Unit 2 Flashcards

Description

A-Level ICT (Unit 2) Flashcards on Unit 2 Flashcards, created by sophiegreer3 on 25/04/2015.
sophiegreer3
Flashcards by sophiegreer3, updated more than 1 year ago
sophiegreer3
Created by sophiegreer3 over 9 years ago
55
1

Resource summary

Question Answer
What is ICT? Information and Communication Technology is the use of technology for input,processing,output,storage and transfer of data and the output of information.
What is a system? A system is something that contains inputs,processes and outputs. It can be using technology or can be paper based.
What are input,processes and outputs? Input is capturing of data,process is converting the data into information and output is the information produced.
What is an ICT system? ICT systems are those where the output from the system goes directly to a human or into another system.
What are the 6 components of an ICT system? People Data Procedures Software Hardware Information
What is data? Data represents raw facts and figures or a set of values.
What are some types of data? Text Number Images Moving Images Sound
What format does a computer store and process data in? Binary numbers (bits and bytes)
Why do we encode data? Encoding data is used by computers to convert data into machine-readable form.
Why do we code data? Data is coded to change the original data into a shortened version. This is to save on storage space and speed up data entry.
What is processing? Processing is the work the computer does on the data to convert it into information.
What is information? Information is data that has been processed into something that is meaningful.
What factors increase the value of information? Accuracy Up to Date Complete From a reliable source Relevant
What characteristics of users need to be considered when designing a system? Experience Physical characteristics Environment of use Task to be undertaken Age
What key factors need to considered when designing a system? Costs Timescale Involvement of clients and users Requirements of clients and users
What is included in a GUI? Windows Icons Menus Pointers
What is a menu-driven interface? This is where the user moves through menus to navigate through the system.
What is a command line interface? These are the most difficult to use. It relies on users typing in text-based commands for the computer to execute.
What types of help and support can be provided to users? Video tutorials FAQ's Helpline Online Chats Manuals
What are some essential skills required for an ICT professional? Good comunication skills (verbal and written) Problem-solving skills Patience Willingness to work flexible hours Teamwork
What are the characteristics of an effective ICT team? Team leader must ensure members work together in organised and effective manner. Encouragement from leader All strengths and weaknesses taken into account Appropriate structure for project Monitoring of task progress Costs are monitored Balance of team Good communication skills
What is an ICT network? Linking two or more computing devices together for the purpose of sharing data,communicating,software and peripherals.
What is a WAN and a LAN and an example of each? WAN-Wide Area Network e.g. worldwide company LAN-Local Area Network e.g. school
What is an intranet? An internal network to communicate via internal email and other methods like newsgroups. This can only be accessed by people involved with the organisation.
What an extranet? The part of an organisations network that can be made available to outside users.
What is a hub? A small,simple network device that allows multiple computers to communicate. Hubs are an inexpensive piece of network equipment found in home wired networks and small businesses.
What is a peer-to-peer network? 2 or more computers linked together so that they can share files and peripherals. Each computer needs a NIC. The OS can be used to define which resources can be shared. A hub may be used if more than 2 computers are used. The main computer connects to the internet via an ADSL modem and then to a router so that the other computers can access the internet too.
What is a client-server network? This is likely to be server based. The server needs a specialised network OS that enables it to manage complex sets of user rights. The server is connected to one or more network switches. Each workstation needs the client version of the OS. They are backed up centrally by the server.
What is a router? Hardware device that joins networks together at the network protocol layer.
What is a network switch? Hardware device that joins multiple computers together at the data link protocol layer.
A client-server network
Wireless peer-to-peer network
What is internet? A large group of interconnected computers around the world that allow the sending and retrieval of information from one computer to another;sometimes described as a network of networks
What is the World Wide Web? a collection of multimedia resources accessible via the Internet
Which protocol is used to access files through a web browser? HTTP-Hyper Text Transfer Protocol
What language are web pages written in? HTML-HyperText Markup Language
What is a de facto standard? This is a standard where no formal agreement is in place,but a particular standard has become one that is most commonly used in practise. e.g.GIF or PC
What is a de jure standard? Legally binding industry standards that all manufacturers have to agree to work to. e.g. WiFi
What are protocols? a set of known rules that govern the communications between computers on a network.
What is a Transmission Control Protocol? (TCP) A protocol to manage the assembly of data into packets transmitted between computers over the Internet,ensures reliable transmission; used along with Internet Protocol.
What is Internet Protocol (IP)? A protocol which directs data from one computer to another.
What does a protocol do? A protocol includes formatting rules that specify how data is packaged into messages.
What are 4 threats to ICT systems? Employees Human Error Viruses Spyware
What is malpractice and give an example? When an employee goes against the company ICT code of practice e.g. leaving a workstation logged on creating an opportunity for an unauthorized individual to access their account.
