All Flashcards
2-in-1 device
A portable computer sharing characteristics of both tablets and laptops
3D Printer
Printer that allows one to create a physical three-dimensional model from designs created using CAD or 3D modelling software by layering material.
4G LTE
The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.
5G
The new generation of radio systems and network architecture for extreme broadband and ultra-robust, low latency connectivity, to enable the programmable world.
802.11 a/b/g/n
Indicates if a device has a wireless adapter. Letters show the speed the wireless network is capable of.
Absolute cell reference
The cell address in the formula will not change as the formula is copied.
Accelerometer
Input device to detect which way a device is being held to change the screen’s orientation.
Access control
The operating system asks for permission before installing software to avoid malware installation without consent. Access control can also be placed on an entire device such that permission is given through a password before the device is accessed.
Access Filter
A criterion or rule set for a field in a database query to display only records that meet the specified condition.
ADSL
Asymmetric Digital Subscriber Line: permanent digital connection along copper cables to the internet using a landline or telephone line by transmitting data.
Adware
Software causing unwanted content to automatically display or download while browsing the internet.
AI
Artificial Intelligence: simulation of human intelligence in computers where they are designed to think and act like humans.
Algorithm
Step-by-step, sequential solution used to solve a problem, typically in programming.
ALU
Arithmetic Logic Unit: part of the CPU performing arithmetic and logical calculations.
Anti-malware
Software safeguarding a computer against malicious threats.
Anti-spyware
Programs designed to remove or block spyware and user practices that increase the chance of getting spyware on a system.
Anti-virus
Software detecting malicious software then deletes or quarantines it based on the program’s behaviour/signature.
Append
Add records to an existing table in a database.
Application software
Executes specific tasks for the user, requiring an operating system to run on
AR
Augmented reality: technology placing interactive digital content over real scenes
Archive emails
Moving messages from the inbox to an archive folder without deleting them.
Archive files
Removing files which aren’t used regularly and storing them in a separate compressed location for space saving and later use.
Aspect ratio
The relationship between the width and the height of the display.
Attachment
One or more files sent with a message (typically e-mail) to share documents and images, typically represented by a paperclip.
Attenuation
Loss of signal strength over a distance
Attribute
Name and value combination defining a property of an element.
AUP
Acceptable use policy: a set of rules drawn up by company management to protect the company, its network and resources from misuse.
Authentication
Verifying a user or device before allowing access to a system or resources (eg. CAPTCHA, OTP)
Autofill
Microsoft Excel feature automatically filling selected cells with data.
Autonomous Vehicles
A self-driving/driverless car that can sense its environment and move safely with little to no human input.
Backbone
Part of a computer network interconnecting pieces of the network and providing a path for the exchange of information between different LANs and subnetworks.
Backup
Copying of files/folders in case of data loss to a separate location.
Bandwidth
Maximum amount of data that can be transferred from one point to another in a period of time measured in (kilo/mega) bits per second (bps)
Bandwidth theft
Unauthorised access to wireless bandwidth.
Barcode
A pattern of thick and thin lines that are decoded by a scanner to represent data.
Beta software
Preliminary version of software released by developers to test software before it is published where any errors are fixed before the final release.
Bibliography
A list of sources of information at the end of a document to acknowledge the references, refer to them later and compare the final document to the original sources for plagiarism (APA, Chicago and Harvard referencing are most common)
Big data
A large volume of structured and unstructured data that is analysed using computers through a difficult process
Biometric device
A device that inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.
BIOS
Basic Input Output System: non-volatile software stored in ROM to initialise the computer
Bit torrent
A peer-to-peer protocol where multiple peers can transfer data between each other. Files are split into smaller parts to increase upload and download speeds. A complete file becomes a seed which other users can use.
Bitcoin
A digital currency with encryption techniques to regulate the generation of units of currency and verify transfers. Operating independently of a central bank.
Black hat
Crackers/Hackers with malicious intentions to steal or vandalise systems.
Blockchain
Advanced database mechanism allowing transparent information sharing within a business network
Blog
A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order.
Blu-ray
An optical disc format designed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data (more than DVD).
Bluetooth
Wireless technology for sending data over short distances using short-wavelength radio transmissions.
Bookmark
Identifies a location or selection of text that you name and identify for future reference.
Boot
A term to describe a computer’s start-up process. Restarting is rebooting.
Bot / Zombie
A software application that runs automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.
