Definitions Flashcards

(158 cards)

1
Q

3G

A

The third generation of cellular communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4G(LTE)

A

The latest generation of cellular communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control

A

The use of software settings and various technologies to control users’ access to data and resources. It also involves control over physical access to equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access point (base station)

A

Consists of a sender/transciever and an antenna which transmits and receives radio waves so that the devices that are wireless enabled are are able to communicate with one another and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accuracy

A

The refers to the fact that the data is ‘right’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Administrator account

A

A special account which allows that account holder to make any changes they wish to the system, including to other accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

Software that downloads and bombards your computer with adverts that pop-up whenever you are connected to the internet. It is more of a nuisance than a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AJAX (Asynchronous JavaScript and XML)

A

Combines JavaScript with a browser command to allow the browser to download data without requiring the whole page to refresh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Alternate key

A

A field that identifies each record with a unique value but is not used as the primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Android

A

OS created by Google and used on most non-Apple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anti-virus software

A

A computer program that scans computer files for viruses and eliminates them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API (Application Programming Interface)

A

An interface between the OS and the programming language/ end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Appification of the web

A

The trend for information that was previously accessed through conventional web pages and a browser, to be accessed via dedicated apps on mobile devices. Driven by increasing reliance on mobile devices for interaction with web services, with benefits of speed, ease of use, singleness of purpose etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application software

A

Software that is used to do productive work and accomplish specific tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Archiving

A

To store files that are static on a secondary system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Artificial intelligence

A

Simulation of human decision-making processes by a computer system that is programmed to react on the basis of input gained from sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASCII (American Standard Code for Information Interchange)

A

A coding system which is limited to 256 different characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assembler

A

A program that translates assembler code to machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ADSL (Asymmetric Digital Subscriber Line)

A

A permanent digital connection to the Internet using a telephone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attenuation

A

The loss of signal strength over a distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AVOD (Audio and Video on Demand)

A

Systems which allows users to watch video content and listen to audio content on demand, without having to wait for a scheduled broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Audit trail

A

A record or ‘trail’ that is made to keep track of who made changes to a database and when those changes were made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AUP (Acceptable Usage Policy)

A

A document that outlines the rights and responsibilities of users within a network environment, including the consequences of violating these stipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bandwidth

A

The total amount of data that can be transferred from one point to another in a given period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Binary
The base 2 system that consists of just two digits, namely a 0 and a 1.
26
Biometric scanners
Specifically designed for security, and read and identify unique identifying characteristics of people, like fingerprints or pattern of an iris.
27
Biometric security
Security based on measurement and identification of unique physical characteristics of a person.
28
BIOS (Basic Input Output System)
The essential startup instructions of a computer, in ROM chips on the motherboard, and representing the lowest level of programming in firmware.
29
Bit
A binary digit.
30
BitTorrent
A peer-to-peer protocol used to transfer and share large files across a network suck as the internet. Parts of the file being downloaded from different computers, and any part of the file that has been saved on your computer becomes available for others to download.
31
Blog
Website updated regularly with news and events in chronological order. A blog reads like a journal with the most recent entry at the top.
32
Bluetooth
A wireless technology that allows devices to communicate over a relatively short distance.
33
Blu-ray
An optical type of read-only storage that represents data as a series of light patterns on a removable disk.
34
Botnet
A remotely controlled network of 'zombie' PCs (computers infected with malware that enables criminals to use then for launching DDOS attacks, sending out spam, etc.)
35
Broadband
Any permanent, high speed, high bandwidth connection to the Internet.
36
Bus
A set of electrical paths etched on a motherboard, used to transfer data between an expansion card and RAM.
37
Byte
A collection of 8 bits - the smallest unit of storage on computer system.
38
Caching
A method used to compensate for the loss of efficiency, or 'bottelneck', that becomes inevitable when a faster medium tries to communicate with a slower medium.
39
Cap
The amount of data an ISP allows a person to upload and download in a month.
40
Clients
Clients are computers that use but do not provide network resources.
41
Cloud applications
Software where most of the processing is done 'in the cloud' i.e. by one or more services on the internet.
42
Cloud computing
The use of resources offered as services over the internet and shared between many users, including online file storage services and running of programs.
43
CMOS (Complementary Metal Oxide Semiconductor)
the type of memory that stores the BIOS settings that can be updated or changed. This memory is kept 'alive' by a small battery on the motherboard.
44
Compilers
Software that translates programming instructions written in a high level language into standalone 'executable files' that can be run independently of the programming language or compiler.
45
Composite keys
The combination of more than one field to uniquely identify a record.
46
Computer virus
A program that is written to distribute the normal functioning of a person's computer without theur knowledge or consent and that easily spreads between computers by attaching itself to files.
47
Computer worm
Malware that is able to distribute itself over a network, without a person having to run an infected program.
48
Context-aware search
A search in which context is used as criteria to make search results more relevant. Inevitable downside is loss of privacy - the higher the relevance of the search, the greater sacrifice of personal privacy.
49
Convergence
Trend whereby separate technologies and functions from multiple devices are combined into a single multi-purpose device.
50
Cookie
A textfile used to store customised settings for a website on your local computer.
51
Copyright
A law designed to protect intellectual property by creating legal limits on who can copy, sell and use types of work suck as photos, documents, books or poems, Copyright indicated by the word copyright or the © symbol followed by the name of the copyright owner and the year in which the copyright was first applied.
52
Core
A single complete working CPU circuit - relevant because modern chips are 'multi-core' and contain more than one 'core' in a single physical CPU 'chip'.
53
CPU (Central Processing Unit)
A chip that can contain mare than one 'core' and which connects to the motherboard using ZIF socket. Responsible for all the processing.
54
CPU cache
Special type of high speed memory built into the CPU, used to maximise CPU productivity.
55
Cracker
'Black hat hacker' who does illegal things to data.
56
Creative commons
A copyright license that allows you to use parts of, copy and distribute work for nonprofit purposes.
57
CSS (Cascading Style sheets)
Allow you to define and name styles and then specify the formatting for those styles and save it all into a .css file - this makes it easier to apply consistent formatting to elements of your website.
58
CopyLeft
A copyright license that allows one to use parts of, copy and distribute work for nonprofit purposes.
59
Currency
This relates to hoe 'recent' or up to dat the data is.
60
Cyberbullying
The use of ICT tools and devices to malign, mock, embarrass, threaten or intimidate a person.
61
Cyber-extortion
The use of IT-based blackmail, whereby threats are issued ranging from the personal to the corporate - unless specified amounts of money are paid over to extortionist.
62
Cybergang
A group of people who help each other to commit cybercrimes. Each member often specialises in a different task.
63
Cybergang
A group of people who help each other to commit cybercrimes. Each member often specialises in a different task.
64
Data collection
any method of obtaining data to be processed.
65
data independence
the same application can be used for data stored on different media, and the application will not be affected when you add a table to a database or create extra fields in existing tables.
66
data integrity
the overall completeness, accuracy and consistency of data. data integrity is ensured when each record has it's own unique primary key and when a foreign key refers to an existing record in another table.
67
data maintenance
adding or deleting records, or updating data.
68
data mining
the use of complex algorithms to group and arrange 'bid data' so that interesting and previously unknown patterns emerge - and new information is discovered.
69
data redundancy
the unnecessary repetition of data.
70
data security
the protection of databases against unauthorized access users.
71
data validation
any technique used to reduce the number of errors that can be made during the input of data by ensuring that data meets a set of requirements.
72
data verification
checking for the accuracy of data from a human perspective.
73
dara warehouse
a huge collection of data, often accumulated from a range of sources such as separate databases within a company
74
database
a collection of data or facts regarding a specific topic
75
DBA (database administrator)
a person who is responsible for managing and maintaining databases, this involves the allocation and supervision of users of the database and their access rights, as well as performing routine maintenance on the database.
76
databases analyst
a person who is concerned with issues such as the need to make changes to the underlying database structure, analysing the efficiency of the syse and analysis and design activities in terms of nee development s and maintenance of the database.
77
DBMS (database management system)
software that allows you to work with electronic databases
78
database programmer
a person who is responsible for coding the custom-made software that is the interface to the database.
79
DDOS (distributed denial of service)
an attack that makes a website unavailable by the use of thousands or millions of computers to request data from the site at the same time. the servers become overloaded, unresponsive, and effectively unavailable for everyone.
80
Decentralization of labour
concept whereby ICT has made it possible for people to work form remote locations.
81
defensive programming
a technique whereby the programmer makes proactive provisions for possible errors made by users, in the interest of correct data entry.
82
delete anomaly
the design of a database is such that deleting one piece of data results in the simultaneous removal of other unrelated data.
83
desktop database
database software where the tools that you to work with the data are all included in a single application - and you need to start that application to be able to work with the database
84
device drivers
programs that allow OS to communicate with and control hardware devices
85
digital certificate
a certificate issued by a trusted third party to verify the identity of a person or organization, so that the person or organization may be trusted for communication of sensitive information. an essential part of the SSL encryption protocol.
86
digital signature
an electronic signature used to identify and validate the sender of an electronic message or the signer of an electronic document.
87
DIMM (Dual inline memory module)
thin rectangular electronic boards which contain banks of RAM chips; inserted into DIMM slots on the motherboard, and the means whereby the memory of a computer is upgraded
88
Internet
A worldwide computer network consisting of computers and networks that are linked using telephone lines undersea cables satellite or microwave for the purpose of sharing resources and communication
89
End-user licence agreement
A licence agreement in which you agreed to use software according to the software company's terms most of the won't finish installing until you have indicated that you are aware of the terms and conditions of this licence agreement and did you accept that these terms and conditions differ from licence to licence but they mostly involves things such as the number of computers and which you may install the software and whether you may distribute software not
90
Disk fragmentation
Parts of files are scattered in several pieces across the desk.
91
Disk cleanup
A utility that removes temporary files downloaded from the internet deleted files and folders permanently by emptying the recycle bin temporary files created by windows are components of windows that you are not using installed programs that you no longer or seldom use
92
Disk cache
A certain amount of high-speed memory built into every harddrive. used to cache data read from the slower disc and thereby speed up subsequent calls from the same chunk of code or data
93
Disk defragmentation
To reorganize the parts of files and speed up your computer again.
94
Disk imaging
Creating a backup image of the entire hard drive including all data and programs to be used for reinstallation in the case of complete hard drive failure.
95
Disk management
A function of an operating system whereby it manages storage- both how the data is organised on the storage device and how or when a program can access the storage device.
96
Distributed computing
Sharing and using the resources of many different computers at the same time in order to solve a single problem.
97
DLL files
DLL or dynamic link library is a file that contain code or routine they can be called a news by programs.
98
DNS domain name systems
An internet service that translate the name names to IP addresses. domain names consisting of words are easier to remember than IP addresses. The internet is based on IP addresses. When you use a domain name a DNS servers must translate the name into the corresponding IP address.
99
Drivers
Software that enables the operating system to communicate with a hardware device.
100
DRM digital rights management
A way of protecting digital books movies games etc by using some form of encryption to control access to the content.
101
DSS decision support system
A computer system designed to gather information from a wide range of sources analysed it and presented it in a summarise or graphical format that aid in decision-making.
102
Dynamic website
A website consisting of web pages designed to be generated on the go and which may differ with each feeling based on her the user is and what the recorded preferences and options are.
103
Eavesdropping
Is dropping is when a signal is detected on a cable allowing someone to gain access to the data. This is also a concern for wireless networks.
104
E-book
Electronic version of a book read by using an e-reader or other e-book software.
105
Email server
Email servers are used to handle all the email needs of the organisation.
106
Email spoofing
The changing of an email header so that the origin of the email appears to be from a different source.
107
Embedded operating system
Embedded operating systems differ from those installed and used on a general-purpose competitors such as a PC and that they are stored on internal memory chips they are not loaded from disj the case of a computer with a hard drive
108
Encryption
The scrambling of text or data using a specified set of Rules to ensure the privacy of the data during communication or for security purposes.
109
Er entity relationship diagram
Diagrams used to illustrate relationship between entities.
110
E-reader
A single purpose device designed to allow you to read ebooks and have a portable library of e-books.
111
Ergonomics
Studies of the human body for the purpose of designing products that will benefit the way in which we actually function.
112
E-waste
Broken I'll take it and discarded hardware that we neither want nor need.
113
Expansion slots
Slots on the motherboard for attaching additional circuit boards and the order to expand the capabilities of the computer-mostly dedicated videos and sound cards for high- end gaming and design work.
114
Expert systems/ knowledge-based system
Ariel-based form of artificial intelligence or human expertise is coded into a computer system that can take in food and arrive at a session far more quickly than most humans can.
115
Expert system/ knowledge-based system
A real-based form of artificial intelligence or human expertise is coded into a computer system that can take input and arrive at a session far more quickly than most humans can.
116
Extranet
An organization's internet or part there of which is available to other users outside the organisation.
