GLOSSARY Flashcards Preview

ICT - Living in a Digital World > GLOSSARY > Flashcards

Flashcards in GLOSSARY Deck (111):
1

What is 3G

3G - THIRD GENERATION WIRELESS COMMUNICATION which allows high-speed wireless data transfer

2

Explain ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY - Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.

3

Describe APPLICATION (Applications software)

APPLICATION (Applications software) is: Software that helps users perform particular tasks.

4

What is meant by the term BACKUP

BACKUP is a copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.

5

What is BANDWIDTH

BANDWIDTH : The AMOUNT OF DATA that can fit through the Internet connection.

6

What is BANDWIDTH measured in?

BANDWIDTH is measured in BITS PER SECOND (bps) This is the number of BITS oif information that can fit down the line in ONE SECOND. Kb/Kbps means 1000s of bits per second. Mb or Mbps means millions of bits per second.

7

Explain BIOMETRIC

BIOMETRIC is an AUTOMATED method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice.

8

What is a BLOG

A BLOG is: a shared online journal where people can post diary entries about their personal experiences and hobbies.

9

What is BLUE JACKING?

BLUE JACKING is the sending of unwanted messages over BLUETOOTH connections

10

Describe BLUE RAY

BLUE RAY - is a disk that enables the recording,re-writing and playback of high definition video and the storing of large amounts of data. It has more than FIVE TIMES the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disk and 50GB on a dual- layer disk.

11

What is BLUETOOTH ?

BLUETOOTH - allows the exchange of data over short distances from fixed and mobile devices. In order for devices to communicate the must be able to understand the Bluetooth rules (protocols)

12

What is BROADBAND ?

BROADBAND is a high speed connection to the Internet

13

Explain the term BUFFERING

BUFFERING is the downloading of a certain amount of data into temporary storage before starting to play a file

14

What is Card Code Verification (CCV) ?

CCV is a set of numbers on the back of a credit card that helps verify that the use of the credit card is legitimate.

15

What is Cloud Computing?

Cloud Computing is a system in which all computer programs and data is stored on a central server owned by a company (e.g Google) and accessed virtually.

16

What does the term COLLABORATIVELY mean?

COLLABORATIVELY: Working together with other people

17

What is meant by the term COMMERCIAL?

COMMERCIAL: related to a business

18

COMPATIBLE

COMPATIBLE: the ability of a device to communicate and share information with another device

19

COMPUTER MISUSE ACT

COMPUTER MISUSE ACT: This law restricts people from accessing or modifying data without permission

20

CONVERGENCE

CONVERGENCE: when one device is developed to carry out functions that were originally performed by several different devices.

21

COOKIES

COOKIES ;Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.

22

COPYRIGHT

COPYRIGHT : Gives the creator of an original work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.

23

COPYRIGHT, DESIGNS & PATENTS ACT

COPYRIGHT, DESIGNS & PATENTS ACT : this law protects people's original work from being used without their permission.

24

CREDIT CARD

CREDIT CARD: a plastic card issued by banks, building societies, retail stores and other businesses, which enables a person to buy goods and services without the need for cash. The holder agrees to pay back the money borrowed at a later date, sometimes with interest.

25

DATA

DATA; Symbols, characters, images and numbers are all types of data. When data is processed and acquires meaning it becomes INFORMATION. Computers process data to produce information.

26

DATA PROTECTION ACT

DATA PROTECTION ACT: This law regulates how personal information is used and protects against misuse of personal details.

27

DEBIT CARD

DEBIT CARD; Similar to a credit card, but the money is taken DIRECTLY from the cardholder's bank account.

28

DIGITAL DIVIDE

DIGITAL DIVIDE: Unequal access to ICT for individuals or groups, usually due to financial, geographic health or cultural reasons.

29

DIGITAL ECONOMY ACT

DIGITAL ECONOMY ACT: This Law protects copyright holders from criminals who illegally distribute copyrighted material (piracy)

30

DIGITAL RIGHTS MANAGEMENT (DRM)

DIGITAL RIGHTS MANAGEMENT: allows the copyright holder or the owner of the media control over the number of viewings, plays and copies, and even which devices the media can be played or viewed on. If you download a film from iTunes, you cannot burn it onto a DVD because of the DRM encoded in the film.

