Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

IT P2 NOTES-2018

Definitions

1. Abstraction-art of representing essential features without including the background


details or explanations. Abstraction principle is used to reduce complexity and allow
efficient design and implementation of complex software systems.

2. ADSL- Asymmetric Digital Subscriber Line

3. AGP- Accelerated Graphics Port

4. Attenuation- reduction of force, effect or value of something.

5. BIOS-A set of computer instructions in firmware which control input and output
operations.

6. BitCoin- a type of digital currency in which encryption techniques are used to regulate
the generation of units of currency and verify the transfer of funds, operating
independently of a central bank.

7. Bit Torrents-A peer to peer file transfer protocol for sharing large amounts of data
over the internet, in which each part of the file downloaded by a user is transferred
to other users.-

8. Botnet/Bots/Zombie PC's- A network of computers that are remotely controlled by


malware and then used by criminals to install and run software as they need it

9. Caching- It prevents a slower medium from slowing down the performance of a faster
medium.

10. Click Farms -A business which pays employees to click on web links to create inflated
(increased) viewership / follower counts.

11. CMOS -A type of memory that stores the BIOS settings.


12. Computer worm- Malware that spreads itself over networks, normally by mailing
itself to all the contacts in a user's address book

13. Convergence -Trend whereby separate technologies and functions from multiple
devices are combined into a single multi-purpose device.

14. convergent devices- Separate technologies and functions from multiple devices, are
combined into a single multi-purpose device

15. Cookie- A text file stored on your local computer that is used to save user
settings/preferences for a website.

16. CSS (Cascading style sheet)- contains the formats for how a particular object should
be displayed in a Web browser and therefore the developer does not have to code
separate web pages for individual user configurations/preferences for example:
different colour schemes

17. Data Integrity- is a fundamental component of information security. In its broadest


use, “data integrity” refers to the accuracy and consistency of data stored in a
database

18. Disk caching-Every hard drive has built-in fast high speed memory (RAM) which is
used to cache data read from/written to the hard drive and therefore speed up
subsequent calls for the same code/data from the hard drive.

19. DNS (Domain Name System)-Internets system for converting alphabetic names into
numeric UP addresses. E.g. when a web address URL is typed into a browser. DNS
servers return the IP address of the web server associated with that name.

20. Dogecoin- A cryptocurrency that was created as a parody and named after an
internet meme

21. DoS attack-denial of service


A cyber attack in which the perpetrator seeks to make a machine or network resource
available to its intended users by temporarily or indefinitely disrupting servers of a
host connected to the internet.
22. DRM (Digital Rights Management)-refers to any software which uses some form of
encryption and manages access  to the content of electronic media

23. EEPROM (Electrostatic Programmable read only memory) - a read only memory
whose contents can be erased and reprogrammed using a pulsed voltage.

24. Encapsulation-Process of enclosing a message or signal in a set of codes which allow


transfer across networks.
Or the provision of an interface for a piece of software or hardware to allow or
simplify access for the user.

25. Ethereum - A cryptocurrency

26. EULA-Legal agreement between a user and a software publisher which has to be
accepted before using the software.

27. Fibre Cables-transmits data via light / laser signals

28. FTP-file transfer protocol. A standard for the exchange of program and data files
across a network.

29. Firmware-Software that is stored on a ROM chip and used to control the basic
operation of a device.

30. Flashing -Display info suddenly on a screen briefly or repeatedly

31. GIGO -The principle in software development which promotes validation on the basis
that: “where input data is invalid, the output will also be invalid.”

32. Hoaxing-to deceive


E.g. a computer virus hoax is a message warning the recipients of a non existing
computer virus threat. Usually a chain email.

33. Hot swappable/pluggable- The ability to plug in or remove a device from a computer
without switching off the computer

34. Incremental backup-A security copy which contains only those files which have been
altered since the last full backup.
35. Internet of Things -The integration of an always-online Internet connection and
interaction in everyday household appliances.

36. Interpreter- Software that compiles and executes one line of programming code at a
time.

37. Intranet -Network facilities and/or webpages made available within the LAN of an
organisation or business.

38. IRC- Internet Relay Chat

39. Jail breaking- Jail breaking means installing a new cracked version of the operating
system’s firmware

40. Logical Error -An error in programming where the program executes, but the output
is incorrect or invalid.

41. Lossless – no data is lost

42. Lossy – some insignificant data is lost

43. Lossy Compression- The type of compression that sacrifices insignificant/redundant


portions of the data.

