Uploaded by Ross Pringle

GRADE 12 IT

advertisement
#separator:tab
#html:false
Hardwarephysical components of a computer or other electronic system
Softwarethe programs and other operating information of a computer
ICT system(information and communication technologies) a set of technological tools used to share or exchange information
Computeran electronic device for the storing and processing of data according to instructions given to it in a variable program
IPOinput process output module
Datainformation that can be interpreted and used by computers
Informationthe desired form of data is transformed into after processing
Laptopa personal computer which can easily moved
Desktopa computer display area represented by the objects found on a physical desk
Serversystem which provides resources data or services to other computers
Embedded computera dedicated computer system which forms part of a larger machine or system
Tableta personal portable computer with a touchscreen interface
Smartphonea mobile or cellular phone which runs off a mobile operating system
Operating systemsoftware which manages the computers memory and processes as well as it's software and hardware.
Application softwarea computer program designed to carry out a specific task other than the operation of the computer itself
CPU.The primary component of a computer which acts as it's control center
ALUperform arithmetic and logical operations as part of the computer's CPU
CUcircuitry within the computers processor which directs operations
BIOSa microprocessor used to start the computer system after it is powered on
UEFIupdated version of BIOS
CMOSa battery powered memory chip which holds the initialization data
RAMrandom access memory is the computers short term memory
ROMa type of storage computer storage containing permeant data which can be read not written to
HDDa mass storage device which hold long term data
SSDa mass storage device which hold long term data
Hybrid drivea computer storage device which combines the best part of SSD and HDD
Flash drivea data device which uses flash memory
Opticalcomputing using light waves as sources for data processing
SD cardflash memory card used in portable devices
Input devicea piece of equipment used to provide data to a computer
Output devicea piece of equipment which receives data from one form and converts it to another form
USB portmechanism used to connect peripheral devices to computer
HDMI porthigh definition multimedia interface
Parallel processinga method of computing where two or more processors handle separate parts of an overall task
Hyper threadinga hardware innovation which allows more than one thread to run on each core
Multiprocessingthe utilization of two or more central processing units in a single computer
Latencythe time taken for data to pass from one part of a network to another
SRAMa type of random access memory which uses latching circuitry
Processor cachingcaches store temporary information for the processor to use
Disk cachinga temporary computer memory which stores frequently used data
Browser cachinga storage location used to temporarily store data for a browser server or app
Web cachingthe activity of storing data for reuse
System clockan electronic device which emits a high frequency signal synchronizing components
Over clockingincreasing a components CPU to speed up it's performance
Clock multiplicationchanging clock speed
Internal bus / FSBa type of data bus which only acts internally in a computer
Data bustransfers data between a computers memory and it's CPU
Address busan element in a CPU which transmits the location of stored information
Control buscarries control signals from a the processor to other components
PCI expressinterface standard connecting high speed input output
SATAcontrol and transport protocol that defines how data is transferred
Modular designbreaking down a design into smaller parts for easier replacement or upgrade
Portsa point where connections start or end
Cardsa device which adds functionality to a computer
Onboard bussesan electronic pathway through which data can be transferred
Graphics processoran electronic circuit which can perform mathematical calculations at high speed
Math processora specialized component which manipulates numbers more quickly than the basic microprocessor
IRQsa signal sent to the processor to momentarily stop operations
IOdevice or operation which transfers data to or from a computer system
Pagingstorage method used in operating systems to retrieve processes from the secondary storage to main memory as pages
Swappingthe moving of data between the secondary storage and main memory
Utilitiesa type of system software used to anylise configure optimize and manage a computer
Driversa set of files which tells a hardware component how to function
Source codeprograming components created by a programmer and saved in a file
Executable codemachine code which is the set of native instruction
proprietary softwaresoftware which is privately owned and distributed
Freewareproprietary software which is free
Freemium softwarehave to pay for full version
Creative commonslicenses which enable the free distribution of copywrited work
High level languagelanguage which allows the user to program in a language independent of what the computer runs on
low level languagea language with minimal difference from the computers base language
Compilerprogram which turn high level code to the computer's language
Interpretersa program which directly executes instructions without having them previously compiled to machine language
Assemblersprogram which converts assembly language code into machine code
Product keycertifies the copy of the program is original
Activation codekey used to activate program after installation
Firewallnetwork security device which monitors incoming and outgoing network traffic
Anti-malwarea type of software program which protects against malicious software
OPERATING SYSTEMS:Desktop - windows Mobile - android Embedded OS - traffic light system
ADVANTAGE COMPUTERS:Accuracy & precision Communication Access to information
DISADVANTAGE COMPUTERS:Cybersecurity risks Distraction Take jobs
EFECT OF NUMBER OF BITS:Doubles the precision of data for every bit added
BUS RELATIONSHIP WITH REGISTERS:Register receives its information from bus when it's load input is activated
EFFECT OF REGISTER SIZE:The bigger the register size the bigger the instructions a processor can handle