31

Digital zoom

Enlarges the image, which can become blurred

32

Dongle

Dongle: A small piece of hardware that connects to a computer and has uses including data storage and picking up Bluetooth and 3G signals. A dongle may be portable like a USB pen.

33

DOWNLOAD

DOWNLOAD: Transfer a file, e.g. a video, from a central computer to your computer

34

DVD (Digital Versatile Disc)

DVD (Digital Versatile Disc): DVD' offer higher storage capacity than CD's (Compact discs) while having the same dimensions. Blank recordable DVDs (DVD-R and DVD+R) can be recorded once using optical disc recording technologies and supported by optical disc drives and DVD recorders and then function as DVD-ROM. Re-writable DVDs (DVD-RW,DVD+RW and DVD RAM) can be recorded and erased mulitiple times

35

DVD-ROM

DVD-ROM : DVD Read Only Memory

36

DVD RAM

DVD RAM - DVD with Random Access Memory

37

E-commerce

E-commerce: Buying and selling goods electronically, usually over the Internet

38

Electronic waste (e-waste)

Electronic waste (e-waste): Rubbish comprising of digital materials e.g old computers

39

ENCRYPTION

ENCRYPTION: for security, data is translated into a secret code according to a set of rules in a special 'key'. To convert the data back into plain text, the receiver must also have the key

40

ERGONOMICS

ERGONOMICS : The design of equipment (like wrist supports) to increase the efficiency of the way it is used by the human body, to promote the health of users.

41

ETIQUETTE

ETIQUETTE: A set of rules that people try to abide by out f respect for other people around them.

42

FIREWALL

FIREWALL : A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.

43

FLASH MEMORY CARD

FLASH MEMORY CARD; Used for fast and easily transferable information storage in digital devices such as mobile phone, media players and cameras. Flash memory is known as SOLID STATE storage device, meaning there are no moving parts. Everything is electronic instead of mechanical so its ideal for mobile devices.

44

FRAUD

FRAUD: Tricking someone for personal gain or to damage them.

45

GEOTAG

GEOTAG ; To attach the exact geographical coordinates longtitude and latitude to a digital image, giving the location of where it was taken.

46

GLOBALISATION

GLOBALISATION: The increasing integration of economies and societies around the world, particularly through international trade.

47

GPS (Global Positioning Tracker)

GPS: A navigational system used in many devices which gives current location of where it was taken.

48

HACKER

HACKER: Someone who gains unauthorised access to a computer in order to obtain data stored on it.

49

HDMI (High Definition Multimedia Interface)

HDMI: required for connecting devices to show high definition video.

50

HDTV

HDTV : High Definition TV

51

High Definition (HD)

HD: the picture on a TV screen is made of lines of PIXELS. in a conventional TV there are 625 lines, which are refreshed 25 times per second. HD has either 720 or 1080 lines, so it produces a clearer, sharper picture.

52

Hosted Software

Hosted Software : Hosted Software, also known as Software as a Service (Saas), is accessed via a web browser rather than being installed on the user's computer.

53

Identity Theft

Identity Theft: A crime that involves someone pretending to be another person in order to steal money or obtain other benefits.

54

Information Overload

Information Overload: Having so much information that the user feels overwhelmed.

55

ISP (Internet Service Provider)

ISP: A company that provides Internet access to its customers.

56

IP (Internet Protocol) address

IP : The personal address of your computer (just like your home address) so that servers know where to send the information you have requested.

57

Lag

Lag: Slow computer functionality often caused by high latency or low performance hardware.

58

Latency

The time delay between the moment something is initiated and the moment it becomes detectable.

59

Locally installed software

Locally installed software: Software which is installed on the user's computer

60

Microblog

Short messages which may include short sentences, individual images or video links. An example is Twitter.

61

Multifunctional

Having the ability to do many different things using the same device.

62

NFC

Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other.

63

What does NFC stand for ?

Near Field Communication)

64

Non-physical goods

Non-physical goods: Items for sale

65

On-demand entertainment

Technology that allows account holders to view programmes at the time of their choosing by streaming them.

66

Online banking

A service offered by banks that allows account holders to view their account information online and carry out various financial transactions

67

Online community

A group of members of a website who communicate and share ideas online, often about a shared interest.

68

Open source software

Software that is available to download free of charge, e.g. OpenOffice.org, which is a suite of applications

69

Overheads

The ongoing expenses of operating a business e.g rent, fuel bills, salaries.

