Computer Systems
0.0 / 5
- Created by: Mulla52
- Created on: 01-06-17 12:27
What is a computer system?
A collection of hardware and software that works together to achieve data processing tasks.
1 of 25
What have computer systems enabled us to achieve?
Improved quality in manufacturing;Cheaper manufacturing;Faster access to information;Better decision making;New ways of doing business;New ways of communicating.
2 of 25
What are general-purpose systems?
Personal computers such as desktops, laptops ect, as well as smartphones, are designed to perform multiple tasks. Various applications can also be downloaded so they can be used for a wide variety of purposes.
3 of 25
What are dedicated systems?
They are specially produced to perform a single function or set of functions. e.g. a ticket vending machine.
4 of 25
What are control systems?
Computer Systems that control machinery which are particularly important in manufacturing processes.
5 of 25
What are embedded systems?
Computer systems that are a part of a larger system. They include portable devices and larger installations. They can be very simple or highly complex.
6 of 25
What are expert systems?
Computer Systems designed to behave like a human expert. They have a knowledge base, an inference engine and an interface. They are commonly used for diagnosing diseases, making credit checks etc.
7 of 25
What are management information systems?
They bring together information from all parts of an organisation so that managers can make sensible decisions. They typically produce regular reports based on the organisation's data.
8 of 25
What can mistakes in the design and production of systems lead to?
Down time, expensive errors, data loss and compromised privacy.
9 of 25
What is data integrity?
The accuracy and consistency of the data stored and how well it reflects the real-world reality.
10 of 25
What can data integrity be compromised by?
Human errors when data is entered, software bugs, viruses, hardware malfunctions and natural disasters.
11 of 25
How can we reduce risks to data?
Regular backups, security mechanisms to control access to data, validation rules to prevent the input of invalid data and using error detection software when transmitting data.
12 of 25
What are De Facto Standards?
These develop over time because of common usage and they ensure that files can be used by anyone. e.g. Microsoft Word, QWERTY Keyboard layout etc.
13 of 25
What are De Jure Standards?
These have become so universally accepted that they have to be adhered to for communication. e.g. ASCII, PDF, Unicode etc.
14 of 25
What are Proprietary Standards?
These are owned by an organisation and ensure compatibility between a company's products. They also reduce competition from rival products. e.g. Apple computers lock users into using Apple software.
15 of 25
What are Industry Standards?
These are set by recognised non-commercial organisations. An example of one of these organisations is IEEE which sets standards for electrical interfaces.
16 of 25
What are Open Standards?
These are publicly available, produced collaboratively, not dominated by one interest group and not for profit. They ensure that access to resources is not dependent upon a single application or a particular hardware platform. e.g. HTTP, HTML etc.
17 of 25
What is the purpose of the Data Protection Act (1998)?
The law protects personal data stored on computers because there was a danger of how this information was being handled so it gave legal rights to people who have information stored about them.
18 of 25
What sort of data is regarded as personal?
Data that allows a person to be identified : Name, Addresses, Date of Birth, Contact Information, Employment History, Medical Conditions, Credit History.
19 of 25
What would happen if you breach this law?
Monetary Penalty Notices (Up to £500,000 for serious breaches), Prosecution (Including prison sentences for deliberate breaches).
20 of 25
What was the purpose of the Computer Misuse Act (1990)?
This law recognised the offences of unauthorised access to computer material (/with the intent to commit or facilitate crime), unauthorised modification of computer material.
21 of 25
What are the different types of computer misuse?
Hacking, unauthorised transfer or copying of data, copying and distributing copyrighted software, email and chat room abuses, viruses and financial abuses.
22 of 25
How can computer misuse be prevented?
Reduce email spamming by not replying to anonymous emails and setting filters on email accounts, having regular backups and security and regulations on social networking sites.
23 of 25
How is the disposal of obsolete (No longer produced or used) computers an environmental issue?
Computers contain toxic materials like lead, beryllium etc. so they have to be disposed of carefully. These toxic materials can leech into the groundwater or be released into the atmosphere. E-Waste is also often shipped to developing countries.
24 of 25
How can data centres reduce the energy used by computer systems?
Virtual servers reduce the number of physical servers in the data centre, solid state storage uses less energy than rotating disk drives and automatic standby switching that turns computers off when they are not in use.
25 of 25
Other cards in this set
Card 2
Front
What have computer systems enabled us to achieve?
Back
Improved quality in manufacturing;Cheaper manufacturing;Faster access to information;Better decision making;New ways of doing business;New ways of communicating.
Card 3
Front
What are general-purpose systems?
Back
Card 4
Front
What are dedicated systems?
Back
Card 5
Front
What are control systems?
Back
Similar Computing resources:
1.0 / 5 based on 1 rating
0.0 / 5
0.0 / 5
5.0 / 5 based on 1 rating
0.0 / 5
2.0 / 5 based on 1 rating
0.0 / 5
0.0 / 5
4.0 / 5 based on 6 ratings
Comments
No comments have yet been made