Botnet / Zombie Army
A group of compromised or infected computers connected to a network such as the internet and controlled remotely to attack other machines by infecting them with malware, sending spam, etc.
Bounded media
Communication channels consisting of physical cabling common in wired LANs
Broadband
High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.
Broadband
High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.
Broadcast
An unsecured method of communication sent to multiple nodes in the network
Browser Add-on/Extension
A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.
Browser cache
Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.
Buffering
A temporary storage area in RAM to speed up a slow input/output device.
Bug
An unintentional error, flaw, fault or failure made by programmers in a computer program/system causing it to produce an incorrect/unexpected result or behave in unintended ways.
Bus
An electronic pathway along which data can be sent from one part of the computer to another.
BYOD
Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device
Bit
A binary digit is a single unit of information
Cache
A high-speed memory used to hold recently or frequently accessed data, in order to be able to retrieve that data faster.
Cap / Uncapped
A bandwidth cap can be applied to a network by the service provider such that a certain amount of data can be transferred over that network to limit the channel from being overloaded. Going over the band cap incurs a fee.
CAPTCHA
Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.
Caption
A numbered description added to a graphic object (such as a diagram or photo) or a table.
Card reader
Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.
Card skimmer
Device that reads the magnetic data from a bank card.
Cell range
Two or more adjacent cells on a spreadsheet.
Chart / Graph
Used to visualise a trend in data over intervals of time.
Chart area
Includes both the Plot Area and the ‘outside’ part of a chart where the titles are located.
Chatbot
A computer program that simulates online conversations using text or voice commands.
Citation
Reference to the source used in a specific instance and found in the text immediately after the piece of information being referred to.
CLI
Command line interface: A text-based interface, with commands entered and executed at the command prompt.
Click-jacking
An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.
Client-server
A single dedicated networked computer that provides services (file storage, email, printing) to other nodes/devices on the network.
Clients
Computers connected to a network that use services and resources from the servers.
Clipboard
Area in memory (RAM) where copied or moved objects – both text and graphics – are temporarily stored. They are kept there until they are pasted somewhere (or until the program is closed or the computer is shut down).
Closed questions
Questions that can be answered directly with facts. These questions often start with words such as What? When? Where? Who? How many? etc.
Cloud computing
A general term that refers to the sharing and use of resources and applications offered as services over the internet.
Cloud storage
Storing data on remote servers, accessible from any Internet-connected device.
CMOS
Complementary Metal-Oxide Semiconductor: Battery-backed, volatile memory that stores hardware
Colour Depth
The number of bits used to represent the colour of each pixel in an image
Column break
Used if you want to shift text to the top of the next column.
Combo box
A list of values from which a user can choose a value. Only one value is visible at a time, the others will appear only when the user clicks on the arrow. A Lookup Wizard is used to create the list of values.
Combo chart
If a chart has more than one data series, a different chart type can be used for each series.
Component
A circuit chip placed directly on the motherboard
Compression
The process of reducing file size takes up less storage space and quicker Internet transfer.
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Computer worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
Conditional formatting
Formatting of data on reports or computer programs that changes based upon specific criteria, e.g. printing and displaying negative quantities in red.
Constant
An entry which has a specific fixed value, e.g. 3.5.
Contrast ratio
The relationship between the darkest black and the brightest white that a display device can produce. Higher values are better.
CU
Control unit: A part of the CPU that coordinates the processing of instructions.
Convergence
The trend where separate technologies and functions that required different devices in the past are combined into one single device, e.g. the smartphone and the tablet.
Cookies
A small text file stored in a user’s browser to record their history and preferences.
Copyright
Software is developed and all rights belong to the owner/developer.
Core
A single physical processor. Chips that are ‘dual core’ have 2 processors, ‘quad core’ have 4 processors, etc.
CPU
Central Processing Unit – hardware component that processes all data and carries out all instructions.
CPU Architecture
32-bit computers have a processor that works with 32 bits at a time. The memory addresses, register sizes, address and data bus sizes and instruction sizes are all 32 bits in length. The computer is able to process at most 32 bits of data at once. In the same way a 64-bit computer sizes are all 64 bits in length. The computer is able to process at most 64 bits of data at once.
Creative Commond License
A licence where the author retains copyright of their work but allows people to copy and distribute the work (documents, source code) on condition the author is acknowledged.
