GLOSSARY Flashcards
What is 3G
3G - THIRD GENERATION WIRELESS COMMUNICATION which allows high-speed wireless data transfer
Explain ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY - Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.
Describe APPLICATION (Applications software)
APPLICATION (Applications software) is: Software that helps users perform particular tasks.
What is meant by the term BACKUP
BACKUP is a copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
What is BANDWIDTH
BANDWIDTH : The AMOUNT OF DATA that can fit through the Internet connection.
What is BANDWIDTH measured in?
BANDWIDTH is measured in BITS PER SECOND (bps) This is the number of BITS oif information that can fit down the line in ONE SECOND. Kb/Kbps means 1000s of bits per second. Mb or Mbps means millions of bits per second.
Explain BIOMETRIC
BIOMETRIC is an AUTOMATED method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice.
What is a BLOG
A BLOG is: a shared online journal where people can post diary entries about their personal experiences and hobbies.
What is BLUE JACKING?
BLUE JACKING is the sending of unwanted messages over BLUETOOTH connections
Describe BLUE RAY
BLUE RAY - is a disk that enables the recording,re-writing and playback of high definition video and the storing of large amounts of data. It has more than FIVE TIMES the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disk and 50GB on a dual- layer disk.
What is BLUETOOTH ?
BLUETOOTH - allows the exchange of data over short distances from fixed and mobile devices. In order for devices to communicate the must be able to understand the Bluetooth rules (protocols)
What is BROADBAND ?
BROADBAND is a high speed connection to the Internet
Explain the term BUFFERING
BUFFERING is the downloading of a certain amount of data into temporary storage before starting to play a file
What is Card Code Verification (CCV) ?
CCV is a set of numbers on the back of a credit card that helps verify that the use of the credit card is legitimate.
What is Cloud Computing?
Cloud Computing is a system in which all computer programs and data is stored on a central server owned by a company (e.g Google) and accessed virtually.
What does the term COLLABORATIVELY mean?
COLLABORATIVELY: Working together with other people
What is meant by the term COMMERCIAL?
COMMERCIAL: related to a business
COMPATIBLE
COMPATIBLE: the ability of a device to communicate and share information with another device
COMPUTER MISUSE ACT
COMPUTER MISUSE ACT: This law restricts people from accessing or modifying data without permission
CONVERGENCE
CONVERGENCE: when one device is developed to carry out functions that were originally performed by several different devices.
COOKIES
COOKIES ;Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.
COPYRIGHT
COPYRIGHT : Gives the creator of an original work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.
COPYRIGHT, DESIGNS & PATENTS ACT
COPYRIGHT, DESIGNS & PATENTS ACT : this law protects people’s original work from being used without their permission.
CREDIT CARD
CREDIT CARD: a plastic card issued by banks, building societies, retail stores and other businesses, which enables a person to buy goods and services without the need for cash. The holder agrees to pay back the money borrowed at a later date, sometimes with interest.
DATA
DATA; Symbols, characters, images and numbers are all types of data. When data is processed and acquires meaning it becomes INFORMATION. Computers process data to produce information.
DATA PROTECTION ACT
DATA PROTECTION ACT: This law regulates how personal information is used and protects against misuse of personal details.
DEBIT CARD
DEBIT CARD; Similar to a credit card, but the money is taken DIRECTLY from the cardholder’s bank account.
DIGITAL DIVIDE
DIGITAL DIVIDE: Unequal access to ICT for individuals or groups, usually due to financial, geographic health or cultural reasons.
DIGITAL ECONOMY ACT
DIGITAL ECONOMY ACT: This Law protects copyright holders from criminals who illegally distribute copyrighted material (piracy)
DIGITAL RIGHTS MANAGEMENT (DRM)
DIGITAL RIGHTS MANAGEMENT: allows the copyright holder or the owner of the media control over the number of viewings, plays and copies, and even which devices the media can be played or viewed on. If you download a film from iTunes, you cannot burn it onto a DVD because of the DRM encoded in the film.
Digital zoom
Enlarges the image, which can become blurred
Dongle
Dongle: A small piece of hardware that connects to a computer and has uses including data storage and picking up Bluetooth and 3G signals. A dongle may be portable like a USB pen.
