glossary Flashcards

1
Q

3G

A

The third generation of cellular communications technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4G (LTE)

A

The latest generation of cellular communications technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control

A

The use of software settings and various technologies (e.g. passwords, encryption codes, biometric security measures) to control users’ access to data and resources. It also involves control over physical access to equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access point

A

Also called a base station, consists of a sender/transceiver and an antenna which transmits and receives radio waves so that the devices that are wireless enabled are able to communicate with one another and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accuracy

A

This refers to the fact that the data is ‘right’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Administrator account

A

A special account which allows that account holder (user) to make any changes they wish to the system, including to other accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

Software that downloads and bombards your computer with adverts that pop-up whenever you are connected to the Internet. It is more of a nuisance than a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AJAX

A

AJAX Asynchronous JavaScript and XML) combines JavaScript with a browser command to allow the browser to download data without requiring the whole page to refresh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Alternate key

A

A field that identifies each record with unique value but is not used as the primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Android

A

Operating system created by Google and used on most non-Apple mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anti-virus software

A

A computer program that scans computer files for viruses and eliminates them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Application Programming Interface - an interface between the operating system (which controls the hardware) and the programming language / end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application of the Web

A

The trend for information that was previously accessed through conventional web pages and a browser, to be accessed via dedicated apps on mobile devices. Driven by increasing reliance on mobile devices for interaction with web services, with benefits of speed, ease of use, singleness of purpose, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application software

A

Software that is used to do productive work and accomplish specific tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Archiving

A

To store files that are static (not going to be changed), usually onto secondary
system or onto a DVD for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Artificial intelligence

A

Simulation of human decision- making processes by a computer system that is
programmed to react on the basis of input gained from sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASCII

A

ASCII (American Standard Code for Information Interchange) is a coding system
which is limited to 256 different characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assembler

A

A program that translates assembler code to machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asymmetric Digital Subscriber Line (ADSL)

A

A permanent digital connection to the Internet using a telephone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attenuation

A

The loss of signal strength over a distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Audio and Video on Demand (AVOD)

A

Video on Demand (VOD) and Audio and Video on Demand (AVOD) are systems which allow users to watch video content and listen to audio content on demand, i.e. without having t o wait for a scheduled broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Audit trail

A

A record or ‘trail’ that is made to keep track of who made changes to database and when those changes were made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AUP

A

Acceptable Usage Policy, a document that outlines the rights and responsibilities of
users within a network environment, including the consequences of violating these stipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bandwidth

A

The total amount of data that can be transferred from one point to another in a
given period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Binary

A

The base number system that consists of just two digits, namely a 0 and a 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Biometric scanners

A

Biometric scanners (usually optical) are specifically designed for security, and read and identify unique identifying characteristics of people, like fingerprints or the pattern of an iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Biometric security

A

Security based on measurement and identification of unique physical
characteristics of a person, e.g. fingerprints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

BIOS

A

Basic Input Output System - the essential startup instructions of a computer, in ROM
chips on the motherboard, and representing the lowest level of programming in firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bit

A

A binary digit i.e. a 0 or a 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

BitTorrent

A

A peer-to-peer protocol used to transfer and share large files across a network such as the Internet. Parts of the file being downloaded are downloaded from different computers, and any part of the file that has been saved on your computer becomes available for others to download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Blog/Weblog

A

Website updated regularly with news and events in chronological order. A blog
reads like a journal with the most recent entry at the top.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Bluetooth

A

A wireless technology that allows devices such as mice, printers and cellphones
to communicate over a relatively short distance, typically less than 10 m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Blu-ray

A

An optical type of read-only storage that represents data as series of light patterns
on a removable disk. Larger capacity (25 - 50 Gb) than a DVD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Botnet

A

A remotely controlled network of ‘zombie’ PCs (computers infected with malware that
enables criminals to use them for launching DDOS attacks, sending out spam, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Broadband