Crop
To remove parts of a picture that you do not need. You can also customize it, for example to fit a specific shape.
Cross-reference
Used to refer to related information elsewhere in the same document. One can choose what information to display about the item referred to. A hyperlink to this item is created by default.
Crosstalk
Signals in adjacent wires interfere with each other.
Crowdfunding
A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme
Cryptocurrency
A form of virtual, digital currency, e.g. Bitcoin, Ethereum, Luno, that can be exchanged for other currencies, products and services.
CSV
Comma Separated Values file – a text file which uses commas to separate the values in each line. Commonly used to import and export data between programs.
CTS
Carpal Tunnel Syndrome: A painful compression of the nerves in the wrist caused by repetitive manual action such as typing.
Cyber-attack
Any type of offensive manoeuvre employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.
Cyberbullying
The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.
Cyberstalking
People who are intruding in other peoples personal details online.
Cyberterrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
Dark / deep web
Non-indexed web pages hidden from standard search engines accessible using an anonymising web browser.
Data
Data is unprocessed items or facts in raw form that usually have to be manipulated or processed before it makes complete sense or before it becomes useful.
Data labels
The values of the data points on a chart
Data redundancy
Unnecessary repetition of data produced by removing repeating groups as a result of first normal form.
Data series
A column or row of numbers in a spreadsheet that is depicted in a chart.
Data Validation
Techniques used to ensure the accuracy and integrity of data entered into a database or spreadsheet, such as input masks, validation rules, drop-down boxes, and adjusting field size properties
Database
A collection of related tables store data about a subject or a group of subjects.
Date Picker
A control in Access that allows selection of a specific date by clicking on an onscreen calendar.
DBMS
Database Management System: Software that manages and controls a database, including permissions, backup, referential integrity, and access control.
DDoS
Distributed Denial of Service: An attack where multiple coordinated Internet devices (bots) are used to overwhelm a service, making it inaccessible to legitimate users.
DDR RAM
Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.
Dedicated device
Devices that are designed to perform one specific task only, e.g. traffic lights, washing machines, ATMS, calculators, etc.
Default Printer
The printer to which documents are sent unless the user specifies otherwise.
Default Value
In databases, a preset value defined for a column type, automatically allocated to a field in a new record when many records hold similar data.
Defragmentation
The process of using a utility program to reverse fragmentation by rearranging and consolidating scattered file parts on a disk for quicker retrieval.
Delimiter
A character such as a comma, space or tab, used to separate each piece of data (each field) in a line in a CSV file.
Desktop
The visual space on a computer screen where programs, shortcuts, icons, folders, files, and documents are displayed upon startup.
Desktop computer / PC
Personal computer: A single computer designed for home or office use, typically placed on a desk.
Digital camera
A camera that captures and stores images digitally, allowing them to be downloaded to a computer for editing with graphics software and printing.
Digital Certificate
A data file from a Certificate Authority (CA) that verifies an organization’s identity by cryptographically linking its public key to specific identity attributes, such as VeriSign.
Digital divide
The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.
Digital footprint
A trail left by an entity’s interactions in a digital environment; including their usage of TV, mobile phone, Internet and World Wide Web, mobile web and other devices and sensors. A digital footprint is the size of an individual’s online presence; as it relates to the number of individuals with whom they interact mainly on social networking sites.
Digital migration (digitisation of media)
The process of converting TV signals from analogue to digital format for broadcast.
Digital Signature
A cryptographic method where a user can “sign” a document by encrypting it with their private key. The document can then be verified using the user’s public key, ensuring its authenticity and integrity.
Digital zoom
Increasing the apparent size of an object in a photograph by enlarging pixels, resulting in potential blurriness and pixelation as the image quality decreases.
DIMM
Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.
Disk Cache
The use of RAM to enhance the speed of access to a slower hard drive by storing chunks of data read from the disk, reducing the need for repeated reads.
Disk Cleanup
A computer maintenance utility in Microsoft Windows that identifies and removes unnecessary files from the hard drive to free up storage space.
Disk Defragmenter
A utility that rearranges fragmented data on a mechanical hard disk to improve efficiency in loading and saving data, thereby enhancing computer speed. Note that it does not increase available disk space.
Disk Scanner
A utility included with operating systems that checks a drive for errors and bad sectors on the disk, attempting to repair them if possible.
