Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
Info 2 Key Terms
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
AQA AS-level ICT Info 2
Terms in this set (88)
Input
The capture of data.
Processing
The conversion of data into information.
Output
Information produced from data.
Encoding
Translating data into language the computer understands (binary)
Coding
Shortening or abbreviating data for quicker data input and recognition, lowers the risk for human error.
Encryption
The process of converting information or data into a code, especially to prevent unauthorised access.
Information
Data given context and therefore meaning.
Data
Raw facts and figures.
Personal data
Facts and opinions about a living person.
Direct data source
Data gathered from an original source.
Indirect data source
Gathered from another source or as a byproduct of another operation.
Validation
Automatic computer checks to ensure that the data entered is sensible and reasonable.
Hardware
The physical equipment of a computer.
Software
A program on a computer system that allows it to function and carry out the processing needed.
Procedures
A series of actions or operations that are undertaken to make sure that the ICT system can run smoothly.
ICT System
A computer system that takes a set of inputs, processes them and creates a set of outputs. This is done using both hardware and software.
ICT
The use of technology for the input, storage, processing and output of data and information.
Computer Networking
Linking 2 or more computing devices together for the purpose of sharing data, communicating software.
Network interface card
A component inside any device that will allow access to the network.
Local Area Network (LAN)
A network that usually covers a single site and could be linked by the use of cables.
Wide Area Network (WAN)
A network that usually covers a large geographical area and could be linked by cables, microwave or satellite.
Metropolitan Area Network (MAN)
Connects LAN's in a city or town.
Peer-to-peer network
A network that has no dedicated servers. All computers are equal, so they are called peers.
Server based network
There is a central location where users can share and access network resources. There is one login and password for the entire network. All computers on the network will point to one server.
Intranet
A local or restricted communications network, especially a private network.
Extranet
An intranet that can be partially accessed by authorised outside users, enabling businesses to exchange information over the internet in a secure way.
Internet
A worldwide system of computer networks, a network of networks.
World Wide Web (WWW)
An information system on the internet which allows documents to be connected to other documents by hypertext links.
CPU
Central processing unit, sometimes referred to as the processor.
Router
Hardware device (wired or wireless) that joins networks together at the network protocol layer.
HUB
Small, simple network device that allows multiple computers to communicate. An expensive piece of network equipment often in home wired networks and small businesses.
Modem
A device that enables a computer to transmit and receive data.
Human Computer Interaction (HCI)
The study of how people interact with computers.
User Interface
The link between the user and the ICT system, involves both software and hardware.
Graphical User Interface
Uses graphics, icons and pointers to make operation of tbe computer user friendly. Designed to make it intuitive for the user. Uses WIMP.
WIMP (Windows, Icons, Menus and Pointers)
The key aspects of a GUI. e.g. dialogue boxes, pictures, pop up menus/ pulldown menus, mouse/touch-pads.
Menu based Interface
Choices are displayed on screen to be selected in order to operate the system.
Command Line Interface
User types in commands for the computer to interpret and carry out the task. Only used by IT experts.
Natural language interface
Communicating with the computer using conversational words.
Electronic Data Interface (EDI)
Allows information to transfer between different systems sometimes within different organisations electronically.
Malpractice
Breaking professional rules set by an employer or professional body that results, intentionally or unintentionally in harm to the organisation or clients.
Computer crime
Illegal acts committed intentionally using a computer as the principal tool e.g. theft of money
Internal threats
Threats that come from employees either with malicious intent or through carelessness.
External threats
Threats that come from outside the organisation e.g. hacking/ spyware
Protocol
A set of standards or rules which defines how communication takes place between computers e.g. IP, HTTP, FTP
Code of conduct
The guidelines to the specific ICT system. A voluntary set of rules which people agree to follow or abide by. Not legally binding but once someone agrees to abide by it, then it is considered binding.
Regulations
The rules or laws made by agencies.
Legislation
A law or a set of laws e.g. computer misuse act, data protection act, copyright of patents act.
Standards
A level of quality or attainment.
Data subject
The person whose data is being collected.