70

Peer-to-peer (P2P)

P2P - sharing files among groups of people who are logged onto a file-sharing network.

71

Peripherals

External devices connected to a computer e.g printer, microphone

72

Personalised learning

Learning that is tailored towards the individual to allow them to make progress

73

Personalisation tehcniques

Ways of making content relevant to a particular customer using their interests, geographical position,etc

74

Phishing

A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords

75

Physical goods

items for sale which can be touched and must be delivered by post in some way

76

Plagiarism

Copying someone else's work and presenting it as your own

77

Privacy

The protection of personal data

78

Proprietary software

Software for which you have to pay for a licence to use (e.g. Microsoft Office)

79

Protocol

A set of rules used by computers to communicate with each other across a network.

80

Public Domain

Materials that are available for anyone to use for any purpose (not subject to the laws of copyright)

81

Query

To search, usually when talking about a database

82

Repetitive Strain Injury (RSI)

RSI - Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.

83

RSS feeds

A web feed format used for content which is frequently updated e.g.news, in a standard format so it can be added to a variety of websites.

84

Sat nav (Satellite navigation)

A device, usually used in a car , that gives directions based on information received from a series of satellites

85

SD & SDHC cards

Secure Digital (SD) cards are one type of flash memory card which store up to 2 GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory card and they are ideal for video cameras because they can store up to 32 GB of data.

86

Search engine index

A list of websites which has been compiled by the search engine which drastically increases speed of searching. The search engine will search its index, which takes milliseconds , rather than millions of files, which could take hours.

87

Social bookmarking

A way of organising, storing and managing links to online resources, allowing users to search them easily

88

Social networking site

An online community where people can communicate and share information

89

Software as a service (SaaS)

Software as a Service (Saas), also known as Hosted Software is accessed via a web browser rather than being installed on the user's computer.

90

Smartphone

A phone offering advanced features e.g the ability to send emails, surf the Internet

91

Spyware

Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to anther computer in the Internet.

92

SSL (Secure Sockets Layer)

SSL - A method of encrypting data to provide security for communications over networks such as the Internet TLS (Transport Layer Security) is a later version of SSL.

93

Stream

Content is sent in compressed form over the Internet and displayed by the viewer in real time. When streaming video, a web user does not have to wait to download a file to play it. Instead the media is sent in a continuous stream of data and is played as it arrives on a special player.

94

Sustainability

Meeting the needs of the PRESENT without compromising the needs of the FUTURE generations.

95

Target audience

A description of the people your products are aimed at It could include their age, the language they speak, their special needs, or any other characteristics relevant to the scenario you are given.

96

Teleworking

Working from home but staying in touch with others with the help of technology.

97

Third party payment processor

A business that offers an alternative fast, safe method to pay for online goods and services (like Paypal)

98

Transactional data

Data which is gathered as part of a user's online activity. When buying something online , this could include information about the product bought but also PERSONAL DETAILS such as ADDRESS and PAYMENT DETAILS.

99

Trojan

A program that appears legitimate but which performs harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A TROJAN is similar to a VIRUS except that it does not replicate itself. It STAYS in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.

100

TLS (Transport Layer Security)

A later version of SSL - A method of encrypting data to provide security for communications over networks such as the Internet

101

Upload

Transfer a file from your computer to a central computer (i.e.your ISP)

102

User-generated reference sites

Allows users to generate content collaboratively on a website to which others can refer to inform their research

103

Validity

based on truth, or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.

104

Viral marketing

A marketing strategy that encourages people to pass on marketing messages to their friends. It uses interesting and entertaining content that people will want to share. Viral marketing uses multimedia to make the message memorable.

105

Virtual learning environment

An online system for education with areas for homework, classes, teacher and pupil space etc.

106

Virus

A program designed to cause other programs on a computer to malfunction or stop working altogether.

107

VoIP (Voice over Internet Protocol)

This technology is used to make telephone calls via the Internet , usually at a cheaper cost.

108

Wi-Fi (Wireless Fidelity)

WiFi - is similar to Bluetooth in that it is used to exchange data wirelessly, but the signals can travel greater distances

109

Wikis

A type of website that encourages collaboration by allowing users to add, edit and remove content.

111

Optical zoom

Moving the lens closer so light from the subject is brought to a focus on the sensor

112

Resolution

The number of pixel elements per inch