R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth-...

33
0 R001 Understanding Computer Systems- Revisions MISS L GEORGE EGA ICT DEPARTMENT Exam Date: Tuesday January 14 th , 2014 Morning

Transcript of R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth-...

Page 1: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

0

R001Understanding Computer Systems- Revisions Guide

Miss L GeorgeEGA ICT Department

Exam Date:Tuesday January 14th, 2014

Morning

Page 2: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Year 11GCSE Mock Examinations

December 3rd 2013ICT

Theory Exam Tuesday 3rd December 2013 (1Hr)

Theory Content R001- Understanding computer systemsLO1

Hardware devices –portable & non-portable Input/output devices System software Application software Storage and connectivity of devices Assistive technology Using Technology to monitor and track

LO2 Data capture methods File formats Validation and verification Data storage and transfer Back-ups and recovery systems

LO3 Business communications Diary management software Collaborative documents

LO4 Moral and ethical issues of using ICT in business Computer use legislation the implications and consequences of data loss, corruption and theft Threats to the security of data; Using automatic and manual updating facilities for operating systems and security

software

Useful Websites/resources

egaict.wikispaces.comwww.teach-ict.comBBC BitesizeTeaching notes on The S Drive (student on EGA area)Notes in your exercise books

Revision / Intervention

Sessions

After school -3:15-4:15Thursday 7th January : 11C[LGE] and 11D[SSH]Friday 8th January: 11A[SSH] and 11B[LGE]Tuesday 14th January: Revision Breakfast -3rd floor hall

Teacher Contact for Support

Miss George [LGE] – Room 3.11Mr. Shum [SSH]- Room 3.44

1

Page 3: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Revision Tips

What are some good methods to use?? Revise, Revise, Revise

Revise with a friend and test your self

Do practice papers/questions then compare your answers to the mark scheme

Create flash cards for key definitions, include images

Do a little revision, often (30 minutes a day)

Download the Cambridge Nationals Revision app for Iphone and Android

Tips for the long answer question1. Always give both sides of the argument (for and against)

2. Aim to give at least 2- 3 points for each side

3. Use full sentences, even if you have a bulleted list

4. Use some relevant ICT key terms

Spotting Key words and what they mean

State- simply give the answer

List – no need for a paragraph or full sentences. Make a list of the answers

Describe- Say what the answer is and describe by giving an example

Explain – Use the PEE (Point, Evidence, and Explain) process

Tips for completing the paper

Answer ALL questions

Read each question at least twice

Look at the number of marks allocated to the question and make sure you at least give the same number if matching points

Answer the questions you know first, then go back to the ones you are not quite sure about

Do not leave any blank spaces

2

Page 4: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Cambridge Nationals in ICT Unit 1 – “Understanding Computer Systems” – 14th Jan 2014 9:00am release topics

Topic Understood? Maybe…LO1 – UNDERSTAND HOW ICT CAN BE USED TO MEET BUSINESS NEEDS1 How ICT is used by individuals and businessesHow ICT is usedThe difference between desktop and portable systemsPortable computer systemsAdvantages and disadvantages of different types of computer systemInput devicesOutput devicesStorage devicesConnectivity devicesChoosing and configuring systemsUsing computer systems and devices for remote workingSystem softwareApplication software (revise database software in particular)2 Factors affecting the choice of systemHow various factors affect the choice of a computer system3 Connecting peripherals to a computer systemsConnecting computer peripherals4 Connecting to a wireless networkConnecting devices to wireless networksRemote access to networks5 Monitoring of employees by organisationsMonitoring employeesLO2 – KNOW HOW TO WORK WITH INFORMATION AND DATA TO MEET SPECIFIED BUSINESS NEEDS1 Data capture methodsDataHow data is capturedPaper forms and online formsAutomated data capture

Most likely topics are highlighted in green

Topic Understood? Maybe…2 Storing dataFile formats (revise open file formats and pdf document file format in particular)Data security3 Data transferData transferring technologiesFactors affecting the choice of data transfer methods4 Backups and recoveryBackupsFactors affecting the choice of backup methodLO3 – KNOW HOW ICT CAN BE USED TO SUPPORT BUSINESS WORKING PRACTICES1 How businesses can communicate with employees and others working remotely