Information commissioner
Government official who oversees the data protection act.
Data controllers
People or organisations who process the personal data who must follow good practices.
Intrinsic value of data
Data has value in its own right.
Commercial value of data
Data has no physical monetary value but may have financial value to businesses.
Free data
Some data items which are available freely to the public e.g. electoral register.
Backup
Refers to the making of copies of data that may be used to restore the original if a loss of data occurs.
Recovery
Restoring files to the original state before failure occurred.
Full backup
Takes a full image of the system that can take a long time to process and slows processes down.
Differential backup
Only backups files that are different from the files in the previous
full backup
, however when some time has passed since the last full backup it would be time consuming.
Incremental backup
Backs up only the files that have changed since the last backup (any type of previous backup).
Online backup
A backup method used by large organisations with an internet connection.
Remote backup
Transferring files to a remote site using WAN.
Disk mirroring
Storing identical data on two different disks. Whenever data is stored to the disk it is stored on both disks.
Redundant array of inexpensive disks (RAID)
Fault-tolerant system which uses a set of two or more disk drives instead of one disk to store data. By using two disks to store the same data a fault in a disk is less likely to affect the whole system.
Batch processing
Method of computer processing used when there is a large number of similar transactions that can be processed together.
Interactive processing
The user will have a conversation with the computer using an input device to directly input the data into the system which is processed at the same time.
Transaction processing
Data for each transaction is entered at source and processed immediately.
File extension
A tag of three or four letters, preceded by a period, which identifies a data file's format or the application used to create the file.
Pixels
The smallest amount of visible data in an image.
American Standard Code for Information Interchange (ASCII)
The most common format for text files in computers and on the internet. Each alphabetic, numeric, or special character is represented with a 7bit binary number. 128 possible characters.
Binary code
Groupings of 1's and 0's that makes information a format that a computer can understand.
Unicode
A coding scheme similar to ASCII that attempts to represent characters in most of the world's languages using 2bytes for each one.
Bitmap images
Binary stored data representing an image created using a grid of small squares called pixels.
Vector images
File that contains instructions for drawing the picture made using mathematical lines. Used in CAD, these graphics allow the user to manipulate objects as entire units.
Integer
In a computer 8 bits can store up to the number 255 for instance. You can also store negative numbers but the computer must be informed.
Garbage In Garbage Out (GIGO)
When incorrect data is input the output is incorrect as a result. This is referred to as...
Voice Over Internet Protocol (VOIP)
Approach to telephones that allows the user to make voice calls using a broadband Internet connection instead of a regular (analog) telephone line.
Virtual Learning Environment (VLE)
An online system that allows teachers to share educational materials with their pupils via the web.
Facsimile (FAX)
An inexpensive method of sending a message which allows exact copies of written images or images to be sent without preparation.
Spyware
Unauthorised access that monitors what you are doing with malicious intent. e.g. key logging
Hacking
Intentionally accessing a computer without authorization or exceeding authorized access.
Antivirus
Prevention, detection and repair.
Access logs
A list of all the requests for individual files that people have requested from a website.
Firewalls
Keeps unauthorized Internet users out of private intranets.
Biometrics
Security measures that require the physical body for access.
Levels of permitted access
Users are given different levels of access to the network.
Expert Systems
Computers programmed with "subject knowledge" to mimic the role of experts.
On screen forms
Uses to enter data into the computer it reduces the chance of errors such as missed field. Mimics the form of paper forms.
THIS SET IS OFTEN IN FOLDERS WITH...
INFO2
108 terms
Info 1 Key Terms
69 terms
AQA INFO1
51 terms
INFO3 - Whole
65 terms
YOU MIGHT ALSO LIKE...
Final For Technology in Action
370 terms
ICT AQA AS UNIT 2 KEYWORDS
52 terms
IS 201 Midterm
80 terms
WJEC IT3 Revision
69 terms
OTHER SETS BY THIS CREATOR
2 Output
12 terms
1 Input
23 terms
8 Factors and consequences of ICT
6 terms
7 Uses of ICT Systems
16 terms