All Flashcards
2-in-1 device
A portable computer sharing characteristics of both tablets and laptops
3D Printer
Printer that allows one to create a physical three-dimensional model from designs created using CAD or 3D modelling software by layering material.
4G LTE
The fourth generation of cellular wireless standards, following 2G and 3G. Also referred to as 4G LTE (Long Term Evolution). A standard for wireless communication of high-speed data for mobile phones and data terminals.
5G
The new generation of radio systems and network architecture for extreme broadband and ultra-robust, low latency connectivity, to enable the programmable world.
802.11 a/b/g/n
Indicates if a device has a wireless adapter. Letters show the speed the wireless network is capable of.
Absolute cell reference
The cell address in the formula will not change as the formula is copied.
Accelerometer
Input device to detect which way a device is being held to change the screen’s orientation.
Access control
The operating system asks for permission before installing software to avoid malware installation without consent. Access control can also be placed on an entire device such that permission is given through a password before the device is accessed.
Access Filter
A criterion or rule set for a field in a database query to display only records that meet the specified condition.
ADSL
Asymmetric Digital Subscriber Line: permanent digital connection along copper cables to the internet using a landline or telephone line by transmitting data.
Adware
Software causing unwanted content to automatically display or download while browsing the internet.
AI
Artificial Intelligence: simulation of human intelligence in computers where they are designed to think and act like humans.
Algorithm
Step-by-step, sequential solution used to solve a problem, typically in programming.
ALU
Arithmetic Logic Unit: part of the CPU performing arithmetic and logical calculations.
Anti-malware
Software safeguarding a computer against malicious threats.
Anti-spyware
Programs designed to remove or block spyware and user practices that increase the chance of getting spyware on a system.
Anti-virus
Software detecting malicious software then deletes or quarantines it based on the program’s behaviour/signature.
Append
Add records to an existing table in a database.
Application software
Executes specific tasks for the user, requiring an operating system to run on
AR
Augmented reality: technology placing interactive digital content over real scenes
Archive emails
Moving messages from the inbox to an archive folder without deleting them.
Archive files
Removing files which aren’t used regularly and storing them in a separate compressed location for space saving and later use.
Aspect ratio
The relationship between the width and the height of the display.
Attachment
One or more files sent with a message (typically e-mail) to share documents and images, typically represented by a paperclip.
Attenuation
Loss of signal strength over a distance
Attribute
Name and value combination defining a property of an element.
AUP
Acceptable use policy: a set of rules drawn up by company management to protect the company, its network and resources from misuse.
Authentication
Verifying a user or device before allowing access to a system or resources (eg. CAPTCHA, OTP)
Autofill
Microsoft Excel feature automatically filling selected cells with data.
Autonomous Vehicles
A self-driving/driverless car that can sense its environment and move safely with little to no human input.
Backbone
Part of a computer network interconnecting pieces of the network and providing a path for the exchange of information between different LANs and subnetworks.
Backup
Copying of files/folders in case of data loss to a separate location.
Bandwidth
Maximum amount of data that can be transferred from one point to another in a period of time measured in (kilo/mega) bits per second (bps)
Bandwidth theft
Unauthorised access to wireless bandwidth.
Barcode
A pattern of thick and thin lines that are decoded by a scanner to represent data.
Beta software
Preliminary version of software released by developers to test software before it is published where any errors are fixed before the final release.
Bibliography
A list of sources of information at the end of a document to acknowledge the references, refer to them later and compare the final document to the original sources for plagiarism (APA, Chicago and Harvard referencing are most common)
Big data
A large volume of structured and unstructured data that is analysed using computers through a difficult process
Biometric device
A device that inputs and analyses human physical data such as fingerprints, voiceprints and retinal/iris scans to uniquely identify an individual.
BIOS
Basic Input Output System: non-volatile software stored in ROM to initialise the computer
Bit torrent
A peer-to-peer protocol where multiple peers can transfer data between each other. Files are split into smaller parts to increase upload and download speeds. A complete file becomes a seed which other users can use.
Bitcoin
A digital currency with encryption techniques to regulate the generation of units of currency and verify transfers. Operating independently of a central bank.
Black hat
Crackers/Hackers with malicious intentions to steal or vandalise systems.
Blockchain
Advanced database mechanism allowing transparent information sharing within a business network
Blog
A web blog is an online journal or diary of one’s thoughts, normally published in reverse chronological order.
Blu-ray
An optical disc format designed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data (more than DVD).
Bluetooth
Wireless technology for sending data over short distances using short-wavelength radio transmissions.
Bookmark
Identifies a location or selection of text that you name and identify for future reference.
Boot
A term to describe a computer’s start-up process. Restarting is rebooting.
Bot / Zombie
A software application that runs automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. This can be due to a compromised computer.
Botnet / Zombie Army
A group of compromised or infected computers connected to a network such as the internet and controlled remotely to attack other machines by infecting them with malware, sending spam, etc.
Bounded media
Communication channels consisting of physical cabling common in wired LANs
Broadband
High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.
Broadband
High-speed, high-bandwidth connection to the internet transmitting multiple signals simultaneously.
Broadcast
An unsecured method of communication sent to multiple nodes in the network
Browser Add-on/Extension
A small software module which is a third party app downloaded to extend the functionality of a browser and provide customisation.
Browser cache
Previously and frequently accessed websites are stored on the local computer and will load from the local computer instead of the remote website when accessed again.
Buffering
A temporary storage area in RAM to speed up a slow input/output device.
Bug
An unintentional error, flaw, fault or failure made by programmers in a computer program/system causing it to produce an incorrect/unexpected result or behave in unintended ways.
Bus
An electronic pathway along which data can be sent from one part of the computer to another.
BYOD
Bring your own device: Students and employees are allowed to bring and use their own portable devices to work on and access the network instead of a company device
Bit
A binary digit is a single unit of information
Cache
A high-speed memory used to hold recently or frequently accessed data, in order to be able to retrieve that data faster.
Cap / Uncapped
A bandwidth cap can be applied to a network by the service provider such that a certain amount of data can be transferred over that network to limit the channel from being overloaded. Going over the band cap incurs a fee.
CAPTCHA
Completely automated public turing test to tell computers and humans apart is a test to determine whether it is a human being interacting with the computer. It usually takes the form of distorted letters and/or words that no computer software can recognise, but which humans can recognise with ease.
Caption
A numbered description added to a graphic object (such as a diagram or photo) or a table.
Card reader
Device into which a memory card is inserted. Data can then be transferred between the memory card and the computing device attached to the card reader.
Card skimmer
Device that reads the magnetic data from a bank card.
Cell range
Two or more adjacent cells on a spreadsheet.
Chart / Graph
Used to visualise a trend in data over intervals of time.
Chart area
Includes both the Plot Area and the ‘outside’ part of a chart where the titles are located.
Chatbot
A computer program that simulates online conversations using text or voice commands.
Citation
Reference to the source used in a specific instance and found in the text immediately after the piece of information being referred to.
CLI
Command line interface: A text-based interface, with commands entered and executed at the command prompt.
Click-jacking
An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.
Client-server
A single dedicated networked computer that provides services (file storage, email, printing) to other nodes/devices on the network.
Clients
Computers connected to a network that use services and resources from the servers.
Clipboard
Area in memory (RAM) where copied or moved objects – both text and graphics – are temporarily stored. They are kept there until they are pasted somewhere (or until the program is closed or the computer is shut down).
Closed questions
Questions that can be answered directly with facts. These questions often start with words such as What? When? Where? Who? How many? etc.
Cloud computing
A general term that refers to the sharing and use of resources and applications offered as services over the internet.
Cloud storage
Storing data on remote servers, accessible from any Internet-connected device.
CMOS
Complementary Metal-Oxide Semiconductor: Battery-backed, volatile memory that stores hardware
Colour Depth
The number of bits used to represent the colour of each pixel in an image
Column break
Used if you want to shift text to the top of the next column.
Combo box
A list of values from which a user can choose a value. Only one value is visible at a time, the others will appear only when the user clicks on the arrow. A Lookup Wizard is used to create the list of values.
Combo chart
If a chart has more than one data series, a different chart type can be used for each series.
Component
A circuit chip placed directly on the motherboard
Compression
The process of reducing file size takes up less storage space and quicker Internet transfer.
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Computer worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
Conditional formatting
Formatting of data on reports or computer programs that changes based upon specific criteria, e.g. printing and displaying negative quantities in red.
Constant
An entry which has a specific fixed value, e.g. 3.5.
Contrast ratio
The relationship between the darkest black and the brightest white that a display device can produce. Higher values are better.
CU
Control unit: A part of the CPU that coordinates the processing of instructions.
Convergence
The trend where separate technologies and functions that required different devices in the past are combined into one single device, e.g. the smartphone and the tablet.
Cookies
A small text file stored in a user’s browser to record their history and preferences.
Copyright
Software is developed and all rights belong to the owner/developer.
Core
A single physical processor. Chips that are ‘dual core’ have 2 processors, ‘quad core’ have 4 processors, etc.
CPU
Central Processing Unit – hardware component that processes all data and carries out all instructions.
