Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
Run Length Encoding |
Replace sequences of same colour pixel with colour code and no. of identical pixels |
|
Property |
Data about shapes |
|
Drawing List |
List of shapes involved in an image |
|
Phishing |
Email pretends to be from official body and persuades to disclose private info |
|
Tuple, Entity, Primary Key |
Tuple : Single row in table Entity : Object about which data is stored Primary Key : Unique attribute to identify the record |
|
Ethernet |
A protocol for data transmission over cables network connections. Uses collision detection. |
|
Query Processor, Utility Software |
QP : Allows user to enter criteria then finds and returns appropriate result Utility software : Helps users maintain the computer by checking system for faults |
|
Breakpoint, Dynamic Syntax Checks |
BP : Stop code at specific line to check current progress DSC : Highlights syntax errors as code is entered |
|
Single stepping, Context sensitive prompt |
SS : Run code one line at a time so values can be checked CSP : Suggests the code to add |
|
Defragmentation, Buffers, IAS |
D : Rearranges blocks of individual files so they are contiguous. Accessing each file is faster so less head movement. Buffer : Temporary storage before used by receiving device IAS : Holds all data currently in use. Volatile with fast access times. |
|
Data verification, validation, integrity, security |
Verification : Ensuring data entered is safe as original Validation : Ensuring data entered is sensible Integrity : Ensuring data is up to date Security : Ensuring only people with authority can access data |
|
Data in 1NF, 2NF, 3NF |
1. No repeating group of attributes 2. No partial key dependencies 3. No non-key dependencies |
|
Improve computer performance |
1. Increase cache memory. More data is stored in fast access so less time is spent accessing from RAM 2. Increase clock speed so more FDE cycles occur per second |
|
IPv4 vs IPv6 |
4 groups vs 8 groups 8 bits vs 16 bits Full stops vs Double colon |
|
OS (File mgmt) |
1. Maintains directory structures 2. Provides file naming conventions 3. Makes file sharing possible by implementing access rights 4. Specifies the logical method of file storage |
|
OS (Peripheral devices) |
1. Manages interrupts from device 2. Handles buffers for transfer of data to ensure smooth transfer between devices that transmit and receive at different speeds. 3. Installs device drivers to allow communication been peripherals and computer |
|
Benefits of sub-netting |
1. Improved network speed 2. Improved network security so that not all devices can access all areas of network 3. Easier maintenance as only one subnetwork may need taking down |
|
Bridge, WAP, Switch |
Connect 2 LANs Allow connection of devices to central device via radio signals Allow 2 or more devices to communicate with one another |