100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Summary IEB Grade 12 Information Technology Theory Terminology List

Puntuación
-
Vendido
4
Páginas
24
Subido en
17-11-2021
Escrito en
2021/2022

An easy to read table, including a succinct definition and description for every term, ordered alphabetically. Each definition and description is coming straight out of the textbook to ensure maximum validity and accuracy. All units being examined are included. This is written according to the IEB 2021 SAGS document and was compiled by a 91% IEB IT student.

Mostrar más Leer menos
Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado
Schooljaar
3

Información del documento

Subido en
17 de noviembre de 2021
Número de páginas
24
Escrito en
2021/2022
Tipo
Resumen

Temas

Vista previa del contenido

GRADE 12 : IT TERMINOLOGY LIST


32-bit – a processor with registers this big will process 64-bit numbers in two
stages, twice as slow as a 64-bit register processor, and can handle less addresses
to send to, send less data over the data bus.

3G – The 3rd generation of cellphone data access technology. Enables internet access

4G (LTE) – The 4th generation of cellphone data access technology. Enables ultra-
broadband Internet access.

64-bit – A processor with registers this big will process 64-bit numbers in one stage,
an address bus
this big can send to more locations and more data can be sent over a data bus with
this size

Abstraction – act of representing essential features without including background
details. It is a technique of creating a new data type that is suited for a specific
application. Only displays essentiall information and hides other details.

Access Modifier – public (+) private (-) protected (#)

Accessor – Typed Accessor Getter (TAG)

Activation codes – Used in software licensing. Know open source, proprietary,
freeware vs
shareware etc.

Adobe Flash – Know about RIA’s and plugins.

Address Resolution Protocol (ARP) – resolves the IP addresses to the address
used in the LAN by Ethernet

Adobe Reader – As this is machine independent, this guarantees the sender will
see it, read only, it
is free to download the reader.

ADSL – Asynchronous Internet access, faster downloading than uploading.
Permanent digital connection to the internet using a telephone line. Different
packages and bandwidth specifications available from service providers. Used for
small or large networks

Adware – Malware in terms of adverts, comes through the browser/phone apps, e.g
pop ups, it is
unsolicited (never asked for it).

Android – An open source operating system. An example of FOSS (Free and Open
Source




1

,Software).

Asynchronous JavaScript and XML (AJAX) – a technique for creating fast and
dynamic webpages which updates parts of a webpage, without reloading the whole
page

Anomalies – Insert, delete, and update anomalies in normalization in databases.
Know definitions
of them from book.

Anti-virus software – Defends your PC against malware (used with a firewall,
firewall is NOT anti- virus software, firewall prevents other people getting in).

API – Application Programming Interface, gives details about classes and methods in
those classes.

Applications – Sits above the OS in the onion model of System Software.



Archive – This utility involves compression and generally moving the data to
another location once
compressed.

Array – collection of variables of the same type. When you need to store a list of
values, such as numbers, you can store them in an array, instead of declaring
separate variables for each number.

Artificial Intelligence – Software designed to emulate human thought, related to
the Turing test (which tests to see if an entity is intelligent).

Assembler – The software/program that turns code into a low level language like
machine code (assembly language). Interpreters turns high level language into low
level language line by line, so code will always run, up until the error, unlike
compliers, which won’t run if there is a syntax error.

Asymmetric Encryption – The key to encrypt plaintext into cipher text is not the
same as the key
to decrypt that cipher text back into plaintext.

Attenuation – A problem associated with copper cables, signal degrades over
distance, a repeater fixes this problem by boosting signal. Linked to crosstalk, EMI,
eavesdropping.

Attribute – A variable/field/property in a class.




2

, Audio and Video on Demand (AVOD) – TV on demand, can either be streaming
or download and match, e.g. DSTV Catchup/Box-office


Audit trails – can identify changes to the data since the data was corrupted
provided the audit trail is stored in a separate place to the faulty hard drive

AUP – Acceptable User Policy, example on page 131 in Gr 11 book. Defines the rules
in which a
user of a certain computer service must use that service.

Backup – A copy made of data, in case the original data is lost. Usually stored
externally from the original data (if back up of file made on the same machine of
the file, and that machine is destroyed, the original and they backup will be lost.

Bandwidth – The maximum carrying capacity of a channel (wired or wireless),
measured in a rate of data per second.


Biometrics – Using unique biological characteristics to identify a human.




BIOS – Firmware (=software that does not change on a chip). Stored on ROM
memory, runs the POST (Power on Self Test) software, gets the data to run the POST
software from the CMOS memory (e.g. user/personal settings) – Unified Extensive
Firmware Interface (UEFI) replace BIO – faster boot time, provides a GUI
(navigation with mouse), supports larger drives

BitTorrent – Peer – to – peer protocol used to share large files over a network. You
can download a file from anyone who has the smallest part of that file on their
computer. Seed (you are not downloading from one place), bottleneck at server can
occur so someone (the seed) downloads the complete file, and then people download
from the seed instead of the server.
Benefits – many users can download a file quickly (increase spend because not
overloading single server), reduces cost to host ( no single host pays for millions of
people downloading from their server), forces equality in sharing (when you run the
software people download from you), Offers effective use of available download
bandwidth, Client software usually free.
Risks – infected files/malware (BitTorrent client guarantees that the file has not been
altered from when the torrent was crated but it could have been infected before. Run
malware scan on files first & infected files usually found + deleted quickly), make
piracy easy, not anonymous ( does not prevent anyone from seeing your IP address
and file you download, can be traced back to you)

Blockchain – decentralized technology spread across many computers that manages
and records transactions. New transaction is requested, once verified, it is combined
with other transactions to make up a black of data In the ledger


3
$6.08
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
hannahmoore3 University of Cape Town
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
122
Miembro desde
4 año
Número de seguidores
97
Documentos
32
Última venta
2 meses hace

3.7

22 reseñas

5
12
4
2
3
1
2
3
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes