Term
|
Definition
Is software with which users process text, numbers, still and moving images and sound ie: Word processing, spreadsheet |
|
|
Term
|
Definition
The audience is normally the person who views the content of a solution and does not enter data or change the content in any way (e.g. a person browsing a website or viewing a multimedia presentation) |
|
|
Term
|
Definition
Data to be input to a batch processing system is collected together (over a set period of time or until a certain batch size is reached. And then processed as a single operation.
Batch processing systems don't require any human interaction whilst a batch is being processed.
Example: of batch processing include payroll systems where many staff are paid at the same time, utility billing whre many bills are produced in a single operation. |
|
|
Term
|
Definition
Bespoke (also known as Tailor Made software is specifically designed for a particular purpose an example of this is Cristalweb, this was designed and created for Farnborough Sixth Form. |
|
|
Term
|
Definition
Experience - What is their experience in using this system ie: novice
Age - Older generation may be slower than younger people ie: speed of actions will be a consideration
Physical Characteristics - Some users may have particular needs due to physical impairments this should be taken into consideration by the system analyst
Environment of use - Where will the system be used, what can be affected ie: not hear instructions because warehouse is very noisy
Tasks to be undertaken - will affect the user interface ie: a busy resturant would benefit more from a concept keyboard |
|
|
Term
|
Definition
The client is someone who has identified a problem and has asked for it to be solved using ICT. If they own the business or are a part of a large organisation it is possible that they won’t be the actual user of the system. They could be the owner of a business or a manager or they could be anyone who has a problem that needs an ICT solution |
|
|
Term
|
Definition
Data is coded BEFORE it is input because it is quicker to input, easier to validate, takes up less storage space.
example - in a questionnaire female = f, male = m, dates = 01/01/2016, London Heathrow = LHR |
|
|
Term
|
Definition
Data are raw facts and figures which are meaningless without context |
|
|
Term
Data Types (otherwise known as forms of data) |
|
Definition
Otherwise known as Forms of data Types of data are: Text/Alphanumeric - Image - Video - Audio - Numeric |
|
|
Term
|
Definition
A database is a collection of data or information which is held together in an organised or logical way.
Is made up of records, one for each person or item data is being stored about. Each record is made up of fields that can be of a variety of data types. |
|
|
Term
|
Definition
Data are entered / input directly into a system for a specific purpose
Example - during a transaction such as card details and PIN being entered via a chip and pin reader to authorise a shop to take money from your bank |
|
|
Term
|
Definition
Encoding - Data needs to be converted into a machine readable format so the computer can understand it. Encoding also compresses data.
example:
text is entered into a system and converted into an ASCII / binary format so the computer can understand it, for example when text is entered into word processing software to create documents such as letters or report images may be encoded into an compressed bitmap using a jpeg file format, this enables the image to be read by the computer and viewed on screen or printed sound may be encoded into a compressed format such as mp3 which might then be output via speakers or headphones |
|
|
Term
|
Definition
When data is encrypted it is scrambled using an encryption key so that it cannot be read by anyone who does not have the decryption key
for example, when you enter your debit card details into an e-commerce website to buy products, the important data is scrambled so only the bank see it using their decryption key |
|
|
Term
|
Definition
New three Rs mean a greener use of ICT
Reduce - the amount of paper, ink and other consumables that you use
Reuse - rather than just throw away computers, printers and other hardware or donate to suitable projects around the globe
Recycle - appropriately via the approved schemes under the WEEE (Waste Electrical and Electronic Equipment) directive which can often be done free of charge, ensuring that all important data, files and folders are removed from the ICT system before recycling |
|
|
Term
|
Definition
Ergonomics is the science of designing equipment to suit the user and help them to work safely |
|
|
Term
|
Definition
Used in validation rules
Error message tells the user they have made a mistake
it is best if they are clear about the error, for instance "Please enter a number between 0 and 90" is clearer than "Data out of range" |
|
|
Term
|
Definition
a time-based grid that shows tasks and resources to accomplish a job |
|
|
Term
|
Definition
Hardware
The physical parts of a computer system
e.g. monitor, keyboard, printer etc |
|
|
Term
|
Definition
Health and Safety at Work Act 1974 - sets out to protect workers from things that could cause them to have accidents or damage their health. Employers have a duty of care to their employees, they provide risk assessments to keep risks to a minimum.
Health and Safety (Display Screen Equipment) Regulations 1992 - these are the H&S regulations that apply to computers to safeguard people who use computers for long periods of time (only applies to those who use computers for a significant part of their working day). |
|
|
Term
|
Definition
Used by some organisations to make all the documents and interfaces look consistent; might involve colours, the use of a logo, font sizes and styles. |
|
|
Term
|
Definition
ICT
Information and Communication Technology is the use of technology for the input, processing, storage and transfer of data and the output of information. |
|
|
Term
|
Definition
Components of an ICT System (PEdishPro)
People - ICT systems cannot work without people ie: they input data
Data - Raw facts and figures without context have no meaning
Information - data that has been processed
Software - packages are the programs that make the computer a useful tool
Hardware - The physical components that make up the ICT system
Procedures - Security procedures such as using passwords to secure systems |
|
|
Term
|
Definition
Business analyst/systems analyst/project manager
Software developer/programmer
Help Desk Operator - ICT Trainer
Web designer/administrator
Technician/network administrator |
|
|
Term
|
Definition
An ICT system consists of hardware and software being used to input data and output information for use by people who use procedures
An ICT system is one that involves input, processing and output, where the output goes directly to a human being.
Example: Is a company payroll system, where the input would be the hours worked, the processing would be calculating the pay by multiplying the hours worked by the hourly rate and the output would be the wage slip. |
|
|
Term
|
Definition
Implementation
Implementation: is the process of producing the working version of the solution to the problem as identified by the client. |
|
|
Term
|
Definition
Indirect data capture is the where data is used for a purpose other than its original.
For example. a bank using a customers details to send out marketing material. Phishing is also an example e.g personal data originally input to apply for a store card being used to send out marketing emails
or the use of data that is a by-product from data collected for another purpose. |
|
|
Term
|
Definition
Information is data that has been processed.
Information is the output from an ICT system.
The processing gives it context or meaning |
|
|
Term
|
Definition
Input is where raw data are entered / captured into an ICT system
Example: Entering an attendance mark ie: present/absent via keyboard |
|
|
Term
|
Definition
The link between the user and the technology they are using which involves software and hardware |
|
|
Term
Interfaces (types of interfaces) |
|
Definition
Menu driven interface - Select from a list of actions ie: press 1 for sales, 2 for stock
Graphical user interface (GUI) - Windows, icons, menus, pointers
Command line interface - User types in text based commands, not used by the non-expert |
|
|
Term
|
Definition
a series of commands and instructions that you can group together as a single command in order to complete a task automatically. Macros save time when you wish to perform tasks on a regular basis |
|
|
Term
|
Definition
Part of systems software. Software that controls the hardware of a computer and is used to run the applications software. Operating systems control the handing of input, output, interrupts, etc |
|
|
Term
Optical Mark Recognition (OMR) |
|
Definition
Optical Mark Recognition (OMR) senses the position of marks on data capture forms such as multiple choice exam papers or lottery entry sheets. |
|
|
Term
Optical Character Recognition (OCR) |
|
Definition
Optical Character Recognition (OCR) uses a scanner and specialist software to turn paper-based text into computer characters |
|
|
Term
|
Definition
Output
The production of meaningful information in a format that is useful for its purpose |
|
|
Term
|
Definition
Each peripheral device (e.g. printer, scanner, digital camera, webcam etc) needs some software to work with the hardware. This software is generally called peripheral drivers.