CPU Architecture
32-bit computers have a processor that works with 32 bits at a time. The memory addresses, register sizes, address and data bus sizes and instruction sizes are all 32 bits in length. The computer is able to process at most 32 bits of data at once. In the same way a 64-bit computer sizes are all 64 bits in length. The computer is able to process at most 64 bits of data at once.
Creative Commond License
A licence where the author retains copyright of their work but allows people to copy and distribute the work (documents, source code) on condition the author is acknowledged.
Crop
To remove parts of a picture that you do not need. You can also customize it, for example to fit a specific shape.
Cross-reference
Used to refer to related information elsewhere in the same document. One can choose what information to display about the item referred to. A hyperlink to this item is created by default.
Crosstalk
Signals in adjacent wires interfere with each other.
Crowdfunding
A way of raising capital in small amounts from a large group of people, using the Internet and social media. Eg: gofundme
Cryptocurrency
A form of virtual, digital currency, e.g. Bitcoin, Ethereum, Luno, that can be exchanged for other currencies, products and services.
CSV
Comma Separated Values file – a text file which uses commas to separate the values in each line. Commonly used to import and export data between programs.
CTS
Carpal Tunnel Syndrome: A painful compression of the nerves in the wrist caused by repetitive manual action such as typing.
Cyber-attack
Any type of offensive manoeuvre employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.
Cyberbullying
The sending, posting, or sharing of negative, harmful, false, or mean content about a person using digital devices.
Cyberstalking
People who are intruding in other peoples personal details online.
Cyberterrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
Dark / deep web
Non-indexed web pages hidden from standard search engines accessible using an anonymising web browser.
Data
Data is unprocessed items or facts in raw form that usually have to be manipulated or processed before it makes complete sense or before it becomes useful.
Data labels
The values of the data points on a chart
Data redundancy
Unnecessary repetition of data produced by removing repeating groups as a result of first normal form.
Data series
A column or row of numbers in a spreadsheet that is depicted in a chart.
Data Validation
Techniques used to ensure the accuracy and integrity of data entered into a database or spreadsheet, such as input masks, validation rules, drop-down boxes, and adjusting field size properties
Database
A collection of related tables store data about a subject or a group of subjects.
Date Picker
A control in Access that allows selection of a specific date by clicking on an onscreen calendar.
DBMS
Database Management System: Software that manages and controls a database, including permissions, backup, referential integrity, and access control.
DDoS
Distributed Denial of Service: An attack where multiple coordinated Internet devices (bots) are used to overwhelm a service, making it inaccessible to legitimate users.
DDR RAM
Double Data Rate RAM: A type of RAM (Random Access Memory) that can be inserted into the RAM slots on a motherboard, known for its high data transfer rates compared to older RAM types.
Dedicated device
Devices that are designed to perform one specific task only, e.g. traffic lights, washing machines, ATMS, calculators, etc.
Default Printer
The printer to which documents are sent unless the user specifies otherwise.
Default Value
In databases, a preset value defined for a column type, automatically allocated to a field in a new record when many records hold similar data.
Defragmentation
The process of using a utility program to reverse fragmentation by rearranging and consolidating scattered file parts on a disk for quicker retrieval.
Delimiter
A character such as a comma, space or tab, used to separate each piece of data (each field) in a line in a CSV file.
Desktop
The visual space on a computer screen where programs, shortcuts, icons, folders, files, and documents are displayed upon startup.
Desktop computer / PC
Personal computer: A single computer designed for home or office use, typically placed on a desk.
Digital camera
A camera that captures and stores images digitally, allowing them to be downloaded to a computer for editing with graphics software and printing.
Digital Certificate
A data file from a Certificate Authority (CA) that verifies an organization’s identity by cryptographically linking its public key to specific identity attributes, such as VeriSign.
Digital divide
The gap between those who have access to and benefit from ICT (Information and Communication Technology) and those who do not. This gap is prominent in developing countries like South Africa and among poorer communities, where access to technology and knowledge of its use are limited.
Digital footprint
A trail left by an entity’s interactions in a digital environment; including their usage of TV, mobile phone, Internet and World Wide Web, mobile web and other devices and sensors. A digital footprint is the size of an individual’s online presence; as it relates to the number of individuals with whom they interact mainly on social networking sites.
Digital migration (digitisation of media)
The process of converting TV signals from analogue to digital format for broadcast.
Digital Signature
A cryptographic method where a user can “sign” a document by encrypting it with their private key. The document can then be verified using the user’s public key, ensuring its authenticity and integrity.
Digital zoom
Increasing the apparent size of an object in a photograph by enlarging pixels, resulting in potential blurriness and pixelation as the image quality decreases.
DIMM
Dual Inline Memory Module: A standardized module of RAM designed to fit into a DIMM slot on a motherboard. It is a small circuit board that holds memory (RAM) chips.
Disk Cache
The use of RAM to enhance the speed of access to a slower hard drive by storing chunks of data read from the disk, reducing the need for repeated reads.
Disk Cleanup
A computer maintenance utility in Microsoft Windows that identifies and removes unnecessary files from the hard drive to free up storage space.
Disk Defragmenter
A utility that rearranges fragmented data on a mechanical hard disk to improve efficiency in loading and saving data, thereby enhancing computer speed. Note that it does not increase available disk space.
Disk Scanner
A utility included with operating systems that checks a drive for errors and bad sectors on the disk, attempting to repair them if possible.
Distribution list/Mailing list
A list of email addresses grouped under a single name. Sending an email to this list forwards it to all addresses included, facilitating communication with multiple recipients simultaneously. Also known as a distribution list or contact group.
Distributed Processing
A method of processing where the computational tasks required to solve a problem are distributed among multiple computers (such as servers in different data centres), thereby enhancing total processing power.
DNS
Domain Name Servers: A protocol that translates domain names into IP addresses, enabling computers to locate resources on the Internet.
Domain Name
A unique string of characters that identifies a website on the Internet.
Dongle
A device plugged into a USB port to enable connectivity, such as for wireless keyboards or mice. It can also refer to a 3G or 4G dongle used with a desktop computer or laptop to connect to a cellular network for internet access.
DoS attack
A Denial of Service attack where thousands of compromised computers (bots) flood a server with information requests, aiming to overwhelm it to the point where legitimate users cannot access the system.
Download
The process of receiving data from a remote server to a local computer
Downward/backward compatibility
The ability of software to open and use files created in previous or older versions of the same software.
DPI
Dots per Inch: A measure of print or scan resolution indicating the density of dots per inch. For instance, an average print resolution might be around 4800 x 1200 dpi. High scan resolution is crucial for those frequently making high-quality copies or scanning pictures.
DRAM
Dynamic RAM: RAM that utilizes capacitors and requires periodic refreshing to maintain stored data.
Driver
System software that enables the operating system to communicate with hardware devices, facilitating their functionality.
Drop Cap
An enlarged initial letter or word at the beginning of a paragraph that extends into the lines of text below it.
DSLR Camera
Digital Single Lens Reflex camera designed for professional use, allowing interchangeable lenses and providing extensive control over technical settings.
Dumpster Diving
The practice of obtaining discarded data, such as invoices, phone records, organizational information, sensitive data printouts, or discarded hardware, typically to extract information or manipulate individuals.
E-commerce
The general term for any type of business transaction conducted over the Internet.
E-learning
A learning environment where individuals use computers to participate in teaching and learning activities to further their education.
E-mail spoofing
The forgery of an email header so that the email appears to be from a different origin (or person).
E-waste
Electronic Waste: Waste materials generated from the use or disposal of electronic devices, such as computers, televisions, and mobile phones. E-waste often contains hazardous materials that can be harmful to humans, plants, and animals, and can contaminate water, air, and soil.
Eavesdropping
The act of intercepting and monitoring signals traveling along copper cables by unauthorized individuals.
eBook / eReader
A mobile electronic device designed primarily for reading digital eBooks and magazines.
EEPROM
Electronically Erasable Programmable ROM: ROM that can be electronically modified and erased using software.
EFT
Electronic Funds Transfer: The process of transferring money from one bank account to another electronically, typically using internet banking services.
Electronic mail: involving the composition, sending, and receiving of messages electronically over a network, including the internet, facilitating communication globally.
EMI
Electro-Magnetic Interference: The corruption of signals traveling in copper cables due to electromagnetic sources, such as nearby machines or equipment.
En dash
A dash that is slightly longer than a hyphen, typically used for number ranges and occasionally for indicating relationships.
Encryption
The process of converting plain text into unreadable ciphertext to secure it from unauthorized access.
Endnote
Similar to a footnote but placed at the end of a section or document rather than at the bottom of the page where referenced.
Entry-level computer
A desktop computer designed for users who primarily use basic applications like email, web browsing, and general document tasks, typically available at an affordable price point.
Ergonomics
The study and design of workplace equipment and furniture to ensure it promotes comfort and safety for individuals in their work environments. Specific areas of interest include keyboards (curved for comfortable arm and wrist positioning), chairs, mice, etc.
Ethernet
A LAN (Local Area Network) technology that encompasses protocols, devices, and communication methods for wired network connections.