A

Any permanent, high speed, high bandwidth connection to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Bus

A

A set of electrical paths etched on a motherboard, used to transfer data between different parts, e.g. between an expansion card and RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Byte

A

A collection of 8 bits- the smallest unit of storage in a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Caching

A

A method used to compensate for the loss of efficiency, or ‘bottleneck’, that
becomes inevitable when a faster medium tries to communicate with a slower medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cap

A

The amount of data an ISP allows a person to upload and download in a month.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Clients

A

Clients are computers that use but do not provide network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cloud applications

A

Software where most of the processing is done ‘in the cloud’ - i.e. by one or more servers on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Cloud computing

A

The use of resources offered as services over the Internet and shared between many users, including online file storage services and the running of programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CMOS

A

Complementary Metal Oxide Semiconductor - the type of memory that stores the BIOS settings that can be updated or changed. This memory is kept ‘alive’ by a
small battery on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Compilers

A

Software that translates programming instructions written in high level language
into standalone ‘executable files’ (with an .exe’ extension) that can be run independently of the programming language or compiler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Composite keys

A

The combination of more than one field to uniquely identify a record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Computer virus

A

A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent and that easily spreads between computers by attaching itself to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Computer worm

A

Malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Context-aware search

A

A search in which context (e.g. one’s immediate physical location) is used as criteria to make search results more relevant. Inevitable downside is loss of privacy - the higher the relevance of the search, the greater the sacrifice of personal privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Convergence

A

Trend whereby separate technologies and functions from multiple devices are combined into a single multi-purpose device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Cookie

A

A text file (max 4 Kb) used to store customised settings for a website on your local computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Copyright

A

A law designed to protect intellectual property by creating legal limits on who can
copy ,sell and use types of work such as photos, documents, books or poems. Copyright is normally indicated by the word Copyright or the © symbol followed
by the name of the copyright owner and the year in which the copyright was first applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Core

A

A single complete working CPU circuit - relevant because modern chips are ‘multi-
core’ and contain more than one ‘core’ in single physical CPU ‘chip’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CPU

A

Central Processing Unit - a chip that can contain more than one ‘core’ (complete
processor) and which connects to the motherboard using the ZIF socket. Responsible for all the processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

CPU cache

A

Special type of high speed memory built into the CPU, used to maximise CPU productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Cracker

A

Term no longer in general use, but which refers to a ‘bad’ hacker (‘black hat hacker’) who does illegal things such as stealing or making unauthorised changes to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Creative Commons

A

A copyright license that allows you
to use parts of, copy and distribute work for non-profit purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

CSS

A

CSS (Cascading Style Sheets) allow you to define and name styles and then specify the formatting for those styles and save it all into a .css file - this makes it easy to apply consistent formatting to elements of your website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Currency

A

This relates to how ‘recent’ or up to date the data is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cyberbullying

A

The use of ICT tools and devices (cell- phones, e-mail, social media, etc.) to malign, mock, embarrass, threaten or intimidate a person.

60
Q

Cyber-extortion

A

The use of IT-based blackmail, whereby threats are issued ranging from the
personal (e.g. release of
unflattering images) to the corporate (e.g. DDOS attacks on websites), - unless specified amounts of money are paid over to the extortionist.

61
Q

Cybergang

A

A group of people who help each other to commit cybercrimes. Each member often specialises in a different task.

62
Q

Data collection

A

Any method of obtaining data to be processed. (Distinguish carefully from the
process of ‘collecting data’ for academic / research purposes.)

63
Q

Data independence

A

The same application can be used for data stored on different media (physical independence), and the application will not be affected when you add a table to a database or create extra fields in existing tables (logical independence).

64
Q

Data integrity

A

The overall completeness, accuracy and consistency of data. Data integrity
ensured when each record has its own unique primary key and when a foreign key refers to an existing record in another table.

65
Q

Data maintenance

A

Adding or deleting records, or updating data.