44. Metadata- Data that provides information about other data.

45. Multiprocessing-involves the use of multiple processors active at the same time
(Managed by Hardware).

46. Multithreading-involves breaking an app up into multiple threads with each running
as an individual (Managed by software)

47. NAS (Network Attached Storage) - is a file level computer data storage server
connected to a computer network providing data access to a heterogeneous group of
clients.
48. Neo- Cryptocurrency

49. Network- a group of two or more computers or devices that are linked together via a
communication medium for the purpose of transferring data and communicating

50. NFC- Near Field Communication

51. NIC (Network Interface Card) - is a circuit board or card that is installed in a computer
so that it can be connected to a network. Provides the computer with a dedicated full
time connection to a network.

52. Overflow- An error condition that occurs when there are not enough bits available to
represent an integer value accurately

53. Patch-is an update that can be downloaded to fix a specific bug in your software

54. Pharming- The fraudulent practice of directing internet users to a bogus website that
mimics the appearance of a legitimate one, in order to obtain personal info.

55. Piggybacking-To take advantage of an existing system or body of work.

56. POST (Power-on-self-test) - Process performed by firmware or software routines


immediately after a computer or other digital device is powered on. The results of the
POST may be displayed on a panel that is part of the device, output to an external
device or stored for future retrieval by a diagnostic tool.

57. Primary Memory -temporarily stores data or instructions currently being used.

58. Private Key-is secret-only the intended recipient can decrypt the message.
Programs.

59. Protocol-A set of rules for transmission of data across a network/encoding and
decoding data for transmission.

60. Public key-encrypts data and is openly available to anyone online.

61. Push technology/notification- A technology used by devices to automatically


download e-mail after receiving a notification from the mail server

62. RFID tag- ID system that uses small radio frequency identification devices for
identification and tracking purposes. An RFID tagging system includes the tag itself, a
read/write device and a host system application for data collection, processing or
transmission.
63. Rootkit-A collection of programs that is designed to infiltrate a computer and gain the
highest level of privileges to take control of an infected computer.

64. RSS-is a web or news feed/automatic provision to users of updated content and/or
notifications of new content from websites

65. SAAS-Software as a service

66. SATA / PATA Cable-Connector which links the HDD to the Motherboard

67. Secondary Memory-stores data permanently that may be loaded into RAM as
required.

68. Semantic Web- Has the ability to interpret information like humans and provide
useful content tailored to user needs/personalization.

69. Source Code -Code written by a programmer in human-readable format, before it is


compiled or interpreted

70. Spamming- Send the same message indiscriminately to a large number of internet
users.

71. Spoofing-hoax or trick. A spoofing attach is a situation in which a person or program


successfully masquerades as another by falsifying data to gain an illegitimate
advantage.

72. The processor or Central Processing Unit (CPU) - is the part of the computer that
executes the instructions (the software), processes the data and manages and
controls all the other parts of the computer

73. Thin clients-Lightweight computer that has been optimized for establishing a remote
connection with a server based computing environment. The server does most of the
work which can include launching software programs, crunching numbers and storing
data.

74. Thrashing- Computers become very slow and sometimes unresponsive when a
number of applications are open at the same time, as there is a high level of
continuous hard drive activity
75. Topology-The physical layout/connection of the computers in a network

76. UPS(uninterrupted power supply)- relates to the protection of hardware from power
irregularities

77. UTP (Unshielded twisted pair)-uses electric signals via copper cables

78. Virtual memory-is an area of disk space on the drive which is set aside so that the
operating system can temporarily store data there that cannot be loaded into
memory at the time.

79. VoIP-Voice over lan Protocol

80. VPN-

81. Web 1.0-content was provided by the site manager / writers and users were simply
content consumers

82. Web 2.0+ - website where users from all over the world collaborate on content,
content can be provided by the site team as well as a community consisting of users
as well. Users can also be contributors.

83. Wiki- A web application that allows people to add and modify content on an online
knowledge resource

84. Acceptable Use Policy-set of rules applied by the owner, creator or administrator of a
network, website or service that restrict the ways in which the
network/website/system may be used. Sets guidelines as to how it should be used.

85. Actual parameter- The actual value that is passed into the method by a caller. (Also
known as arguments)

86. Formal Parameter-the identifier used in a method to stand for the value that is
passed into the method by a caller.

87. Global variable-variable with global scope. It’s visible throughout the program, unless
shadowed. The set of all global variables is known as the global environment or global
state.
88. SSL (secure Sockets Layer) - Standard security technology for establishing an
encrypted link between a web server and a browser.