Distribution list/Mailing list
A list of email addresses grouped under a single name. Sending an email to this list forwards it to all addresses included, facilitating communication with multiple recipients simultaneously. Also known as a distribution list or contact group.
Distributed Processing
A method of processing where the computational tasks required to solve a problem are distributed among multiple computers (such as servers in different data centres), thereby enhancing total processing power.
DNS
Domain Name Servers: A protocol that translates domain names into IP addresses, enabling computers to locate resources on the Internet.
Domain Name
A unique string of characters that identifies a website on the Internet.
Dongle
A device plugged into a USB port to enable connectivity, such as for wireless keyboards or mice. It can also refer to a 3G or 4G dongle used with a desktop computer or laptop to connect to a cellular network for internet access.
DoS attack
A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.
Download
The process of receiving data from a remote server to a local computer
Downward/backward compatibility
The ability of software to open and use files created in previous or older versions of the same software.
DPI
Dots per Inch: A measure of print or scan resolution indicating the density of dots per inch. For instance, an average print resolution might be around 4800 x 1200 dpi. High scan resolution is crucial for those frequently making high-quality copies or scanning pictures.
DRAM
Dynamic RAM: RAM that utilizes capacitors and requires periodic refreshing to maintain stored data.
Driver
System software that enables the operating system to communicate with hardware devices, facilitating their functionality.
Drop Cap
An enlarged initial letter or word at the beginning of a paragraph that extends into the lines of text below it.
DSLR Camera
Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.
Dumpster Diving
The practice of obtaining discarded data, such as invoices, phone records, organizational information, sensitive data printouts, or discarded hardware, typically to extract information or manipulate individuals.
E-commerce
The general term for any type of business transaction conducted over the Internet.
E-learning
A learning environment where individuals use computers to participate in teaching and learning activities to further their education.
E-mail spoofing
The forgery of an email header so that the email appears to be from a different origin (or person).
E-waste
Electronic Waste: Waste materials generated from the use or disposal of electronic devices, such as computers, televisions, and mobile phones. E-waste often contains hazardous materials that can be harmful to humans, plants, and animals, and can contaminate water, air, and soil.
Eavesdropping
The act of intercepting and monitoring signals traveling along copper cables by unauthorized individuals.
eBook / eReader
A mobile electronic device designed primarily for reading digital eBooks and magazines.
EEPROM
Electronically Erasable Programmable ROM: ROM that can be electronically modified and erased using software.
EFT
Electronic Funds Transfer: The process of transferring money from one bank account to another electronically, typically using internet banking services.
Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.
EMI
Electro-Magnetic Interference: The corruption of signals traveling in copper cables due to electromagnetic sources, such as nearby machines or equipment.
En dash
A dash that is slightly longer than a hyphen, typically used for number ranges and occasionally for indicating relationships.
Encryption
The process of converting plain text into unreadable ciphertext to secure it from unauthorized access.
Endnote
Similar to a footnote but placed at the end of a section or document rather than at the bottom of the page where referenced.
Entry-level computer
A desktop computer designed for users who primarily use basic applications like email, web browsing, and general document tasks, typically available at an affordable price point.
Ergonomics
The study and design of workplace equipment and furniture to ensure it promotes comfort and safety for individuals in their work environments. Specific areas of interest include keyboards (curved for comfortable arm and wrist positioning), chairs, mice, etc.
Ethernet
A LAN (Local Area Network) technology that encompasses protocols, devices, and communication methods for wired network connections.
EULA
End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.
Excel Filter
A feature used in Excel to display only certain rows of data in a worksheet based on specified criteria or conditions.
Expansion Card
A small circuit board that is inserted into a motherboard slot (such as PCI, PCIe, SATA) to enhance the functionality of a computer beyond what is provided by the onboard components.
Export
Saving data in a format that can be read by a different version of the same application or even a totally different application.
Fake News
Stories or hoaxes created to deliberately misinform or deceive readers.
Fibre optic cable
A type of network cable that transmits data using light pulses through a central glass or plastic core, making it exceptionally fast and efficient for data transmission.
Field
In the context of a database, a field refers to a single piece of data or a single fact, such as an ID number, surname, or any other attribute of a record. It is the smallest unit of data stored in a database.
File Extension
A set of characters, typically 3-5 in length, added to the end of a filename to denote the type of file and the software required to operate or open it. Examples include JPG, EXE, BMP, DOCX, HTML, ACCDB, PPTX, XLSX, and ZIP.