66
Q

Data mining

A

The use of complex algorithms to group and arrange ‘big data’ so that interesting
and previously unknown patterns emerge - and new information is discovered.

67
Q

Data redundancy

A

The unnecessary repetition of data.

68
Q

Data security

A

The protection of databases against unauthorised access by users.

69
Q

Data validation

A

Any technique used to reduce the number of errors that can be made during the input of data by ensuring that data meets a set of requirements (a defined set of criteria or allowable values).

70
Q

Data verification

A

Checking for the accuracy of data from a human perspective.

71
Q

Data warehouse

A

A huge collection of data, often accumulated from a range of sources such as separate databases within a company.

72
Q

Database

A

A collection of data or facts regarding a specific topic, e.g. details of a
CD collection or details concerning clients.

73
Q

Database administrator (DBA)

A

A person who is responsible for managing and maintaining databases (usually via DBMSs). This involves the allocation and supervision of users of the database and their access rights, as well as performing routine maintenance on the database.

74
Q

Database analyst

A

A person who is concerned with issues such as the need to make changes to the underlying database structure, analysing the
efficiency of the system and analysis and design activities in terms of new developments and maintenance of the database.

75
Q

Database management system (DBMS)

A

Software that allows you to work with electronic databases. Examples are Microsoft SQL Server, Oracle, Microsoft Access, Blackfish and MySQL.

76
Q

Database programmer

A

A person who is responsible for coding the custom-made software that is the user interface to the database.

77
Q

DDOS

A

Distributed Denial Of Service: an ‘attack’ that makes a website unavailable by the use
of thousands or millions of computers to request data from the site at the same time. The servers become overloaded, unresponsive, and effectively unavailable for everyone.

78
Q

Decentralisation of labour

A

Concept whereby ICT has made it possible for people to work from remote locations, instead of being tied to a specific central location.

79
Q

Decimal

A

The base 10 number system that consists of the digits 1, 2, 3, 4, 5, 6, 7, 8 and 9.

80
Q

Defensive programming

A

A technique whereby the programmer makes pro-active provision for possible
errors made by the user, in the interest of correct data entry.

81
Q

Delete anomaly

A

The design of a database is such that deleting one piece of data results in the simultaneous removal of other, unrelated data.

82
Q

Desktop database

A

Database software where the tools that you need to work with the data are all included in a single application- and you need to start that application to be able to work with the database.

83
Q

Device drivers

A

Programs that allow operating systems to communicate with and control hardware devices.

84
Q

Digital certificate

A

A certificate issued by a trusted third party to verify the identity of a person or an organization, so that the person or organisation may be trusted for communication of sensitive information. An essential part of the SSL encryption protocol.

85
Q

Digital Divide

A

The gap between people that have access to computers and technology and people that do not.

86
Q

Digital signature

A

An electronic ‘signature’ used to identify and validate the sender of an electronic message (e-mail) or the ‘signer’ of an electronic document.

87
Q

DIMM

A

Dual Inline Memory Module - thin rectangular electronic boards which contain banks of RAM chips; inserted into DIMM slots on the motherboard, and the means whereby the memory of a computer is upgraded.

88
Q

Disk cache

A

A certain amount of high speed memory built into every hard drive. Used to cache
data read from the (slower) disk, and thereby speed up subsequent calls for the same ‘chunk’ of code or data.

89
Q

Disk Cleanup

A

A utility that removes: temporary files
downloaded from the Internet, deleted files and folders permanently by emptying the Recycle Bin, temporary files created by Windows, components of Windows that
you are not using, installed programs that you no longer or seldom use.

90
Q

Disk defragmentation

A

To reorganise the parts of files and speed your computer up again.

91
Q

Disk fragmentation

A

Parts of files are scattered ‘pieces’ across the disk.

92
Q

Disk imaging

A

Creating a backup ‘image’ of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure.

93
Q

Disk management

A

A function of an operating system whereby it manages storage - both how the data is organised on the storage device and how or when a program can access the storage device.

