100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary IEB Grade 12 Information Technology Theory Terminology List

Rating
-
Sold
4
Pages
24
Uploaded on
17-11-2021
Written in
2021/2022

An easy to read table, including a succinct definition and description for every term, ordered alphabetically. Each definition and description is coming straight out of the textbook to ensure maximum validity and accuracy. All units being examined are included. This is written according to the IEB 2021 SAGS document and was compiled by a 91% IEB IT student.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 17, 2021
Number of pages
24
Written in
2021/2022
Type
Summary

Content preview

GRADE 12 : IT TERMINOLOGY LIST


32-bit – a processor with registers this big will process 64-bit numbers in two
stages, twice as slow as a 64-bit register processor, and can handle less addresses
to send to, send less data over the data bus.

3G – The 3rd generation of cellphone data access technology. Enables internet access

4G (LTE) – The 4th generation of cellphone data access technology. Enables ultra-
broadband Internet access.

64-bit – A processor with registers this big will process 64-bit numbers in one stage,
an address bus
this big can send to more locations and more data can be sent over a data bus with
this size

Abstraction – act of representing essential features without including background
details. It is a technique of creating a new data type that is suited for a specific
application. Only displays essentiall information and hides other details.

Access Modifier – public (+) private (-) protected (#)

Accessor – Typed Accessor Getter (TAG)

Activation codes – Used in software licensing. Know open source, proprietary,
freeware vs
shareware etc.

Adobe Flash – Know about RIA’s and plugins.

Address Resolution Protocol (ARP) – resolves the IP addresses to the address
used in the LAN by Ethernet

Adobe Reader – As this is machine independent, this guarantees the sender will
see it, read only, it
is free to download the reader.

ADSL – Asynchronous Internet access, faster downloading than uploading.
Permanent digital connection to the internet using a telephone line. Different
packages and bandwidth specifications available from service providers. Used for
small or large networks

Adware – Malware in terms of adverts, comes through the browser/phone apps, e.g
pop ups, it is
unsolicited (never asked for it).

Android – An open source operating system. An example of FOSS (Free and Open
Source




1

,Software).

Asynchronous JavaScript and XML (AJAX) – a technique for creating fast and
dynamic webpages which updates parts of a webpage, without reloading the whole
page

Anomalies – Insert, delete, and update anomalies in normalization in databases.
Know definitions
of them from book.

Anti-virus software – Defends your PC against malware (used with a firewall,
firewall is NOT anti- virus software, firewall prevents other people getting in).

API – Application Programming Interface, gives details about classes and methods in
those classes.

Applications – Sits above the OS in the onion model of System Software.



Archive – This utility involves compression and generally moving the data to
another location once
compressed.

Array – collection of variables of the same type. When you need to store a list of
values, such as numbers, you can store them in an array, instead of declaring
separate variables for each number.

Artificial Intelligence – Software designed to emulate human thought, related to
the Turing test (which tests to see if an entity is intelligent).

Assembler – The software/program that turns code into a low level language like
machine code (assembly language). Interpreters turns high level language into low
level language line by line, so code will always run, up until the error, unlike
compliers, which won’t run if there is a syntax error.

Asymmetric Encryption – The key to encrypt plaintext into cipher text is not the
same as the key
to decrypt that cipher text back into plaintext.

Attenuation – A problem associated with copper cables, signal degrades over
distance, a repeater fixes this problem by boosting signal. Linked to crosstalk, EMI,
eavesdropping.

Attribute – A variable/field/property in a class.




2

, Audio and Video on Demand (AVOD) – TV on demand, can either be streaming
or download and match, e.g. DSTV Catchup/Box-office


Audit trails – can identify changes to the data since the data was corrupted
provided the audit trail is stored in a separate place to the faulty hard drive

AUP – Acceptable User Policy, example on page 131 in Gr 11 book. Defines the rules
in which a
user of a certain computer service must use that service.

Backup – A copy made of data, in case the original data is lost. Usually stored
externally from the original data (if back up of file made on the same machine of
the file, and that machine is destroyed, the original and they backup will be lost.

Bandwidth – The maximum carrying capacity of a channel (wired or wireless),
measured in a rate of data per second.


Biometrics – Using unique biological characteristics to identify a human.




BIOS – Firmware (=software that does not change on a chip). Stored on ROM
memory, runs the POST (Power on Self Test) software, gets the data to run the POST
software from the CMOS memory (e.g. user/personal settings) – Unified Extensive
Firmware Interface (UEFI) replace BIO – faster boot time, provides a GUI
(navigation with mouse), supports larger drives

BitTorrent – Peer – to – peer protocol used to share large files over a network. You
can download a file from anyone who has the smallest part of that file on their
computer. Seed (you are not downloading from one place), bottleneck at server can
occur so someone (the seed) downloads the complete file, and then people download
from the seed instead of the server.
Benefits – many users can download a file quickly (increase spend because not
overloading single server), reduces cost to host ( no single host pays for millions of
people downloading from their server), forces equality in sharing (when you run the
software people download from you), Offers effective use of available download
bandwidth, Client software usually free.
Risks – infected files/malware (BitTorrent client guarantees that the file has not been
altered from when the torrent was crated but it could have been infected before. Run
malware scan on files first & infected files usually found + deleted quickly), make
piracy easy, not anonymous ( does not prevent anyone from seeing your IP address
and file you download, can be traced back to you)

Blockchain – decentralized technology spread across many computers that manages
and records transactions. New transaction is requested, once verified, it is combined
with other transactions to make up a black of data In the ledger


3

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
hannahmoore3 University of Cape Town
View profile
Follow You need to be logged in order to follow users or courses
Sold
122
Member since
4 year
Number of followers
97
Documents
32
Last sold
1 month ago

3,7

22 reviews

5
12
4
2
3
1
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions