glossary Flashcards
3G
The third generation of cellular communications technology.
4G (LTE)
The latest generation of cellular communications technology.
Access control
The use of software settings and various technologies (e.g. passwords, encryption codes, biometric security measures) to control users’ access to data and resources. It also involves control over physical access to equipment.
Access point
Also called a base station, consists of a sender/transceiver and an antenna which transmits and receives radio waves so that the devices that are wireless enabled are able to communicate with one another and the network.
Accuracy
This refers to the fact that the data is ‘right’.
Administrator account
A special account which allows that account holder (user) to make any changes they wish to the system, including to other accounts.
Adware
Software that downloads and bombards your computer with adverts that pop-up whenever you are connected to the Internet. It is more of a nuisance than a threat.
AJAX
AJAX Asynchronous JavaScript and XML) combines JavaScript with a browser command to allow the browser to download data without requiring the whole page to refresh.
Alternate key
A field that identifies each record with unique value but is not used as the primary key.
Android
Operating system created by Google and used on most non-Apple mobile devices.
Anti-virus software
A computer program that scans computer files for viruses and eliminates them.
API
Application Programming Interface - an interface between the operating system (which controls the hardware) and the programming language / end user.
Application of the Web
The trend for information that was previously accessed through conventional web pages and a browser, to be accessed via dedicated apps on mobile devices. Driven by increasing reliance on mobile devices for interaction with web services, with benefits of speed, ease of use, singleness of purpose, etc.
Application software
Software that is used to do productive work and accomplish specific tasks.
Archiving
To store files that are static (not going to be changed), usually onto secondary
system or onto a DVD for example.
Artificial intelligence
Simulation of human decision- making processes by a computer system that is
programmed to react on the basis of input gained from sensors.
ASCII
ASCII (American Standard Code for Information Interchange) is a coding system
which is limited to 256 different characters.
Assembler
A program that translates assembler code to machine code.
Asymmetric Digital Subscriber Line (ADSL)
A permanent digital connection to the Internet using a telephone line.
Attenuation
The loss of signal strength over a distance.
Audio and Video on Demand (AVOD)
Video on Demand (VOD) and Audio and Video on Demand (AVOD) are systems which allow users to watch video content and listen to audio content on demand, i.e. without having t o wait for a scheduled broadcast.
Audit trail
A record or ‘trail’ that is made to keep track of who made changes to database and when those changes were made.
AUP
Acceptable Usage Policy, a document that outlines the rights and responsibilities of
users within a network environment, including the consequences of violating these stipulations.
Bandwidth
The total amount of data that can be transferred from one point to another in a
given period of time.
Binary
The base number system that consists of just two digits, namely a 0 and a 1.
Biometric scanners
Biometric scanners (usually optical) are specifically designed for security, and read and identify unique identifying characteristics of people, like fingerprints or the pattern of an iris.
Biometric security
Security based on measurement and identification of unique physical
characteristics of a person, e.g. fingerprints.
BIOS
Basic Input Output System - the essential startup instructions of a computer, in ROM
chips on the motherboard, and representing the lowest level of programming in firmware.
Bit
A binary digit i.e. a 0 or a 1.
BitTorrent
A peer-to-peer protocol used to transfer and share large files across a network such as the Internet. Parts of the file being downloaded are downloaded from different computers, and any part of the file that has been saved on your computer becomes available for others to download.
Blog/Weblog
Website updated regularly with news and events in chronological order. A blog
reads like a journal with the most recent entry at the top.
Bluetooth
A wireless technology that allows devices such as mice, printers and cellphones
to communicate over a relatively short distance, typically less than 10 m.
Blu-ray
An optical type of read-only storage that represents data as series of light patterns
on a removable disk. Larger capacity (25 - 50 Gb) than a DVD.
Botnet
A remotely controlled network of ‘zombie’ PCs (computers infected with malware that
enables criminals to use them for launching DDOS attacks, sending out spam, etc.).
Broadband
Any permanent, high speed, high bandwidth connection to the Internet.
Bus
A set of electrical paths etched on a motherboard, used to transfer data between different parts, e.g. between an expansion card and RAM.
Byte
A collection of 8 bits- the smallest unit of storage in a computer system.
Caching
A method used to compensate for the loss of efficiency, or ‘bottleneck’, that
becomes inevitable when a faster medium tries to communicate with a slower medium.
Cap
The amount of data an ISP allows a person to upload and download in a month.
Clients
Clients are computers that use but do not provide network resources.
Cloud applications
Software where most of the processing is done ‘in the cloud’ - i.e. by one or more servers on the Internet.
Cloud computing
The use of resources offered as services over the Internet and shared between many users, including online file storage services and the running of programs.
CMOS
Complementary Metal Oxide Semiconductor - the type of memory that stores the BIOS settings that can be updated or changed. This memory is kept ‘alive’ by a
small battery on the motherboard.
Compilers
Software that translates programming instructions written in high level language
into standalone ‘executable files’ (with an .exe’ extension) that can be run independently of the programming language or compiler.
Composite keys
The combination of more than one field to uniquely identify a record.
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent and that easily spreads between computers by attaching itself to files.
Computer worm
Malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program.
Context-aware search
A search in which context (e.g. one’s immediate physical location) is used as criteria to make search results more relevant. Inevitable downside is loss of privacy - the higher the relevance of the search, the greater the sacrifice of personal privacy.
Convergence
Trend whereby separate technologies and functions from multiple devices are combined into a single multi-purpose device.
Cookie
A text file (max 4 Kb) used to store customised settings for a website on your local computer.
Copyright
A law designed to protect intellectual property by creating legal limits on who can
copy ,sell and use types of work such as photos, documents, books or poems. Copyright is normally indicated by the word Copyright or the © symbol followed
by the name of the copyright owner and the year in which the copyright was first applied.
Core
A single complete working CPU circuit - relevant because modern chips are ‘multi-
core’ and contain more than one ‘core’ in single physical CPU ‘chip’.
CPU
Central Processing Unit - a chip that can contain more than one ‘core’ (complete
processor) and which connects to the motherboard using the ZIF socket. Responsible for all the processing.
CPU cache
Special type of high speed memory built into the CPU, used to maximise CPU productivity.
Cracker
Term no longer in general use, but which refers to a ‘bad’ hacker (‘black hat hacker’) who does illegal things such as stealing or making unauthorised changes to data.
Creative Commons
A copyright license that allows you
to use parts of, copy and distribute work for non-profit purposes.
CSS
CSS (Cascading Style Sheets) allow you to define and name styles and then specify the formatting for those styles and save it all into a .css file - this makes it easy to apply consistent formatting to elements of your website.
Currency
This relates to how ‘recent’ or up to date the data is.