100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary IEB Grade 12 Information Technology Theory Terminology List R99,00
Add to cart

Summary

Summary IEB Grade 12 Information Technology Theory Terminology List

 192 views  3 purchases
  • Institution
  • 12

An easy to read table, including a succinct definition and description for every term, ordered alphabetically. Each definition and description is coming straight out of the textbook to ensure maximum validity and accuracy. All units being examined are included. This is written according to the IEB ...

[Show more]

Preview 3 out of 24  pages

  • November 17, 2021
  • 24
  • 2021/2022
  • Summary
All documents for this subject (17)
avatar-seller
hannahmoore3
GRADE 12 : IT TERMINOLOGY LIST


32-bit – a processor with registers this big will process 64-bit numbers in two
stages, twice as slow as a 64-bit register processor, and can handle less addresses
to send to, send less data over the data bus.

3G – The 3rd generation of cellphone data access technology. Enables internet access

4G (LTE) – The 4th generation of cellphone data access technology. Enables ultra-
broadband Internet access.

64-bit – A processor with registers this big will process 64-bit numbers in one stage,
an address bus
this big can send to more locations and more data can be sent over a data bus with
this size

Abstraction – act of representing essential features without including background
details. It is a technique of creating a new data type that is suited for a specific
application. Only displays essentiall information and hides other details.

Access Modifier – public (+) private (-) protected (#)

Accessor – Typed Accessor Getter (TAG)

Activation codes – Used in software licensing. Know open source, proprietary,
freeware vs
shareware etc.

Adobe Flash – Know about RIA’s and plugins.

Address Resolution Protocol (ARP) – resolves the IP addresses to the address
used in the LAN by Ethernet

Adobe Reader – As this is machine independent, this guarantees the sender will
see it, read only, it
is free to download the reader.

ADSL – Asynchronous Internet access, faster downloading than uploading.
Permanent digital connection to the internet using a telephone line. Different
packages and bandwidth specifications available from service providers. Used for
small or large networks

Adware – Malware in terms of adverts, comes through the browser/phone apps, e.g
pop ups, it is
unsolicited (never asked for it).

Android – An open source operating system. An example of FOSS (Free and Open
Source




1

,Software).

Asynchronous JavaScript and XML (AJAX) – a technique for creating fast and
dynamic webpages which updates parts of a webpage, without reloading the whole
page

Anomalies – Insert, delete, and update anomalies in normalization in databases.
Know definitions
of them from book.

Anti-virus software – Defends your PC against malware (used with a firewall,
firewall is NOT anti- virus software, firewall prevents other people getting in).

API – Application Programming Interface, gives details about classes and methods in
those classes.

Applications – Sits above the OS in the onion model of System Software.



Archive – This utility involves compression and generally moving the data to
another location once
compressed.

Array – collection of variables of the same type. When you need to store a list of
values, such as numbers, you can store them in an array, instead of declaring
separate variables for each number.

Artificial Intelligence – Software designed to emulate human thought, related to
the Turing test (which tests to see if an entity is intelligent).

Assembler – The software/program that turns code into a low level language like
machine code (assembly language). Interpreters turns high level language into low
level language line by line, so code will always run, up until the error, unlike
compliers, which won’t run if there is a syntax error.

Asymmetric Encryption – The key to encrypt plaintext into cipher text is not the
same as the key
to decrypt that cipher text back into plaintext.

Attenuation – A problem associated with copper cables, signal degrades over
distance, a repeater fixes this problem by boosting signal. Linked to crosstalk, EMI,
eavesdropping.

Attribute – A variable/field/property in a class.




2

, Audio and Video on Demand (AVOD) – TV on demand, can either be streaming
or download and match, e.g. DSTV Catchup/Box-office


Audit trails – can identify changes to the data since the data was corrupted
provided the audit trail is stored in a separate place to the faulty hard drive

AUP – Acceptable User Policy, example on page 131 in Gr 11 book. Defines the rules
in which a
user of a certain computer service must use that service.

Backup – A copy made of data, in case the original data is lost. Usually stored
externally from the original data (if back up of file made on the same machine of
the file, and that machine is destroyed, the original and they backup will be lost.

Bandwidth – The maximum carrying capacity of a channel (wired or wireless),
measured in a rate of data per second.


Biometrics – Using unique biological characteristics to identify a human.




BIOS – Firmware (=software that does not change on a chip). Stored on ROM
memory, runs the POST (Power on Self Test) software, gets the data to run the POST
software from the CMOS memory (e.g. user/personal settings) – Unified Extensive
Firmware Interface (UEFI) replace BIO – faster boot time, provides a GUI
(navigation with mouse), supports larger drives

BitTorrent – Peer – to – peer protocol used to share large files over a network. You
can download a file from anyone who has the smallest part of that file on their
computer. Seed (you are not downloading from one place), bottleneck at server can
occur so someone (the seed) downloads the complete file, and then people download
from the seed instead of the server.
Benefits – many users can download a file quickly (increase spend because not
overloading single server), reduces cost to host ( no single host pays for millions of
people downloading from their server), forces equality in sharing (when you run the
software people download from you), Offers effective use of available download
bandwidth, Client software usually free.
Risks – infected files/malware (BitTorrent client guarantees that the file has not been
altered from when the torrent was crated but it could have been infected before. Run
malware scan on files first & infected files usually found + deleted quickly), make
piracy easy, not anonymous ( does not prevent anyone from seeing your IP address
and file you download, can be traced back to you)

Blockchain – decentralized technology spread across many computers that manages
and records transactions. New transaction is requested, once verified, it is combined
with other transactions to make up a black of data In the ledger


3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller hannahmoore3. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R99,00. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

51683 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 15 years now

Start selling
R99,00  3x  sold
  • (0)
Add to cart
Added