What is crime and given an ICT related example? When individuals or organisations break the law through using computers to illegally gain access to a computer system e.g to break in and change the payroll figures in an internal database.
What is a virus and give some forms of a virus? a piece of malicious code that is written by programmers and used to corrupt data and systems. It comes in different forms such as trojans,logic bombs and worms.
What is spyware? Installed on user's computer and some of the threats are: Data is sent to an external source without your permission Passwords might be stolen Networks of infected computers could be used to commit further crimes.
What are 4 reasons for security breaches? Satisfaction -trying to show off Personal gain-student changing grades Financial gain-steal money Sabotage-damage company
Two types of threat Data access threat-data is accessed while being communicated across a network illegally Service threats-disruption of normal running of software e.g. viruses
What are some ways to control a threat? Password-based login procedures Firewalls Secure Socket Layer (SSL) Digital signatures
How are ICT systems protected? Hardware measures Software measures Procedures Combination of above
What hardware measures could be put in place? Only let allowed removable devices be used Fix workstations to desk Restricted access to computer rooms e.g. ID pads,biometrics
What software measures could be put in place? User names and passwords Controlled access rights e.g.no access,read only,full control Network security software Automatic saving Data encryption
What procedures could be put in place? Induction training- responsibilities regarding data security Backup procedures ICT code of practice
What is the Data Protection Act 1998? regulates how personal data is used and protects data subjects from the misuse of their personal data.
What are the rights of data subjects? to see what data is held about them to have an errors corrected to refuse to allow data to be processed for junk mail to refuse to allow sensitive data to be processed to complain to data protection commissioner about any abuse to act to claim compensation if damaged by misuse of act
What is the role of the Data Protection Commissioner? enforcing and overseeing the Act raising awareness of the act and its implications investigating complaints
What are the 3 offences identified in the Computer Misuse Act 1990? 1. unauthorised access to computer material. 2. unauthorised access with intent to commit or facilitate commission of further offences. 3. unauthorised modification of computer material.
What can happen to individual for each of these offences? 1. Max prison sentence-6 months and/or Max fine £2000 2 &3- Max prison sentence- 5 years and/or a fine.
How could an organisation deal with computer misuse? Preventative measures Computer security
What is a firewall? acts as a barrier between the public Internet and your private computer or network and blocks threats including some viruses.
A firewall
What is the Copyright,Designs and Patents Act 1988? It applies to computer software as well as non-ICT-related media and gives the creator control over the ways in which their material may be used.
What are the three types of licenses available for computer software? 1. Single-User Licence 2. Multi-User Licence 3. A Site Licence
What questions need to be considered when thinking about backup? What data needs to be backed up? How often does the data need to be backed up? When does the data need to be backed up? Which backup media will be used? Who will be responsible? Where will the data be stored?
What are some causes of data loss? Natural disasters Human error Software corruption Virus attack Hardware error Sabotage
What is a full backup? This is when all data stored in files and folders is backed up.
What is a differential backup? This is when only data that is different from the last full backup is backed up.
What is an incremental backup? This is when all files since any type of previous backup are backed up.
What 6 things can ICT provide? Fast,repetitive processing Vast storage capacity Improved search facilities Improved presentation of information Improved accessibility of information and services Improved security of data and processes
Why aren't ICT systems always appropriate to use? Limitations in what they can be used for Limitations in information they produce Appropriateness of solutions
What are the three types of processing? Batch Interactive Transaction
What is batch processing? This is where data is collected together in a group or batch before processing takes place.. When the job is run, the data held in the transaction file is used to update the master file. There is no interaction between the computer and user.
What is interactive processing? This is where this is interaction between the ICT system and the user. The user reacts to prompts from the computer and the computer uses these prompts to process data. The data is processed at the time it is input and output is also immediate.
What is transaction processing? This allows many users to access and update a system at apparently the same time. Each transaction must be completed before the next transaction is begun. It must be able to work quickly with a large amount of different transactions taking place,from many different users.
What factors may influence the use of ICT systems? Cultural Economic Environmental Ethical Legal Social
What is data security? Data security is commonly referred to as the confidentiality, availability, and integrity of data.
What is data privacy? Data privacy is suitably defined as the appropriate use of data..
Show full summary Hide full summary

Similar

Function and Structure of DNA
Elena Cade
AQA AS Biology Unit 2 DNA and Meiosis
elliedee
Types and Components of Computer Systems
Jess Peason
Psychology subject map
Jake Pickup
Input Devices
Jess Peason
Using GoConqr to teach French
Sarah Egan
Using GoConqr to teach science
Sarah Egan
Using GoConqr to study geography
Sarah Egan
Using GoConqr to study Economics
Sarah Egan
Using GoConqr to study English literature
Sarah Egan
Using GoConqr to learn French
Sarah Egan