3

Page 5: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Communication methods and how they support businessesAdvantages and disadvantages of communication methodsEmail and email etiquette2 How diary management software can be used to organise work schedulesDiary management software (DMS)3 Creating and editing documents collaborativelyCreating and editing documents collaborativelyLO4 – UNDERSTAND HOW LEGAL, ETHICAL, SAFETY AND SECURITY ISSUES AFFECT HOW COMPUTERS SHOULD BE USED1 How legislation affects business computer usersComputing legislation and the CMAHealth and safety legislationThe Data Protection Act (DPA)The Copyright, Designs and Patents Act2 How moral and ethical issues affect business computer usersPersonal data and cyber bullyingMonitoring of individuals by organisations3 The implications and consequences for organisations of data loss, corruption and theftData loss, corruption and theft4 Threats to data securityThreats to data securityActions to minimise risksAutomatic and manual updating facilities for operating systems and security software

Most likely topics are highlighted in green

4

Page 6: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

LO1: Understanding how ICT can be used to meet business needsHardware devices –portable & non-portable (desktop Computer systems)

Desktop computer systems are usually found in office environments. They are usually to large and heavy to move from place to place.

Portable devices are computer devices that allow you to work on the go. They tend to be small and lightweight; easy to carry around.

Examples include:– Laptops – Netbooks – Mobile phones – Tablets (I pad, Android Tablet) – handheld consoles (PSPs)– Media players (e.g. iPods, mp3 or video players)

Features of some portable devices

Input/Output/Storage/connectivity devices

INPUT DEVICES- allow you to enter data into a computer system

OUTPUT DEVICES- allow you to get information from a computer system

STORAGE DEVICES- These allow you to save work created on a computer system5

Page 7: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

CONNECTIVITY DEVICES- These allow computer system to connect up to a network such as the InternetBelow is a table that shows you some examples of devices that come under each category

INPPUT OUTPUT STORAGE ConnectivityKeyboard printer CD R/CD RW ModemMouse Monitor/screen DVD R/ DVD RW RouterMicrophone touchscreen USB Drive Wireless RouterWebcam speakers Desktop Hard Drive Wi-Fi

dongle/Wireless NICJoystick headphones External Hard Drive Network Card (NIC)Game controller Projector SD card Switchtouchscreen Interactive whiteboard Floppy Disk* Wireless Access

Point (WAP)Touch screen stylus/pen Graph Plotter Magnetic TapeScanner Laser Cutter Solid Sate DriveKey padTouch padSpecialist keyboards (braille)Remote controlsBar code reader/scannerChip and Pin readerMagnetic Strip readerMIDI (connects musical instruments to computer systems using specialists interface)Camerasensors

Tip: Can you find any other INPUT/OUTPUT or STORAGE devices?

More examples with images

6

Page 8: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Storage and connectivity of devicesStorage capacity: how much space a storage device has available

Different storage devices use different methods to save data. The Four main methods are Optical : CD , DVD , Blu-Ray Magnetic: magnetic tape, floppy disks, cassettes, some desktop hard drives Solid State (no moving parts!!): USB, SD cards Cloud Storage: google drop box, I cloud, sky drive

Peripheral devicesA computer peripheral is a device that is connected to a computer system but is not part of the computer system itself/ examples include printers, scanners, cameras, etc.

Wired peripheral Wireless peripheralUSB (universal serial bus) cable: allows fast data transfer

Wi-Fi- no physical cabling needed, easy to transfer but can be slow, can have large bandwidth

7

Floppy disk (now obsolete) - 1.44 MB CD - 700MB DVD - 4.7GB (4,812.8MB) Blu-Ray- 25GB (25,600MB

Page 9: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Firewire: high speed connection similar to USB. More expensive and less popular

Bluetooth- requires devices to be paired and use a password key; low bandwidth so can send limited amounts of dataInfrared- need devices to be very close, usually 1 metre

Connecting to a wireless networkYou need a network name [SSID: Service Set Identifier] and a password [network key/security key]

Assistive technology: another word for this is AccessibilityThis is when computer systems are adapted in a way that would allow users with a physical disability to use themAssistive Technologies come under two categories

– Devices– Software and software settings

Accessibility Devices

Accessibility Software

8

Page 10: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

SoftwareMost business would run some sort of

1. Operating System2. A range of Application software

They can choose to use one of two types of software1. Paid for software e.g. windows, Microsoft Office Suit2. Free/open Source software e.g. Linux

System SoftwareSystem software refers to the operating system and all utility programs that manage a computer.

Types of System Software• Operating System

– (Windows, Mac OSX, Android etc.)• Utility Software

– Anti-Virus Software– Disk Cleaners– File Managers– Screensavers– Disk defragmenters– File encryption software– Backup Software– Archiving Software

• Drivers and Firmware

Application softwareApplication software is software that causes a computer to perform useful tasks beyond the running of the computer itself. Software applications are often called programs, applications or apps.