EULA
End-User Licence Agreement: A legally binding contract between a user and a software company, defining the terms under which the software can be used, including permissions and restrictions.
Excel Filter
A feature used in Excel to display only certain rows of data in a worksheet based on specified criteria or conditions.
Expansion Card
A small circuit board that is inserted into a motherboard slot (such as PCI, PCIe, SATA) to enhance the functionality of a computer beyond what is provided by the onboard components.
Export
Saving data in a format that can be read by a different version of the same application or even a totally different application.
Fake News
Stories or hoaxes created to deliberately misinform or deceive readers.
Fibre optic cable
A type of network cable that transmits data using light pulses through a central glass or plastic core, making it exceptionally fast and efficient for data transmission.
Field
In the context of a database, a field refers to a single piece of data or a single fact, such as an ID number, surname, or any other attribute of a record. It is the smallest unit of data stored in a database.
File Extension
A set of characters, typically 3-5 in length, added to the end of a filename to denote the type of file and the software required to operate or open it. Examples include JPG, EXE, BMP, DOCX, HTML, ACCDB, PPTX, XLSX, and ZIP.
File Path
The complete location or name of where a computer file, webpage, or other object is located.
File property
The basic information about a file such as its name, size and date modified.
Firewall
A security system, implemented as hardware, software, or both, that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the internet), helping to protect against unauthorized access and potential cyber threats.
Flash Drive
Portable secondary storage that stores programs and using flash memory.
Folder
A virtual location where programs, files, and other folders can be located. Computers with an Apple, Microsoft Windows, or other GUI operating system have folders to help users store and organize their files. A subfolder is a folder that is located inside another folder.
Footnote
Additional information placed at the bottom of the page in a document, and linked by a number or symbol to the relevant text in the body of the page.
Foreign Key
A field in a table that is a primary key in another table.
Form
An interface or object in software applications that allows users to input, store, and view data in a structured and user-friendly manner. Forms typically include fields for entering data and controls for navigation and interaction.
Form Letter
A standard letter template designed to be personalized and distributed to multiple recipients on a mailing list.
Formatting
The process of preparing a storage device, such as a disk or a drive, to store data by defining its file system structure. Initialisation determines how data is stored and accessed. Formatting a disk usually erases all existing data on the disk.
Formula
A statement written by a user in software applications like spreadsheets to perform calculations. Formulas can range from simple arithmetic operations to complex calculations involving functions, cell references, and constants. They always begin with an equals sign (=).
Fragmentation
The more you use your computer, the more the files (and parts of files) get scattered on the disk. The more scattered the files’ parts are, the slower your computer becomes, as the files take longer to retrieve.
Freemium Software
A type of software that offers basic functionality or a limited version for free, but charges for additional features or premium services. This model allows users to use the software for free with the option to upgrade to access more advanced capabilities.
Freeware
Software that is fully functional and available for use and distribution at no cost. Unlike open-source software, freeware typically does not provide access to its source code and may have restrictions on resale or modification.
FTP
File Transfer Protocol: A protocol to transfer and download files from the Internet.
Function
A named and predefined procedure in software that performs a specific operation and returns a result. Functions are typically invoked by typing their name followed by parentheses, within which arguments (if any) are specified. Examples include functions like COUNT, SUM, and MEDIAN in spreadsheet applications.
GAN
Global Area Network: A worldwide WAN such as the Internet.
Gap width
The distance between columns or bars in a chart, typically expressed as a percentage of the width of the columns or bars themselves.
Gateway
A device that connects and translates between network segments with different topologies, technologies, or protocols, enabling communication between them.
Geotagging
The process of adding geographical coordinates (latitude and longitude) to the metadata of a file, such as a photo, indicating where the photo was taken.
GHz
Gigahertz: A unit of frequency measurement for CPUs, indicating their processing speed. A higher GHz value generally signifies faster processing capabilities. 1GHz = 1 billion cycles (of instructions) per second
GIGO
Garbage-In-Garbage-Out: The principle that if incorrect or low-quality data is entered into a system, the output or results will also be incorrect or of low quality.
GPS
Global positioning system: A satellite-based navigation system that provides real-time location information to a device, calculating precise geographic coordinates (latitude and longitude) based on signals received from at least three GPS satellites.
GPU
Graphics Processing Unit: A co-processor on a video card that accelerates applications by offloading complex mathematical and geometric calculations required for graphics rendering from the CPU. This can significantly enhance computer performance in tasks such as CAD, 3D graphics rendering, and gaming.
Green Computing
The practice of using computers and related resources in an environmentally responsible and eco-friendly manner, encompassing their manufacturing, use, and disposal processes.
Grid Computing
A system where the computational resources of multiple computers from different locations are pooled together to work collaboratively on a single problem or task. Examples include projects like the SETI@Home initiative.
Gridlines (Excel chart)
Lines displayed in the plot area of a chart to aid in visually estimating the values of data points.
Gridlines (Excel worksheet)
Lines forming a rectangular grid that distinguish individual cells in an Excel worksheet, aiding in visual organization and alignment of data.
GUI
Graphical User Interface: A user interface that allows users to interact with electronic devices through graphical icons and visual indicators, rather than text-based commands. It typically includes windows, icons, menus, and a pointing device (like a mouse) for navigation and selection.
Hackers and crackers
Individuals who break into computer systems. Hackers often do so for prestige and recognition, while crackers have criminal intent.
HAN
Home Area Network – a small network within a home that connects devices such as computers, printers, tablets, smartphones, smart TVs, and gaming consoles.
Hard copy
A printed version of data stored on a computer, as opposed to a soft copy, which is visual output on a screen.
Hard space
A space where word wrapping cannot occur, keeping the characters or words on either side together on the same line.
Hardware
The physical components of a computer, such as the mouse, keyboard, and monitor.
HDD/Mechanical Drive
Hard disk drive: A secondary storage device that uses mechanical parts to store programs and data magnetically.
HDMI
High-Definition Multimedia Interface – a single cable interface that transmits high-definition video and sound, offering better quality images due to digital signals.
HDMI Port
A connection interface that transmits both video and audio.
Header / footer
An area within the top and bottom margins of a page, which can contain information that appears on each page of the document or section, such as page numbers, a company logo, or the file name.
Hidden attribute
A file attribute indicating if a file is visible. Hidden files, unlike visible files, do not appear in File Explorer by default.
History
An option that allows a user to find the web pages they have previously visited. When you click this option, it shows a list of sites you have visited.
Hits
Each file sent to a web browser by a web server, also called a page hit. It refers to the retrieval of any item, such as a page or graphic, from a web server.
Hoax
A cybercrime involving fraudulent chain messages, typically warning about a nonexistent virus. These deceptive messages can be sent via email, SMS, WhatsApp, or social media platforms like Facebook and Twitter.
Home page
The first page of a website, which contains information about the website’s purpose and content. It also provides links to other web pages and resources in the site.
Hot swappable
An extension of plug and play functionality where a new device can be connected to a computer while it is still running, without needing to power down, set up the device, or reboot the computer.
Hotspot
The area where a WiFi signal can be detected and used, providing internet access to devices.
HTML
Hyper-Text Markup Language: The predominant markup language for creating web pages. Used to structure and present content on the World Wide Web (WWW), including text, graphics, audio, and video. HTML elements consist of tags surrounded by angle brackets within web page content. HTML files are text files readable by all browsers and word processing software, making it the fundamental language for creating basic websites.
HTTP
HyperText Transfer Protocol: The standard protocol for transferring web pages and their content across the Internet.
HTTPS
HyperText Transfer Protocol over Secure Socket layer: A secure version of HTTP.
Hybrid computer
Laptop / tablet with a reversible or detachable screen and a normal keyboard. The screen is touch- or pen-sensitive. This machine can be used either as a normal laptop or as a tablet.
Hybrid Drive
A secondary storage device that combines a mechanical HDD and an SSD.
Hyperlink (Link)
An icon, graphic, or text in a document that links to another file or object. A built-in connection to another place in a document (web page, resource), often indicated as text underlined in blue.
Hypertext
A document with highlighted words or pictures, which when clicked on links to other information.
ICT
Information and Communication Technology: The use of computer-based technology and the Internet to make information and communication services available in a wide range of users.
Identity Theft
Obtaining a user’s identity, personal, or financial information to commit fraud. This can include making unauthorized transactions, purchases, or applying for credit in the victim’s name. Eg: Banking information
IM
Instant Messaging: The exchange of text messages through a software application in real-time.
Import
Process of opening or ‘reading’ data created in a different version of the same application or even a totally different application. It involves bringing in data saved in a format that can be read by a different version of the same software or a different program altogether.
Information
Information is processed facts or data. Information comprises particulars that make sense, that you can use when you have to make decisions or when you have to solve problems.
Information overload
Difficulty in understanding an issue and making effective decisions when one is overwhelmed by an excessive amount of information about that issue. It occurs when people can’t cope with the amount of information they are exposed to, leading to feelings of helplessness, inability to cope, and unproductive behavior.
Information Processing Cycle
The sequence of events in processing data into information which includes input, processing, storage and output. Communication has also become a very important element in this cycle.