This is part of systems software
Peripheral drivers provide communication between the operating system / application software and the peripheral device
They convert instructions from the software into a form that the peripheral device can understand |
|
|
Term
Personal Skills/Qualities |
|
Definition
ersonal Skills - Good written and oral communication skills, listening skills, problem solving skills, patience, willingness to work flexi hours, team work, organization/line management skills, perseverance |
|
|
Term
|
Definition
A single, usually square, dot that makes up the bitmap image. |
|
|
Term
|
Definition
Processing is where data is converted / changed into useful / meaningful information
Examples: Formatted - Editing - Sorting - Calculations - Queries - Searching |
|
|
Term
|
Definition
Up to date - Some information only has value within a specific timescale, for instance, share prices can change several times in a minute and so buying recommendations that are produced would change quickly and have no value at all once they were out of date
Relevant for use - Information is only valuable to someone who has a use for it, and its value will also depend on that potential use. For example, if a company has information on a summary sales report then it must show sales of individual members of staff if it is to be relevant for calculating staff commission bonuses.
Accuracy - a. The information on a sales report must be accurate to the exact monetary value otherwise any decisions made will be inaccurate. This is extremely important as organisations need accurate information to remain in business.
b. Thorough error checking must take place and regular updates must be applied if the information is to remain accurate.
Reliability - a. Because of the lack of control on the content included on Internet websites this can often reduce the value of the information obtained
b. Individuals are often encouraged to obtain their information from trusted sources like the BBC websites or trusted newspapers or other recognised organisations as opposed to online resources which are written ad hoc by users, such as Wikipedia. It would certainly make sense to look at review and report on equipment from a variety of manufacturers, and these provide valuable information which is more likely to be impartial than information from the manufacturers.
Complete - a. If the information is not complete then it loses its valu |
|
|
Term
|
Definition
Repetitive Strain Injury is when people who use computers often perform the same movements over and over again when using a keyboard or mouse, and this can cause pain and damage to joints.
To help reduce RSI you can use ie: a specially designed "ergonomic" keyboard, a wrist guard |
|
|
Term
|
Definition
Software is the program commands that make a computer do the tasks we need it to, usually referred to as software packages. There are 2 main types of software - System Software, Application Software |
|
|
Term
|
Definition
Specific software is software that performs one particular task for example: Payroll, Stock Control, Garden Design software. |
|
|
Term
|
Definition
5 Stages
Analysis - Design - Implementation - Testing - Evaluation |
|
|
Term
|
Definition
Any computer software that manages and controls hardware thus allowing the applications software to do a useful job. Systems software consists of a group of programs:
The operating system Utilities File management Peripheral drivers User interface |
|
|
Term
|
Definition
Effective Leader - Appropriate allocation of tasks - Adherence to standards - Monitoring of progress / ability to meet deadlines - Monitoring of team budget - Control (over change) - Balance of team - Good internal communication skills - Good external communication skills |
|
|
Term
|
Definition
Template is used to specify the structure of a document such as fonts, page layout, formatting and styles |
|
|
Term
|
Definition
There are 3 types of test data:
Normal - Data that is within the normal range will be accepted for example - cost should be between 20 and 40. Enter 30 for test data which should be accepted
Boundary/Extreme - Data that is on the extreme limits of the range ie between 20 and 40, either 20 or 40 should be tested and accepted
Erroneous - Data that is outside of the limits of between 20 and 40 should fail ie: 105 |
|
|
Term
|
Definition
A transaction is made up of data and processes that update (make a single change) the data held on the system.
Each item of data is dealt with as it is submitted Each transaction must be completed before the next transaction is begun.
Examples of a single transaction include booking an airline ticket, transferring money between bank accounts, ordering. Usually there are multiple users of a transaction processing system |
|
|
Term
|
Definition
an occur when data is being transferred manually, usually fro a paper-based document. Eg an examination mark written on the sheet at 87 might be entered as 57, perhaps because the number 8 was not written clearly enough. |
|
|
Term
|
Definition
The user is normally the person who will actively use an ICT solution, they will change the content, supply inputs and make use of the outputs. |
|
|
Term
|
Definition
A utility is a program that performs a very specific task and a series of utilities comes as part of the systems software.
Utilities are not regarded as applications because they are fairly simple and will only perform on very specific task, which always relates in some way to managing the computers resources
e.g. File converters - used to save files in different formats.
