• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

Run Length Encoding

Replace sequences of same colour pixel with colour code and no. of identical pixels

Property

Data about shapes

Drawing List

List of shapes involved in an image

Phishing

Email pretends to be from official body and persuades to disclose private info

Tuple, Entity, Primary Key

Tuple : Single row in table


Entity : Object about which data is stored


Primary Key : Unique attribute to identify the record

Ethernet

A protocol for data transmission over cables network connections. Uses collision detection.

Query Processor, Utility Software

QP : Allows user to enter criteria then finds and returns appropriate result


Utility software : Helps users maintain the computer by checking system for faults

Breakpoint, Dynamic Syntax Checks

BP : Stop code at specific line to check current progress


DSC : Highlights syntax errors as code is entered

Single stepping, Context sensitive prompt

SS : Run code one line at a time so values can be checked


CSP : Suggests the code to add

Defragmentation, Buffers, IAS

D : Rearranges blocks of individual files so they are contiguous. Accessing each file is faster so less head movement.


Buffer : Temporary storage before used by receiving device


IAS : Holds all data currently in use. Volatile with fast access times.

Data verification, validation, integrity, security

Verification : Ensuring data entered is safe as original


Validation : Ensuring data entered is sensible


Integrity : Ensuring data is up to date


Security : Ensuring only people with authority can access data

Data in 1NF, 2NF, 3NF

1. No repeating group of attributes


2. No partial key dependencies


3. No non-key dependencies

Improve computer performance

1. Increase cache memory. More data is stored in fast access so less time is spent accessing from RAM


2. Increase clock speed so more FDE cycles occur per second

IPv4 vs IPv6

4 groups vs 8 groups


8 bits vs 16 bits


Full stops vs Double colon

OS (File mgmt)

1. Maintains directory structures


2. Provides file naming conventions


3. Makes file sharing possible by implementing access rights


4. Specifies the logical method of file storage

OS (Peripheral devices)

1. Manages interrupts from device


2. Handles buffers for transfer of data to ensure smooth transfer between devices that transmit and receive at different speeds.


3. Installs device drivers to allow communication been peripherals and computer

Benefits of sub-netting

1. Improved network speed


2. Improved network security so that not all devices can access all areas of network


3. Easier maintenance as only one subnetwork may need taking down

Bridge, WAP, Switch

Connect 2 LANs


Allow connection of devices to central device via radio signals


Allow 2 or more devices to communicate with one another