Digital World Keywords Flashcards

1
Q

Smart Phone

A

A phone offering advanced features, e.g. ability to send emails, surf the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multifunctional

A

Having the ability to do many different things using the same device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SD & SDHC cards (Secure Digital & Secure Digital High Capacity)

A

One type of flash memory card which store data - SD up to 2GB SDHC up to 32GB (ideal for video)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

File Format

A

The particular code that a file is stored in. Different software and devices use different formats, which can cause problems if a device cannot decode the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compatible

A

The ability of a device to communicate and share

information with another device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluetooth

A

Allows the exchange of data over short distances from fixed and mobile devices. In order for devices to
communicate they must be able to understand Bluetooth rules (protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wi-Fi

A

Wireless fidelity. It is similar to Bluetooth in that it is used to exchange data, but the signals can travel further distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Global Positioning System (GPS)

A

Navigational system used in many devices which give current location, directions to and from specified location, distance to location by using satellite signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assisted GlobalPositioning System (AGPS)

A

A technology that has been built into mobile phones. When signal between mobile and satellites is weak as in the case as urban areas) the signal sent by the mobile phone is diverted to mobile masts which identify the phones exact location which allows the user to continue using GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

User Interface

A

The way in which a user interacts with a system such as a computer or mobile phone e.g. keypad, screens, menu and icons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Repetitive Strain Injury (RSI)

A

damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Etiquette

A

A set of rules that people try to abide by out of respect for other people around them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public Domain

A

Materials that are available for anyone to use for any purpose (not subject to laws of copyright)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Future Proofing

A

Anticipating future developments when you buy something in the hope that it will not go out of date quickly. Future proofing can be expensive, as buying something top of the range will cost more than if you wait a short while

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Real Time

A

The actual time during which
something takes place,
without noticeable delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Emoticon

A

The use of icons or text to portray mood or facial expressions e.g. =) is happy =( is sad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Voice Over Internet Protocol (VoIP)

A

The technology is used to make phone calls via the internet, usually at a cheaper cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3G

A

3rd generation wireless communication allows high-speed wireless data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Latency

A

The time delay between the moment something is initiated and the moment it becomes detectable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Internet Service Provider (ISP)

A

A company that provides Internet access to its customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Social networking site

A

an online community where people can communicate and share information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Link

A

Allows users to navigate around a product. By clicking a link, the user can ‘jump’ to a new screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Blog

A

Short for ‘web log’, a shared online journal where people can post diary entries about their personal experiences and hobbies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Browser

A

A software application for retrieving, presenting and

navigating information resources on the World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Spam

A

Unwanted or junk email sent to lots of recipients at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Protocol

A

A set of rules used by computers to communicate with each other across a network. Without these computers would not be able to communicate effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Personal Learning

A

Learning that is tailored towards the individual to allow them to make progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Collaboratively

A

Working together with other people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Information overload

A

Having so much information available that the user feels overwhelmed and is unable to take any of it in, possibly leading to stress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Plagiarism

A

Copying someone else’s work and presenting it as your own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Virus

A

Virus A program designed to cause other programs on a computer to malfunction or stop working altogether

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Fraud

A

Tricking someone for personal gain or to damage them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Peer-to-peer (P2P)

A

Sharing files among groups of people who are logged on to a file-sharing network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Hacker

A

Someone who gains unauthorised access to a computer in order to obtain data stored on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Identity theft

A

A crime that involved someone pretending to be another person in order to steal money or obtain other benefits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

E-commerce

A

Buying and selling goods electronically, usually over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Globalisation

A

The increasing integration of economies and societies around the world, particularly through international trade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Hardware

A

The physical parts of a computer system e.g. CPU, RAM, CD Drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Microchip

A

A miniature electronic circuit used to control computers and most other electronic devices

40
Q

Biometrics

A

An automated method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice

41
Q

Netbook

A

A small portable laptop computer designed for wireless communication and access to the internet

42
Q

Universal Serial Bus (USB)

A

A standard method of connecting devices such as keyboard and printers to computers

43
Q

Flash memory card

A

Used for fast and easily transferable information storage in digital devices such as mobile phones, media players, and cameras. This memory is known as Solid State Storage Device, meaning there is no moving parts. Everything is electronic instead of mechanical and so it is ideal for mobile phones.

44
Q

Cyber cafe

A

A cafe or coffee shop that has a number of personal computers connected to the internet and available for the use by customers. Most charge by the hour or fraction of an hour.

45
Q

Hotspot

A

A venue that offers a Wi-Fi internet connection. Many are located in hotels and restaurants and lots of them are free.

46
Q

Cloud Computing

A

A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually

47
Q

Web application (Web App)

A

Any application that can be accessed using a web browser. The application can be as simple as a message board or guest sign-in page on a website, or as complex as a spreadsheet.

48
Q

Sat Nav

A

A device , usually used in the car, that gives directions based on information received a series of satellites.

49
Q

Convergence

A

When one device is developed to carry out functions that where originally performed by several different devices.

50
Q

Metadata

A

Provides information about the content of a digital item, e.g. Each digital image from a digital camera has a file attached listing such things as data, time, camera and shutter speed.

51
Q

Geotag

A

To attach the exact geographical coordinates of longitude and latitude to a digital image, giving the location of where it was taken

52
Q

HDTV

A

High-definition TV

53
Q

High Definition (HD)

A

The picture on a TV screen is made of lines of pixels. In a conventional TV there are 625 lines, which are refreshed 25 times per second. This has either 720 or 1080 line, so it produces a clearer, shaper picture.