Virus scanners - used to scan the memory and hard drives for viruses
security and accounting used to check user IDs and passwords and to keep a record of network activity |
|
|
Term
|
Definition
- Is a technique that can be used to ensure data entry is robust
- It is a method of checking data to try to reduce the number of errors in data being entered.
- It tests data against the validation rule and gives the user an error message if the data does not pass the test.
- It is a computer-based check that data being entered is reasonable.
|
|
|
Term
|
Definition
Graphics that store the instructions for drawings each object on a page, rather than the picture as a whole. |
|
|
Term
|
Definition
Is a technique that can be used to ensure data entry is robust.
Verification checks that the data being entered into the ICT system perfectly matches the source of the data.
A check to make sure data has not been corrupted as it is copied between different parts of a computer system or entered from a source document.
Example:
if a date of birth was entered into a database from a form as 06/05/1902 instead of 06/05/1972 it might get through the validation rule but it would be incorrect
By checking and proof reading, the mistake would be found.
This is known as verification and is a good way of avoiding transcription errors.
|
|
|
Term
|
Definition
a series of commands and instructions that you can group together as a single command in order to complete a task automatically. Macros save time when you wish to perform tasks on a regular basis. |
|
|
Term
|
Definition
The link between the user and the technology they are using which involves software and hardware
|
|
|
Term
|
Definition
Forms (types) of data are: Text/Alphanumeric - Image - Video - Audio - Numeric |
|
|
Term
|
Definition
Data are entered / input directly into a system for a specific purpose
Example - during a transaction such as card details and PIN being entered via a chip and pin reader to authorise a shop to take money from your bank |
|
|
Term
|
Definition
Indirect data capture is the where data is used for a purpose other than its original.
For example. a bank using a customers details to send out marketing material. Phishing is also an example e.g personal data originally input to apply for a store card being used to send out marketing emails
or the use of data that is a by-product from data collected for another purpose. |
|
|
Term
|
Definition
Data is coded BEFORE it is input because it is quicker to input, easier to validate, takes up less storage space.
example - in a questionnaire female = f, male = m, dates = 01/01/2016, London Heathrow = LHR
|
|
|
Term
|
Definition
Encoding - Data needs to be converted into a machine readable format so the computer can understand it. Encoding also compresses data.
example:
text is entered into a system and converted into an ASCII / binary format so the computer can understand it, for example when text is entered into word processing software to create documents such as letters or report
images may be encoded into an compressed bitmap using a jpeg file format, this enables the image to be read by the computer and viewed on screen or printed
sound may be encoded into a compressed format such as mp3 which might then be output via speakers or headphones |
|
|
Term
|
Definition
When data is encrypted it is scrambled using an encryption key so that it cannot be read by anyone who does not have the decryption key
for example, when you enter your debit card details into an e-commerce website to buy products, the important data is scrambled so only the bank see it using their decryption key |
|
|
Term
The factors that affect the quality of information |
|
Definition
Accurate
Up to date
Reliable source
Relevant
Complete |
|
|
Term
The characteristics of an effective team |
|
Definition
Effective Leader
Appropriate allocation of tasks
Adherence to standards
Monitoring of progress / ability to meet deadlines
Monitoring of team budget
Control (over change)
Balance of team
Good internal communication skills
Good external communication skills
|
|
|
Term
The personal skills / qualities of an IT professional
|
|
Definition
Good written communication
Good oral/verbal communication
Problem solving skills
Patience
Willingness to work flexible hours
Good listening skills
Teamwork
|
|
|
Term
The five things that test plans should aim to prove: |
|
Definition
- The validity of data input
- The accuracy of output
- The presentation of output
- That the solution meets the requirements of the client
- That the solution is usable by the end ouse and / or the intended audience
|
|
|
Term
|
Definition
- Business / systems analyst / project Manager
- Software Developer / programmer
- ICT trainer
- Web designer / administrator
- Help desk operator
- Technician / network administrator
|
|
|
Term
|
Definition
The type of data that will be entered most of the time. It should be accepted by the system and should give the expected result when processing.
e.g. A validation rule states that only whole number between 2 and 50 can be entered. Normal data for this rule would be any whole number within the boundaries
Boundary (extreme), Normal and erroneous data are used to test validation rules |
|
|
Term
|
Definition
Sometimes known as Extreme data
- Data that tests the inside and outside limits of what should be accepted and rejected.