Information Theft
The illegal copying or storage of confidential personal or financial information, including passwords, software code, algorithms or databases.
Infrared
Infrared connects devices in a short range, devices need to be line-of-sight and only one-to-one connections can be made.
Inkjet printer
Type of printer that sprays microscopic dots of ink onto the paper and is relatively cheap to buy but is comparatively expensive to run. Good for high-quality graphics such as photographs.
Input Mask
Field property in database design used to enforce data entry in a specific format. It consists of a code made up of letters, digits, and symbols, which dictates how data should be formatted when entered into a field. Input masks are commonly used for fields such as telephone numbers or dates to ensure consistency and accuracy of data input.
Integrated Graphics
A GPU that is embedded in the CPU, and instead of separate VRAM, the GPU shares system RAM.
Internet
Global network of interconnected computers and networks that use various communication technologies such as telephone lines, satellite links, and wireless connections. It enables communication, information sharing, and access to resources and services worldwide.
Interrupt
A signal sent to the operating system from hardware or software requiring the CPU’s attention.
Intranet
Private network within an organization that functions similarly to the Internet. It is used to share information, resources, and collaborative tools among employees. Access to the intranet is typically restricted to employees of the organization.
IoT
Internet of Things: Network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data. These devices can communicate and interact with each other over the Internet without human intervention.
IP Address
Internet Protocol Address: Unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication to ensure the correct destination is reached. It serves as an identifier for the device within the network.; IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), limited by available addresses.
IPv6: Uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), designed to accommodate the growing number of devices connected to the internet.
IRQ
Interrupt Request Number: A unique device number that the operating system uses to identify the source of the interrupt.
ISO rating
A digital camera’s sensitivity to light. Higher ISO ratings are better.
ISP
Internet Service Provider: a company that has a permanent, fast connection to the internet. They sell internet access and services to individuals or organisations for a monthly fee.
ISP-Based email
When using ISP-based email, you access your email by using software such as Microsoft Outlook on the device where your account settings have been configured.
Kernel
The kernel is the core of the operating system that is always in RAM to control the computer.
Keylogger / Keylogging
A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.
Label (Access)
A control containing text, mainly used for headings and captions.
LAN
Local Area Network: Network that connects computers and other devices within a limited geographical area, such as a school, office building, or campus.
Laptop / Notebook
A mobile electronic device that has the same power today as a PC. Its main advantage is that it is portable.
Laser printer
Type of printer that works like a photocopier, using toner instead of ink cartridges. Relatively expensive to buy compared to inkjet printers but cheaper to run and, of the two, best suited for higher volume printing.
Latency
The time taken for a component or device to respond.
LBS
Location Based Services: Services that use a device’s geographical position provide contextual information like the nearest ATM, restaurant or retail store.
LCD
Liquid Crystal Display: A monitor that does not need to be refreshed. Found in Laptops and PDAs.
Legend (Excel)
The ‘key’ which describes (gives the names of) the different data series in the chart, by depicting the fill colours or the patterns used.
Linux
An open source operating system.
List box (Access)
A list of values from which a user can select a value but not add an additional one
Lumen
This measures the brightness of the image projected by a data projector. The higher the lumen rating, the more effective the projector will be.
M.2 Format
M.2 is a form factor – it describes the shape and size of a hardware device.
MAC Address
Media Access Control Address: A hardware identification number that uniquely identifies each network node.
Machine Cycle
The steps for a program instruction to be executed by the CPU. It consists of FETCH, DECODE, EXECUTE and STORE.
Macro
A single instruction that expands automatically into a set of instructions to perform a particular task.
Mail merge
A document is merged with a list of names/addresses to avoid having to type out letters out individually. The data source could be a spreadsheet, a database table or a word processing table.
Mainframe
A powerful computer that is used to control major networks, e.g. banks, universities and large companies.
Malware
Software harmful to the computer written with negative intentions
MAN
Metropolitan Area Network: High-speed interconnected LANs across a city or metropolitan area.
Margins
The distance between the text and the sides of a whole page or whole document.
Markers (Excel)
Small marks (e.g. dots or crosses) used to indicate the actual data points on a line chart.
Meme
An image, video, piece of text, etc., typically humorous in nature, that is copied and spread rapidly by Internet users, often with slight variations.
Memory
Temporary storage area for programs and data being processed in the computer. Memory loses its contents when the power is switched off. Such as RAM
Memory Card
Electronic storage media used in digital cameras and smartphones.
Metadata
Additional data. Providing information about a certain item’s content. Eg: size, colour depth, resolution, date created, document length, author, etc.
Metaverse
A world that promises to combine the physical world, digital, artificial intelligence, augmented reality and cryptonomics into one immersive experience.
Micro-USB
A smaller type of USB port, usually found on mobile devices such as smartphones.
Microwave
A communications system that uses microwave frequency radio waves to transmit video, audio, or data between two locations, from a few metres to several kilometres apart.
Mid-range computer
For users that will be using their desktop for basic applications such as e-mail, Internet surfing and general documentation, but are more frequent users, require multi-tasking and are looking for a PC with slightly better specs than the entry-level range shown above.
Mobile Applications
Applications that are downloaded and installed on a mobile device. An app can access remote content and data using the Internet or download the content to be accessed locally.
Mobile Device
Electronic devices, usually portable, which helps the user with diary, dates, calendars and short notes.
Mobile Offices
A temporary or movable configuration of equipment and services allowing a person to function as if they are working from a permanent office
Mobile Operating System
Operating systems designed to run on mobile devices with limited resources, e.g. iOS, Windows Mobile, Android
Mobile or m-learning
A form of education and training delivered and conducted via the internet using mobile devices.
Mobile user
User (not necessarily a separate category) who wants and needs to have their technology with them wherever they are, e.g. sales people and consultants.
Modular Design
A computer is assembled with various components to suit a user’s requirements.
Monitor / Screen
A piece of electrical equipment which displays images generated from the video output of devices such as computers, without producing a permanent record.
Motherboard
A large circuit board that connects the most important components such as CPU, memory and connectors for peripherals
Multi-function printer
An all-in-one input/output device which can typically print, scan, photocopy and fax
Multi-touch (touch screen)
A screen that allows for two or more fingers to be detected and used on it at one time, e.g. for pinching actions.
Multi-user operating system
An operating system that allows multiple users to access a computer system at the same time. It is often used in networks where the same single operating system deals with multiple users that are simultaneously logged on.
Multimedia
Content that uses a combination of different content forms. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content forms.
Multiprocessing
More than one physical core on a CPU chip. When a computer is able to run more than one process simultaneously.
Multitasking
An operating system is able to load and process multiple tasks/processes simultaneously. True multitasking is achieved if the CPU has more than one core (multiprocessing). For example, compiling a program and listening to music.
Netiquette
The use of good manners when using the Internet and respect for other users.
Network
A collection of computing devices that are connected via some form of medium.
NFC
Near Field Communication: Technology that allows electronic devices to connect wirelessly and exchange data, simply by touching them together or bringing them close together. NFC is mainly used for payment processing.
NIC
Network Interface Card: Connects a computer to a network enabling data to be sent and received between the computer and other network-connected devices.
Node
Any device connected to a network and has an IP address.
Non-breaking hyphen
Used to force the words or characters on both sides of the hyphen to remain on the same line. ()
Normalisation
The process of creating separate linked tables by removing data redundancy, anomalies and complex SQL queries.
NVMe
Non-Volatile Memory express: A device interface specification for accessing a computer’s non-volatile storage media attached via PCI Express bus.
OCR
Optical Character Recognition: technology that converts text within an image into editable and searchable text by analysing the image and translating the text into a standardised format such as UNICODE.
Office Suite
A package which includes a number of standalone programs. Referred to as an Integrated Package. Types of applications included: Word processing, spreadsheet, presentations, e-mail, and database. Examples include Office 365, OpenOffice
OLE Object (Access)
A data type that can contain graphics, sound and video in addition to other data types. (Object Linking and Embedding)
Onboard Controller
A hardware component embedded into a circuit board such as the motherboard.
Online / Virtual Community
An online group of individuals who share common interests and ideas through digital networks.
Online banking
Allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtual bank, credit union or building society.
Online storage
Disk space that is allocated to you on a server on the internet. Accessible wherever you can log into the server.
Open Source Licence
The source code is freely available and can be changed. For a copyleft licence, any changes to the source code require the user to release the source code.
Open-ended questions
Questions that cannot be answered directly with facts and require some form of exploring, brainstorming or judgment. These questions often start with words such as Why? How? What if? etc.
Optical Drives
A secondary storage device that stores programs and data using lasers, e.g. DVD, CD
Optical Zoom
Uses lenses on the camera to ‘get closer’ to the object being photographed. Use optical zoom for better quality images.
Orientation
The horizontal (landscape) and vertical (portrait) orientation of a page.
OS
Operating system: System software that manages hardware resources and runs applications, controlling all activities within a computer. Examples include Windows, Linux, macOS, iOS, and Android.
OSS
Open Source Software: Software for which the source code is available to users, allowing it to be freely used, modified, and distributed. While the software itself can be freely copied and shared, it may not be sold. An example of open source software is Linux.
Page break
Starts text on a new page, without creating a new section.
PAN
Personal Area Network: A network organised around an individual or a small group, typically with a range of a few metres, used to communicate between personal devices such as PCs, smartphones, smart wear, and tablets.
Patch
A downloadable software update that fixes flaws, bugs, or security vulnerabilities in an operating system or other programs.
Path
The succession of folders, starting from the drive letter and separated by \ , that lead to the location of a specific file, e.g. U:\Documents\Finance\2019
PCIe Bus
PCI-express Bus: High-speed motherboard bus of various sizes to connect graphics cards, RAID cards, Wi-Fi cards or SSDs.
Portable Document Format: A file format used to distribute documents that is independent of the application in which they were created. It can be read using a free utility program called Adobe Reader.
Peer to Peer File sharing
Each networked computer acts as a file server providing file sharing services to other network nodes.
Pen input
A pen (or stylus) is an input device used together with a pressure-sensitive digitising tablet.
Peripheral
Input, output or storage devices connected to the motherboard
Phablet
A smartphone with a screen size larger than 5” (midway in size between a smartphone and a tablet).
Pharming
A scamming practice where a user’s web traffic is automatically redirected to a bogus website, even if the correct URL for the official site is entered. This allows criminals to capture any data the user enters, such as passwords and PINs.
Phishing
A scamming technique where users are enticed, usually via email, to click on a link to a fraudulent website in order to trick them into providing personal and confidential information, such as banking details, PIN numbers, and passwords, often by posing as a legitimate organisation.
PIN
Personal Identification Number: A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards.
Pivot Tables
An interactive table that automatically extracts, organizes, and summarizes your data. You can use this report to analyse the data, make comparisons, detect patterns and relationships, and discover trends.
Pixel density
Also known as dpi – how many pixels the display fits into a 1” horizontal line. A higher pixel density is better.
Pixels
Digital cameras capture images as pixel elements, known as pixels. Simply put, a megapixel is equal to one million pixels.
Plagiarism
The use of materials and sources without acknowledging the author.
Plain text file
A text file that contains lines of plain text with no formatting. The file extension .txt is associated with text files.
Platform
A type of operating system, e.g. Linux, Android, Windows.
Plot Area (Excel)
The ‘middle’ part of a chart where the data – the bars/columns/line – is plotted.
Plug and Play/Hotswappable/Autoconfiguration
A series of technologies where a new hardware device connected to a computer is automatically detected and configured by the operating system, enabling it to be used almost immediately without requiring manual installation.
Plug-in
A third-party app that the browser can call on to display specialised content such as a Flash video.
Podcast
A series of on-demand digital audio files that typically focus on a specific topic or theme, available for streaming or downloading over the internet.
Point to Point
A direct connection between two network nodes.
Pointing stick
An alternative to a mouse, used with laptops. It takes the form of a small button between the keys of the keyboard. You move the pointing stick to move the pointer, and press it down to click.
Pop-up
A small web browser window that appears on top of the website you are viewing. They are usually created by advertisers and often open as soon as you visit a website.
POS
Point of Sale: The software used in shops and supermarkets to manage tills, often linked to stock control systems designed to expedite the sale of goods and services in retail environments.
POST
Power On Self Test: A program executed by BIOS to check the computer’s hardware using the list of installed devices from CMOS.
Power user
Category of user who has computing needs that make the top-of-the-range hardware and software indispensable, e.g. architects and engineers. They typically also use all the advanced functions of the software they use.
ppm
Pages per minute: A measurement of the printing speed, indicating the number of pages a printer can produce in one minute.
Primary Key
A field within a database table that uniquely identifies each record by its unique value, ensuring each record can be distinguished from others in the table.
Primary Memory / Storage
Electronic and fast memory that holds the instructions that the computer is using whilst it is on. Examples include RAM, BIOS and ROM.
Printer
An electromechanical device that prints text or illustrations (hard copies) on paper.
Printer queue
Temporary storage area on the hard drive where print tasks are sent and where they wait until the printer is ready to print them. Each printer has its own queue
Processor cache
Primary storage that stores the next few instructions and data to be processed from slower RAM. Level 1 runs at the speed of the CPU.
Program files
Actual programs, not data files, that run (execute) when opened. They normally have a .com or .exe file extension. .
Proprietary software / License
Software that is licensed under specific terms and conditions, typically restricting users from freely using, copying, modifying, or distributing it. The source code is not available, only the executable code, and usage often requires product or activation keys for licensing.
PSU
Power Supply Unit: An internal or external device to provide regulated power to the computer.
QR code
Quick response code: A two-dimensional square barcode capable of storing significantly more data than traditional barcodes. QR codes can be scanned using a mobile device camera to access encoded information.
Quarantine
Placing a virus in an area of the disk where it cannot infect the computer.
Query
The object that allows you to retrieve specific information from a vast database based on certain criteria. Advanced queries can be made, i.e. more than one field, certain fields can be displayed, criteria can be applied to a number of fields in a specific order and results are stored.
RAID
Redundant Array of Inexpensive Disks: Multiple hard drives to protect against hard drive failure so if one hard drive fails, the other hard drive(s) can reconstruct the missing data providing reliable hard drive storage.
RAM
Primary short-term, volatile memory that temporarily stores programs and instructions currently loaded.
Ransomware
Malicious software that encrypts data on a computer or network, making it inaccessible to the user until a ransom is paid to the attacker.
Read-only
A file attribute that indicates if a file is read only or not. A read-only file cannot be modified and saved under the same name within the same folder.
Real-time messaging
Online exchange of messages (also images, video and voice) in real time. It includes IM (e.g. WhatsApp) and chat.
Record
A group of related fields that contains the particulars of a specific entity
Referential Integrity
A record cannot refer to another record that does not exist.
Refresh Rate
The frequency at which a monitor’s screen is refreshed or redrawn each second, measured in hertz (Hz). A higher refresh rate indicates a smoother and more responsive display.
Registers
Fast RAM (SRAM) on the CPU that stores the current instruction and its data.
Relational Database
A collection of related tables store data about a subject or a group of subjects.
Relative cell reference
In a spreadsheet formula, a cell address that adjusts automatically when the formula is copied to another cell.
Remote Access
Using a computer to access and control a remote networked computer or device using the Internet.
Remote working
Teleworking allows employees to work at home or at a local telework centre one or more days per week using communication tools, such as such as phone, fax, modem, Internet teleconferencing, e-mail or IM, to perform work duties from a remote location.
Report
Allows the user to view information so it can be presented in a printed format in various different ways.
Resolution
Scanner: Resolution is measured in dots per inch (DPI), indicating the number of dots the scanner can capture per inch.
Digital Camera: Resolution refers to the total number of pixels that make up an image.
Printer: Resolution indicates the number of dots the printer/scanner can create along a horizontal line, measured in dots per inch (DPI) determining the quality of the image
Reverse Social Engineering or Role Playing
An attacker convinces the target that they have a computer problem or vulnerability so they can access or download Malware onto the target’s device.
RFID
Radio Frequency Identification: A technology that uses small radio devices, typically smaller than a grain of rice, to store and transmit data via radio signals, allowing identification and data transfer to a receiving device.
Robotics
Designing, manufacturing and operating intelligent machines to perform human tasks.
ROM
Read Only Memory: A non-volatile memory chip that can be used to permanently store data in computers and other electronic devices, such as BIOS firmware, embedded operating systems and appliance/robotics controllers. Holding the instructions to start the computer and loard the operating system.
Router
A network device that connects multiple networks using the same protocol and determines the best path for data packets to travel between them. It enables devices to connect to a network and provides internet connectivity via fixed lines (such as telephone lines or fibre optic cables) or wireless means like WiFi.
rpm
Revolutions per minute – unit in which the rotational speed of a hard drive is measured, e.g. 7200 rpm.
RSI
Repetitive Strain Injury: An occupational illness caused by repetitive movements, typically of the hands and arms, resulting in damage to nerves in the hands, arms, shoulders, and neck. It is associated with fast, repetitive actions such as frequent text messaging.
RSS
Really Simple Syndication – a technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines – all from many different sites.
rtf
Rich Text Format: A file format that supports text formatting such as bold, font sizes, tab settings and even images. Widely used and supported by most word processors.
Safe Mode
A mode in which a computer can be booted in order to help fix various software problems. In Safe Mode, only essential system programs and services are loaded.
Sample group
The group of people chosen to take part in a survey, whose responses are used to reflect the opinions and responses of the bigger target group. The sample group should be fairly representative of the target group.
SATA
The internal hard drive interface or connection used to connect mass storage devices (such as mechanical or solid state hard drives) to a computer motherboard.
Satellite
Used to establish communication links in remote locations or over long distances. Used by Telkom, Military and other media organisations.
Scam
False organisations that trick you into doing business with them online, which means you, lose money.
Scanner
An input device that scans images, including printed text, graphics, barcodes, QR codes, and even parts of the human body, into a computer. OCR (Optical Character Recognition) can be used to convert scanned images into editable text files.
