Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
- 3rd side (hint)
Data |
meaningless raw facts and figures, maybe alphanumeric, or sound, or graphic, etc. |
|
|
Info |
Taking data and processing it to give it meaning |
|
|
Data Structure |
[data] + [structure] + [context] + [meaning]
1310 - 13/10 - mm/dd - jimin bday |
|
|
Boolean |
Only true value (yes/no) |
|
|
Data Types (7) |
Boolean Real Integer Alphanumeric Currency Text Time |
BRITACT |
|
Real |
Numbers w decimal termasuk % |
|
|
Integer |
Numbers w/o decimal |
|
|
Date/Time |
Dd/mm |
|
|
Static Info & Example |
Information w little to no changes such as book, movie in a dvd |
|
|
Advantages of Static (3) |
- ad historical copy - proofreaded jd more accurate - bisa dipake w/o internet |
HIP |
|
Disadvantages of Static (4) |
- klo salah bikin baru - lama bikinnya - bisa mahal - maybe lost or damaged |
BLMD |
|
Dyanmic Info & Example |
Information that can be quickly changed or updated (wikipedia, web pages) |
|
|
Advantages of Dynamic (5) |
- cepet update - cheap - easy find related info - many can access tgt - search engine biar cepet nyarinya |
CRUMS |
|
Disadvantages of dynamic (4) |
- mistakes bisa ga di notice - bias - info bisa conflict - info overload |
COMB |
|
Validations and def (7) |
Range - data between two value Type - data entered is the correct type Presence - data ad ga Check digit - ensure data received Length - number of char Format - correct format (mobil) |
RTPCLF |
|
Verification |
- double data entry - visual |
|
|
Disadvantage double data entry (4) |
- bisa salah 2 kli - klo data panjang rempong - lama - 2 copy data unfaedah |
2LUR |
|
Disadvantage visual check (3) |
- dizzy - blurry eyes - data di kertas bisa salah |
DBKs |
|
Causes of digital divide (4) explain |
- rural vs urban area ; bc banyak consumer jd bs invest - more vs less indst develop ; klo less moneynya buat develop industry - socio-econ group ; rich ppl can afford poor cant - hi-low tech ; if can afford hi better exp |
|
|
Lookup |
=V/HLOOKUP(cell ref, range, kbrp dri range) |
|
|
Merge two date |
= & |
|
|
Math Formula (4) |
Tambah + Kurang - Bagi / Kali * |
|
|
LAN (def) |
Local area network |
|
|
WAN (def) |
Wide area network |
|
|
LAN (ciri2) (5) |
1 GB/s Few error Low secur Indv ppl Small loc |
1ESIL |
|
WAN (ciri2) (5) |
200 Mb/s High error High secur W other Telecom syst |
200ESOT |
|
Client-server (def & use) |
Use a dedicated computer to store data, manage resource, and control accsss
Bank, host webs |
|
|
Advantage client server (3) |
Access level Gausa b/u Private data |
ABP |
|
Disadvantage client server (3) |
Mahal Central ggl semua ggl Special tech staff |
MCS |
|
Peer to peer (def & use) |
Has no central server, each comp store data and share
Shares movie on net |
|
|
Advantages peer to peer (3) |
- cheap - 1 fail dia doang - no specialisg |
C1Ns |
|
Disadvantages peer to peer (3) |
- harus b/u - byk comp low speed - low secur |
B(Ls)2 |
|
Main beda p2p ama cli-ser (4) |
Cli / peer - dedicated comp / no indv comp - centr data / no centr data - centr b/u / no centr b/u - good 4 large net / good 4 small |
|
|
Methods to comm w internet (3) |
- IM ; text tranmission, online chats, use anagrams to reduce typing (LINE) - VoIP ; voice com but can internal thru intranet or external thru internet, if w LAN gratis (skype) - News ; subscribe and receive (buzzfeed) |
|
|
Good impact of vid con (6) |
- couple live @ dist can hear loved knes - users w hear prob can sign - witness more comfy give testi - safe travel money - teacher can teach ol - if medic expert can vidcal e/o if struggling |
|
|
Bad impact of vidcon (3) |
- ad yg self conscious - makan byk data trs mahal - widen digital divide bc ortu ga nyaman - org bisa lazy |
SMDL |
|
Online scams ad ap aj |
- phishing - smishing - vishing - pharming |
2PSV |
|
Phishing (def & how avoid) |
- unauthorised person gather personal data like pw by pretending they are from good org
* check grammar error, open link from known sender |
|
|
Smishing (def & avoid) |
- sms phishing thru text
* dont phone # thru text, dont install app from unknown pers |
|
|
Vishing (def & avoid) |
- use phonecall to try and scam user to give pers data
* if ragu matiin hape, jgn give pers detail thru call |
|
|
Pharming (def & avoid) |
- hacker plant code to pers comp or web so di redirect ke fake web
* run regular scans, check for https or lock symbol |
|
|
Malware (def & 6) |
- comp program designed to damage files and data di comp
Trojan Worm Spyware Adware Rootkit Malicious bots |
TWSARM |
|
Trojan horse |
Mask as other app pas dibuka del and corrupt other files |
|
|
Worms |
Tunnel to hard drive and replicate jdi comp nya lemot |
|
|
Spyware |
Spies on users activity and comp history |
|
|
Adware |
Display unwanted ad |
|
|
Rootkit |
Installs to bios to conceals and opens door for other malware |
|
|
Malicious bots |
- spam ; send chats - zombie ; slave other comp - file sharing ; shares ur files - chatter ; porn sites |
|
|
Virus |
Rep itself and gain access on priv syst or disp unwanted ads |
|
|
Cell reference |
Refers to cell on a worksheet |
|