94
Q

Distributed computing

A

Sharing and using the resources of many different computers at the same time in order to solve a single problem.

95
Q

Distributed database

A

A system where parts of a database (the data and the DBMS) are spread (distributed) across servers in separate locations.

96
Q

DLL files

A

DLL or Dynamic Link Libraries are files that contain code or routines that can be called and used by programs.

97
Q

DNS (Domain Name System)

A

An Internet service that translates domain names to IP addresses. Domain names consisting of words are easier to remember than IP addresses. The Internet is based on IP addresses. When you use domain name, a DNS service must translate the name into the corresponding IP address.

98
Q

Drivers

A

Software that enables the operating system to communicate with a hardware device.

99
Q

DRM (Digital Rights Management)

A

A way of protecting digital books, movies, games, etc., by using some form
of encryption to control access to the content (copying, viewing, printing, changing, etc.)

100
Q

DSS (Decision Support System)

A

A computer system designed to gather information from a wide range of sources, analyse it, and present it in summarised or
graphical formats that aid in decision-making.

101
Q

Dynamic website

A

A website consisting of webpages designed to be generated (‘on the go’ and which may differ with each viewing, based on who the user is and what the recorded preferences and options are.

102
Q

Eavesdropping

A

Eavesdropping is when a signal is detected on cable allowing someone to gain access to
data. This is also a concern for wireless networks.

103
Q

E-book

A

Electronic version of a book, read by using an e-reader or other e-book software.

104
Q

E-mail servers

A

E-mail servers are used to handle all the e-mail needs of the organisation.

105
Q

E-mail spoofing

A

The changing of an e-mail header so that the origin of the e-mail appears to be from a different source.

106
Q

Embedded operating system

A

Embedded operating systems differ
from those installed and used on a general- purpose computer such as a PC in that
they are stored on internal memory chips. They are not loaded from disk as is the case of a computer with a hard drive.

107
Q

Encryption

A

The ‘scrambling’ of text or data using a specified set of rules to ensure the privacy
of data during communication, or for security purposes.

108
Q

ER (Entity Relationship) diagrams

A

Diagrams used to illustrate relationships between entities.

109
Q

E-Reader

A

Single-purpose device designed to allow you to read e-books (and have a portable library of e-books).

110
Q

Ergonomics

A

Studies of the human body for the purpose of designing products that will better
fit the way in which we actually function.

111
Q

EULA (End User License Agreement)

A

A licence agreement (which is a legally binding contract) in which you agree to use software only according to the software company’s terms. Most software won’t finish installing until you have indicated that you are aware of the terms and conditions of this licence agreement, and that you accept them. These terms and conditions differ from licence to licence, but they mostly involve things such as the number
of computers on which you may install the software, and whether you may distribute the software or not.

112
Q

E-waste

A

Broken, outdated and discarded hardware that we neither want nor need.

113
Q

Expansion slots

A

Slots on the motherboard for attaching additional circuit boards in order to ‘expand’ the capabilities of the computer mostly dedicated video and sound cards for high-end gaming and design work.

114
Q

Expert System Knowledge-based System

A

A rule-based form of Artificial Intelligence where human expertise coded into a computer system that can take input and arrive at a decision far more quickly than most humans can.

115
Q

Extranet

A

An organisation’s intranet (or part thereof) which is available to other users outside
the organisation.

116
Q

Fat clients

A

Computers that run most of their applications from their local hard drives and
make little use of network services.

117
Q

File extension

A

This set of characters (usually 3-5) is added to the end of a file name and it identifies the type of file e.g. docx is the file extension of a Microsoft Word file.

118
Q

Firewall

A

Hardware or software that monitors the traffic between a computer and the Internet, to safeguard against breaches in security.

119
Q

FireWire

A

A type of port that can transfer data faster than USB. It is usually used where high speed data transfer is desirable, such as videos from a video camera, and data to or from an external hard drive.