Scheduler
A program that is used to run certain programs at specific times.
Screen lock pattern
A security feature on mobile devices where a pattern, drawn or traced on the screen with a finger, is used to unlock the device.
SD Card
Secure Digital Card: A secondary storage medium that stores programs but mostly data and is small in size.
Search Engine
A software program or website that allows users to search for webpages or documents on the internet using keywords or phrases entered by the user.
Secondary storage
Permanent storage that stores all programs and data on the local computer.
Section (Word)
A part of a document in which the page formatting can differ from the rest of the document. Sections are thus used to vary the page layout on one or more pages of the same document.
Section Break (Word)
Separates a document or page into sections, and indicates the end of one section / start of the next section. Distinguishes sections from one another, and allows different sections to be formatted differently.
Secure URL
A URL that begins with https:// or has a small closed lock displayed somewhere on the page, often next to the URL. It means that the site is encrypted for security.
Sensor size
The size of the sensor in a digital camera. The bigger the size, the better the quality of the image.
Sensors
A device that converts a real-world property into data that a computer can process by converting the physical parameter (for example, temperature, blood pressure, height, humidity, speed, etc.) into a signal which can be measured electrically.
SEO
Search Engine Optimisation: A combination of strategies to increase the number of website visitors by obtaining a high-ranking placement in the Search Engine Page Results (SERP).
Server
A computer or software that provides services or resources to other computers (clients) within a network. This includes functions like file serving, print serving, hosting websites, managing email, and more.
Service pack
A collection of all the previous software updates for the last period of time (6 months to a year). It is meant to help people who are behind in their updates fix their software all at once. Service packs are pretty much a thing of the past. Most software companies create software so that it will regularly check for updates and then automatically download and install those updates.
Shaped connection
An internet connection where preference is given to certain services on the
internet, such as email, downloading and browsing. Other services, such as online
gaming and VoIP, are given less preference and are slower.
Shareware
Proprietary software that is freely distributed to users on a trial basis, typically for a limited period (usually 30 days). Users can download and use shareware for free during the trial period, after which the software may stop functioning or restrict some features until a full version is purchased.
Shoulder Surfing
Using observational techniques, such as looking over someone’s shoulder, to gain private information such as a password.
Single-user Licence
A licence under which you may only install one copy of the software. You may not install it on other computers.
Single-user Operating System
An operating system that can only be used by a single user at a time.
Site Licence
A licence agreement that allows a company or organisation an unrestricted number of installations of the software within the company or organisation.
Skype
A popular software package that allows people to communicate using VoIP. Skype also allows you to make video calls if you have a webcam attached to your computer.
Smart home
Home in which virtual assistant software is coupled to ‘pods’ that link to all the electronically controlled devices in the home.
Smartphone
Handheld devices that integrates mobile phone capabilities with the more common features of a handheld computer or cellphone. Smartphones allow users to store information, e-mail, and install programs, along with using a mobile phone in one device.
SMiShing
When a phishing attack is done via an SMS on a smartphone. SMiShing is short for SMS phishing.
SMTP
Simple Mail Transfer Protocol: An email protocol for delivering emails from an email client to a server. It is usually used for outgoing emails.
Social Engineering
The use of deception and psychological manipulation to trick individuals into divulging confidential information, providing unauthorized access to computer systems, or performing actions that may compromise security. This can include impersonation, installing malware, or other fraudulent activities.
Social Media
The collective of online communications channels dedicated to community-based input, interaction, content-sharing and collaboration. Social media refers to websites and applications that enable users to create and share content or to participate in social networking.
Social Networking
A web-based technology platform that facilitates communication, data sharing, and connections among users, including friends, family, colleagues, and strangers with similar interests. It allows individuals and organisations to post and share likes, dislikes, interests, comments, photographs, and activities. Examples include Facebook, Instagram, TikTok, Twitter, etc.
Soft Copy
A readable version of information that is not printed on a physical medium, typically stored or displayed on a computer screen. It contrasts with hard copy, which refers to information printed on paper.
Software
Programs written to control, support and operate the computer itself (It enables everything on your computer to work better) e.g. operating system, utilities, drivers etc.
Software Piracy
The illegal copying, distribution, or downloading of software, CDs, or DVDs without proper authorization, typically for commercial or personal use.
Software Theft
The unauthorised or illegal copying, sharing or usage of copyright-protected software programs.
SOHO
Small Office Home Office: A SOHO user is the type of user that works from home and might need general entry-level desktops for administrative functions such as accounting, databases, planning and scheduling.
Spam
The electronic equivalent of junk mail, specifically referring to unsolicited email advertisements or messages sent to users without their request or consent.
Speech recognition
Software that ‘listens’ to what you say and ‘understands’ it as a command or turns it into text (instead of the user typing the text).
Spoofing
The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL.
Spooling
The process where documents waiting to be printed are temporarily stored on a disk, forming a queue until the printer is ready to process them. This technique helps manage printing tasks efficiently when the printer operates slower than the speed of the computer.
Spyware
Software that covertly installs malware on a user’s device to intercept and collect their data without their informed consent. This may include keystroke logging or other methods to monitor and report user activities to third parties.
SRAM
Static RAM: Fast RAM located on or near the CPU without capacitors. It does not need to be refreshed; hence it is faster. Also smaller and more expensive.
SSD
Solid State Drive: A storage device that electronically stores programs and data in flash memory, providing faster disk access compared to traditional hard drives.
SSL
Secure Sockets Layer: A security management protocol for transmitting data on the Internet. It has been replaced with Transport Layer Security (TLS) certificates.
Stack and scale (Excel)
Where a data series in a chart is filled with pictures, and each picture is used to represent a certain number of units.
Stacked chart (Excel)
A type of chart where data series are placed one on top of the other – useful for comparing main categories (grand totals) and sub-categories in the same chart.
Stand-Alone Applications
Applications that do not require any networking hardware or software resources.
STP
Shielded Twisted Pair: Twisted pairs of copper wire enclosed in a protective foil. This type of cable is less affected than UTP by interference and crosstalk.
Streaming
The process of continuously receiving data from the Internet in real-time.
String (text data)
Combinations of characters (letters, digits and symbols like @) in text data. Examples are names and surnames, as well as strings of digits such as cellphone numbers and postal codes.
Styles
A combination of formatting attributes saved as a collection under one name.
Subscription-based software
Software where the user pays a monthly or yearly subscription for the use of the software, e.g. Office 365.
Super computer
A high powered, large computer that is used by big corporations, governments and universities, for massive calculations or number crunching.
Superscript / Subscript
Superscript is text that appears in smaller script above the text line. Subscript is text that appears in smaller script below the text line.
Surface Web
Indexed part of the World Wide Web that is searchable with standard web search engines.
Survey
A method of gathering data about a specific topic to analyse the data.
Switch
A network device used to connect multiple computers or devices within a local area network (LAN), allowing communication between them via Ethernet cables. Switches operate in a star topology and are essential for local network communication but do not provide internet access directly.
Synching
The process where changes made to data on one device are automatically updated and replicated across all devices that share the same data, ensuring consistency and accessibility in real-time.
System Clock
The microchip on the motherboard that regulates the timing and speed of computer functions.
System requirements
The minimum requirements (such as storage space, processing power and memory) needed to run a piece of software. When software requirements are indicated, this usually relates to the operating system needed.
System Software
Software designed to manage and control computer hardware and provide a platform for running application software. This includes operating systems, utilities, device drivers, and other essential programs that enable the computer to function efficiently.
Tabbed browsing
Allows you to have several web pages open on separate tabs of a single web browser, allowing you to quickly and easily jump between web pages.
Table
A collection of records in a database.
Table of contents (Word)
Automatically created list of headings or chapters and the pages on which they start, placed at the beginning of a document.
Tablet
A portable computer featuring a touch- or pen-sensitive screen for user interaction. Tablets are similar to smartphones but offer advantages such as larger screens and longer battery life. They are designed for mobile use and typically run special operating systems, providing wireless or 3G data connectivity. Unlike smartphones, tablets cannot make phone calls or send/receive SMS messages.
Target audience
The specific group of individuals or users that information, messages, or surveys are intended for, typically chosen based on demographics, interests, or specific criteria relevant to the communication or research objective.
Task Manager
Provides information about the computer’s performance and applications and processes. Most often used to end non-responding tasks or programs.
TCP/IP Protocol
The communication protocol for the Internet. It defines the address of each device (IP) and the packet structure of the communication (TCP).
Telecommuting (e-commuting)
A work arrangement where employees work from home or remote locations, communicating with their workplace, colleagues, and clients primarily through electronic means such as phone, fax, email, or internet. This eliminates the need for physical commuting to a traditional office setting.
Template
A blueprint or framework for a specific type of document, providing a predefined layout. Templates allow users to create new copies of the document by filling in necessary information, thereby streamlining the document creation process.
Text File
A data structure that stores unstructured text data permanently.
Theme
A collection of formatting elements that complement each other to lend a specific appearance to a document, in respect of fonts used for headings and body text, the colour combinations as well as the fill and line effects are used in the document.
