click below
click below
Normal Size Small Size show me how
Y8 ICT Exam Topics
Computer Theory
| Question | Answer |
|---|---|
| Bit | The smallest unit of computer information (0 or 1) |
| Browser | A program used to access and view websites on the internet |
| Byte | A small unit of data storage (8 bits), usually stores one character |
| Central Processing Unit (CPU) | The “brain” of the computer that controls all operations |
| Database | An organized collection of data that can be easily managed and accessed |
| Download | Copying data from the internet or another computer to your own |
| File | A named piece of data stored on a computer |
| Gigabyte (GB) | About 1 billion bytes (1,024 megabytes) |
| Graphical User Interface (GUI) | Interface using pictures and icons instead of text commands |
| Hard Drive | The main storage device where all data is saved |
| Internet | A global network connecting millions of computers |
| Keyboard | A peripheral used to input text and commands |
| Kilobyte (KB) | About 1 024 bytes |
| Megabyte (MB) | About 1 million bytes or 1 024 kilobytes |
| Modem | Device that connects a computer to the internet |
| Monitor | A screen that displays information visually |
| Motherboard | The main circuit board that connects all computer components |
| Mouse | A pointing device used to control the cursor on screen |
| Network | A group of connected computers sharing information and resources |
| Network Interface Card (NIC) | A card that connects a computer to a network |
| Peripheral | A device connected to a computer (keyboard, mouse, printer) |
| Power Supply | Converts electricity so the computer can use it |
| Printer | A device that produces a paper copy of computer output |
| Random Access Memory (RAM) | Temporary storage; erased when the computer is turned off |
| Read-Only Memory (ROM) | Permanent storage; keeps data even when the computer is off |
| Software | Programs or instructions that tell the computer what to do |
| Uniform Resource Locator (URL) 3 Parts | The address of a webpage on the internet 1) Protocol 2) Domain 3) File Location |
| Virus | Harmful software that can damage data or programs |
| USB Ports | Connection points for plugging in devices like flash drives or keyboards |
| Local Area Network (LAN) | A network that connects computers and devices within a small area so they can share data and resources |
| WiFi | Wireless connection to a LAN |
| Router | Device that connects a LAN to the internet |
| "Cloud" | The internet-based storage and services you can use anytime, anywhere |
| Web Site | The content of a website (Youtube, Wikipedia) |
| Server | A computer that sends information out to the internet |
| Wide Area Network (WAN) | Connects multiple LANs over large distances (The Internet is the largest WAN) |
| Machine Learning | How computers recognise patterns & make decisions without explicit programming |
| Artificial Intelligence | A computer / software that mimics the human way of thinking |
| Pattern Recognition | Finding patterns in data to help computers make decisions |
| Dataset | A collection of data (text, images, numbers) |
| Protocols | Ensure that information gets where it needs to go |
| Packets | Split data into smaller pieces, allowing computers to send data to one another |
| Brute-Force | A method of trying every possible combination to guess a password |
| Password | A combination of letters, numbers and symbols, keeping it encrypted and hard to guess |
| Password Entropy | Measures how hard it is to randomly guess a password |
| Firewall | A network security system that monitors and controls incoming and outgoing network traffic |
| Two-factor authentication (2FA) | A security method that requires two forms of identification to access an account or system |
| Malware | Software that is designed to damage a computer system |
| Quarantine | Isolating a file or device that is suspected of causing harm to the system / network |
| Phishing | Sending fraudulent communications that appear to come from a legitimate source |
| Ways to keep a Network safe | Firewalls WiFi encryption Strong network passwords |