File Path
The complete location or name of where a computer file, webpage, or other object is located.
File property
The basic information about a file such as its name, size and date modified.
Firewall
A security system, implemented as hardware, software, or both, that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the internet), helping to protect against unauthorized access and potential cyber threats.
Flash Drive
Portable secondary storage that stores programs and using flash memory.
Folder
A virtual location where programs, files, and other folders can be located. Computers with an Apple, Microsoft Windows, or other GUI operating system have folders to help users store and organize their files. A subfolder is a folder that is located inside another folder.
Footnote
Additional information placed at the bottom of the page in a document, and linked by a number or symbol to the relevant text in the body of the page.
Foreign Key
A field in a table that is a primary key in another table.
Form
An interface or object in software applications that allows users to input, store, and view data in a structured and user-friendly manner. Forms typically include fields for entering data and controls for navigation and interaction.
Form Letter
A standard letter template designed to be personalized and distributed to multiple recipients on a mailing list.
Formatting
The process of preparing a storage device, such as a disk or a drive, to store data by defining its file system structure. Initialisation determines how data is stored and accessed. Formatting a disk usually erases all existing data on the disk.
Formula
A statement written by a user in software applications like spreadsheets to perform calculations. Formulas can range from simple arithmetic operations to complex calculations involving functions, cell references, and constants. They always begin with an equals sign (=).
Fragmentation
The more you use your computer, the more the files (and parts of files) get scattered on the disk. The more scattered the files’ parts are, the slower your computer becomes, as the files take longer to retrieve.
Freemium Software
A type of software that offers basic functionality or a limited version for free, but charges for additional features or premium services. This model allows users to use the software for free with the option to upgrade to access more advanced capabilities.
Freeware
Software that is fully functional and available for use and distribution at no cost. Unlike open-source software, freeware typically does not provide access to its source code and may have restrictions on resale or modification.
FTP
File Transfer Protocol: A protocol to transfer and download files from the Internet.
Function
A named and predefined procedure in software that performs a specific operation and returns a result. Functions are typically invoked by typing their name followed by parentheses, within which arguments (if any) are specified. Examples include functions like COUNT, SUM, and MEDIAN in spreadsheet applications.
GAN
Global Area Network: A worldwide WAN such as the Internet.
Gap width
The distance between columns or bars in a chart, typically expressed as a percentage of the width of the columns or bars themselves.
Gateway
A device that connects and translates between network segments with different topologies, technologies, or protocols, enabling communication between them.
Geotagging
The process of adding geographical coordinates (latitude and longitude) to the metadata of a file, such as a photo, indicating where the photo was taken.
GHz
Gigahertz: A unit of frequency measurement for CPUs, indicating their processing speed. A higher GHz value generally signifies faster processing capabilities. 1GHz = 1 billion cycles (of instructions) per second
GIGO
Garbage-In-Garbage-Out: The principle that if incorrect or low-quality data is entered into a system, the output or results will also be incorrect or of low quality.
GPS
Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.
GPU
Graphics Processing Unit: A co-processor on a video card that accelerates applications by offloading complex mathematical and geometric calculations required for graphics rendering from the CPU. This can significantly enhance computer performance in tasks such as CAD, 3D graphics rendering, and gaming.
Green Computing
The practice of using computers and related resources in an environmentally responsible and eco-friendly manner, encompassing their manufacturing, use, and disposal processes.
Grid Computing
A system where the computational resources of multiple computers from different locations are pooled together to work collaboratively on a single problem or task. Examples include projects like the SETI@Home initiative.
Gridlines (Excel chart)
Lines displayed in the plot area of a chart to aid in visually estimating the values of data points.
Gridlines (Excel worksheet)
Lines forming a rectangular grid that distinguish individual cells in an Excel worksheet, aiding in visual organization and alignment of data.
GUI
Graphical User Interface: A user interface that allows users to interact with electronic devices through graphical icons and visual indicators, rather than text-based commands. It typically includes windows, icons, menus, and a pointing device (like a mouse) for navigation and selection.
Hackers and crackers
Individuals who break into computer systems. Hackers often do so for prestige and recognition, while crackers have criminal intent.
HAN
Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.
Hard copy
A printed version of data stored on a computer, as opposed to a soft copy, which is visual output on a screen.
Hard space
A space where word wrapping cannot occur, keeping the characters or words on either side together on the same line.