Thin client
A special (cheaper) type of computer that doesn’t have its own hard drive and has limited memory and CPU power. It relies on a server for resources.
Throttling
When an Internet Service Provider (ISP) intentionally slows down the internet connection speed of a user who is consuming excessive amounts of data. This is typically done based on the ISP’s acceptable use policy (AUP), which defines thresholds or conditions under which throttling may occur to manage network congestion or ensure fair usage among subscribers.
Tooltip
A tip or information that pops up when you rest the pointer on an icon or object.
Top-range Computer
For users that will be using their desktop for more
Topology
The physical layout of a network. Star, bus, ring and hybrid
Touch Screen
An electronic display screen that serves as both an input and output device, allowing users to interact directly with a computer or device using their finger or a stylus. Touch screens are commonly found in smartphones, tablets, and other electronic devices, with variations that can respond to different types of touch inputs.
Touchpad
A pressure-sensitive surface built into laptops. It is an input device that can be used instead of a mouse.
Track changes
A feature in word processing software that records and displays all modifications made to a document. Deletions are typically shown as strike-through text, while insertions are often indicated with underlined text or in a different colour. This feature allows users to review and accept or reject changes made during collaborative editing processes.
Trackball
An input device with a large ball on it. You move the pointer on the screen by rolling the ball with your thumb.
Trendline (Excel)
A straight or curved type of ‘best fit’ line in a chart, that shows the general trend or direction of the values of a data series – usually over time.
Trojan
A type of malicious software that masquerades as a legitimate or useful program, but when executed, it causes harm to a computer system.
A microblogging service (‘micro’ is used to describe the service because messages in Twitter can’t be longer than 280 characters). Twitter allows people to send messages (tweets) to their ‘followers’.
Unbounded Media
Transferring signals between nodes using no cables such as Bluetooth, infrared beams, microwaves, satellites or laser light signals.
Unmanned Aerial Vehicles
A type of aircraft that operates without an onboard pilot, the most common being a drone.
Unshaped connection
An internet connection that gives all the internet services the same priority.
Update
Either the latest fix for bugs in the current version of the software, or the addition of new, additional features to the software.
Upgrade
Hardware Upgrade: The process of replacing old or obsolete hardware components with newer equivalents to improve performance or functionality.
Software Upgrade: Installing a new version of software that includes significant changes or new features. Software upgrades typically require payment for the new version.
UPS
Uninterruptible Power Supply: An electrical device designed to provide emergency power to electrical equipment when the primary power source fails. It protects computers and other devices from power surges, spikes, and outages, allowing enough time to save work and shut down equipment properly.
URL
Uniform Resource Locator: A unique alphanumeric address used to identify resources such as websites, web pages, documents, and files stored on web servers. URLs are entered into the address bar of a web browser to locate and access specific resources on the internet.
URL Shortener
A tool or service, such as TinyURL.com, that converts a long URL into a shorter version. This abbreviated URL redirects users to the same web address as the original, making it easier to share, remember, and type.
USB
Universal Serial Bus: Standardised serial bus to connect most types of peripherals to the motherboard. It transfers data and power.
USB Port
Standard port commonly used to connect devices such as keyboards, mice and printers to a computer. USB ports and standards are evolving and becoming faster.
Username / password
Your username identifies you as a user and the password is a secret set of characters that ensures that it is you that is logging in . The computer will then authenticate you as a valid user.
Utility programs
System software programs designed to assist users in performing maintenance tasks and managing computer resources. Operating systems often include utilities for tasks such as managing disk drives, printers, and other devices.
UTP
Unshielded Twisted Pair: A type of cable that consists of several pairs of copper twisted wires within an outer protective plastic cover.
Valid data
Data where the values are acceptable in terms of permissible values, the limits within which it occurs or the format in which it is entered.
Validation Rule
Criteria that data must meet to be considered valid within a specific field. Validation rules help prevent errors by enforcing the input of predefined values or conditions, ensuring data integrity and accuracy.
Validation text
The message that must be displayed if the data entered does not meet the condition(s) in the Validation Rule.
VGA port
Port used to connect the monitor to the computer. Largely replaced today by other connection types, such as HDMI.
Video blog (vlog)
A form of blog which uses video as the medium. Entries on the vlog normally consist of video supported by text and images.
Video Card
A separate circuit board that plugs into a special slot on the motherboard. It has its own video memory and a graphics processing unit (GPU) that improves video processing.
Video conference
An online conference between two or more people at different locations, using a computer network to transmit audio and video data, as if all the people were in the same room.
Video RAM (VRAM)
RAM that stores data about each pixel, its colour and location on the screen to be used by the GPU.
Virtual (on-screen) Keyboard
A software component that allows a user to enter characters. A virtual keyboard can usually be operated with multiple input devices, which may include a touchscreen, an actual keyboard and a computer mouse.
Virtual assistant
Software that allows you to speak to your phone (or tablet) and have it ‘understand’ and respond to what you say, e.g. ‘turn off the lights’.
Virtual community
A group of people who gather online to share ideas and interests.
Virtual Memory
A technique where the operating system uses free disk space on a hard drive to simulate additional RAM capacity. This allows the computer to run more programs simultaneously than the physical RAM would normally support. In virtual memory systems, RAM data is divided into pages that are swapped between RAM and the hard drive as needed, to optimize memory usage and performance.
Virtual Offices
A flexible workspace to provide businesses with any combination of services, space and/or technology without owning or leasing a traditional office.
Virtual Reality
The use of computer-based technology to create a simulated environment that immerses users and allows them to interact with a three-dimensional, computer-generated environment.
Virus
Damaging programs that are illegally copied and installed onto a computer and are part of Malware.
Virus signature/definition
The pattern that uniquely identifies the malware.
Vlog
A blog in which the postings are primarily in video form.
Vodcast
A video form of podcast
Voice Recognition Software
Software that enables computers to interpret and understand spoken language. It operates by converting spoken words into text or executing commands based on voice input. There are two primary categories: software for commanding computers and dictating text, and virtual assistants that perform tasks based on voice commands. Examples: Dragon Dictate or Dragon Naturally Speaking, Siri, Dragon Mobile Assistant, Google Now, Google Voice Search, etc.
VoIP
Voice Over Internet Protocol: A technology that enables voice and multimedia communications to be transmitted over IP networks, such as LANs, WANs, and the internet. VoIP allows users to make telephone calls to others with VoIP systems anywhere in the world, leveraging internet connectivity for communication.
Volatile memory
Memory (RAM) does not keep its contents when the power is switched off and this means that it is volatile. Storage (and ROM) keeps its contents at all times – therefore it is non-volatile.
VPN
Virtual Private Network: A network that connects remote users to a private internal network using the Internet.
WAN
Wide Area Network: A network that spans a large geographical area, such as a city, country, or continents, connecting multiple LANs (Local Area Networks) or MANs (Metropolitan Area Networks) across different locations.
Watermark
Text or a graphic which appears very lightly as a background on all the pages in a document.
Wearable devices
Wearable technologies, e.g. electronic mobile devices worn as accessories or part of clothing, e.g. smartwatches, fitness health trackers, etc. continuously generate data from various environments and communication with other devices.
Web 1.0
Static websites that do not allow users to interact with the content.
Web 2.0
Dynamic websites that allow users to interact with the content.
Web 3.0
Websites that provide users with a more personal experience by accessing browser history and location.
Web 4.0
Web 4.0 is the mobile web that can adapt to its mobile surroundings. Web 4.0 connects all devices in the real and virtual world in real time.
Web application/online software
Software that runs on servers on the internet. You view the interface in a web browser. Requiring only a browser and internet access to function.
Web browser
Software that allows you to view and explore Web pages on the Internet, e.g. Internet Explorer, Netscape Navigator, Google Chrome.
Web Cache
The activity of storing recently accessed web pages on a server in a network.
Web caching
Temporarily storing recently accessed web pages on disk so that they can be loaded more quickly the next time they are requested.
Web page
A document on the web which can be viewed in a web browser, and created in languages such as HTML, JavaScript, PHP and Python.
Web-based email
A service that allows you to access an email account through a web browser from any location that has internet access.
Webcam
A digital camera typically used for video conferencing, security monitoring, and other applications requiring real-time video feeds. Webcams are often integrated into laptops or set up separately, providing live video images to the computer or web server.
Weblog / blog
Website updated often with news and events in chronological or sequential order. A blog reads like a journal with the most recent entry at the top.
White Hat Hackers
Non-malicious hackers who legitimately test a company’s computer and network security.
Wi-Fi
A popular technology that enables electronic devices to exchange data wirelessly over a computer network, including high-speed internet connections. Devices such as computers, smartphones, tablets, and others can connect to network resources like the internet via a wireless access point. Wi-Fi can provide coverage ranging from small areas like a single room to large areas encompassing multiple square miles, achieved through multiple overlapping access points.
Wi-Fi Router
A network device that connects a LAN to another network with the same protocol and provides Wi-Fi access to mobile devices.
Widow/Orphan
A single ‘dangling’ line at the top or bottom of a page of a paragraph that splits over a page.
Wiki
A website that allows multiple users to collaborate by adding, editing, and modifying content collectively. An example is Wikipedia, where users can contribute and edit articles collaboratively.
