer Misuse Act (1990)

Makes it illegal to access computers without permission (hacking).

Data protection act (1980)

Makes it illegal for people to sell on personal data without the subject's permission.

Regulation of investigatory powers act (RIPA)

Makes it legal for the government to read your e-mails and tap your phone.

Health & safety at work act

Means employers have to provide equipment (eg adjustable chairs) so employees don't get hurt whilst using computers.

Copyright Act

Makes it illegal to distribute artistic works (like music) without the owner's permission.