Easy

    Cards (57)

    • Types of digital devices:
      Personal computers, servers, mobile devices, entertainment systems, navigation Systems
    • More digital devices types:
      Multifunctional devices, digital cameras, data capture and Collection systems, Communication Devices And Systems
    • Uses of digital devices1:
      Education and training, personal, social
    • Uses Of Digital Devices 2:
      Retail, organisational use, creative tasks
    • Input devices:
      Keyboard, mouse, webcam, microphone, game controller, sensor, Scanner, Graphics Tablet
    • Output devices:
      Monitor, printer, plotter, projector, speakers, actuator
    • Storage devices:
      Hdd, ssd, usb flash Drives, sd cards, optical Disks
    • Two ways of processing data:
      Manual and automatic
    • Accessibility devices:
      Trackballs, braille and large Key Keyboards, touchscreens, braille embossers, screen magnifiers, Eye Typers
    • Types of operating systems:
      Real-Time, single-user single-task, single-user multi-tasking, Multi-user
    • Roles of operating systems:
      Networking, Security, memory management, multi tasking, device drivers
    • User interfaces:
      Graphical user Interface, command line, menu based, adapted
    • Factors affecting the performance and use of operating systems:
      Malware, hardware, virtual memory
    • Utility software:
      Disk defragmenter, backup, disk/registry cleaner, software Updates, anti-virus, firewalls
    • Application software:
      Productivity software, Graphics/Multimedia Software, personal, communication
    • Image file Types:

      Jpg, bmp, Gif, png,svg
    • Video file Types:
      Avi, Mp4, Mov, Mkv
    • Application file types:
      Word processing ( Doc, Docx, Docm, rtf ), Spreadsheets ( Xlsx, xls, xlsm, csv ), Presentations ( Ppt, Pptx, Pptm, Pdf ), Databases ( Accdb, Mdb )
    • Application licenses:

      Open source and proprietary
    • Emerging technologies that affect it systems:
      • self driving cars
      • Virtual memory
      • Media Streaming
    • Personal use of emerging technologies:
      • Smart watches
      • Smart Speakers
      • Self driving cars
    • Organisational use of emerging technologies:
      • Augmented reality
      • 3D Printing
      • Internet of things
    • Factors affecting Choice of it systems:
      user experience, user needs, specification, compatibility, connectivity, cost, implementation, security, efficiency, productivity
    • Wired methods of connecting devices:
      • usb
      • sata
      • vga
      • hdmi
      • Ethernet cable
      • Fibre Optic
    • Wireless methods of connecting Devices:
      • Infrared
      • bluetooth
      • Wifi
      • Mobile Broadband
    • Types of networks:
      Lan, Pan, Wan, Vpn
    • Factors affecting choice of network:

      User experience, user needs, cost, Compatibility, connectivity, implementation, specification, productivity, efficiency security
    • Data transmission protocols:
      Email ( Smpt, pop3, imap ), Voice and video calls over the internet ( sit, rtp, rtcp ), Web Pages ( Http, Https, Ftp ), Secure payment systems ( Set, 3D Secure )
    • Data transmission security issues:
      Sniffing, Spoofing
    • Data transmission Prevention methods:
      Firewalls, Encryption
    • Two types of compressions:
      Lossy, Lossless
    • Two types of codecs:
      Hardware and software
    • Two types of online systems:
      Cloud storage, cloud computing
    • Systems that enable remote working:
      Vpn, Remote desktop technologies
    • Factors affecting choosing online systems:

      Security, cost, ease of use, features, connectivity
    • Online communities:
      • Social media
      • Blogs, microblogs, vlogs
      • wikis
      • chatrooms
      • instant messaging
      • Forums
      • Podcasts
    • Implications of online communities ( Individuals ):
      User experience, Meeting needs, cost, Privacy, Security
    • Implications of Online communities ( Organisations ):

      Employee and customer Experience, customer needs, cost, implementation, Replacement or integration with current systems, Productivity, working practices, security
    • Threats to data:
      Malware, Hackers, Phishing, Accidental damage
    • Protecting data techniques:
      File Permissions, access levels, backup and recovery procedures, passwords, physical access Controls, Digital certificates, Protocols
    See similar decks