keywords

Description

Flashcards on keywords, created by Lee Smith on 15/05/2017.
Lee Smith
Flashcards by Lee Smith, updated more than 1 year ago
Lee Smith
Created by Lee Smith almost 7 years ago
5
0

Resource summary

Question Answer
Data raw facts and figures before they have been processed
Information Data + [structure] + [context] + Meaning
Knowledge the application of information to a situation.
Boolean can contain only one of two values. True / false. • Male / female • Yes / no
Real contains numbers with decimals places. • 45.78 • 123.456 • 12.00
Integer - contains whole numbers with no decimal places. • 45 • 125 • 1250
Text / string - alphanumeric character. Includes numbers, text and symbols. • 12345 • Examination • 123GD56 • M10RDY
Direct collected form an original source. Often easiest to think of it as data that has been physically collected by you.
Indirect (secondary) People / companies involved in collecting the data are different to those using the data. For example, people who conduct market surveys and then sell the results to other companies who use it in advertising
Static data data once created does not change. For example, CD-ROM.
Dynamic data can be changed and updated once created. For example, a Website.
Encoding data Taking the original data and storing it in a different a different representation. E.g. shorthand or putting it into code.
Validation Ensures that entered data is: - Sensible - Reasonable - Within acceptable boundaries - Complete
Verification making sure that the information on the source document is the same as the information as the object document.
Range checks checks the upper and lower boundaries for the data. Data entered must lie between these two boundaries, e.g. a school student must be between 3 (lower boundary) – 18 (upper boundary).
Type checks checks that data entered is correct type. E.g. if you try to enter text into numeric field it will be rejected.
Presence checks i.e. required field on a website.
Length checks when data is entered it has a length. Ensures that data cannot be more than a set number of characters.
Lookup checks this is where data is cross-referenced against a list to make sure that it is valid and acceptable. E.g. a postcode can be checked against a list of properties.
Picture checks (format checks) some data might be a combination of numbers and letters and therefore the type check could not be applied. However, the location of the letters or the numbers may be in the same position every time. E.g. a postcode.
Check digit used to calculate and verify the barcode. The check digit is the last digit.
Backing up making a copy of the current data so if there is a system failure you have copy of all the data.
Archiving for long term storage that is not required immediately and is often not required at all and therefore deleted off the system. This process is done when the files are no longer needed, but should be readily available if needed so they cannot be permanently deleted.
Dot Matrix This means there is physical contact between print head and the paper through an inked ribbon. Colour and black & white.
Inkjet spray ink on paper and are relatively quiet. Colour and black & white. Cheap to run. Used in homes and offices.
Laser high resolution non-impact. Quality in both colour and black & white. Running costs are high. Used mainly in businesses and often found in homes.
Plotters mechanical device which produces printout using vector or coordinate graphics. E.g. maps and building plans.
Operating system controls the allocation and use of hardware resources, such as, memory, CPU time hard disk space and peripheral devices. E.g. Microsoft Windows, Apple.
User interface small program that assists in the monitoring and the maintaining of the computer system. E.g. virus checks.
Application software allow computer to be used to solve particular problems and perform particular tasks for the end user. E.g. spreadsheets and databases.
Wizard assists the user to produce the final product. E.g. document, mail merge.
Templates - provides standard pre-set layouts and formats. Includes: • Character formatting – font size, colour, type etc. • Page formatting – margins, size, layout etc. • Text inserts – standard words, date, time etc. • Graphic inserts – standard logo, position etc.
House styles - Recognition by clients and customer - Pre-defined colours / fonts style and sizes - Consistency across all company documentation - Achieved by using: • Master documents / slide – enables a team of people to work on the same presentation separately. • Styles – help user apply formatting to a document. • Style sheets – used to describe the format that should be applied to a document. • Templates – produce the different documents that can be used by the company.
Tables contains data about ‘things’. E.g. students, orders etc
Record a single row within a table. Collection of data about a single item or event. Made up of fields.
Field individual data item within a record. Each field within a record should have a unique name. Should only contain a single data item.
Normalisation process applied to the data structures which decreases redundancy and increases integrity
Data dictionary - Database about a database - Contains design details about the database - Includes: • Tables name • Field name • Data type • Length • Validation • Relationships • Security.
Mail merge It allows the user to create and send a personalised version of the same document to many different people. Generally done with a wizard. A data source is created containing all the information to be included in the document.
Bitmap images –images which are made up of pixels.
Vector graphics stored as geometric-based data. Mathematical data that defines the key properties of every element in the graphic (length, colour thickness etc.).
Linear presentation slides are shown in a pre-determined order and in which any jump out of this sequence is not allowed. Follow ordered line from the beginning to end.
Hierarchical presentation allows different, but pre-determined, slides to be jumped to from a slide depending on an option selected. Only jump to those in path.
Data Protection Act (1998) passed to protect individuals from organisations. Limits the data held by individual organisations to only that which they need. It was meant to stop organisations holding a lot of data about people which they don’t need.
The Computer Misuse Act (1990) protecting data from hackers. Main provisions: - Unauthorised access to computer material. - Unauthorised access which could be gained to access the user account and use it to transmit illegal material. - Unauthorised act with intent to make changes. - Making or supplying or obtaining articles for use in computer misuse offences – involves software that modifies original code.
The Copyright, Designs and Patents Act (1988) makes it illegal to steal or create unauthorised copies of software. Also covers manuals, books, CDs and music.
The Regulations of investigatory powers Act (2000) addresses concerns about the use and misuse of communication interception techniques by public and private organisations. The Act allows legal interception of postal, telecommunications and digital communications. Criminal offence to monitor communications (includes calls, email, post etc.) without lawful authority (when businesses use their own telecommunications for purposes relevant to the business).
The Electronic Communications Act (2000) legal framework so that people can be sure about the origin and integrity of communications. Allows Government to set up a register of ‘approved cryptography suppliers’ (cryptography service providers). Recognises digital signatures, which are now admissible law (facilitation of electronic commerce, data storage).
The Freedom of Information Act (2000) deals with access to official information that is being able to find out information on any topic from any public authority. Act applies to: public authorities; health services; schools and police. Act allows anyone to make a request to see their information. Must send letter with what information you want, name and address, and description of what you want. Usually free, sometimes at a fee.
Firewalls hardware and / or software gate between two networks or between a system and a network that filters the data transferred based on security policies. Used on computers that connect to the internet to prevent unauthorised access to the system or network the computer is part of.
Professional body Formal group that is set up to oversee a particular area of industry. The main professional bodies that oversee ICT industry are: BCS – The Chartered Institute for IT (UK) and the Institute of Electronics Engineers (worldwide). Perform variety of roles and offer their members many benefits.
Deep vein thrombosis (DVT) Blood clot, usually in the leg
Repetitive strain injury (RSI) Chronic pain experienced in the arms, shoulder or back
Carpel tunnel syndrome Pressure on the median nerve in the wrist
Show full summary Hide full summary

Similar

LOGARITHMS
pelumi opabisi
C1, C2, C3 keywords
Jessica Phillips
3.1 Keywords - Marketing
Mr_Lambert_Hungerhil
Command Words
Mr Mckinlay
Key word flashcards
I M Wilson
atoms and elements
Danoa400
Medicine Through Time - Keywords
Lara Jackson
The Muscles in the body
Thomas Marshall
Business Studies - AQA - GCSE - Business Studies Key Terms
Josh Anderson
Chemistry, Unit 1
greenchloe1998
cells
joesmith20