120
Q

Firmware

A

Software that is permanently installed, or ‘hard-coded’ on a ROM chip, and used to control the basic operation of a device, e.g. a printer.

121
Q

Fixed location Internet access

A

High speed data transmission to homes and businesses using cabled technologies such as ADSL. This is often referred to as fixed broadband Internet access.

122
Q

Flash Players

A

Examples include Adobe Flash Player, Silverlight and Adobe Shockwave Player. These multimedia plug-ins enable users to experience a very wide range of applications and multimedia web content in any browser, irrespective of the operating system.

123
Q

Flashing the ROM

A

The process whereby the existing contents of firmware is wiped and replaced with an updated version - always to be performed with great care.

124
Q

Font files

A

Files containing fonts that can be used by programs on the computer where the fonts are installed. They typically have file extension of TTF or OTF.

125
Q

Foreign keys

A

A field (not a primary key) that is used as a ‘link’ to a field in another table (usually the primary key).

126
Q

Freeware

A

Software which is distributed freely. You do not receive the source code. There is no limitation on the time or functionality included.

127
Q

FTP (File Transfer Protocol)

A

The protocol used for the fast, easy transfer of large files between remote computers that have an Internet connection.

128
Q

Fuzzy logic

A

A type of reasoning that works with probabilities in order to arrive at a decision.

129
Q

GIGO

A

‘Garbage In, Garbage Out’; the quality of the output for any computer system is directly related to the quality of the input.

130
Q

GNU / GPL

A

A license specifically for software that allows people to distribute the software for free or even charge for it so long as the source code is made available. GNU is the license under which most freeware is distributed.

131
Q

GPS (Global Positioning System)

A

A navigation system that uses signals received from geo-
stationary satellites to determine accurately (within 5 m) the position of a receiving device.

132
Q

GPU

A

Graphics Processing Unit - dedicated graphics processor on a graphics card, used to provide extra processing power.

133
Q

Green computing:

A

Initiatives to design, use and dispose of technology in an
environmentally or eco-friendly way.

134
Q

GUI

A

A graphical user interface makes use of visual controls to allow the user to interact with the computer and with programs on the computer.

135
Q

Hacker

A

General term used for any person who uses ICT skills to access computer systems, networks and information illegally. Sometimes differentiated into two sub-categories, ‘good’ hackers (‘white hat hackers’) and ‘bad’ hackers (‘black hat hackers’).

136
Q

Hardware interrupt

A

A dedicated communication channel, or means, whereby a device can request the immediate attention of the CPU, in order to process a given function, e.g. a
mouse click or a keystroke.

137
Q

Hexadecimal

A

The base 16 number system that consists of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F.

138
Q

High-level programming languages

A

Programming languages that are easier for humans to write and understand, that rely on extensive pre-written libraries to execute complex instructions with just a few lines of code.

139
Q

Home Area Network (HAN)

A

A small network within a home environment.

140
Q

Home page

A

The first page of a website containing information about the website’s purpose and content. It also provides links to other web pages, websites and documents.

141
Q

Hotspot

A

An area, usually in a public space such as an airport, restaurant or hotel lobby, where people may receive and be granted WiFi access from an access point to connect wirelessly to the Internet via a wired network.

142
Q

HTML (Hypertext Markup Language)

A

A set of formatting codes, placed in a text file to change the way a browser displays text.

143
Q

HTML files

A

Hypertext Markup Language files are used to define the structure and layout of a web page.

144
Q

HTTP (HyperText Transfer Protocol)

A

The protocol that defines how web pages and their content are transferred across the Web.

145
Q

HTTPS (HyperText Transfer Protocol Secure)

A

The protocol used for secure, encrypted communication over the Internet. It is used on websites which require a user to enter confidential or personal information such as passwords or banking details.

146
Q

Hyperlink

A

A built-in connection to another related web page, and is indicated as text underlined in blue, or by a graphic with a blue outline.