Hardware
The physical components of a computer, such as the mouse, keyboard, and monitor.
HDD/Mechanical Drive
Hard disk drive: A secondary storage device that uses mechanical parts to store programs and data magnetically.
HDMI
High-Definition Multimedia Interface – a single cable interface that transmits high-definition video and sound, offering better quality images due to digital signals.
HDMI Port
A connection interface that transmits both video and audio.
Header / footer
An area within the top and bottom margins of a page, which can contain information that appears on each page of the document or section, such as page numbers, a company logo, or the file name.
Hidden attribute
A file attribute indicating if a file is visible. Hidden files, unlike visible files, do not appear in File Explorer by default.
History
An option that allows a user to find the web pages they have previously visited. When you click this option, it shows a list of sites you have visited.
Hits
Each file sent to a web browser by a web server, also called a page hit. It refers to the retrieval of any item, such as a page or graphic, from a web server.
Hoax
A cybercrime involving fraudulent chain messages, typically warning about a nonexistent virus. These deceptive messages can be sent via email, SMS, WhatsApp, or social media platforms like Facebook and Twitter.
Home page
The first page of a website, which contains information about the website’s purpose and content. It also provides links to other web pages and resources in the site.
Hot swappable
An extension of plug and play functionality where a new device can be connected to a computer while it is still running, without needing to power down, set up the device, or reboot the computer.
Hotspot
The area where a WiFi signal can be detected and used, providing internet access to devices.
HTML
Hyper-Text Markup Language: The predominant markup language for creating web pages. Used to structure and present content on the World Wide Web (WWW), including text, graphics, audio, and video. HTML elements consist of tags surrounded by angle brackets within web page content. HTML files are text files readable by all browsers and word processing software, making it the fundamental language for creating basic websites.
HTTP
HyperText Transfer Protocol: The standard protocol for transferring web pages and their content across the Internet.
HTTPS
HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP.
Hybrid computer
Laptop / tablet with a reversible or detachable screen and a normal keyboard. The screen is touch- or pen-sensitive. This machine can be used either as a normal laptop or as a tablet.
Hybrid Drive
A secondary storage device that combines a mechanical HDD and an SSD.
Hyperlink (Link)
An icon, graphic, or text in a document that links to another file or object. A built-in connection to another place in a document (web page, resource), often indicated as text underlined in blue.
Hypertext
A document with highlighted words or pictures, which when clicked on links to other information.
ICT
Information and Communication Technology: The use of computer-based technology and the Internet to make information and communication services available in a wide range of users.
Identity Theft
Obtaining a user’s identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim’s name. Eg: Banking information
IM
Instant Messaging: The exchange of text messages through a software application in real-time.
Import
Process of opening or ‘reading’ data created in a different version of the same application or even a totally different application. It involves bringing in data saved in a format that can be read by a different version of the same software or a different program altogether.
Information
Information is processed facts or data. Information comprises particulars that make sense, that you can use when you have to make decisions or when you have to solve problems.
Information overload
Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can’t cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.
Information Processing Cycle
The sequence of events in processing data into information which includes input, processing, storage and output. Communication has also become a very important element in this cycle.
Information Theft
The illegal copying or storage of confidential personal or financial information, including passwords, software code, algorithms or databases.
Infrared
Infrared connects devices in a short range, devices need to be line-of-sight and only one-to-one connections can be made.
Inkjet printer
Type of printer that sprays microscopic dots of ink onto the paper and is relatively cheap to buy but is comparatively expensive to run. Good for high-quality graphics such as photographs.
Input Mask
Field property in database design used to enforce data entry in a specific format. It consists of a code made up of letters, digits, and symbols, which dictates how data should be formatted when entered into a field. Input masks are commonly used for fields such as telephone numbers or dates to ensure consistency and accuracy of data input.
Integrated Graphics
A GPU that is embedded in the CPU, and instead of separate VRAM, the GPU shares system RAM.
Internet
Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.
Interrupt
A signal sent to the operating system from hardware or software requiring the CPU’s attention.
Intranet
Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.
IoT
Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.
IP Address
Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses.
IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.
IRQ
Interrupt Request Number: A unique device number that the operating system uses to identify the source of the interrupt.
ISO rating
A digital camera’s sensitivity to light. Higher ISO ratings are better.
ISP
Internet Service Provider: a company that has a permanent, fast connection to the internet. They sell internet access and services to individuals or organisations for a monthly fee.