Wildcard
Wildcards are like the blank pieces in Scrabble, or like the Jokers you can use in some card games to stand in for any card. The wildcards “” and “?” can be used to display all files with the extension “.doc” by typing “.doc”, or all files “01062001.doc”, “01072001.doc”,“01122001.doc”… by typing “01??2001.doc”.
WIMAX
An upgrade on WiFi and a more secure wireless networking technology, that allows wireless devices to communicate with one another over a much wider area than WiFi.
Wireless Access Point
A wireless transceiver that broadcasts a signal within a limited area. Each access point is connected to a wired network.
Wizard
A feature that guides a user through a process such as creating a document.
WLAN
Wireless Local Area Network: A network that links two or more devices using wireless distribution methods, typically through an access point, allowing mobility within a local coverage area while maintaining connectivity to the wider internet. Wireless LANs are popular for their ease of installation and are commonly found in homes and commercial settings, providing wireless access to users.
WWW
World Wide Web: A service on the internet that comprises a vast collection of multimedia, interactive documents stored on servers worldwide. These documents are interconnected and accessed using HTTP (Hypertext Transfer Protocol).
Ink-jet printer
An ink-jet printer produces high-quality text and graphics by spraying ink onto a sheet of paper by using an ink cartridge.
Laser printer
A laser printer uses a laser beam to produce an image onto a drum. A laser printer uses a toner cartridge similar to a photocopy machine.
Bits and bytes conversions
One byte is 8 bits
One kilobyte (KB) is equal to 1,024 bytes
One Megabyte (MB) is equal to 1,024×1,024 or 1048576 bytes (1,024 kilobytes)
One gigabyte (GB) is equal to 1,024 megabytes.
One Terabyte (TB) is equal to 1,024 gigabytes.
Pie chart
Show and compare the cost percentages of items
Bar chart
A chart with bars whose lengths are proportional to quantities
Why would one pay more for a high-end computer?
To use demanding applications such as CAD, games, photo and video editing, graphic rendering, etc. as well as basic applications such as e-mail, Internet surfing and general documentation, and who are looking for a PC with more power. Paying extra for a higher performance PC will ensure that your PC can cope with more demanding applications while building future capacity.
Retinal scanner
Uses unique patterns of a person’s retina to identify them.
Multi-function printer
A Multi-function printer incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting or to provide centralized document management/ distribution/production in a large-office setting. A typical MFP may act as a combination of some or all of the following devices: E-mail, Fax, Photocopier, Printer, Scanner
FIFO
First in, first out: ata transfer is not controlled by the ISP and is operated on a first come first served basis FIFO OR all protocols are treated in the same way and no protocol is given priority.
Disk Optimisation
Optimising the disk means that it compresses and/or organizes the files on your hard disk
Embedded computer
A dedicated computer system that forms an integral part of a larger machine or system
Drone Technologies
A drone is a flying robot that can be remotely controlled, combined with advanced technologies including GPS, sensors, artificial intelligence, and video cameras. It is an unarmed aircraft.
Memory Card Reader
A device connected to a computer designed to accept and read data from different types of storage media such as SIM and SD cards and flash drives.
Another word for shaping?
Tuning
Another word for throttling?
Policing
4IR
4th industrial revolution: describes the blurring boundaries between the physical, digital and biological worlds where AI, robotics, IoT and other technologies to make newly essential products and services
5IR
5th Industrial Revolution: develops alongside 4IR and uses its advantages to place focus on humans and their endeavours, defining the ethics and impact of technology.
IPO
Input, Processing and Output:
Input
Output
Processing
Storage
Communication
Computer
An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
Raspberry PI/Arduino
Single board computers
Advantages and disadvantages of using computers.
Advantages:
1. Speed and efficiency: ability to process and analyse large amounts of data
2. Storage and organisation: ability to store large amounts of information in an organised manner
3. Connectivity and communication: enable easy communication and access to information worldwide
Disadvantages:
1. Dependency and over-reliance: people can be dependent on computers for basic tasks
2. Health issues: prolonged use can lead to health issues
3. Security risks: security threats like viruses and hacking
Types of input
Data or instructions
How are computers categorised?
Portability, processing power and usage
What may disabled people use to make computing more accessible?
Ergonomic considerations for keyboard
Ergonomic considerations for mouse
Examples of pointing devices
Touch pad, trackball, keyboards, touch screen, stylus, joystick
Magnetic stripe
A magnetic area on the back of a plastic card containing electronic information.
Advantages and disadvantages of scanners
Advantages:
1. Digital archiving: conversion of physical documents into digital format for archiving
2. Easy sharing: digital files created can be shared
3. Improved organisation: documents can be organised and searched through easily
Disadvantages:
1. Initial cost: high quality scanners are expensive
2. Technical issues: Scanners can have technical problems such as software glitches/hardware failures
3. Quality variations: scanned image quality can vary depending on scanner and scanner settings
Advantages and disadvantages of digital cameras
Advantages:
1. Instant gratification: photos can be seen immediately
2. Cost-effective: no film purchase or development costs
3. Easy editing and sharing online
Disadvantages:
1. Battery dependency
2. Initial cost: Higj quality digital cameras can be expensive
3. Complexity for beginners: advanced digital cameras can be complex to use
Advantages and disadvantages of input hand-held devices
Advantages:
1. Portability: easy to use and carry anywhere
2. Ease of use: many are user-friendly
3. Efficienct: devices can speed up data input and processing
Disadvantages:
1. Limited functionality: limited capabilities compared to larger devices
2. Battery dependency: many require frequent recharging or battery changing
3. Durability issues: can be fragile and prone to damage
Types of output
Text, graphic, audio, video
Types of input
Video, audio, biometric
Output devices for disabled users
Print speed of inkjet, laser, 3D and dot matrix printers
Advantages and disadvantages of inkjet, laser, 3D and dot matrix printers
Quality of inkjet, laser, 3D and dot matrix printers
Cost of inkjet, laser, 3D and dot matrix printers
Advantages and disadvantages of [display devices]
Factors to consider when purchasing
Budget, speed, colour, cost, graphics, printing, paper type and size, compatibility, mobility, resolution, economic/environmental considerations
One EB is how many PB?
One exabyte is 1000 petabytes
One PB is how many GB?
One petabyte is one million gigabytes
Robustness
What is the difference between primary and secondary storage?
What storage media is suitable for backups?
Advantages and disadvantages of cloud storage?
How can peripherals be connected?
Cabled or wireless (bluetooth, USB or WiFi)
Outline the booting/start-up process
SDRAM
DDRRAM chips
PROM
EPROM
EEPROM
How would one troubleshoot the following:
1. Disk errors
2. Resolution
3. Non-responding programs
4. Non-responding mouse
5. Non-respinding keyboard
6. Printing issues
7. Connection issues
8. Storage issues
9. Issues with UPS
Differentiate between system software and application software
Examples of GUI
Icons, combo boxes, checkboxes
Advantages and disadvantages of open source software
Site license agreement
Subscription model agreement
Risks of using flawed software
Factors that influence performace
RAM, Processing (type, speed, number of cores, cache), number of applications running and caching, disk optimisation
Mobile operating systems
Android, iOS
Desktop operating systems
Windows, Linux, MacOS
Embedded operating systems
Auto configuration of devices
Troubleshooting for system software
Disk cleanup, wizards, etc.
Basic security of a computer
Username and password log on
Forms of authentication
Screen lock pattern, biometric input
Examples of utility programs
Scheduler/update utility, backup/archive, firewalls
Application version
Software for disabled users
Screen readers, voice recognition software…
Typing tutor
How to use snipping tool
Win+shift+S
How to add a new peripheral
How to access task manager
How to change the default printer
How to manage the printer queue
Hardware configuration of:
1. Processor
2. Memory
3. Hard drive size
File organisation
Provide possible file extensions for:
1. Compressed files
2. Office suite files
3. Graphics
4. Movie
5. Sound
6. Animation
7. PDF
What are the objectives of a network?
Advantages and disadvantages of networks
Advantages: Facilitating communications, sharing hardware/software/data/information
Disadvantages: security issues, privacy issues
What can make a network more secure?
Access rights, usernames and passwords
Purpose, role and use of:
1. PAN
2. HAN
3. LAN
4. MAN
5. WAN
6. GAN
Advantages and disadvantages of WLAN
Role, use and purpose of WLAN
Give an example of a GAN and advantages and disadvantages
The internet
What are the basic components of a network?
Workstations and servers, NIC, connection devices (router and switch), communication medium, network software
What is needed to set up a PAN/HAN
Good practices when engaging in digital communications
Types of digital communications
VoIP, File sharing (eg. FTP), video conferencing
Advantages and disadvantages of digital communications
Website
A set of related web pages under a single domain name.
Hardware and software required to connect to the internet using a computer
Examples of web browsers
Google Chrome, Brave, Microsoft Edge
Examples of IoT
Smart appliances, wearable technology, self-driving cars
SBC
Single-board computer is a complete computer built on a single circuit board with microprocessors, memory, output, input, etc.