Database

89. Data integrity-the maintenance of, and the assurance of the accuracy and consistency
of data over its entire life cycle. It’s a critical aspect of the design implementation and
usage of any system which stores, processes or retrieves data.

90. Data independence- Type of data transparency that matters for a centralized DBMS.
Refers to the immunity of user applications to changes made in the definition and
organization of data.

91. Data security-Protecting digital data, such as those in a database, from destructive
forces and from the unwanted actions of unauthorized users, such as cyber attack or
data breach.
92. Data redundancy- Repetition of data. It’s a common issue in computer data storage
and data base systems. Some data fields are repeated

93. Validate data – The data meets the requirement for a specific format/range/data type

94. Verified data – The user has confirmed that the correct option was selected/correct
data was entered.

95. Private Key-A tiny bit of code that is paired with a public hey to set off algorithms for
text encryption and decryption. Also known as a secret key.

96. Public Key-a cryptographic key that can be obtained and used by anyone to encrypt
messages intended for a particular recipient, such that the encrypted messages can
be deciphered only by using a second key which is known as a private key.

97. Foreign Key- Purpose is to ensure referential integrity of the data. Only values that
are supposed to appear in the database are permitted.
Common stuff

 Advantages of using a star topology-


• Failure of a device will not influence the rest of the network as all
Computers are individually connected to a central hub/switch
• Easy to add nodes
• Easy to troubleshoot

 Reasons for using thin clients:


• Less hardware required making it cheaper/Do not need very powerful hardware as
processing is done by server
• Less physical space required
• Software only needs to be installed on server/Programs are loaded onto and shared
from server
• Reduced security threat

 Functions of BIOS:
• Check that all hardware is connected and in working order/POST
• Provide user with a menu of setup options for configuration at lowest level/CMOS
settings
• Locate and load operating system
• Controls hardware at low level

 Disadvantages using smartphones:


• Difficult to input data on a small screen
• Limited battery life - need to be charged regularly
• Mobile operating system limits the applications
• Not easily expandable with peripherals
• Cost of the data used on the phone

 Advantages of SaaS:
• Rent the software instead of purchasing a license
• Can be installed on multiple devices
• Can use cloud version on any device
• Have access to a certain amount of cloud based storage
• Updates are done automatically/always have latest version
• Accessible from any device with Internet access

 Disadvantages of cloud computing:


• Need Internet connection/stable connection
• Security of data
• Free storage is limited
• Need to be online to collaborate
• Is only available as long as company supplying service is in existence
• Data costs

 Public key encryption method: Uses a Public key to encrypt data and a Private
Key (secret/hidden) to decrypt data.

 Disadvantage of using BitCoin:


• Transactions cannot be cancelled/reversed
• No person/entity is accountable
• Need to register online as a user

 Benefits of using BitTorrents:


• Many users can download popular files quickly
• A single person is not responsible for all the costs of making files available for
downloading (hosting)/reduced cost to the host
• Some equality in sharing – as a user downloads files it is also made available for
other users to download/share from this computer
• Effective use of download bandwidth
• Client software is usually free

 Functions of an operating system:


• Supply an interface/GUI/UI
• Manage all the processes and tasks/apps/software
• Manage the computer memory/RAM
• Manage the input and output to and from the computer system
• Manage all disk drives/hardware

 Multitask processing/Multiprocessing:
The computer appears to run multiple programs at the same time/simultaneously by
sharing processing time of the CPU between processes/tasks
Concepts:
• Any indication of multiple programs/applications
• Sharing of CPU time between programs
 Multithreading:
When a single program is broken up into independent parts/threads that run at the
same time
Concepts:
• Program/application is split into parts/threads
• Independent processing

 Data structure that is non-volatile-Text File


 HTTPS protocol means: webpage is using encryption
 Regard to passive RFID tags
Technology used in e-Toll tags
Transmits over a very short range
Activates when within range of a receiver
 BIOS is stored in CMOS
 Primary Memory temporarily stores data or instructions currently being used
 Secondary Memory stores data permanently that may be loaded into RAM as
required
 Always virtual memory questions
 Fibre transmits data via light / laser signals
 UTP uses electric signals via copper cables
 Client – receives resources / generally low specs / dependent
 Server – sends resources / high specs / independent
 Why a ‘switch ‘is used in a network?

You might also like