54
Q

High Definition Media Interface (HDMI)

A

Required for connecting devices to show high-definition videos.

55
Q

Terabyte (TB)

A

1000GB (Gigabytes) is

56
Q

Gigabyte (GB)

A

1000MB (Megabytes) is

57
Q

Blu-ray

A

A disk that enables recording, rewriting and playback of high-definition video and it stores large amounts of data. It has more than 5 times the storage capacity of traditional DVD’s. They can hold 25GB on single layer and 50GB on dual layer disk.

58
Q

Download

A

Transfer of a file e.g. A video from a central computer to your computer.

59
Q

Broadband

A

A high-speed connection to the internet.

60
Q

Bandwidth

A

The amount of data that can fit through the internet
connection. Compare it to a 10 lane motorway which can fit more cars on it than a 4 lane motorway. Its measured in bits per second (bps). This indicates the number of bits that can fit down the lane in one second. kilobits per second (kps) means thousands of bits per second, megabits per second Mbps means millions of bits per second.

61
Q

Upload

A

Transfer a file from your computer to a central computer e.g. Your ISP

62
Q

Firewall

A

A system designed to prevent unauthorised access to your computer when connected to a network such as the internet.

63
Q

Spyware

A

Software that can be installed on your computer without your knowledge, which collects information about logins and passwords and sends details to another computer on the internet.

64
Q

Internet Protocol (IP) address

A

The personal address of your computer (just like you home address) so that servers know where to send the information you have requested.

65
Q

Encryption

A

For security, data is translated into a secret code according to a set of rules in a special ‘key’. To convert the data back into plain text, the receiver must also have the key.

66
Q

Copyright

A

Gives the creator of an original work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.

67
Q

Digital Rights Management (DRM)

A

Allows the copyright holder or owner of the media control over the number of viewings, plays and copies, and even which devices the media can be played or viewed on. If you download a film from iTunes you cannot burn it onto a DVD because this is encoded in the film.

68
Q

Streaming

A

Content that is send in compressed form over the internet and played by the viewer in real time. User does not have to wait for this to download, the media is sent in a continuous stream of data and is played as it arrives.

69
Q

Malware

A

Software that is designed to cause problems for users.

70
Q

Cookies

A

Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.

71
Q

Dongle

A

A small piece of hardware that connects to a computer and has uses including data storage and picking up Bluetooth and 3G signals. It is portable, looks like a USB drive and can get you onto the internet using 3G.

72
Q

multitask

A

To perform more than one task at the same time.

73
Q

Remotely

A

Perform tasks from a different location.

74
Q

Wiki

A

A type of website that encourages collaboration by

allowing users to add, edit and remove content

75
Q

Teleworking

A

Working from home but staying in touch with others with the help of technology.

76
Q

Hot Desking

A

Sharing desks or workstations between workers, as a way of saving space and resources.

77
Q

Open Source Software

A

Software that is available to download free of charge e.g. OpenOffice.org which is a suite of applications.

78
Q

Data

A

Symbols, characters, images and numbers are all types of this. When this is processed and acquires meaning it becomes information. Computers process this to produce information.

79
Q

Backup

A

A copy of data that is made in case the original data is lost or damaged. This can restore the data to its original state.

80
Q

Primary Storage

A

Built in storage designed to be directly accessed by the CPU.

81
Q

Secondary Storage

A

Storing data on another device, such as a CD or USB pen.

82
Q

Outsourcing

A

Using an external service provider to carry out a business function.

83
Q

Disaster Recovery

A

The policies and procedures that a company or organisation has in place so it can carry on with normal business after a disaster, such as a major ICT failure or fire etc.

84
Q

Redundant array of inexpensive disks (RAID)

A

A hard disk drive where is written on to lots of disks at the same time. If one disk gets damaged, data can be accessed from another disk.

85
Q

Presence Awareness

A

A common IM feature that gives you a quick view of

people who are logged on at that time.

86
Q

Overheads

A

The ongoing expenses of operating a business e.g. Rent, fuel bills and salaries.

87
Q

Viral Marketing

A

A marketing strategy that encourages people to pass on a marketing message to their friends. It uses interesting and entertaining content that people will want to share. This uses multimedia to make the message memorable.

88
Q

Validation

A

The process of checking that the data entered is reasonable or one of the expected options, e.g. That a persons age has not been entered as 200.

89
Q

Verification

A

The process of checking that the data entered is accurate. The data could be valid but still inaccurate. E.g. Someone could enter their age as 81
when they are actually 18.

90
Q

Credit Card

A

Plastic card, issued by banks, building societies, retail stores and other businesses, which enables the person to buy goods without the need for cash. The holder agrees to pay back the money borrowed at a later date, sometimes with interest.

91
Q

Debit Card

A

Plastic card, issued by banks, enables the person to buy goods but the money is taken directly from the holders bank account.

92
Q

Secure Socket Layer (SSL)

A

A method of encrypting data to provide security for

communications being sent over networks such as the internet.

93
Q

Online Banking

A

A service offered by banks that allows account holders to view their account information online and carry out various financial transactions.

94
Q

Third-Party payment processor

A

A business that offers customers an alternative fast,

safe method to pay for online goods (e.g. PayPal)

95
Q

Personal Identification Number (PIN)

A

A type of password applied to a credit/debit card.

96
Q

Trojan

A

A program that appears legitimate but which performs
harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk. Its similar to a virus except it doesn’t replicate itself. It could also allow somebody from a remote site to control computer. Often sneaked into free games/downloads.

97
Q

Phishing

A

A form of internet fraud that aims to steal valuable information such as credit card details, usernames and passwords through emails.