9

Page 11: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Types of Application software• Word processors• Desktop publishing software• Spreadsheets• Database management software• Multimedia software• Gaming software• Web browsers• Apps for portable devices• Presentation software• Photo-editing software• Video-editing software• Graphics manipulation software• Communications software

• Social networking• Chat rooms• Instant messaging• Email• File transfer/file sharing

Choosing a computer systemThe computer systems that large businesses and organisations choose for their employees are crucial. The following four factors affect these choices

1. Cost: too cheap or too expensive2. Availability: can you get more of the same if you need it?3. Suitability for user needs: will it be used in an office of on the go?4. Data security: how easy is it to keep your data secure on this system

Configuring computer systemsThese types of computers will have

A suitable sized monitor that is adjustable Ergonomic keyboards suitable for long periods of typing A mouse Large and fast Hard disk capacity DVD.CD rewriter to load software and make backups/archives Ability to connect to the network and Internet (network card) Suitable desk space to hold all components

Software in offices can be configured in the following ways Changing the language Adjusting time and date

10

Page 12: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Adjusting the screen resolution (useful for some visual impairments, dyslexics and colour blindness The size and colour of text on screen The arrangement of icons or window displays Enlarging/zooming in on sections f the screen Audible warnings- text to speech and speech to text

Monitoring an trackingMany companied use different technologies to track both their employees and company owned devices/vehicles.

GPS – Global Positioning system. Uses four satellites for accurate positioning. Each satellite receives signals from the device that is used to calculate the position on the earth’s surface.

Electronic Tagging- uses a device that is monitored by a base unit. The base unit alerts authorities if the tag goes out of range

RFID- radio frequency Identification- is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information

Internet and Email Monitoring- companies may; block inappropriate websites from use, scan emails to ensure that no viruses or inappropriate words are used and keep automatic records and backups of all emails that are sent or received by the company systems

Company Policy- companies will have a policy about the way employees use the internet, telephone and email. They must inform their employees that their use of Internet and communications is monitored.

LO2: Knowing how to work with information and data to meet specific business needsData capture methods

ManualUse either paper based or online data capture forms

Paper based• Usually pre-printed • Include instructions as to how to fill it out• Includes questions and prompts with

spaces for the answers• Often include examples of how the data

should be entered• Can be completed by either a member of

staff asking questions or by the customer/client

Online• Used to enter data directly into a

computer system.• Often used over the Internet via websites• Useful for collecting new customer

details

11

Page 13: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Paper Based Data Capture Form Online Data Capture Form

Examples

AutomaticThis method uses sensors such as temperature sensors and camerasExamples include

Barometers, rainfall gauges and temperature sensors that collect data used in weather predictions Speed cameras that collect data about speed as well as an image of the vehicle

12

Page 14: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

When designing a data capture form you have to pay attention to a few things– The format of the data– The number of spaces available to enter data– Examples of how data should be entered– Clear and simple instructions

This will make sure that data is entered in a suitable format

Factors that affect the Data capture method that you choose• The factors include

– The nature of the information- is it text, numbers, etc– Location of the information- is it from a place that could be dangerous for humans, Can it be done easily

by a machine, freeing up staff to do other jobs– The cost of collection- does the business have resources to develop expensive online media, is the

business large or small– The method of collection (paper based forms)-costs to print, buy paper, pay staff for data entry and

data checking, can be difficult to read hand writing– Analogue & Digital collection- analogue data must be converted to digital data for use by computer

systems. Sensor collect data in analogue and use an analogue to digital converter in order to send it to the computer system

– The security of the Data- all data collected must be kept secure (Data protection Act), must prevent; loss or damage, unauthorised access

File formats

13

Page 15: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Validation and verificationValidation checks that data entered is of the right type

Some common validation checks include:o Presence check- has data been enteredo Data type check- is data of the correct data typeo Format check- is the data in the correct format, e.g. dd/mm/yyyyo Range check- is data within the limits that have been seto Character check-make sure only allowed characters are entered, e.g. Post codes cannot contain # or @o Check digit- is added to a number that has been calculated form a collection of digits. When the digits,

example a bar code, is read the check digit is re-calculated to make sure it has been read accurately

Verification checks that data is entered exactly as it is shown on the original data capture sheetThere are two methods

Proof reading- suitable for small amounts of data Double entry- suitable for large amounts of data

o Data is entered twice by two different people and then compared by the computer for accuracy

Data storage and transfer

Data types

14

To do: research the following methods used to capture and store data Matrix Bar codes

RFID tagsNFC (near field communications)

Page 16: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Data SecurityData can be kept secure by

Using a robust back up system Using passwords to protect saved files and

folderso User different user access rights

and permissions (read only/read-write/etc)

Using encryption when transferring information

Physical security – locked doors, RFID tags on equipment, etc

Back-ups and recovery systems

Back-ups: copies of files and documents that are currently in use. Backups are made regularly and stored away from the computer system

Back up frequency: will depend on the size of the business and how important the data is. Most companies will make backup every day. Banks make back-ups every few minutes so that data is up to date

At home or at school you can do backups less frequently but you should back up important documents such as school work regularly in case of loss.