117
Fat clients
Computers that run most of the applications from the local hard drive and make little use of network services
118
File extension
This set of characters usually 3 to 5 as I did to the end of a file name and it identifies the type of file.
119
Firewall
Hardware or software that monitors the traffic between a computer and the internet to safeguard against breaches in security.
120
FireWire
Type of food that can transfer data faster than USB. It is usually used by high-speed data transfers as desirable such as videos from video camera and are taught to or from an external hard drive.
121
Firmware
Software that is permanently installed or hard- coded on a ROM chip and is used to control the basic operations of a device.
122
Fixed location internet access
High-speed data transmissions to homes and businesses using cable technologies such as ADSL. This is often referred to as fixed broadband internet access.
123
Flash players
Examples include Adobe Flash Player Silverlight and Adobe shockwave player. This multimedia plugins enable users to experience a very wide range of applications and multimedia web content in any browser irrespective of the operating system.
124
Flashing the ROM
The process whereby the existing content of firmware is white and replaced with an updated version always to be performed with great care
125
Font files
Files containing phones that can be used by programmers on the computer where the fonts are installed. They typically have the file extension of ttf or otf.
126
Foreign keys
A field not a primary key that is used as a link to a field in another table usually the primary key.
127
Freeware
Software which is distributed freely. You do not receive the source code. There is no limitations all the time or functionality included.
128
FTP file transfer protocol
Protocol used for fast easy transfer of large files between remote computers that have internet connection
129
Fuzzy Logic
A type of reasoning that works with probabilities in order to arrive at a decision.
130
GIGO
Garbage in garbage out the quality of output of any computer system is directly related to the quality of input
131
GNU / GPL
Allison specifically for software that allows people to distribute the software for free or even charge for it so long as the Source Code is made available. GNU with the licence under which most freeware is distributed.
132
GPS global positioning system
A navigation system that uses signals received from the geostationary satellite to determine accurately the position of a receiving device.
133
GPU graphics processing unit
Dedicated graphics processor on a graphics card used to provide extra processing power
134
Green computing
initiatives to design use and dispose of technology in an environmentally or eco-friendly waves
135
Gui
A graphical user interface makes use of Visual controls to allow the user to interact with the computer and with programs on the computer and
136
Hacker
General term used for any person who uses ICT skills to access computer systems networks and information illegally. Sometimes differentiated into two subcategories good hackers or white hat hackers and bad hackers black hat hackers.
137
Hardware interrupt
A dedicated communication channel or means whereby a device can request the immediate attention of the CPU in order to process a given function.
138
Hexadecimal
The base 16 number system that consists of the digits 0 1 2 3 4 5 6 7 8 9 a b c d e and f.
139
High-level programming languages
Programming languages that are easier for humans to ride and understand that rely on extensive pre-written libraries to execute complex instructions with just a few lines of code.
140
Home area network h a n
A small network within a home environment.
141
Homepage
The first page of a website containing information about the websites purpose and content. It also provides links to other web pages website and documents.
142
Hotspot
An area usually in a public space where people may receive and be granted Wi-Fi access from an access point to connect wirelessly to the internet via a wired network.
143
HTML hypertext markup language
A set of formatting codes placed in a text file to change the way the browser displays text.
144
HTML files
Hypertext markup language files is used to define the structure and layout of a web page.
145
HTTP hypertext transfer protocol
The protocol that defines how web pages and the contents are transferred across the web
146
Https hypertext transfer protocol secure
The protocol used for secure encrypted communication over the internet. It is use on website which require a user to enter confidential or personal information such as password of banking details.
147
Hyperlink
A built-in connection to another related web page and is indicated as text underlined in blue or by a graphic with a blue outline.
148
Identity theft
When someone steals your details in order to pretend to be you and then buy the expensive goods and your name or just money from your account etc.
149
Incremental backup
Backup schedule whereby backups are made only of new files and files that have changed since the last backup resulting in a greater backup efficiency and allowing selective Data Recovery from an earlier date.
150
Input/output management
A function of an operating system whereby it manages input and output of the computer and how program programs use the input and output devices- which programs receive input from input devices and which programs can use an output device.
151
Incident anomaly
The design of a database prevents a user from capturing data when they want or need to.
152
Installation wizard
A program that present you with options and defence installations based on your choices and preferences.
153
IM instant messaging
Internet-based alternative to text messaging and which multimedia content can be exchanged in real-time via applications such as WhatsApp BBM and mix it
154
Intellectual property
The idea behind any original creation is the property of its creative and not only the physical objects which might Express that idea if for example you were to write a poem or a book or take a photo and someone were to make a copy of it without asking your permission or compensation you that person would have stored in your intellectual property in it even if he didn't steal your physical exemplar of the
155
Internet
The internet is a worldwide computer network consisting of computers and networks that are linked using telephone lines undersea cable satellite or microwave for the purpose of sharing resources and communication.
156
Internet hoax
An email message or article intended to deceive or defraud others
157
Internet or proxy server
Users connect to the internet via their servers so security control for virus etc. Can be implemented at 1 central point. Access to the Internet can also be speeded up by storing cashing recently Access web pages on the desk
158
Internet of proxy server
Users connect to the internet via their servers so security control for virus etc. Can be implemented at 1 central point. Access to the Internet can also be speeded up by storing cashing recently Access web pages on the desk