- e.g. A validation rule states that only whole number between 2 and 50 can be entered. Boundary data for this rule would be 2 and 50.
-
- Boundary (extreme), Normal and erroneous data are used to test validation rules
|
|
|
Term
|
Definition
- Sometimes known as Boundary data
- Data that tests the inside and outside limits of what should be accepted and rejected.
- e.g. A validation rule states that only whole number between 2 and 50 can be entered. Boundary data for this rule would be 2 and 50.
-
- Boundary (extreme), Normal and erroneous data are used to test validation rules
|
|
|
Term
|
Definition
data that is inappropriate. If possible, validation checks should reject this kind of data.
e.g. A validation rule states that only whole number between 2 and 50 can be entered. Erroneous data that could be used to test this rule could be the numbers that are outside the boundaries (e.g. 1 and 51) , a decimal number inside the boundaries (e.g. 5.5), text (e.g. five), other character (e.g. *, !)
Boundary (extreme), Normal and erroneous data are used to test validation rules
|
|
|
Term
|
Definition
Local Area Network
A computer network - Usually covers a single building or site and could be linked by the use of cables
The organisation owns all the communication equipment
|
|
|
Term
Metropolitan Area Network (MAN) |
|
Definition
A computer network that covers an area like a town or city, normally between 5 and 50 km and could be connected by cables, mircrowave/radio wave, satellites |
|
|
Term
|
Definition
A computer network that covers a large geographical area and could be linked by cables, radio waves/microwaves
Hardware situated in many different sites renting services from telecommunication supplier
Third party telecommunications equipment is used e.g. leased lines which are rented from communication company. |
|
|
Term
|
Definition
Linking two or more computer devices and other hardware (such as periperals ) together for the purpose of sharing and transferring data, communication, sharing software and devices.
Two types of networks: Peer to peer, Client to server
Examples of some benefits/disadvantages are:
Improved security, easier to back up files, lower software costs - Lack of access when server fails, technical knowledge needed, viruses spread quicker
|
|
|
Term
|
Definition
The internet is a series of interlinked networks which cover the globe/world, allowing the sending and retrieval of information from one computer to another, sometimes described as 'a network of networks'.
|
|
|
Term
|
Definition
The www connects information in the form of hypertext documents (HTML). it is a collection of multimedia resources accessed through a browser and hosted by the internet
|
|
|
Term
|
Definition
A private internal network accessible to the members of an organisation.
An Intranet uses Internet protocols and is accessible via a browser. An intranet is used for sharing resources and organisational information as well as sending messages. |
|
|
Term
|
Definition
An extranet is an external network that can be used by the customers, suppliers and partners of an organisation to see a limited area of the organisation’s intranet. Extranets use Internet protocols. Extranets are not accessible by the general public, users must be authorised to access an extranet with a username and password
|
|
|
Term
|
Definition
Privacy is ensuring that data is only accessed or viewed by those who have permission/authorisation to do so and is not disclosed to anyone who is not entitled to see it
The right of an individual to keep certain aspects of their life private
|
|
|
Term
|
Definition
Security means the application of safeguards to an ICT system to protect data and keep it safe from accidental or malicious modifications, destruction or damage
|
|
|
Term
|
Definition
Personal data means data which relate to a living individual who can be identified – (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual.
|
|
|
Term
|
Definition
When an employee does not follow an organisation’s ICT code of practice
e.g. leaving a workstation logged on creating an opportunity for an unauthorised individual to access their account
|
|
|
Term
|
Definition
When an individual or organisation break the law through using computers to illegally access a computer system
e.g.to break in and change the payroll figures on the internal database
|
|
|
Term
|
Definition
The way a computer obtains its data for processing
|
|
|
Term
|
Definition
The hardware device used to feed the input data into an ICT system
|
|
|
Term
|
Definition
The material on which the data is encoded (e.g. barcode) so it can be read by an input device and digitised so it can be processed into information
|
|
|