INCREASING LEVEL 1;2;3 CACHE: (increasing cache size increases system performance)L1 - extremely fast transfer rates L2 - bigger and slower L3 - higher storage more latency
INCREASE OF RAM SPEED / SIZE:Faster data access; improved system performance
IMPROVING COMPONENTS:Video card for 3D rendering Faster HDD/SSD for video editing
MOBILE TECHNOLOGIES CONSRAINTS:Battery life Size computing power power consumption
FUNCTIONS OF OPERATING SYSTEM:User interface Load and run programs Manage resources Interface between hardware and application programs
MACHINE CYCLE:Fetch Decode Execute Store
SOFTWARE PROCESSING TECHNIQUES:Multi-tasking Multi-threading related
HARDWARE PROCESSING TECHNIQUES:Hyper-threading multiprocessing
UEFI VS BIOS VS CMOS:UEFI - higher bit size offers more advanced interface BIOS - limited user interface CMOS - ability to control the settings in BIOS
EFFECT OF VIRTUAL MEMMORY:Frees up RAM Improves system performance Improves multitasking Improves using large programs
Networka series of interconnected nodes
Clientany computer hardware or software device that requests access to a service provided by a server
Server:a computer program or device that provides a service to another computer program and it's user
Switcha device which connects devices in a network together
Routera device which connects two or more networks
Firewalla device which monitors incoming and outgoing network traffic
ADSL routerprovide an internet connection using a home telephone network
Hotspota physical location where people may access the internet
Starcentral hub/switch connecting out
Busmiddle cable that all are connected too
Hybridmix of different topologies
Meshevery node is connected to every node
POP3protocol relating to emails
SMTPsimple mail transfer protocol (send and receive)
IMAPinternet message access protocol (accessing emails)
TCPtransmission control protocol (exchanging messages over the internet)
IPinternet protocol address (identifies a network or device on the internet)
UDPUser Datagram Protocol (connectionless communication)
HTTPHypertext transfer protocol
HTTPSsite is secure
FTPfile transfer protocol (file transmitting between computers)
WebDAVWeb Distributed authorizing and versioning
Cookiesfiles created by websites you visit
Search enginea program that identifies items in a database
mediated searchusing a bigger search engine inside a website
Bounded mediaBounded uses cables ( UTP and fibre)
Microwavetravel long distance can't travel through walls
Radio wavecan travel through walls can't travel long distances
Thin clienta device with limited computing capacity
Fat clientnetwork computer with the most recourses installed locally
Smart clienteasily deployed and managed client application
Bandwidththe amount of data which can be sent from one point to another in a certain period of time
Onion routerpeer to peer router which allows user to browse anonymously
VPNvirtual private network (connects to remote server creating a point to point tunnel which encrypts data)
URLweb address locater
RAIDstoring data in multiple locations on a drive to protect in case of drive failure
UPSa device which maintains power in case of power failure
Reasons for using networks:communication, access to/sharing resources, centralization, data transfer, productivity
Advantages and disadvantages of networksAdvantage - fast efficient Disadvantage - virus, expensive
Method overloadingcreating two methods with the same name and parameters but different return types
Classtemplate that describes the data and behavior associated
Objectinstances of a class created to use their attributes
Attributesthe characteristics or properties of a class or object
Methoda block of code which when called performs specific actions mentioned in it
Instancean object that is created using a class is said to be an instance of that class
Abstractionrefers to hiding the implementation details of a code and only showing the necessary information to the user
Encapsulatingrefers to implementing code and variables into a single unit
Inheritanceallowing all methods and variables from one class to be accessed in another
Base classthe class from which the subclass is derived
Derived classa class which inherits from a base class
Constructorthe block of code which initializes the state and value of an object during object creation
Polymorphismthe ability of objects to take on many forms
Method Overridingoccurs when a subclass has the same method as the parent class
Decompositionbreaking down large problems into smaller ones each with a method that defines a larger problem
Algorithmsequence of finite steps designed to solve a specific problem
Information hidingencapsulating data within a class and restricting access to specific components using access modifier
Static variablethe variable belongs to the class only ; not any instance of it
Static methoda method that belongs to a class rather than any instance of it
Finala variable which cannot be changed
Protectedrestricts the accessibility of the class to main class & sub class
Privaterestricts access of elements to only the class where they are declared
toStringreturns the string version of an object
Gettergives access to an attribute in a given class
Setterused to set the data of a class field to a variable
IPOinput output model
Overflow errorwhen a program tries to store more data in a fixed location than it can handle
Truncationcuts of the end of a value
Mantissadictates the precision of a number
IPV432 bit less range
IPV6128 bits greater range of IP address
JSONa text based readable file which can store and transmit data objects consisting of attributes
Overridingthe ability of a class to change the implementation of the methods inherited from it's ancestor class
Digital dividea gap between demographics and regains which have access to modern technology
AUPa document stipulating constraints and practices a user must agree to for access to corporate network
Hackera person who breaks into a computer system
Crackera person who aims to get access to a computer system with malicious intent
POPIprotection of personal information act
REASONS FOR USING COMPUTERS:Saving paper Labor Communication cost
HEALTH ISSUES:Eye strain RSI Carpal tunnel
USE OF ARTIFITUAL INTELIGENCE:Detect earthquakes Detect social media propaganda
IMPLICATIONS OF CRYPTOCURRENCY:No legal protections Non reversable Some public information
Download