Creado por Raphael Del Rio
hace más de 8 años
|
||
Pregunta | Respuesta |
Analyse | Identify components and the relationships between them |
Collaboration | Working together in pairs or a group to share ideas and expertise |
Communication | Sharing of information with people |
Concept map | Graphic showing how ideas are related |
Criteria | Elements that must be included in a project and the standards by which it will be evaluated |
Design, Produce evaluate | The 3 stages of successful project work |
Evaluation | Comparison of the solution and original expectations |
IPO table | Input, Output and Processing of data needed for a solution |
Project management | Overseeing of a project to ensure it is done to time and on budget |
Prototype | Simple version of how the final project might look |
Resources | time, finances and people needed for a solution |
Storyboard | Simple sketches of screen design and navigation |
Bus lines | Connections between chips on the circuit boards |
Control | Allowing data to move through the system |
Controller cards | Circuit boards that hold chips performing secondary functions such as sound and video display |
Display | Appearance of the information presentation to the user |
Hardware | Physical parts of a computer |
Microprocessor | General name for a chip |
Motherboard | Main circuit board that holds most of the main chips |
Port | Point of connection between an external device and the computer |
Processing | Changing data from one form to another |
Secondary storage | Devices that can hold data after the power is turned off |
Server | Networked computers that perform certain tasks for other computers on the network |
Troubleshooting | Systematic method for finding faults in a computer system |
Application Software | Program that allows the user to create, edit or display computer generated files |
Control elements | Buttons, tabs and drop-down lists that allow the user to work the application |
GUI (Graphical User Interface) | Interaction between the user and the computer screen |
Hardware requirements | Components that need to be used to run software correctly |
Inclusice design | Software presentation that allows people with a wide range of a abilities to use it |
Interactivity | Communication between the user and the application |
Macro | set of stored instructions labelled and used repeatedly in an application |
Navigation | Movement of users between different sections of an application |
Operating System | Control of hardware components by application software |
Utility software | Program that has specific housekeeping tasks to perform |
Binary data | Data represented by ones and zeros |
Copyright | Ownership of intellectual property by its creator |
Data compression | Decrease of file size by removing data or finding patterns |
Data security | Procedures intended to protect data from unauthorised access |
Data transmission | Movement of data from one place to another within a computer system or across a network |
Digital data | Represented by fixed values |
Primary storage | Chips on the motherboard, directly accessed by the CPU |
Secondary storage | Devices that can hold data after the power is turned off |
Augmented reality | Integration of real world video with computer generated images to deliver an interactive 3D environment |
Convergence | Trend of combining previously separate technologies into single items of equipment |
Expert system | Computer program that contains stored knowledge and solves problems in a specified field |
Fuzzy logic | Assigns a probability to events and predicts the most likely conclusion from a range of possibilities |
Generations of computers | Groups of computer hardware improvements over time, each group presenting a significant advance in technology |
Computer forensics analyst | Recovers data from computers and other digital devices in order to provide evidence of illegal or inappropriate activities |
Computer scientist | Designs and develops new hardware and software technology |
eLearning designer | Creates digital teaching and learning resources |
Multimedia specialist | Produces computer displays using text, graphics, video, animation and audio |
Online music promoter | Plans and produces marketing campaigns to sell musoc |
Programmer | Writes code used to create, update and maintain software packages |
Project manager | Manages a project in order to keep it on schedule and within budget |
Software engineer | Designs and develops software for operating systems and application programs |
Support staff | Provide assistance for people who have problems with their computer system |
Systems analyst | Designs and manages information systems in order to solve problems related to computer technology. |
Technician | Installs, repairs and maintains computers, servers and other hardware devices |
Training specialist | Plans, coordinated and teaches a range of activities related to information and software technology. |
Website designer | Designs, creates and maintains websites |
Code of conduct | Rules that set out standards of behaviour |
Copyright | Ownership of intellectual property by its creator |
Cloud computing | Technology offering a range of applications via the internet to perform tasks traditionally executed with software on an individual |
Control | Power to make decisions about who does and does not gain access to information and software technology |
Data accuracy | Extent to which data is free or errors |
Data bias | Manipulation of data in order to present a one-sided view |
Data security | Protection of data from loss or modification |
Ergonomics | Study of the relationship between machines and the people who use them |
Equity and access | Belief that all people should have equal rights and access to the benefits that information and software technologies offer |
Hackers | people who deliberately intrude into computer systems without permission |
Intellectual property | Product of the intellect that has commercial value |
Occupational health and safety legislation | Enacted workplace law that aims to protect the health, safety and welfare of people at work |
Phishing | Transmission of a seemingly legitimate email in an attempt to gather personal and financial information |
Piracy | Unauthorised copying of software |
Privacy | Right of an individual or group to keep their lives and personal affairs out of public view, or to exercise control over personal information |
Telecommuting | Working from home using modern technology to keep in touch with a place of employment |
Videoconferencing | Using video and audio to link two or more people in different locations |
¿Quieres crear tus propias Fichas gratiscon GoConqr? Más información.