Archives: copies of documents and files that are not currently being used but need to be stored for referencing purposes. These are made at longer intervals

Factors affecting the choice of method for backup or archive

15

Page 17: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

LO3: Knowing how ICT can be used to support

business working practices

Business communicationsCommunication is

very important in any business. Some common communication methods include Telephone SMS text messaging Email VOIP (voice over Internet Protocol) e.g. SKYPE Instant Messaging Chat rooms Forums Bulletin Boards Video Conferencing Blogs Webcams

16

Page 18: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Social Networking

Advantages and disadvantages if different methods

17

Page 19: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Diary management software

18

Page 20: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Diary management Software is useful for employees who work remotely as they can use it to coordinate their diaries with other colleagues

Diary Management software (DMS) allows you to complete the following tasks:1. Create Meetings and appointments- creates a list of all those who are attending, also shows clashes and suggest

alternatives2. Invite Participants- will email those participants who need to attend a meeting3. Create tasks and Projects- can create a list of tasks with who is mean to complete it, the priority of the task and

the deadline for it. Some DMS will allow you to create tasks for others. Tasks lists can be shared4. Create to-do lists- usually small tasks that need to be completed and d can be used as reminders. 5. Set Reminders-can automatically remind a user of an appointment/meeting. Reminders can also be attached to

a task6. Share diaries- some allow employees to share their diaries or to keep some things personal

Collaborative documentsSome examples of business Documents include:

Letters Memo Invoices Order Forms Websites

19

Page 21: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Reports Presentations Leaflets/Brochures

These may be for internal or external use. They may also be formal or informal

Ways that you could collaborate on a document

1. Put it in a shared area for shared accessa. Shared area on networkb. Use of a cloud service

2. Sharing Documents – allows more than one person to work on a document at the same time3. Inserting Comments into draft documents- This is a feature of a word processor such as MS Word. It allows you

to add comments to a draft document. This could be used to provide feedback to other employees who are also working on the same document

4. Editing and Tracking changes- This is a feature of a word processor such as MS Word. This allows people to edit and make changes to a document. The changes are tracked by being highlighted in a different colour. Tracking highlights insertions, deletions and corrections. More than one person can edit and track a document at the same time

The version of the document that has all the tracking is known as the Mark-up version

5. Reviewing a document- each suggested change made and tracked can be accepted or rejected by the creator of the document

20

Page 22: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

LO4: Understanding how legal, ethical, safety and security issues affect how computers should be usedMoral and ethical issues of using ICT in businessThe increased use of computers and the Internet means that users need to be aware of moral and ethical issues. These include things like;

The use and abuse of personal and private data – this is governed by legislation but is of great concern to those whose information is kept

Cyber bullying- using Internet and technology to cause harm or intimidate another

Monitoring of individuals by organisations – it may be important for employers to monitor the tasks that their employees do. Tools used for monitoring include CCTV, swipe ID badges, RFID id badges, etc.

Call monitoring/recording – most companies record phone calls to and from the business

Cookies-

Key logging - a key logger is a piece of hardware or software that logs the real time key strokes of a computer user

Electronic costumer surveillance – many retail businesses offer a loyalty card scheme. This allows them to keep track of what a customer buys and where. Every time a purchase is made the loyalty card number is captured. Businesses may use this information to send vouchers and promotions to these customers

Mobile Phone positioning – use 3 mobile phone masts to triangulate the mobile phone position. GPS may also be used. This technology can be used by emergency services such as fire, police and ambulance to find the location where a call was made. The flip side is that this can invade the privacy of the mobile phone user

21

Page 23: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Computer Use legislation

There are four main areas of law that relate to the use of computers in the UK1. Health and Safety2. Computer Misuse3. Copyright and Patents Act4. Data Protection Act

Organisations are required to comply with all laws affecting the use of computers in the workplace and to keep up to date with any changes.

