100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Samenvatting

Summary IEB Grade 12 Information Technology Theory Terminology List

Beoordeling
-
Verkocht
4
Pagina's
24
Geüpload op
17-11-2021
Geschreven in
2021/2022

An easy to read table, including a succinct definition and description for every term, ordered alphabetically. Each definition and description is coming straight out of the textbook to ensure maximum validity and accuracy. All units being examined are included. This is written according to the IEB 2021 SAGS document and was compiled by a 91% IEB IT student.

Meer zien Lees minder
Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak
Schooljaar
3

Documentinformatie

Geüpload op
17 november 2021
Aantal pagina's
24
Geschreven in
2021/2022
Type
Samenvatting

Onderwerpen

Voorbeeld van de inhoud

GRADE 12 : IT TERMINOLOGY LIST


32-bit – a processor with registers this big will process 64-bit numbers in two
stages, twice as slow as a 64-bit register processor, and can handle less addresses
to send to, send less data over the data bus.

3G – The 3rd generation of cellphone data access technology. Enables internet access

4G (LTE) – The 4th generation of cellphone data access technology. Enables ultra-
broadband Internet access.

64-bit – A processor with registers this big will process 64-bit numbers in one stage,
an address bus
this big can send to more locations and more data can be sent over a data bus with
this size

Abstraction – act of representing essential features without including background
details. It is a technique of creating a new data type that is suited for a specific
application. Only displays essentiall information and hides other details.

Access Modifier – public (+) private (-) protected (#)

Accessor – Typed Accessor Getter (TAG)

Activation codes – Used in software licensing. Know open source, proprietary,
freeware vs
shareware etc.

Adobe Flash – Know about RIA’s and plugins.

Address Resolution Protocol (ARP) – resolves the IP addresses to the address
used in the LAN by Ethernet

Adobe Reader – As this is machine independent, this guarantees the sender will
see it, read only, it
is free to download the reader.

ADSL – Asynchronous Internet access, faster downloading than uploading.
Permanent digital connection to the internet using a telephone line. Different
packages and bandwidth specifications available from service providers. Used for
small or large networks

Adware – Malware in terms of adverts, comes through the browser/phone apps, e.g
pop ups, it is
unsolicited (never asked for it).

Android – An open source operating system. An example of FOSS (Free and Open
Source




1

,Software).

Asynchronous JavaScript and XML (AJAX) – a technique for creating fast and
dynamic webpages which updates parts of a webpage, without reloading the whole
page

Anomalies – Insert, delete, and update anomalies in normalization in databases.
Know definitions
of them from book.

Anti-virus software – Defends your PC against malware (used with a firewall,
firewall is NOT anti- virus software, firewall prevents other people getting in).

API – Application Programming Interface, gives details about classes and methods in
those classes.

Applications – Sits above the OS in the onion model of System Software.



Archive – This utility involves compression and generally moving the data to
another location once
compressed.

Array – collection of variables of the same type. When you need to store a list of
values, such as numbers, you can store them in an array, instead of declaring
separate variables for each number.

Artificial Intelligence – Software designed to emulate human thought, related to
the Turing test (which tests to see if an entity is intelligent).

Assembler – The software/program that turns code into a low level language like
machine code (assembly language). Interpreters turns high level language into low
level language line by line, so code will always run, up until the error, unlike
compliers, which won’t run if there is a syntax error.

Asymmetric Encryption – The key to encrypt plaintext into cipher text is not the
same as the key
to decrypt that cipher text back into plaintext.

Attenuation – A problem associated with copper cables, signal degrades over
distance, a repeater fixes this problem by boosting signal. Linked to crosstalk, EMI,
eavesdropping.

Attribute – A variable/field/property in a class.




2

, Audio and Video on Demand (AVOD) – TV on demand, can either be streaming
or download and match, e.g. DSTV Catchup/Box-office


Audit trails – can identify changes to the data since the data was corrupted
provided the audit trail is stored in a separate place to the faulty hard drive

AUP – Acceptable User Policy, example on page 131 in Gr 11 book. Defines the rules
in which a
user of a certain computer service must use that service.

Backup – A copy made of data, in case the original data is lost. Usually stored
externally from the original data (if back up of file made on the same machine of
the file, and that machine is destroyed, the original and they backup will be lost.

Bandwidth – The maximum carrying capacity of a channel (wired or wireless),
measured in a rate of data per second.


Biometrics – Using unique biological characteristics to identify a human.




BIOS – Firmware (=software that does not change on a chip). Stored on ROM
memory, runs the POST (Power on Self Test) software, gets the data to run the POST
software from the CMOS memory (e.g. user/personal settings) – Unified Extensive
Firmware Interface (UEFI) replace BIO – faster boot time, provides a GUI
(navigation with mouse), supports larger drives

BitTorrent – Peer – to – peer protocol used to share large files over a network. You
can download a file from anyone who has the smallest part of that file on their
computer. Seed (you are not downloading from one place), bottleneck at server can
occur so someone (the seed) downloads the complete file, and then people download
from the seed instead of the server.
Benefits – many users can download a file quickly (increase spend because not
overloading single server), reduces cost to host ( no single host pays for millions of
people downloading from their server), forces equality in sharing (when you run the
software people download from you), Offers effective use of available download
bandwidth, Client software usually free.
Risks – infected files/malware (BitTorrent client guarantees that the file has not been
altered from when the torrent was crated but it could have been infected before. Run
malware scan on files first & infected files usually found + deleted quickly), make
piracy easy, not anonymous ( does not prevent anyone from seeing your IP address
and file you download, can be traced back to you)

Blockchain – decentralized technology spread across many computers that manages
and records transactions. New transaction is requested, once verified, it is combined
with other transactions to make up a black of data In the ledger


3

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
hannahmoore3 University of Cape Town
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
123
Lid sinds
4 jaar
Aantal volgers
97
Documenten
32
Laatst verkocht
2 weken geleden

3,7

22 beoordelingen

5
12
4
2
3
1
2
3
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen