All Flashcards

(630 cards)

1
Q

2-in-1 device

A

A portable computer sharing characteristics of both tablets and laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3D Printer

A

Printer that allows one to create a physical three-dimensional model from designs created using CAD or 3D modelling software by layering material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4G LTE

A

The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5G

A

The new generation of radio systems and network architecture for extreme broadband and ultra-robust, low latency connectivity, to enable the programmable world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11 a/b/g/n

A

Indicates if a device has a wireless adapter. Letters show the speed the wireless network is capable of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Absolute cell reference

A

The cell address in the formula will not change as the formula is copied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accelerometer

A

Input device to detect which way a device is being held to change the screen’s orientation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control

A

The operating system asks for permission before installing software to avoid malware installation without consent. Access control can also be placed on an entire device such that permission is given through a password before the device is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Filter

A

A criterion or rule set for a field in a database query to display only records that meet the specified condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ADSL

A

Asymmetric Digital Subscriber Line: permanent digital connection along copper cables to the internet using a landline or telephone line by transmitting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adware

A

Software causing unwanted content to automatically display or download while browsing the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AI

A

Artificial Intelligence: simulation of human intelligence in computers where they are designed to think and act like humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Algorithm

A

Step-by-step, sequential solution used to solve a problem, typically in programming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ALU

A

Arithmetic Logic Unit: part of the CPU performing arithmetic and logical calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-malware

A

Software safeguarding a computer against malicious threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anti-spyware

A

Programs designed to remove or block spyware and user practices that increase the chance of getting spyware on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Anti-virus

A

Software detecting malicious software then deletes or quarantines it based on the program’s behaviour/signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Append

A

Add records to an existing table in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Application software

A

Executes specific tasks for the user, requiring an operating system to run on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AR

A

Augmented reality: technology placing interactive digital content over real scenes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Archive emails

A

Moving messages from the inbox to an archive folder without deleting them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Archive files

A

Removing files which aren’t used regularly and storing them in a separate compressed location for space saving and later use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Aspect ratio

A

The relationship between the width and the height of the display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attachment

A

One or more files sent with a message (typically e-mail) to share documents and images, typically represented by a paperclip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Attenuation
Loss of signal strength over a distance
26
Attribute
Name and value combination defining a property of an element.
27
AUP
Acceptable use policy: a set of rules drawn up by company management to protect the company, its network and resources from misuse.
28
Authentication
Verifying a user or device before allowing access to a system or resources (eg. CAPTCHA, OTP)
29
Autofill
Microsoft Excel feature automatically filling selected cells with data.
30
Autonomous Vehicles
A self-driving/driverless car that can sense its environment and move safely with little to no human input.
31
Backbone
Part of a computer network interconnecting pieces of the network and providing a path for the exchange of information between different LANs and subnetworks.
32
Backup
Copying of files/folders in case of data loss to a separate location.
33
Bandwidth
Maximum amount of data that can be transferred from one point to another in a period of time measured in (kilo/mega) bits per second (bps)
34
Bandwidth theft
Unauthorised access to wireless bandwidth.
35
Barcode
A pattern of thick and thin lines that are decoded by a scanner to represent data.
36
Beta software
Preliminary version of software released by developers to test software before it is published where any errors are fixed before the final release.
37
Bibliography
A list of sources of information at the end of a document to acknowledge the references, refer to them later and compare the final document to the original sources for plagiarism (APA, Chicago and Harvard referencing are most common)
38
Big data
A large volume of structured and unstructured data that is analysed using computers through a difficult process
39
Biometric device
A device that inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.
40
BIOS
Basic Input Output System: non-volatile software stored in ROM to initialise the computer
41
Bit torrent
A peer-to-peer protocol where multiple peers can transfer data between each other. Files are split into smaller parts to increase upload and download speeds. A complete file becomes a seed which other users can use.
42
Bitcoin
A digital currency with encryption techniques to regulate the generation of units of currency and verify transfers. Operating independently of a central bank.
43
Black hat
Crackers/Hackers with malicious intentions to steal or vandalise systems.
44
Blockchain
Advanced database mechanism allowing transparent information sharing within a business network
45
Blog
A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order.
46
Blu-ray
An optical disc format designed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data (more than DVD).
47
Bluetooth
Wireless technology for sending data over short distances using short-wavelength radio transmissions.
48
Bookmark
Identifies a location or selection of text that you name and identify for future reference.
49
Boot
A term to describe a computer’s start-up process. Restarting is rebooting.
50
Bot / Zombie
A software application that runs automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.
51
Botnet / Zombie Army
A group of compromised or infected computers connected to a network such as the internet and controlled remotely to attack other machines by infecting them with malware, sending spam, etc.
52
Bounded media
Communication channels consisting of physical cabling common in wired LANs
53
Broadband
High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.
54
Broadband
High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.
55
Broadcast
An unsecured method of communication sent to multiple nodes in the network
56
Browser Add-on/Extension
A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.
57
Browser cache
Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.
58
Buffering
A temporary storage area in RAM to speed up a slow input/output device.
59
Bug
An unintentional error, flaw, fault or failure made by programmers in a computer program/system causing it to produce an incorrect/unexpected result or behave in unintended ways.
60
Bus
An electronic pathway along which data can be sent from one part of the computer to another.
61
BYOD
Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device
62
Bit
A binary digit is a single unit of information
63
Cache
A high-speed memory used to hold recently or frequently accessed data, in order to be able to retrieve that data faster.
64
Cap / Uncapped
A bandwidth cap can be applied to a network by the service provider such that a certain amount of data can be transferred over that network to limit the channel from being overloaded. Going over the band cap incurs a fee.
65
CAPTCHA
Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.
66
Caption
A numbered description added to a graphic object (such as a diagram or photo) or a table.
67
Card reader
Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.
68
Card skimmer
Device that reads the magnetic data from a bank card.
69
Cell range
Two or more adjacent cells on a spreadsheet.
70
Chart / Graph
Used to visualise a trend in data over intervals of time.
71
Chart area
Includes both the Plot Area and the ‘outside’ part of a chart where the titles are located.
72
Chatbot
A computer program that simulates online conversations using text or voice commands.
73
Citation
Reference to the source used in a specific instance and found in the text immediately after the piece of information being referred to.
74
CLI
Command line interface: A text-based interface, with commands entered and executed at the command prompt.
75
Click-jacking
An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.
76
Client-server
A single dedicated networked computer that provides services (file storage, email, printing) to other nodes/devices on the network.
77
Clients
Computers connected to a network that use services and resources from the servers.
78
Clipboard
Area in memory (RAM) where copied or moved objects – both text and graphics – are temporarily stored. They are kept there until they are pasted somewhere (or until the program is closed or the computer is shut down).
79
Closed questions
Questions that can be answered directly with facts. These questions often start with words such as What? When? Where? Who? How many? etc.
80
Cloud computing
A general term that refers to the sharing and use of resources and applications offered as services over the internet.
81
Cloud storage
Storing data on remote servers, accessible from any Internet-connected device.
82
CMOS
Complementary Metal-Oxide Semiconductor: Battery-backed, volatile memory that stores hardware
83
Colour Depth
The number of bits used to represent the colour of each pixel in an image
84
Column break
Used if you want to shift text to the top of the next column.
85
Combo box
A list of values from which a user can choose a value. Only one value is visible at a time, the others will appear only when the user clicks on the arrow. A Lookup Wizard is used to create the list of values.
86
Combo chart
If a chart has more than one data series, a different chart type can be used for each series.
87
Component
A circuit chip placed directly on the motherboard
88
Compression
The process of reducing file size takes up less storage space and quicker Internet transfer.
89
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
90
Computer worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
91
Conditional formatting
Formatting of data on reports or computer programs that changes based upon specific criteria, e.g. printing and displaying negative quantities in red.
92
Constant
An entry which has a specific fixed value, e.g. 3.5.
93
Contrast ratio
The relationship between the darkest black and the brightest white that a display device can produce. Higher values are better.
94
CU
Control unit: A part of the CPU that coordinates the processing of instructions.
95
Convergence
The trend where separate technologies and functions that required different devices in the past are combined into one single device, e.g. the smartphone and the tablet.
96
Cookies
A small text file stored in a user's browser to record their history and preferences.
97
Copyright
Software is developed and all rights belong to the owner/developer.
98
Core
A single physical processor. Chips that are ‘dual core’ have 2 processors, ‘quad core’ have 4 processors, etc.
99
CPU
Central Processing Unit – hardware component that processes all data and carries out all instructions.
100
CPU Architecture
32-bit computers have a processor that works with 32 bits at a time. The memory addresses, register sizes, address and data bus sizes and instruction sizes are all 32 bits in length. The computer is able to process at most 32 bits of data at once. In the same way a 64-bit computer sizes are all 64 bits in length. The computer is able to process at most 64 bits of data at once.
101
Creative Commond License
A licence where the author retains copyright of their work but allows people to copy and distribute the work (documents, source code) on condition the author is acknowledged.
102
Crop
To remove parts of a picture that you do not need. You can also customize it, for example to fit a specific shape.
103
Cross-reference
Used to refer to related information elsewhere in the same document. One can choose what information to display about the item referred to. A hyperlink to this item is created by default.
104
Crosstalk
Signals in adjacent wires interfere with each other.
105
Crowdfunding
A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme
106
Cryptocurrency
A form of virtual, digital currency, e.g. Bitcoin, Ethereum, Luno, that can be exchanged for other currencies, products and services.
107
CSV
Comma Separated Values file – a text file which uses commas to separate the values in each line. Commonly used to import and export data between programs.
108
CTS
Carpal Tunnel Syndrome: A painful compression of the nerves in the wrist caused by repetitive manual action such as typing.
109
Cyber-attack
Any type of offensive manoeuvre employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.
110
Cyberbullying
The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.
111
Cyberstalking
People who are intruding in other peoples personal details online.
112
Cyberterrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
113
Dark / deep web
Non-indexed web pages hidden from standard search engines accessible using an anonymising web browser.
114
Data
Data is unprocessed items or facts in raw form that usually have to be manipulated or processed before it makes complete sense or before it becomes useful.
115
Data labels
The values of the data points on a chart
116
Data redundancy
Unnecessary repetition of data produced by removing repeating groups as a result of first normal form.
117
Data series
A column or row of numbers in a spreadsheet that is depicted in a chart.
118
Data Validation
Techniques used to ensure the accuracy and integrity of data entered into a database or spreadsheet, such as input masks, validation rules, drop-down boxes, and adjusting field size properties
119
Database
A collection of related tables store data about a subject or a group of subjects.
120
Date Picker
A control in Access that allows selection of a specific date by clicking on an onscreen calendar.
121
DBMS
Database Management System: Software that manages and controls a database, including permissions, backup, referential integrity, and access control.
122
DDoS
Distributed Denial of Service: An attack where multiple coordinated Internet devices (bots) are used to overwhelm a service, making it inaccessible to legitimate users.
123
DDR RAM
Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.
124
Dedicated device
Devices that are designed to perform one specific task only, e.g. traffic lights, washing machines, ATMS, calculators, etc.
125
Default Printer
The printer to which documents are sent unless the user specifies otherwise.
126
Default Value
In databases, a preset value defined for a column type, automatically allocated to a field in a new record when many records hold similar data.
127
Defragmentation
The process of using a utility program to reverse fragmentation by rearranging and consolidating scattered file parts on a disk for quicker retrieval.
128
Delimiter
A character such as a comma, space or tab, used to separate each piece of data (each field) in a line in a CSV file.
129
Desktop
The visual space on a computer screen where programs, shortcuts, icons, folders, files, and documents are displayed upon startup.
130
Desktop computer / PC
Personal computer: A single computer designed for home or office use, typically placed on a desk.
131
Digital camera
A camera that captures and stores images digitally, allowing them to be downloaded to a computer for editing with graphics software and printing.
132
Digital Certificate
A data file from a Certificate Authority (CA) that verifies an organization's identity by cryptographically linking its public key to specific identity attributes, such as VeriSign.
133
Digital divide
The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.
134
Digital footprint
A trail left by an entity's interactions in a digital environment; including their usage of TV, mobile phone, Internet and World Wide Web, mobile web and other devices and sensors. A digital footprint is the size of an individual's online presence; as it relates to the number of individuals with whom they interact mainly on social networking sites.
135
Digital migration (digitisation of media)
The process of converting TV signals from analogue to digital format for broadcast.
136
Digital Signature
A cryptographic method where a user can "sign" a document by encrypting it with their private key. The document can then be verified using the user's public key, ensuring its authenticity and integrity.
137
Digital zoom
Increasing the apparent size of an object in a photograph by enlarging pixels, resulting in potential blurriness and pixelation as the image quality decreases.
138
DIMM
Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.
139
Disk Cache
The use of RAM to enhance the speed of access to a slower hard drive by storing chunks of data read from the disk, reducing the need for repeated reads.
140
Disk Cleanup
A computer maintenance utility in Microsoft Windows that identifies and removes unnecessary files from the hard drive to free up storage space.
141
Disk Defragmenter
A utility that rearranges fragmented data on a mechanical hard disk to improve efficiency in loading and saving data, thereby enhancing computer speed. Note that it does not increase available disk space.
142
Disk Scanner
A utility included with operating systems that checks a drive for errors and bad sectors on the disk, attempting to repair them if possible.
143
Distribution list/Mailing list
A list of email addresses grouped under a single name. Sending an email to this list forwards it to all addresses included, facilitating communication with multiple recipients simultaneously. Also known as a distribution list or contact group.
144
Distributed Processing
A method of processing where the computational tasks required to solve a problem are distributed among multiple computers (such as servers in different data centres), thereby enhancing total processing power.
145
DNS
Domain Name Servers: A protocol that translates domain names into IP addresses, enabling computers to locate resources on the Internet.
146
Domain Name
A unique string of characters that identifies a website on the Internet.
147
Dongle
A device plugged into a USB port to enable connectivity, such as for wireless keyboards or mice. It can also refer to a 3G or 4G dongle used with a desktop computer or laptop to connect to a cellular network for internet access.
148
DoS attack
A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.
149
Download
The process of receiving data from a remote server to a local computer
150
Downward/backward compatibility
The ability of software to open and use files created in previous or older versions of the same software.
151
DPI
Dots per Inch: A measure of print or scan resolution indicating the density of dots per inch. For instance, an average print resolution might be around 4800 x 1200 dpi. High scan resolution is crucial for those frequently making high-quality copies or scanning pictures.
152
DRAM
Dynamic RAM: RAM that utilizes capacitors and requires periodic refreshing to maintain stored data.
153
Driver
System software that enables the operating system to communicate with hardware devices, facilitating their functionality.
154
Drop Cap
An enlarged initial letter or word at the beginning of a paragraph that extends into the lines of text below it.
155
DSLR Camera
Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.
156
Dumpster Diving
The practice of obtaining discarded data, such as invoices, phone records, organizational information, sensitive data printouts, or discarded hardware, typically to extract information or manipulate individuals.
157
E-commerce
The general term for any type of business transaction conducted over the Internet.
158
E-learning
A learning environment where individuals use computers to participate in teaching and learning activities to further their education.
159
E-mail spoofing
The forgery of an email header so that the email appears to be from a different origin (or person).
160
E-waste
Electronic Waste: Waste materials generated from the use or disposal of electronic devices, such as computers, televisions, and mobile phones. E-waste often contains hazardous materials that can be harmful to humans, plants, and animals, and can contaminate water, air, and soil.
161
Eavesdropping
The act of intercepting and monitoring signals traveling along copper cables by unauthorized individuals.
162
eBook / eReader
A mobile electronic device designed primarily for reading digital eBooks and magazines.
163
EEPROM
Electronically Erasable Programmable ROM: ROM that can be electronically modified and erased using software.
164
EFT
Electronic Funds Transfer: The process of transferring money from one bank account to another electronically, typically using internet banking services.
165
Email
Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.
166
EMI
Electro-Magnetic Interference: The corruption of signals traveling in copper cables due to electromagnetic sources, such as nearby machines or equipment.
167
En dash
A dash that is slightly longer than a hyphen, typically used for number ranges and occasionally for indicating relationships.
168
Encryption
The process of converting plain text into unreadable ciphertext to secure it from unauthorized access.
169
Endnote
Similar to a footnote but placed at the end of a section or document rather than at the bottom of the page where referenced.
170
Entry-level computer
A desktop computer designed for users who primarily use basic applications like email, web browsing, and general document tasks, typically available at an affordable price point.
171
Ergonomics
The study and design of workplace equipment and furniture to ensure it promotes comfort and safety for individuals in their work environments. Specific areas of interest include keyboards (curved for comfortable arm and wrist positioning), chairs, mice, etc.
172
Ethernet
A LAN (Local Area Network) technology that encompasses protocols, devices, and communication methods for wired network connections.
173
EULA
End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.
174
Excel Filter
A feature used in Excel to display only certain rows of data in a worksheet based on specified criteria or conditions.
175
Expansion Card
A small circuit board that is inserted into a motherboard slot (such as PCI, PCIe, SATA) to enhance the functionality of a computer beyond what is provided by the onboard components.
176
Export
Saving data in a format that can be read by a different version of the same application or even a totally different application.
177
Fake News
Stories or hoaxes created to deliberately misinform or deceive readers.
178
Fibre optic cable
A type of network cable that transmits data using light pulses through a central glass or plastic core, making it exceptionally fast and efficient for data transmission.
179
Field
In the context of a database, a field refers to a single piece of data or a single fact, such as an ID number, surname, or any other attribute of a record. It is the smallest unit of data stored in a database.
180
File Extension
A set of characters, typically 3-5 in length, added to the end of a filename to denote the type of file and the software required to operate or open it. Examples include JPG, EXE, BMP, DOCX, HTML, ACCDB, PPTX, XLSX, and ZIP.
181
File Path
The complete location or name of where a computer file, webpage, or other object is located.
182
File property
The basic information about a file such as its name, size and date modified.
183
Firewall
A security system, implemented as hardware, software, or both, that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the internet), helping to protect against unauthorized access and potential cyber threats.
184
Flash Drive
Portable secondary storage that stores programs and using flash memory.
185
Folder
A virtual location where programs, files, and other folders can be located. Computers with an Apple, Microsoft Windows, or other GUI operating system have folders to help users store and organize their files. A subfolder is a folder that is located inside another folder.
186
Footnote
Additional information placed at the bottom of the page in a document, and linked by a number or symbol to the relevant text in the body of the page.
187
Foreign Key
A field in a table that is a primary key in another table.
188
Form
An interface or object in software applications that allows users to input, store, and view data in a structured and user-friendly manner. Forms typically include fields for entering data and controls for navigation and interaction.
189
Form Letter
A standard letter template designed to be personalized and distributed to multiple recipients on a mailing list.
190
Formatting
The process of preparing a storage device, such as a disk or a drive, to store data by defining its file system structure. Initialisation determines how data is stored and accessed. Formatting a disk usually erases all existing data on the disk.
191
Formula
A statement written by a user in software applications like spreadsheets to perform calculations. Formulas can range from simple arithmetic operations to complex calculations involving functions, cell references, and constants. They always begin with an equals sign (=).
192
Fragmentation
The more you use your computer, the more the files (and parts of files) get scattered on the disk. The more scattered the files’ parts are, the slower your computer becomes, as the files take longer to retrieve.
193
Freemium Software
A type of software that offers basic functionality or a limited version for free, but charges for additional features or premium services. This model allows users to use the software for free with the option to upgrade to access more advanced capabilities.
194
Freeware
Software that is fully functional and available for use and distribution at no cost. Unlike open-source software, freeware typically does not provide access to its source code and may have restrictions on resale or modification.
195
FTP
File Transfer Protocol: A protocol to transfer and download files from the Internet.
196
Function
A named and predefined procedure in software that performs a specific operation and returns a result. Functions are typically invoked by typing their name followed by parentheses, within which arguments (if any) are specified. Examples include functions like COUNT, SUM, and MEDIAN in spreadsheet applications.
197
GAN
Global Area Network: A worldwide WAN such as the Internet.
198
Gap width
The distance between columns or bars in a chart, typically expressed as a percentage of the width of the columns or bars themselves.
199
Gateway
A device that connects and translates between network segments with different topologies, technologies, or protocols, enabling communication between them.
200
Geotagging
The process of adding geographical coordinates (latitude and longitude) to the metadata of a file, such as a photo, indicating where the photo was taken.
201
GHz
Gigahertz: A unit of frequency measurement for CPUs, indicating their processing speed. A higher GHz value generally signifies faster processing capabilities. 1GHz = 1 billion cycles (of instructions) per second
202
GIGO
Garbage-In-Garbage-Out: The principle that if incorrect or low-quality data is entered into a system, the output or results will also be incorrect or of low quality.
203
GPS
Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.
204
GPU
Graphics Processing Unit: A co-processor on a video card that accelerates applications by offloading complex mathematical and geometric calculations required for graphics rendering from the CPU. This can significantly enhance computer performance in tasks such as CAD, 3D graphics rendering, and gaming.
205
Green Computing
The practice of using computers and related resources in an environmentally responsible and eco-friendly manner, encompassing their manufacturing, use, and disposal processes.
206
Grid Computing
A system where the computational resources of multiple computers from different locations are pooled together to work collaboratively on a single problem or task. Examples include projects like the SETI@Home initiative.
207
Gridlines (Excel chart)
Lines displayed in the plot area of a chart to aid in visually estimating the values of data points.
208
Gridlines (Excel worksheet)
Lines forming a rectangular grid that distinguish individual cells in an Excel worksheet, aiding in visual organization and alignment of data.
209
GUI
Graphical User Interface: A user interface that allows users to interact with electronic devices through graphical icons and visual indicators, rather than text-based commands. It typically includes windows, icons, menus, and a pointing device (like a mouse) for navigation and selection.
210
Hackers and crackers
Individuals who break into computer systems. Hackers often do so for prestige and recognition, while crackers have criminal intent.
211
HAN
Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.
212
Hard copy
A printed version of data stored on a computer, as opposed to a soft copy, which is visual output on a screen.
213
Hard space
A space where word wrapping cannot occur, keeping the characters or words on either side together on the same line.
214
Hardware
The physical components of a computer, such as the mouse, keyboard, and monitor.
215
HDD/Mechanical Drive
Hard disk drive: A secondary storage device that uses mechanical parts to store programs and data magnetically.
216
HDMI
High-Definition Multimedia Interface – a single cable interface that transmits high-definition video and sound, offering better quality images due to digital signals.
217
HDMI Port
A connection interface that transmits both video and audio.
218
Header / footer
An area within the top and bottom margins of a page, which can contain information that appears on each page of the document or section, such as page numbers, a company logo, or the file name.
219
Hidden attribute
A file attribute indicating if a file is visible. Hidden files, unlike visible files, do not appear in File Explorer by default.
220
History
An option that allows a user to find the web pages they have previously visited. When you click this option, it shows a list of sites you have visited.
221
Hits
Each file sent to a web browser by a web server, also called a page hit. It refers to the retrieval of any item, such as a page or graphic, from a web server.
222
Hoax
A cybercrime involving fraudulent chain messages, typically warning about a nonexistent virus. These deceptive messages can be sent via email, SMS, WhatsApp, or social media platforms like Facebook and Twitter.
223
Home page
The first page of a website, which contains information about the website’s purpose and content. It also provides links to other web pages and resources in the site.
224
Hot swappable
An extension of plug and play functionality where a new device can be connected to a computer while it is still running, without needing to power down, set up the device, or reboot the computer.
225
Hotspot
The area where a WiFi signal can be detected and used, providing internet access to devices.
226
HTML
Hyper-Text Markup Language: The predominant markup language for creating web pages. Used to structure and present content on the World Wide Web (WWW), including text, graphics, audio, and video. HTML elements consist of tags surrounded by angle brackets within web page content. HTML files are text files readable by all browsers and word processing software, making it the fundamental language for creating basic websites.
227
HTTP
HyperText Transfer Protocol: The standard protocol for transferring web pages and their content across the Internet.
228
HTTPS
HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP.
229
Hybrid computer
Laptop / tablet with a reversible or detachable screen and a normal keyboard. The screen is touch- or pen-sensitive. This machine can be used either as a normal laptop or as a tablet.
230
Hybrid Drive
A secondary storage device that combines a mechanical HDD and an SSD.
231
Hyperlink (Link)
An icon, graphic, or text in a document that links to another file or object. A built-in connection to another place in a document (web page, resource), often indicated as text underlined in blue.
232
Hypertext
A document with highlighted words or pictures, which when clicked on links to other information.
233
ICT
Information and Communication Technology: The use of computer-based technology and the Internet to make information and communication services available in a wide range of users.
234
Identity Theft
Obtaining a user's identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim's name. Eg: Banking information
235
IM
Instant Messaging: The exchange of text messages through a software application in real-time.
236
Import
Process of opening or 'reading' data created in a different version of the same application or even a totally different application. It involves bringing in data saved in a format that can be read by a different version of the same software or a different program altogether.
237
Information
Information is processed facts or data. Information comprises particulars that make sense, that you can use when you have to make decisions or when you have to solve problems.
238
Information overload
Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can't cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.
239
Information Processing Cycle
The sequence of events in processing data into information which includes input, processing, storage and output. Communication has also become a very important element in this cycle.
240
Information Theft
The illegal copying or storage of confidential personal or financial information, including passwords, software code, algorithms or databases.
241
Infrared
Infrared connects devices in a short range, devices need to be line-of-sight and only one-to-one connections can be made.
242
Inkjet printer
Type of printer that sprays microscopic dots of ink onto the paper and is relatively cheap to buy but is comparatively expensive to run. Good for high-quality graphics such as photographs.
243
Input Mask
Field property in database design used to enforce data entry in a specific format. It consists of a code made up of letters, digits, and symbols, which dictates how data should be formatted when entered into a field. Input masks are commonly used for fields such as telephone numbers or dates to ensure consistency and accuracy of data input.
244
Integrated Graphics
A GPU that is embedded in the CPU, and instead of separate VRAM, the GPU shares system RAM.
245
Internet
Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.
246
Interrupt
A signal sent to the operating system from hardware or software requiring the CPU's attention.
247
Intranet
Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.
248
IoT
Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.
249
IP Address
Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses. IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.
250
IRQ
Interrupt Request Number: A unique device number that the operating system uses to identify the source of the interrupt.
251
ISO rating
A digital camera’s sensitivity to light. Higher ISO ratings are better.
252
ISP
Internet Service Provider: a company that has a permanent, fast connection to the internet. They sell internet access and services to individuals or organisations for a monthly fee.
253
ISP-Based email
When using ISP-based email, you access your email by using software such as Microsoft Outlook on the device where your account settings have been configured.
254
Kernel
The kernel is the core of the operating system that is always in RAM to control the computer.
255
Keylogger / Keylogging
A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.
256
Label (Access)
A control containing text, mainly used for headings and captions.
257
LAN
Local Area Network: Network that connects computers and other devices within a limited geographical area, such as a school, office building, or campus.
258
Laptop / Notebook
A mobile electronic device that has the same power today as a PC. Its main advantage is that it is portable.
259
Laser printer
Type of printer that works like a photocopier, using toner instead of ink cartridges. Relatively expensive to buy compared to inkjet printers but cheaper to run and, of the two, best suited for higher volume printing.
260
Latency
The time taken for a component or device to respond.
261
LBS
Location Based Services: Services that use a device's geographical position provide contextual information like the nearest ATM, restaurant or retail store.
262
LCD
Liquid Crystal Display: A monitor that does not need to be refreshed. Found in Laptops and PDAs.
263
Legend (Excel)
The ‘key’ which describes (gives the names of) the different data series in the chart, by depicting the fill colours or the patterns used.
264
Linux
An open source operating system.
265
List box (Access)
A list of values from which a user can select a value but not add an additional one
266
Lumen
This measures the brightness of the image projected by a data projector. The higher the lumen rating, the more effective the projector will be.
267
M.2 Format
M.2 is a form factor – it describes the shape and size of a hardware device.
268
MAC Address
Media Access Control Address: A hardware identification number that uniquely identifies each network node.
269
Machine Cycle
The steps for a program instruction to be executed by the CPU. It consists of FETCH, DECODE, EXECUTE and STORE.
270
Macro
A single instruction that expands automatically into a set of instructions to perform a particular task.
271
Mail merge
A document is merged with a list of names/addresses to avoid having to type out letters out individually. The data source could be a spreadsheet, a database table or a word processing table.
272
Mainframe
A powerful computer that is used to control major networks, e.g. banks, universities and large companies.
273
Malware
Software harmful to the computer written with negative intentions
274
MAN
Metropolitan Area Network: High-speed interconnected LANs across a city or metropolitan area.
275
Margins
The distance between the text and the sides of a whole page or whole document.
276
Markers (Excel)
Small marks (e.g. dots or crosses) used to indicate the actual data points on a line chart.
277
Meme
An image, video, piece of text, etc., typically humorous in nature, that is copied and spread rapidly by Internet users, often with slight variations.
278
Memory
Temporary storage area for programs and data being processed in the computer. Memory loses its contents when the power is switched off. Such as RAM
279
Memory Card
Electronic storage media used in digital cameras and smartphones.
280
Metadata
Additional data. Providing information about a certain item's content. Eg: size, colour depth, resolution, date created, document length, author, etc.
281
Metaverse
A world that promises to combine the physical world, digital, artificial intelligence, augmented reality and cryptonomics into one immersive experience.
282
Micro-USB
A smaller type of USB port, usually found on mobile devices such as smartphones.
283
Microwave
A communications system that uses microwave frequency radio waves to transmit video, audio, or data between two locations, from a few metres to several kilometres apart.
284
Mid-range computer
For users that will be using their desktop for basic applications such as e-mail, Internet surfing and general documentation, but are more frequent users, require multi-tasking and are looking for a PC with slightly better specs than the entry-level range shown above.
285
Mobile Applications
Applications that are downloaded and installed on a mobile device. An app can access remote content and data using the Internet or download the content to be accessed locally.
286
Mobile Device
Electronic devices, usually portable, which helps the user with diary, dates, calendars and short notes.
287
Mobile Offices
A temporary or movable configuration of equipment and services allowing a person to function as if they are working from a permanent office
288
Mobile Operating System
Operating systems designed to run on mobile devices with limited resources, e.g. iOS, Windows Mobile, Android
289
Mobile or m-learning
A form of education and training delivered and conducted via the internet using mobile devices.
290
Mobile user
User (not necessarily a separate category) who wants and needs to have their technology with them wherever they are, e.g. sales people and consultants.
291
Modular Design
A computer is assembled with various components to suit a user's requirements.
292
Monitor / Screen
A piece of electrical equipment which displays images generated from the video output of devices such as computers, without producing a permanent record.
293
Motherboard
A large circuit board that connects the most important components such as CPU, memory and connectors for peripherals
294
Multi-function printer
An all-in-one input/output device which can typically print, scan, photocopy and fax
295
Multi-touch (touch screen)
A screen that allows for two or more fingers to be detected and used on it at one time, e.g. for pinching actions.
296
Multi-user operating system
An operating system that allows multiple users to access a computer system at the same time. It is often used in networks where the same single operating system deals with multiple users that are simultaneously logged on.
297
Multimedia
Content that uses a combination of different content forms. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content forms.
298
Multiprocessing
More than one physical core on a CPU chip. When a computer is able to run more than one process simultaneously.
299
Multitasking
An operating system is able to load and process multiple tasks/processes simultaneously. True multitasking is achieved if the CPU has more than one core (multiprocessing). For example, compiling a program and listening to music.
300
Netiquette
The use of good manners when using the Internet and respect for other users.
301
Network
A collection of computing devices that are connected via some form of medium.
302
NFC
Near Field Communication: Technology that allows electronic devices to connect wirelessly and exchange data, simply by touching them together or bringing them close together. NFC is mainly used for payment processing.
303
NIC
Network Interface Card: Connects a computer to a network enabling data to be sent and received between the computer and other network-connected devices.
304
Node
Any device connected to a network and has an IP address.
305
Non-breaking hyphen
Used to force the words or characters on both sides of the hyphen to remain on the same line. ()
306
Normalisation
The process of creating separate linked tables by removing data redundancy, anomalies and complex SQL queries.
307
NVMe
Non-Volatile Memory express: A device interface specification for accessing a computer's non-volatile storage media attached via PCI Express bus.
308
OCR
Optical Character Recognition: technology that converts text within an image into editable and searchable text by analysing the image and translating the text into a standardised format such as UNICODE.
309
Office Suite
A package which includes a number of standalone programs. Referred to as an Integrated Package. Types of applications included: Word processing, spreadsheet, presentations, e-mail, and database. Examples include Office 365, OpenOffice
310
OLE Object (Access)
A data type that can contain graphics, sound and video in addition to other data types. (Object Linking and Embedding)
311
Onboard Controller
A hardware component embedded into a circuit board such as the motherboard.
312
Online / Virtual Community
An online group of individuals who share common interests and ideas through digital networks.
313
Online banking
Allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtual bank, credit union or building society.
314
Online storage
Disk space that is allocated to you on a server on the internet. Accessible wherever you can log into the server.
315
Open Source Licence
The source code is freely available and can be changed. For a copyleft licence, any changes to the source code require the user to release the source code.
316
Open-ended questions
Questions that cannot be answered directly with facts and require some form of exploring, brainstorming or judgment. These questions often start with words such as Why? How? What if? etc.
317
Optical Drives
A secondary storage device that stores programs and data using lasers, e.g. DVD, CD
318
Optical Zoom
Uses lenses on the camera to ‘get closer’ to the object being photographed. Use optical zoom for better quality images.
319
Orientation
The horizontal (landscape) and vertical (portrait) orientation of a page.
320
OS
Operating system: System software that manages hardware resources and runs applications, controlling all activities within a computer. Examples include Windows, Linux, macOS, iOS, and Android.
321
OSS
Open Source Software: Software for which the source code is available to users, allowing it to be freely used, modified, and distributed. While the software itself can be freely copied and shared, it may not be sold. An example of open source software is Linux.
322
Page break
Starts text on a new page, without creating a new section.
323
PAN
Personal Area Network: A network organised around an individual or a small group, typically with a range of a few metres, used to communicate between personal devices such as PCs, smartphones, smart wear, and tablets.
324
Patch
A downloadable software update that fixes flaws, bugs, or security vulnerabilities in an operating system or other programs.
325
Path
The succession of folders, starting from the drive letter and separated by \ , that lead to the location of a specific file, e.g. U:\Documents\Finance\2019
326
PCIe Bus
PCI-express Bus: High-speed motherboard bus of various sizes to connect graphics cards, RAID cards, Wi-Fi cards or SSDs.
327
PDF
Portable Document Format: A file format used to distribute documents that is independent of the application in which they were created. It can be read using a free utility program called Adobe Reader.
328
Peer to Peer File sharing
Each networked computer acts as a file server providing file sharing services to other network nodes.
329
Pen input
A pen (or stylus) is an input device used together with a pressure-sensitive digitising tablet.
330
Peripheral
Input, output or storage devices connected to the motherboard
331
Phablet
A smartphone with a screen size larger than 5" (midway in size between a smartphone and a tablet).
332
Pharming
A scamming practice where a user's web traffic is automatically redirected to a bogus website, even if the correct URL for the official site is entered. This allows criminals to capture any data the user enters, such as passwords and PINs.
333
Phishing
A scamming technique where users are enticed, usually via email, to click on a link to a fraudulent website in order to trick them into providing personal and confidential information, such as banking details, PIN numbers, and passwords, often by posing as a legitimate organisation.
334
PIN
Personal Identification Number: A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards.
335
Pivot Tables
An interactive table that automatically extracts, organizes, and summarizes your data. You can use this report to analyse the data, make comparisons, detect patterns and relationships, and discover trends.
336
Pixel density
Also known as dpi – how many pixels the display fits into a 1" horizontal line. A higher pixel density is better.
337
Pixels
Digital cameras capture images as pixel elements, known as pixels. Simply put, a megapixel is equal to one million pixels.
338
Plagiarism
The use of materials and sources without acknowledging the author.
339
Plain text file
A text file that contains lines of plain text with no formatting. The file extension .txt is associated with text files.
340
Platform
A type of operating system, e.g. Linux, Android, Windows.
341
Plot Area (Excel)
The ‘middle’ part of a chart where the data – the bars/columns/line – is plotted.
342
Plug and Play/Hotswappable/Autoconfiguration
A series of technologies where a new hardware device connected to a computer is automatically detected and configured by the operating system, enabling it to be used almost immediately without requiring manual installation.
343
Plug-in
A third-party app that the browser can call on to display specialised content such as a Flash video.
344
Podcast
A series of on-demand digital audio files that typically focus on a specific topic or theme, available for streaming or downloading over the internet.
345
Point to Point
A direct connection between two network nodes.
346
Pointing stick
An alternative to a mouse, used with laptops. It takes the form of a small button between the keys of the keyboard. You move the pointing stick to move the pointer, and press it down to click.
347
Pop-up
A small web browser window that appears on top of the website you are viewing. They are usually created by advertisers and often open as soon as you visit a website.
348
POS
Point of Sale: The software used in shops and supermarkets to manage tills, often linked to stock control systems designed to expedite the sale of goods and services in retail environments.
349
POST
Power On Self Test: A program executed by BIOS to check the computer's hardware using the list of installed devices from CMOS.
350
Power user
Category of user who has computing needs that make the top-of-the-range hardware and software indispensable, e.g. architects and engineers. They typically also use all the advanced functions of the software they use.
351
ppm
Pages per minute: A measurement of the printing speed, indicating the number of pages a printer can produce in one minute.
352
Primary Key
A field within a database table that uniquely identifies each record by its unique value, ensuring each record can be distinguished from others in the table.
353
Primary Memory / Storage
Electronic and fast memory that holds the instructions that the computer is using whilst it is on. Examples include RAM, BIOS and ROM.
354
Printer
An electromechanical device that prints text or illustrations (hard copies) on paper.
355
Printer queue
Temporary storage area on the hard drive where print tasks are sent and where they wait until the printer is ready to print them. Each printer has its own queue
356
Processor cache
Primary storage that stores the next few instructions and data to be processed from slower RAM. Level 1 runs at the speed of the CPU.
357
Program files
Actual programs, not data files, that run (execute) when opened. They normally have a .com or .exe file extension. .
358
Proprietary software / License
Software that is licensed under specific terms and conditions, typically restricting users from freely using, copying, modifying, or distributing it. The source code is not available, only the executable code, and usage often requires product or activation keys for licensing.
359
PSU
Power Supply Unit: An internal or external device to provide regulated power to the computer.
360
QR code
Quick response code: A two-dimensional square barcode capable of storing significantly more data than traditional barcodes. QR codes can be scanned using a mobile device camera to access encoded information.
361
Quarantine
Placing a virus in an area of the disk where it cannot infect the computer.
362
Query
The object that allows you to retrieve specific information from a vast database based on certain criteria. Advanced queries can be made, i.e. more than one field, certain fields can be displayed, criteria can be applied to a number of fields in a specific order and results are stored.
363
RAID
Redundant Array of Inexpensive Disks: Multiple hard drives to protect against hard drive failure so if one hard drive fails, the other hard drive(s) can reconstruct the missing data providing reliable hard drive storage.
364
RAM
Primary short-term, volatile memory that temporarily stores programs and instructions currently loaded.
365
Ransomware
Malicious software that encrypts data on a computer or network, making it inaccessible to the user until a ransom is paid to the attacker.
366
Read-only
A file attribute that indicates if a file is read only or not. A read-only file cannot be modified and saved under the same name within the same folder.
367
Real-time messaging
Online exchange of messages (also images, video and voice) in real time. It includes IM (e.g. WhatsApp) and chat.
368
Record
A group of related fields that contains the particulars of a specific entity
369
Referential Integrity
A record cannot refer to another record that does not exist.
370
Refresh Rate
The frequency at which a monitor's screen is refreshed or redrawn each second, measured in hertz (Hz). A higher refresh rate indicates a smoother and more responsive display.
371
Registers
Fast RAM (SRAM) on the CPU that stores the current instruction and its data.
372
Relational Database
A collection of related tables store data about a subject or a group of subjects.
373
Relative cell reference
In a spreadsheet formula, a cell address that adjusts automatically when the formula is copied to another cell.
374
Remote Access
Using a computer to access and control a remote networked computer or device using the Internet.
375
Remote working
Teleworking allows employees to work at home or at a local telework centre one or more days per week using communication tools, such as such as phone, fax, modem, Internet teleconferencing, e-mail or IM, to perform work duties from a remote location.
376
Report
Allows the user to view information so it can be presented in a printed format in various different ways.
377
Resolution
Scanner: Resolution is measured in dots per inch (DPI), indicating the number of dots the scanner can capture per inch. Digital Camera: Resolution refers to the total number of pixels that make up an image. Printer: Resolution indicates the number of dots the printer/scanner can create along a horizontal line, measured in dots per inch (DPI) determining the quality of the image
378
Reverse Social Engineering or Role Playing
An attacker convinces the target that they have a computer problem or vulnerability so they can access or download Malware onto the target's device.
379
RFID
Radio Frequency Identification: A technology that uses small radio devices, typically smaller than a grain of rice, to store and transmit data via radio signals, allowing identification and data transfer to a receiving device.
380
Robotics
Designing, manufacturing and operating intelligent machines to perform human tasks.
381
ROM
Read Only Memory: A non-volatile memory chip that can be used to permanently store data in computers and other electronic devices, such as BIOS firmware, embedded operating systems and appliance/robotics controllers. Holding the instructions to start the computer and loard the operating system.
382
Router
A network device that connects multiple networks using the same protocol and determines the best path for data packets to travel between them. It enables devices to connect to a network and provides internet connectivity via fixed lines (such as telephone lines or fibre optic cables) or wireless means like WiFi.
383
rpm
Revolutions per minute – unit in which the rotational speed of a hard drive is measured, e.g. 7200 rpm.
384
RSI
Repetitive Strain Injury: An occupational illness caused by repetitive movements, typically of the hands and arms, resulting in damage to nerves in the hands, arms, shoulders, and neck. It is associated with fast, repetitive actions such as frequent text messaging.
385
RSS
Really Simple Syndication – a technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines – all from many different sites.
386
rtf
Rich Text Format: A file format that supports text formatting such as bold, font sizes, tab settings and even images. Widely used and supported by most word processors.
387
Safe Mode
A mode in which a computer can be booted in order to help fix various software problems. In Safe Mode, only essential system programs and services are loaded.
388
Sample group
The group of people chosen to take part in a survey, whose responses are used to reflect the opinions and responses of the bigger target group. The sample group should be fairly representative of the target group.
389
SATA
The internal hard drive interface or connection used to connect mass storage devices (such as mechanical or solid state hard drives) to a computer motherboard.
390
Satellite
Used to establish communication links in remote locations or over long distances. Used by Telkom, Military and other media organisations.
391
Scam
False organisations that trick you into doing business with them online, which means you, lose money.
392
Scanner
An input device that scans images, including printed text, graphics, barcodes, QR codes, and even parts of the human body, into a computer. OCR (Optical Character Recognition) can be used to convert scanned images into editable text files.
393
Scheduler
A program that is used to run certain programs at specific times.
394
Screen lock pattern
A security feature on mobile devices where a pattern, drawn or traced on the screen with a finger, is used to unlock the device.
395
SD Card
Secure Digital Card: A secondary storage medium that stores programs but mostly data and is small in size.
396
Search Engine
A software program or website that allows users to search for webpages or documents on the internet using keywords or phrases entered by the user.
397
Secondary storage
Permanent storage that stores all programs and data on the local computer.
398
Section (Word)
A part of a document in which the page formatting can differ from the rest of the document. Sections are thus used to vary the page layout on one or more pages of the same document.
399
Section Break (Word)
Separates a document or page into sections, and indicates the end of one section / start of the next section. Distinguishes sections from one another, and allows different sections to be formatted differently.
400
Secure URL
A URL that begins with https:// or has a small closed lock displayed somewhere on the page, often next to the URL. It means that the site is encrypted for security.
401
Sensor size
The size of the sensor in a digital camera. The bigger the size, the better the quality of the image.
402
Sensors
A device that converts a real-world property into data that a computer can process by converting the physical parameter (for example, temperature, blood pressure, height, humidity, speed, etc.) into a signal which can be measured electrically.
403
SEO
Search Engine Optimisation: A combination of strategies to increase the number of website visitors by obtaining a high-ranking placement in the Search Engine Page Results (SERP).
404
Server
A computer or software that provides services or resources to other computers (clients) within a network. This includes functions like file serving, print serving, hosting websites, managing email, and more.
405
Service pack
A collection of all the previous software updates for the last period of time (6 months to a year). It is meant to help people who are behind in their updates fix their software all at once. Service packs are pretty much a thing of the past. Most software companies create software so that it will regularly check for updates and then automatically download and install those updates.
406
Shaped connection
An internet connection where preference is given to certain services on the internet, such as email, downloading and browsing. Other services, such as online gaming and VoIP, are given less preference and are slower.
407
Shareware
Proprietary software that is freely distributed to users on a trial basis, typically for a limited period (usually 30 days). Users can download and use shareware for free during the trial period, after which the software may stop functioning or restrict some features until a full version is purchased.
408
Shoulder Surfing
Using observational techniques, such as looking over someone's shoulder, to gain private information such as a password.
409
Single-user Licence
A licence under which you may only install one copy of the software. You may not install it on other computers.
410
Single-user Operating System
An operating system that can only be used by a single user at a time.
411
Site Licence
A licence agreement that allows a company or organisation an unrestricted number of installations of the software within the company or organisation.
412
Skype
A popular software package that allows people to communicate using VoIP. Skype also allows you to make video calls if you have a webcam attached to your computer.
413
Smart home
Home in which virtual assistant software is coupled to ‘pods’ that link to all the electronically controlled devices in the home.
414
Smartphone
Handheld devices that integrates mobile phone capabilities with the more common features of a handheld computer or cellphone. Smartphones allow users to store information, e-mail, and install programs, along with using a mobile phone in one device.
415
SMiShing
When a phishing attack is done via an SMS on a smartphone. SMiShing is short for SMS phishing.
416
SMTP
Simple Mail Transfer Protocol: An email protocol for delivering emails from an email client to a server. It is usually used for outgoing emails.
417
Social Engineering
The use of deception and psychological manipulation to trick individuals into divulging confidential information, providing unauthorized access to computer systems, or performing actions that may compromise security. This can include impersonation, installing malware, or other fraudulent activities.
418
Social Media
The collective of online communications channels dedicated to community-based input, interaction, content-sharing and collaboration. Social media refers to websites and applications that enable users to create and share content or to participate in social networking.
419
Social Networking
A web-based technology platform that facilitates communication, data sharing, and connections among users, including friends, family, colleagues, and strangers with similar interests. It allows individuals and organisations to post and share likes, dislikes, interests, comments, photographs, and activities. Examples include Facebook, Instagram, TikTok, Twitter, etc.
420
Soft Copy
A readable version of information that is not printed on a physical medium, typically stored or displayed on a computer screen. It contrasts with hard copy, which refers to information printed on paper.
421
Software
Programs written to control, support and operate the computer itself (It enables everything on your computer to work better) e.g. operating system, utilities, drivers etc.
422
Software Piracy
The illegal copying, distribution, or downloading of software, CDs, or DVDs without proper authorization, typically for commercial or personal use.
423
Software Theft
The unauthorised or illegal copying, sharing or usage of copyright-protected software programs.
424
SOHO
Small Office Home Office: A SOHO user is the type of user that works from home and might need general entry-level desktops for administrative functions such as accounting, databases, planning and scheduling.
425
Spam
The electronic equivalent of junk mail, specifically referring to unsolicited email advertisements or messages sent to users without their request or consent.
426
Speech recognition
Software that ‘listens’ to what you say and ‘understands’ it as a command or turns it into text (instead of the user typing the text).
427
Spoofing
The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL.
428
Spooling
The process where documents waiting to be printed are temporarily stored on a disk, forming a queue until the printer is ready to process them. This technique helps manage printing tasks efficiently when the printer operates slower than the speed of the computer.
429
Spyware
Software that covertly installs malware on a user's device to intercept and collect their data without their informed consent. This may include keystroke logging or other methods to monitor and report user activities to third parties.
430
SRAM
Static RAM: Fast RAM located on or near the CPU without capacitors. It does not need to be refreshed; hence it is faster. Also smaller and more expensive.
431
SSD
Solid State Drive: A storage device that electronically stores programs and data in flash memory, providing faster disk access compared to traditional hard drives.
432
SSL
Secure Sockets Layer: A security management protocol for transmitting data on the Internet. It has been replaced with Transport Layer Security (TLS) certificates.
433
Stack and scale (Excel)
Where a data series in a chart is filled with pictures, and each picture is used to represent a certain number of units.
434
Stacked chart (Excel)
A type of chart where data series are placed one on top of the other – useful for comparing main categories (grand totals) and sub-categories in the same chart.
435
Stand-Alone Applications
Applications that do not require any networking hardware or software resources.
436
STP
Shielded Twisted Pair: Twisted pairs of copper wire enclosed in a protective foil. This type of cable is less affected than UTP by interference and crosstalk.
437
Streaming
The process of continuously receiving data from the Internet in real-time.
438
String (text data)
Combinations of characters (letters, digits and symbols like @) in text data. Examples are names and surnames, as well as strings of digits such as cellphone numbers and postal codes.
439
Styles
A combination of formatting attributes saved as a collection under one name.
440
Subscription-based software
Software where the user pays a monthly or yearly subscription for the use of the software, e.g. Office 365.
441
Super computer
A high powered, large computer that is used by big corporations, governments and universities, for massive calculations or number crunching.
442
Superscript / Subscript
Superscript is text that appears in smaller script above the text line. Subscript is text that appears in smaller script below the text line.
443
Surface Web
Indexed part of the World Wide Web that is searchable with standard web search engines.
444
Survey
A method of gathering data about a specific topic to analyse the data.
445
Switch
A network device used to connect multiple computers or devices within a local area network (LAN), allowing communication between them via Ethernet cables. Switches operate in a star topology and are essential for local network communication but do not provide internet access directly.
446
Synching
The process where changes made to data on one device are automatically updated and replicated across all devices that share the same data, ensuring consistency and accessibility in real-time.
447
System Clock
The microchip on the motherboard that regulates the timing and speed of computer functions.
448
System requirements
The minimum requirements (such as storage space, processing power and memory) needed to run a piece of software. When software requirements are indicated, this usually relates to the operating system needed.
449
System Software
Software designed to manage and control computer hardware and provide a platform for running application software. This includes operating systems, utilities, device drivers, and other essential programs that enable the computer to function efficiently.
450
Tabbed browsing
Allows you to have several web pages open on separate tabs of a single web browser, allowing you to quickly and easily jump between web pages.
451
Table
A collection of records in a database.
452
Table of contents (Word)
Automatically created list of headings or chapters and the pages on which they start, placed at the beginning of a document.
453
Tablet
A portable computer featuring a touch- or pen-sensitive screen for user interaction. Tablets are similar to smartphones but offer advantages such as larger screens and longer battery life. They are designed for mobile use and typically run special operating systems, providing wireless or 3G data connectivity. Unlike smartphones, tablets cannot make phone calls or send/receive SMS messages.
454
Target audience
The specific group of individuals or users that information, messages, or surveys are intended for, typically chosen based on demographics, interests, or specific criteria relevant to the communication or research objective.
455
Task Manager
Provides information about the computer’s performance and applications and processes. Most often used to end non-responding tasks or programs.
456
TCP/IP Protocol
The communication protocol for the Internet. It defines the address of each device (IP) and the packet structure of the communication (TCP).
457
Telecommuting (e-commuting)
A work arrangement where employees work from home or remote locations, communicating with their workplace, colleagues, and clients primarily through electronic means such as phone, fax, email, or internet. This eliminates the need for physical commuting to a traditional office setting.
458
Template
A blueprint or framework for a specific type of document, providing a predefined layout. Templates allow users to create new copies of the document by filling in necessary information, thereby streamlining the document creation process.
459
Text File
A data structure that stores unstructured text data permanently.
460
Theme
A collection of formatting elements that complement each other to lend a specific appearance to a document, in respect of fonts used for headings and body text, the colour combinations as well as the fill and line effects are used in the document.
461
Thin client
A special (cheaper) type of computer that doesn’t have its own hard drive and has limited memory and CPU power. It relies on a server for resources.
462
Throttling
When an Internet Service Provider (ISP) intentionally slows down the internet connection speed of a user who is consuming excessive amounts of data. This is typically done based on the ISP's acceptable use policy (AUP), which defines thresholds or conditions under which throttling may occur to manage network congestion or ensure fair usage among subscribers.
463
Tooltip
A tip or information that pops up when you rest the pointer on an icon or object.
464
Top-range Computer
For users that will be using their desktop for more
465
Topology
The physical layout of a network. Star, bus, ring and hybrid
466
Touch Screen
An electronic display screen that serves as both an input and output device, allowing users to interact directly with a computer or device using their finger or a stylus. Touch screens are commonly found in smartphones, tablets, and other electronic devices, with variations that can respond to different types of touch inputs.
467
Touchpad
A pressure-sensitive surface built into laptops. It is an input device that can be used instead of a mouse.
468
Track changes
A feature in word processing software that records and displays all modifications made to a document. Deletions are typically shown as strike-through text, while insertions are often indicated with underlined text or in a different colour. This feature allows users to review and accept or reject changes made during collaborative editing processes.
469
Trackball
An input device with a large ball on it. You move the pointer on the screen by rolling the ball with your thumb.
470
Trendline (Excel)
A straight or curved type of ‘best fit’ line in a chart, that shows the general trend or direction of the values of a data series – usually over time.
471
Trojan
A type of malicious software that masquerades as a legitimate or useful program, but when executed, it causes harm to a computer system.
472
Twitter
A microblogging service (‘micro’ is used to describe the service because messages in Twitter can’t be longer than 280 characters). Twitter allows people to send messages (tweets) to their ‘followers’.
473
Unbounded Media
Transferring signals between nodes using no cables such as Bluetooth, infrared beams, microwaves, satellites or laser light signals.
474
Unmanned Aerial Vehicles
A type of aircraft that operates without an onboard pilot, the most common being a drone.
475
Unshaped connection
An internet connection that gives all the internet services the same priority.
476
Update
Either the latest fix for bugs in the current version of the software, or the addition of new, additional features to the software.
477
Upgrade
Hardware Upgrade: The process of replacing old or obsolete hardware components with newer equivalents to improve performance or functionality. Software Upgrade: Installing a new version of software that includes significant changes or new features. Software upgrades typically require payment for the new version.
478
UPS
Uninterruptible Power Supply: An electrical device designed to provide emergency power to electrical equipment when the primary power source fails. It protects computers and other devices from power surges, spikes, and outages, allowing enough time to save work and shut down equipment properly.
479
URL
Uniform Resource Locator: A unique alphanumeric address used to identify resources such as websites, web pages, documents, and files stored on web servers. URLs are entered into the address bar of a web browser to locate and access specific resources on the internet.
480
URL Shortener
A tool or service, such as TinyURL.com, that converts a long URL into a shorter version. This abbreviated URL redirects users to the same web address as the original, making it easier to share, remember, and type.
481
USB
Universal Serial Bus: Standardised serial bus to connect most types of peripherals to the motherboard. It transfers data and power.
482
USB Port
Standard port commonly used to connect devices such as keyboards, mice and printers to a computer. USB ports and standards are evolving and becoming faster.
483
Username / password
Your username identifies you as a user and the password is a secret set of characters that ensures that it is you that is logging in . The computer will then authenticate you as a valid user.
484
Utility programs
System software programs designed to assist users in performing maintenance tasks and managing computer resources. Operating systems often include utilities for tasks such as managing disk drives, printers, and other devices.
485
UTP
Unshielded Twisted Pair: A type of cable that consists of several pairs of copper twisted wires within an outer protective plastic cover.
486
Valid data
Data where the values are acceptable in terms of permissible values, the limits within which it occurs or the format in which it is entered.
487
Validation Rule
Criteria that data must meet to be considered valid within a specific field. Validation rules help prevent errors by enforcing the input of predefined values or conditions, ensuring data integrity and accuracy.
488
Validation text
The message that must be displayed if the data entered does not meet the condition(s) in the Validation Rule.
489
VGA port
Port used to connect the monitor to the computer. Largely replaced today by other connection types, such as HDMI.
490
Video blog (vlog)
A form of blog which uses video as the medium. Entries on the vlog normally consist of video supported by text and images.
491
Video Card
A separate circuit board that plugs into a special slot on the motherboard. It has its own video memory and a graphics processing unit (GPU) that improves video processing.
492
Video conference
An online conference between two or more people at different locations, using a computer network to transmit audio and video data, as if all the people were in the same room.
493
Video RAM (VRAM)
RAM that stores data about each pixel, its colour and location on the screen to be used by the GPU.
494
Virtual (on-screen) Keyboard
A software component that allows a user to enter characters. A virtual keyboard can usually be operated with multiple input devices, which may include a touchscreen, an actual keyboard and a computer mouse.
495
Virtual assistant
Software that allows you to speak to your phone (or tablet) and have it ‘understand’ and respond to what you say, e.g. ‘turn off the lights’.
496
Virtual community
A group of people who gather online to share ideas and interests.
497
Virtual Memory
A technique where the operating system uses free disk space on a hard drive to simulate additional RAM capacity. This allows the computer to run more programs simultaneously than the physical RAM would normally support. In virtual memory systems, RAM data is divided into pages that are swapped between RAM and the hard drive as needed, to optimize memory usage and performance.
498
Virtual Offices
A flexible workspace to provide businesses with any combination of services, space and/or technology without owning or leasing a traditional office.
499
Virtual Reality
The use of computer-based technology to create a simulated environment that immerses users and allows them to interact with a three-dimensional, computer-generated environment.
500
Virus
Damaging programs that are illegally copied and installed onto a computer and are part of Malware.
501
Virus signature/definition
The pattern that uniquely identifies the malware.
502
Vlog
A blog in which the postings are primarily in video form.
503
Vodcast
A video form of podcast
504
Voice Recognition Software
Software that enables computers to interpret and understand spoken language. It operates by converting spoken words into text or executing commands based on voice input. There are two primary categories: software for commanding computers and dictating text, and virtual assistants that perform tasks based on voice commands. Examples: Dragon Dictate or Dragon Naturally Speaking, Siri, Dragon Mobile Assistant, Google Now, Google Voice Search, etc.
505
VoIP
Voice Over Internet Protocol: A technology that enables voice and multimedia communications to be transmitted over IP networks, such as LANs, WANs, and the internet. VoIP allows users to make telephone calls to others with VoIP systems anywhere in the world, leveraging internet connectivity for communication.
506
Volatile memory
Memory (RAM) does not keep its contents when the power is switched off and this means that it is volatile. Storage (and ROM) keeps its contents at all times – therefore it is non-volatile.
507
VPN
Virtual Private Network: A network that connects remote users to a private internal network using the Internet.
508
WAN
Wide Area Network: A network that spans a large geographical area, such as a city, country, or continents, connecting multiple LANs (Local Area Networks) or MANs (Metropolitan Area Networks) across different locations.
509
Watermark
Text or a graphic which appears very lightly as a background on all the pages in a document.
510
Wearable devices
Wearable technologies, e.g. electronic mobile devices worn as accessories or part of clothing, e.g. smartwatches, fitness health trackers, etc. continuously generate data from various environments and communication with other devices.
511
Web 1.0
Static websites that do not allow users to interact with the content.
512
Web 2.0
Dynamic websites that allow users to interact with the content.
513
Web 3.0
Websites that provide users with a more personal experience by accessing browser history and location.
514
Web 4.0
Web 4.0 is the mobile web that can adapt to its mobile surroundings. Web 4.0 connects all devices in the real and virtual world in real time.
515
Web application/online software
Software that runs on servers on the internet. You view the interface in a web browser. Requiring only a browser and internet access to function.
516
Web browser
Software that allows you to view and explore Web pages on the Internet, e.g. Internet Explorer, Netscape Navigator, Google Chrome.
517
Web Cache
The activity of storing recently accessed web pages on a server in a network.
518
Web caching
Temporarily storing recently accessed web pages on disk so that they can be loaded more quickly the next time they are requested.
519
Web page
A document on the web which can be viewed in a web browser, and created in languages such as HTML, JavaScript, PHP and Python.
520
Web-based email
A service that allows you to access an email account through a web browser from any location that has internet access.
521
Webcam
A digital camera typically used for video conferencing, security monitoring, and other applications requiring real-time video feeds. Webcams are often integrated into laptops or set up separately, providing live video images to the computer or web server.
522
Weblog / blog
Website updated often with news and events in chronological or sequential order. A blog reads like a journal with the most recent entry at the top.
523
White Hat Hackers
Non-malicious hackers who legitimately test a company's computer and network security.
524
Wi-Fi
A popular technology that enables electronic devices to exchange data wirelessly over a computer network, including high-speed internet connections. Devices such as computers, smartphones, tablets, and others can connect to network resources like the internet via a wireless access point. Wi-Fi can provide coverage ranging from small areas like a single room to large areas encompassing multiple square miles, achieved through multiple overlapping access points.
525
Wi-Fi Router
A network device that connects a LAN to another network with the same protocol and provides Wi-Fi access to mobile devices.
526
Widow/Orphan
A single ‘dangling’ line at the top or bottom of a page of a paragraph that splits over a page.
527
Wiki
A website that allows multiple users to collaborate by adding, editing, and modifying content collectively. An example is Wikipedia, where users can contribute and edit articles collaboratively.
528
Wildcard
Wildcards are like the blank pieces in Scrabble, or like the Jokers you can use in some card games to stand in for any card. The wildcards “*” and “?” can be used to display all files with the extension “.doc” by typing “*.doc”, or all files “01062001.doc”, “01072001.doc”,“01122001.doc”... by typing “01??2001.doc”.
529
WIMAX
An upgrade on WiFi and a more secure wireless networking technology, that allows wireless devices to communicate with one another over a much wider area than WiFi.
530
Wireless Access Point
A wireless transceiver that broadcasts a signal within a limited area. Each access point is connected to a wired network.
531
Wizard
A feature that guides a user through a process such as creating a document.
532
WLAN
Wireless Local Area Network: A network that links two or more devices using wireless distribution methods, typically through an access point, allowing mobility within a local coverage area while maintaining connectivity to the wider internet. Wireless LANs are popular for their ease of installation and are commonly found in homes and commercial settings, providing wireless access to users.
533
WWW
World Wide Web: A service on the internet that comprises a vast collection of multimedia, interactive documents stored on servers worldwide. These documents are interconnected and accessed using HTTP (Hypertext Transfer Protocol).
534
Ink-jet printer
An ink-jet printer produces high-quality text and graphics by spraying ink onto a sheet of paper by using an ink cartridge.
535
Laser printer
A laser printer uses a laser beam to produce an image onto a drum. A laser printer uses a toner cartridge similar to a photocopy machine.
536
Bits and bytes conversions
One byte is 8 bits One kilobyte (KB) is equal to 1,024 bytes One Megabyte (MB) is equal to 1,024×1,024 or 1048576 bytes (1,024 kilobytes) One gigabyte (GB) is equal to 1,024 megabytes. One Terabyte (TB) is equal to 1,024 gigabytes.
537
Pie chart
Show and compare the cost percentages of items
538
Bar chart
A chart with bars whose lengths are proportional to quantities
539
Why would one pay more for a high-end computer?
To use demanding applications such as CAD, games, photo and video editing, graphic rendering, etc. as well as basic applications such as e-mail, Internet surfing and general documentation, and who are looking for a PC with more power. Paying extra for a higher performance PC will ensure that your PC can cope with more demanding applications while building future capacity.
540
Retinal scanner
Uses unique patterns of a person's retina to identify them.
541
Multi-function printer
A Multi-function printer incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting or to provide centralized document management/ distribution/production in a large-office setting. A typical MFP may act as a combination of some or all of the following devices: E-mail, Fax, Photocopier, Printer, Scanner
542
FIFO
First in, first out: ata transfer is not controlled by the ISP and is operated on a first come first served basis FIFO OR all protocols are treated in the same way and no protocol is given priority.
543
Disk Optimisation
Optimising the disk means that it compresses and/or organizes the files on your hard disk
544
Embedded computer
A dedicated computer system that forms an integral part of a larger machine or system
545
Drone Technologies
A drone is a flying robot that can be remotely controlled, combined with advanced technologies including GPS, sensors, artificial intelligence, and video cameras. It is an unarmed aircraft.
546
Memory Card Reader
A device connected to a computer designed to accept and read data from different types of storage media such as SIM and SD cards and flash drives.
547
Another word for shaping?
Tuning
548
Another word for throttling?
Policing
549
4IR
4th industrial revolution: describes the blurring boundaries between the physical, digital and biological worlds where AI, robotics, IoT and other technologies to make newly essential products and services
550
5IR
5th Industrial Revolution: develops alongside 4IR and uses its advantages to place focus on humans and their endeavours, defining the ethics and impact of technology.
551
IPO
Input, Processing and Output: Input Output Processing Storage Communication
552
Computer
An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
553
Raspberry PI/Arduino
Single board computers
554
Advantages and disadvantages of using computers.
Advantages: 1. Speed and efficiency: ability to process and analyse large amounts of data 2. Storage and organisation: ability to store large amounts of information in an organised manner 3. Connectivity and communication: enable easy communication and access to information worldwide Disadvantages: 1. Dependency and over-reliance: people can be dependent on computers for basic tasks 2. Health issues: prolonged use can lead to health issues 3. Security risks: security threats like viruses and hacking
555
Types of input
Data or instructions
556
How are computers categorised?
Portability, processing power and usage
557
What may disabled people use to make computing more accessible?
558
Ergonomic considerations for keyboard
559
Ergonomic considerations for mouse
560
Examples of pointing devices
Touch pad, trackball, keyboards, touch screen, stylus, joystick
561
Magnetic stripe
A magnetic area on the back of a plastic card containing electronic information.
562
Advantages and disadvantages of scanners
Advantages: 1. Digital archiving: conversion of physical documents into digital format for archiving 2. Easy sharing: digital files created can be shared 3. Improved organisation: documents can be organised and searched through easily Disadvantages: 1. Initial cost: high quality scanners are expensive 2. Technical issues: Scanners can have technical problems such as software glitches/hardware failures 3. Quality variations: scanned image quality can vary depending on scanner and scanner settings
563
Advantages and disadvantages of digital cameras
Advantages: 1. Instant gratification: photos can be seen immediately 2. Cost-effective: no film purchase or development costs 3. Easy editing and sharing online Disadvantages: 1. Battery dependency 2. Initial cost: Higj quality digital cameras can be expensive 3. Complexity for beginners: advanced digital cameras can be complex to use
564
Advantages and disadvantages of input hand-held devices
Advantages: 1. Portability: easy to use and carry anywhere 2. Ease of use: many are user-friendly 3. Efficienct: devices can speed up data input and processing Disadvantages: 1. Limited functionality: limited capabilities compared to larger devices 2. Battery dependency: many require frequent recharging or battery changing 3. Durability issues: can be fragile and prone to damage
565
Types of output
Text, graphic, audio, video
566
Types of input
Video, audio, biometric
567
Output devices for disabled users
568
Print speed of inkjet, laser, 3D and dot matrix printers
569
Advantages and disadvantages of inkjet, laser, 3D and dot matrix printers
570
Quality of inkjet, laser, 3D and dot matrix printers
571
Cost of inkjet, laser, 3D and dot matrix printers
572
Advantages and disadvantages of [display devices]
573
Factors to consider when purchasing
Budget, speed, colour, cost, graphics, printing, paper type and size, compatibility, mobility, resolution, economic/environmental considerations
574
One EB is how many PB?
One exabyte is 1000 petabytes
575
One PB is how many GB?
One petabyte is one million gigabytes
576
Robustness
577
What is the difference between primary and secondary storage?
578
What storage media is suitable for backups?
579
Advantages and disadvantages of cloud storage?
580
How can peripherals be connected?
Cabled or wireless (bluetooth, USB or WiFi)
581
Outline the booting/start-up process
582
SDRAM
583
DDRRAM chips
584
PROM
585
EPROM
586
EEPROM
587
How would one troubleshoot the following: 1. Disk errors 2. Resolution 3. Non-responding programs 4. Non-responding mouse 5. Non-respinding keyboard 6. Printing issues 7. Connection issues 8. Storage issues 9. Issues with UPS
588
Differentiate between system software and application software
589
Examples of GUI
Icons, combo boxes, checkboxes
590
Advantages and disadvantages of open source software
591
Site license agreement
592
Subscription model agreement
593
Risks of using flawed software
594
Factors that influence performace
RAM, Processing (type, speed, number of cores, cache), number of applications running and caching, disk optimisation
595
Mobile operating systems
Android, iOS
596
Desktop operating systems
Windows, Linux, MacOS
597
Embedded operating systems
598
Auto configuration of devices
599
Troubleshooting for system software
Disk cleanup, wizards, etc.
600
Basic security of a computer
Username and password log on
601
Forms of authentication
Screen lock pattern, biometric input
602
Examples of utility programs
Scheduler/update utility, backup/archive, firewalls
603
Application version
604
Software for disabled users
Screen readers, voice recognition software...
605
Typing tutor
606
How to use snipping tool
Win+shift+S
607
How to add a new peripheral
608
How to access task manager
609
How to change the default printer
610
How to manage the printer queue
611
Hardware configuration of: 1. Processor 2. Memory 3. Hard drive size
612
File organisation
613
Provide possible file extensions for: 1. Compressed files 2. Office suite files 3. Graphics 4. Movie 5. Sound 6. Animation 7. PDF
614
What are the objectives of a network?
615
Advantages and disadvantages of networks
Advantages: Facilitating communications, sharing hardware/software/data/information Disadvantages: security issues, privacy issues
616
What can make a network more secure?
Access rights, usernames and passwords
617
Purpose, role and use of: 1. PAN 2. HAN 3. LAN 4. MAN 5. WAN 6. GAN
618
Advantages and disadvantages of WLAN
619
Role, use and purpose of WLAN
620
Give an example of a GAN and advantages and disadvantages
The internet
621
What are the basic components of a network?
Workstations and servers, NIC, connection devices (router and switch), communication medium, network software
622
What is needed to set up a PAN/HAN
623
Good practices when engaging in digital communications
624
Types of digital communications
VoIP, File sharing (eg. FTP), video conferencing
625
Advantages and disadvantages of digital communications
626
Website
A set of related web pages under a single domain name.
627
Hardware and software required to connect to the internet using a computer
628
Examples of web browsers
Google Chrome, Brave, Microsoft Edge
629
Examples of IoT
Smart appliances, wearable technology, self-driving cars
630
SBC
Single-board computer is a complete computer built on a single circuit board with microprocessors, memory, output, input, etc.