Topic 1: System Fundamentals | Topic 3: Networking | Topic 5: Abstract Data | Web Science | Case Study |
---|---|---|---|---|
What is a prototype
An original type, form, or instance serving as a basis or standard for later stages.
|
What is a protocol
A set of rules/standards to coordinate data transmission (between a sender and a receiver.)
|
What is a linked list
A type of data structure in which represents a group of nodes as a sequence.
|
What is black hat search engine optimization
A form of search engine optimization that is against the search engine’s terms of service
|
What is telemedicine
Diagnosis and treatment of patients by means of calling or online communication
|
What is the extent and limitations of a new system
Identify two features that need to be considered when planning a new computing system for an organization.
|
What is a Local Area Network (LAN)
A physical, private network defined by cables and networking hardware that has a bunch of interconnected computers within a limited area. which is linked together through hardware such as switches, hub and routers.
|
What is a dynamic data structure
A type of data structure in which represents a group of nodes as a sequence.
|
What is lossy compression
When a file is permanently reduced to eliminate redundant information to increase transfer speed over the Internet
|
What is a CT scan
The most risky/dangerous form of medical imagery
|
What is iteration
A process which includes prototyping, testing, analyzing and refining a product or system after receiving some feedback from customers.
|
What is Wi-Fi Protected Access (WPA)
Designed to work with all wireless network adapters, this form of network security encrypts information and makes sure that the network security key can not be modified or changed. It also authenticates the users to help ensure that only authorized people can access the network.
|
What are: enqueue() dequeue() isEmpty()
Identify the three standard queue operations
|
What is the Power law
This law suggests that the internet is developing exponentially, however, it is unlikely that the growth will continue indefinitely
|
What is CDSS
A system that helps doctors to suggest treatments for patients after diagnosis
|
What are Voice Recognition, Text-To-Speech, Braille Keyboards, Trackball Mouse
Identify four methods that can be used to improve the accessibility of systems
|
What is the OSI Model
A standardized system/model for network connections, consisting of 7 layers. Each layer deals with a specific part of network communication.
|
What is a keyboard- key strokes from a keyboard would be placed in a queue
Within a computer system, state where the processing might utilise a queue.
|
What is Ambient Intelligence
This is when technology is brought into our environment and the environment is enabled to become sensitive to us
|
What is RFID
This form of communication uses electromagnetic fields to automatically identify and locate special tags attached to objects
|
What are
External Storage: Files could be stored on an external flash disk or hard drive. Files could also be stored on a mobile phone or any storage device that is peripheral to the main operating system. Failover System: switching to a redundant or standby computer server, system, hardware component or network upon the failure of the system. Redundancy: these are computers that have duplicated data, however unlike a failover system, this system does not take over the initial system’s requests.
Describe three main methods that can be used to prevent data loss
|
What are Data encryption, authentication, and authorization
Identify 3 VPN functions.
|
What is parent, left-child, right-child, subtree, root and leaf.
Identify the six terms related to the structure and nodes of the binary tree
|
What is the semantic web
The idea that new technologies can be used to store information about objects on the web and how they interconnect.
|
What is the internet of helath things
The process of medical data being relayed continually to a health centre to monitor health of an individual
|