|
|
Created by Raphael Del Rio
over 9 years ago
|
|
| Question | Answer |
| Analyse | Identify components and the relationships between them |
| Collaboration | Working together in pairs or a group to share ideas and expertise |
| Communication | Sharing of information with people |
| Concept map | Graphic showing how ideas are related |
| Criteria | Elements that must be included in a project and the standards by which it will be evaluated |
| Design, Produce evaluate | The 3 stages of successful project work |
| Evaluation | Comparison of the solution and original expectations |
| IPO table | Input, Output and Processing of data needed for a solution |
| Project management | Overseeing of a project to ensure it is done to time and on budget |
| Prototype | Simple version of how the final project might look |
| Resources | time, finances and people needed for a solution |
| Storyboard | Simple sketches of screen design and navigation |
| Bus lines | Connections between chips on the circuit boards |
| Control | Allowing data to move through the system |
| Controller cards | Circuit boards that hold chips performing secondary functions such as sound and video display |
| Display | Appearance of the information presentation to the user |
| Hardware | Physical parts of a computer |
| Microprocessor | General name for a chip |
| Motherboard | Main circuit board that holds most of the main chips |
| Port | Point of connection between an external device and the computer |
| Processing | Changing data from one form to another |
| Secondary storage | Devices that can hold data after the power is turned off |
| Server | Networked computers that perform certain tasks for other computers on the network |
| Troubleshooting | Systematic method for finding faults in a computer system |
| Application Software | Program that allows the user to create, edit or display computer generated files |
| Control elements | Buttons, tabs and drop-down lists that allow the user to work the application |
| GUI (Graphical User Interface) | Interaction between the user and the computer screen |
| Hardware requirements | Components that need to be used to run software correctly |
| Inclusice design | Software presentation that allows people with a wide range of a abilities to use it |
| Interactivity | Communication between the user and the application |
| Macro | set of stored instructions labelled and used repeatedly in an application |
| Navigation | Movement of users between different sections of an application |
| Operating System | Control of hardware components by application software |
| Utility software | Program that has specific housekeeping tasks to perform |
| Binary data | Data represented by ones and zeros |
| Copyright | Ownership of intellectual property by its creator |
| Data compression | Decrease of file size by removing data or finding patterns |
| Data security | Procedures intended to protect data from unauthorised access |
| Data transmission | Movement of data from one place to another within a computer system or across a network |
| Digital data | Represented by fixed values |
| Primary storage | Chips on the motherboard, directly accessed by the CPU |
| Secondary storage | Devices that can hold data after the power is turned off |
| Augmented reality | Integration of real world video with computer generated images to deliver an interactive 3D environment |
| Convergence | Trend of combining previously separate technologies into single items of equipment |
| Expert system | Computer program that contains stored knowledge and solves problems in a specified field |
| Fuzzy logic | Assigns a probability to events and predicts the most likely conclusion from a range of possibilities |
| Generations of computers | Groups of computer hardware improvements over time, each group presenting a significant advance in technology |
| Computer forensics analyst | Recovers data from computers and other digital devices in order to provide evidence of illegal or inappropriate activities |
| Computer scientist | Designs and develops new hardware and software technology |
| eLearning designer | Creates digital teaching and learning resources |
| Multimedia specialist | Produces computer displays using text, graphics, video, animation and audio |
| Online music promoter | Plans and produces marketing campaigns to sell musoc |
| Programmer | Writes code used to create, update and maintain software packages |
| Project manager | Manages a project in order to keep it on schedule and within budget |
| Software engineer | Designs and develops software for operating systems and application programs |
| Support staff | Provide assistance for people who have problems with their computer system |
| Systems analyst | Designs and manages information systems in order to solve problems related to computer technology. |
| Technician | Installs, repairs and maintains computers, servers and other hardware devices |
| Training specialist | Plans, coordinated and teaches a range of activities related to information and software technology. |
| Website designer | Designs, creates and maintains websites |
| Code of conduct | Rules that set out standards of behaviour |
| Copyright | Ownership of intellectual property by its creator |
| Cloud computing | Technology offering a range of applications via the internet to perform tasks traditionally executed with software on an individual |
| Control | Power to make decisions about who does and does not gain access to information and software technology |
| Data accuracy | Extent to which data is free or errors |
| Data bias | Manipulation of data in order to present a one-sided view |
| Data security | Protection of data from loss or modification |
| Ergonomics | Study of the relationship between machines and the people who use them |
| Equity and access | Belief that all people should have equal rights and access to the benefits that information and software technologies offer |
| Hackers | people who deliberately intrude into computer systems without permission |
| Intellectual property | Product of the intellect that has commercial value |
| Occupational health and safety legislation | Enacted workplace law that aims to protect the health, safety and welfare of people at work |
| Phishing | Transmission of a seemingly legitimate email in an attempt to gather personal and financial information |
| Piracy | Unauthorised copying of software |
| Privacy | Right of an individual or group to keep their lives and personal affairs out of public view, or to exercise control over personal information |
| Telecommuting | Working from home using modern technology to keep in touch with a place of employment |
| Videoconferencing | Using video and audio to link two or more people in different locations |
Want to create your own Flashcards for free with GoConqr? Learn more.