Health and Safety regulations state that Employers must6. Analyse workstation, assess and reduce risks7. Ensure that workstation meet minimum requirements8. Plan work so that there are breaks or changes to activity9. Arrange and pay for eye tests and glasses (if special ones are need)10. Provide health and safety training and information

Health risks associated with the use of computers Eye strain- make sure the screen is not too far away or too dim/too bright. Take regular breaks RSI (repetitive strain Injury) - repetitive actions can cause this. Also known as carpel tunnel syndrome Headaches- caused by issues with vision or poor ventilation Neck and Back strain- cause by poor posture. Ensure you use a back and height adjustable chair

Physical Safety

Employees should make sure that they Use proper chairs that have back support and are height adjustable

22

Page 24: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Do not eat or drink around the computer Do not tamper with cables and equipment Place computer equipment so that it does not fall or get knocked over Take care of their own health and safety and the safety of others

Data Protection ActThis law protects the owners of data and not the data itself. There a 8 principles (see BBC Bitesize)

Data must be:1. fairly and lawfully processed (used) 2. used for limited purposes 3. adequate and relevant, only what is needed may be used 4. accurate 5. not kept for longer than is necessary 6. accessible to the individual and able to be corrected or removed where necessary 7. secure 8. not transferred to countries without adequate protection

Copyright, design and Patents ActThere are three main ways in which this act is broken

1. Using software without the correct software license2. Downloading files illegally from the internet3. Copying and sharing music, CDs DVDs and software

Computer Misuse Act

23

Page 25: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

There are three main parts to this act1. Unauthorised access to computer materials2. Unauthorised access with intent to commit or facilitate the commission of further offences3. Unauthorised acts with intent to impair or with recklessness as to impairing the operation of a computer

The implications and consequences of data loss, corruption and theft Businesses rely on the data it stores to keep the business running. Therefore data s lost, stolen or corrupted can have a serious impact

Legal implications- the DPA and Computer misuse act are the main legislations that apply to the use and security of data in computer systems

Threats to the security of data

24

Page 26: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Steps to reduce the risk

Use different password for different websites/accounts

Check websites for the padlock symbol Do not open unsolicited emails or emails

from unknown senders Use a firewall Anti-virus software Anti-Spam software Data encryption software

Using automatic and manual updating facilities for operating systems and security softwareIt is important that software is kept up to date. Most software creators will make changes or fixes to their software after the software is released.

Automatic updates- many operating systems have a built in facility to automatically update software, usually at shutdown or start up times.

Some security software also update in real time (when to computer is connected to the Internet)

The advantage: The user does not have to remember to update or have to fiddle with any of the software settings

Manual update of software- Manual update of the operating system or security software can be dangerous because if the user forgets them the system may be left vulnerable to threats. For example, if a security software update is checked at 5pm but a new virus is released overnight, that system may be vulnerable to attack for the whole of the next day

25

Page 27: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Disadvantage: updates may take a long time. If updates are set for times when the system is shut down or off line, they may never get done

Advantage: the user can look at update before applying them to see if they are necessary

GlossaryHardware- The physical components of a computer system that you can see and touch

Software- The computer programs or applications that you use to complete tasks on the computer system

Hot-desking- where employees may share a desktop computer system by using the same computer but at different times

Tailor made software (Bespoke) is software that is made to the specifications of a client. In other words it is custom made, bespoke, or 'tailored' to address a specific need. This kind of software can be expensive as it has to be designed by a team who are making software to specific needs for a specific organisation.

Off the shelf software is more general and produced for the masses. Although it probably also costs a lot of money to make, it is cheaper to buy because it can be bought by anyone.

Bandwidth- is the maximum amount of data that can travel along a communications channel in a given time.

Firewall- is software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set

User ID – this is a username that identifies a person as being authorized to use a network

Password- this is usually used with a User ID to identify and secure data on a network. May also be applied to individual files and folder or as a security to connect to a wireless network

Encryption- is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can

Data- is raw material that has not been processed and has no meaning

26

Page 28: R001 - WikispacesRevision+…  · Web viewAnswer the questions you know first, ... Bluetooth- requires devices to be paired and use a password key; ... - This is a feature of a word

Information is data that has been processed and is now meaningful

Data transfer means sending data from one place to another

Device- physical equipment

Implication- the impact, consequence or effect of an action

Capture- to collect data

Feature- a tool that allows you to perform specific tasks

Draw back- disadvantage or negative consequence

Database – software that allows you to store large amounts of data in an organised way e.g. MS Access Features: tables, Queries, Reports, Forms, Validation

Spreadsheet – Software that allows you to perform calculations and create graphs using numerical data e.g. MS Excel Features: calculations, sorting & filtering, graphs

27