Technique of software that tries to track/monitor how you use your computer, then sends it to a third party.
utility program that puts parts of a file (scattered files) back together and speeds up the computer.
Nothing to do with storage space - does not free up space.
Type of spyware
Capture your keystrokes to discover usernames and passwords
File Transfer Protocol
protocol/rule for communication
transfer files between computers that have internet connection
Distributed Denial of Service Attack
cyberattack where computer system is bombarded with information that it cannot attend to its users or function correctly.
user operated drone that receives commands from user.
used for areas that connot be easily accessed
less expensive than helicopter - no fuel needed
range could be an issue
more quiet than helicopter
self-driving vehicles that make use of softwares programed by users.
software could fail, resulting in inaccurate driving/accident
Near Field communication
radio waves to transmit data in a short range
EG: tapping a bank card
Radio-frequency Identification
tags that are used to store/send/recieve data from a distance
EG: tagging of dogs, tracking rhinos for poaching, E-toll tags on cars
Device that is worn, can connect to the internet and perform multiple tasks - listen to music, check messages, track steps/heart rate.
Real Simple Syndication
service designed to automatically deliver updated web content to subscribers
EG: Flipboard, Freedly
EG: Blogs, news headlines
ability to send/receive data over a cell network
Examples: MTN/Telkom
Basic Input Output System
set of instructions stored on ROM chip on the motherboard
speed data travels from one point to another
bps - bits per second
kbps - kilobits per second
mbps - megabits per second
*bits not bytes!
EG: 25mbps/5mbps - 25mbps refers to the download speed, 5mbps refers to the upload speed. download speed is faster due to users downloading more than they upload to the internet.
high speed internet connection that is always on
EG: Wi-Fi, Fibre
virus downloaded onto pc and disguised as a legitimate program to be used.
maximum rate of data transfer across an internet line
when an email header seems legit (from a trusted source) but is fake and part of social engineering/hoax
manage hardware and software
manage user interface (GUI)
provide security
Learning environment online (think of Covid), classroom online - Google Classroom, Teams etc
Normal classroom environment, with the use of mobile devices such as phone/tablet.
Bring your own device
for physically challenged users mostly - bringing the device to school/work to use.
why?
blind - special braille keyboard that the school cannot accomodate you with.
financial reasons/resources from the school not being able to provide.
series of techologies where the operating system automatically detects a device and the device can be used almost immediately
software that allows computer to communicate with hardware or devices and control them
Organizations private network, internet like, consisting of webpages relating to the organization. Info only available to employees.
Used for policy documents and news letters
Many servers working together to provide information
Specialised, inexpensive computer
Electromagnetic Interference
Unique, biological features to gain access.
such as:
fingerprint
iris
Potential of various devices to connect to each other via the internet
EG: Smarthome
The study and design of the workplace and environment for comfort and safety.
802.11 a/b/g/n
Selectively reducing internet speed for specific activities on the internet. Gives priority to certain services over others.
Shaped internet: Priority given to services - EG: Email priority over streaming YouTube.
Unshaped internet: No priority given - equal speeds provided.
ISP (Internet Service Provider), reduces the internet lines speed when data limit is reached.
Maximum amount of data that can be used in one month.
Acceptable User Policy - serves as a contract, the do's and dont's when using ICTs and being online
End User Liscense agreement - "terms and conditions" when downloading software and using it
Malware
tricking you into clicking on a hidden element - often on webpages. Viruses are either downloaded or given access to personal information.
Example - a pop-up on the FNB banking website to go to another page or to pay money - NOT legit and tricking you into clicking.
Online currency (digital)
same value worldwide
EG: Bitcoin
often used for trading
Ram vs Rom
A ROM chip is a non-volatile storage medium, which means it does not require a constant source of power to retain the information stored on it. By contrast, a RAM chip is volatile, which means it loses any information it is holding when the power is turned off.
A ROM chip is used primarily in the start-up process of a computer, whereas a RAM chip is used in the normal operations of a computer once the operating system has been loaded.
Writing data to a ROM chip is a much slower process than writing it to a RAM chip.
A RAM chip can store multiple gigabytes (GB) of data, ranging from 1 GB to 256 GB per chip. A ROM chip stores several megabytes (MB) of data, typically 4 MB or 8 MB per chip.