| A | B |
| Knowledge | is derived from information |
| Hacking | unlawful access to another persons computer |
| Executive Information System | provide detailed statistical information for senior managers |
| Information is | data that has been processed and has structure and organisation |
| Information can be categorised in terms of its | source nature level and frequency |
| Data processing systems | deal with the day-to-day transactions of an organisation |
| Backup Strategy | enables data to be successfully recovered after a system failure |
| Client-Server Network | ses a powerful computer system to provide resources for all workstations on a network |
| Audit Procedures | recording of every transaction in which a record is accessed updated or deleted |
| Virus | destructive piece of software that attaches itself to a file, reproduces itself and spreads to other files |
| Archiving | the storage of data not regularly in use |
| Online help/tutorials | Computer based systems which are used to support people learning about new software |
| Web-authoring Software | Class of software used to produce documents that are displayed using a browser |
| Templates | a feature of presentation software that can be used to produce a house style |
| The Data Protection Act 1998 makes it a requirement for companies to | obtain the consent of data subjects before storing and processing personal data |
| The Regulation of Investigatory Powers Act | enables the government to intercept communications, acquire communications data and set up electronic surveillance |
| A network adapter is a network card that | connects a computer to a network |
| Grandfather Father Son is | rotation method for making regular backups |
| Inhouse courses | Short training courses run onsite |
| Project management software | Helps managers plan and monitor complex activities |