DOWNLOAD
DOWNLOAD: Transfer a file, e.g. a video, from a central computer to your computer
DVD (Digital Versatile Disc)
DVD (Digital Versatile Disc): DVD’ offer higher storage capacity than CD’s (Compact discs) while having the same dimensions. Blank recordable DVDs (DVD-R and DVD+R) can be recorded once using optical disc recording technologies and supported by optical disc drives and DVD recorders and then function as DVD-ROM. Re-writable DVDs (DVD-RW,DVD+RW and DVD RAM) can be recorded and erased mulitiple times
DVD-ROM
DVD-ROM : DVD Read Only Memory
DVD RAM
DVD RAM - DVD with Random Access Memory
E-commerce
E-commerce: Buying and selling goods electronically, usually over the Internet
Electronic waste (e-waste)
Electronic waste (e-waste): Rubbish comprising of digital materials e.g old computers
ENCRYPTION
ENCRYPTION: for security, data is translated into a secret code according to a set of rules in a special ‘key’. To convert the data back into plain text, the receiver must also have the key
ERGONOMICS
ERGONOMICS : The design of equipment (like wrist supports) to increase the efficiency of the way it is used by the human body, to promote the health of users.
ETIQUETTE
ETIQUETTE: A set of rules that people try to abide by out f respect for other people around them.
FIREWALL
FIREWALL : A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.
FLASH MEMORY CARD
FLASH MEMORY CARD; Used for fast and easily transferable information storage in digital devices such as mobile phone, media players and cameras. Flash memory is known as SOLID STATE storage device, meaning there are no moving parts. Everything is electronic instead of mechanical so its ideal for mobile devices.
FRAUD
FRAUD: Tricking someone for personal gain or to damage them.
GEOTAG
GEOTAG ; To attach the exact geographical coordinates longtitude and latitude to a digital image, giving the location of where it was taken.
GLOBALISATION
GLOBALISATION: The increasing integration of economies and societies around the world, particularly through international trade.
GPS (Global Positioning Tracker)
GPS: A navigational system used in many devices which gives current location of where it was taken.
HACKER
HACKER: Someone who gains unauthorised access to a computer in order to obtain data stored on it.
HDMI (High Definition Multimedia Interface)
HDMI: required for connecting devices to show high definition video.
HDTV
HDTV : High Definition TV
High Definition (HD)
HD: the picture on a TV screen is made of lines of PIXELS. in a conventional TV there are 625 lines, which are refreshed 25 times per second. HD has either 720 or 1080 lines, so it produces a clearer, sharper picture.
Hosted Software
Hosted Software : Hosted Software, also known as Software as a Service (Saas), is accessed via a web browser rather than being installed on the user’s computer.
Identity Theft
Identity Theft: A crime that involves someone pretending to be another person in order to steal money or obtain other benefits.
Information Overload
Information Overload: Having so much information that the user feels overwhelmed.
ISP (Internet Service Provider)
ISP: A company that provides Internet access to its customers.
IP (Internet Protocol) address
IP : The personal address of your computer (just like your home address) so that servers know where to send the information you have requested.
Lag
Lag: Slow computer functionality often caused by high latency or low performance hardware.
Latency
The time delay between the moment something is initiated and the moment it becomes detectable.
Locally installed software
Locally installed software: Software which is installed on the user’s computer
Microblog
Short messages which may include short sentences, individual images or video links. An example is Twitter.
Multifunctional
Having the ability to do many different things using the same device.
NFC
Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other.
What does NFC stand for ?
Near Field Communication)
Non-physical goods
Non-physical goods: Items for sale
On-demand entertainment
Technology that allows account holders to view programmes at the time of their choosing by streaming them.
Online banking
A service offered by banks that allows account holders to view their account information online and carry out various financial transactions
Online community
A group of members of a website who communicate and share ideas online, often about a shared interest.
Open source software
Software that is available to download free of charge, e.g. OpenOffice.org, which is a suite of applications
Overheads
The ongoing expenses of operating a business e.g rent, fuel bills, salaries.
Peer-to-peer (P2P)
P2P - sharing files among groups of people who are logged onto a file-sharing network.
Peripherals
External devices connected to a computer e.g printer, microphone
Personalised learning
Learning that is tailored towards the individual to allow them to make progress
Personalisation tehcniques
Ways of making content relevant to a particular customer using their interests, geographical position,etc
Phishing
A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords
Physical goods
items for sale which can be touched and must be delivered by post in some way
Plagiarism
Copying someone else’s work and presenting it as your own
Privacy
The protection of personal data
Proprietary software
Software for which you have to pay for a licence to use (e.g. Microsoft Office)
Protocol
A set of rules used by computers to communicate with each other across a network.
Public Domain
Materials that are available for anyone to use for any purpose (not subject to the laws of copyright)
Query
To search, usually when talking about a database
Repetitive Strain Injury (RSI)
RSI - Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
RSS feeds
A web feed format used for content which is frequently updated e.g.news, in a standard format so it can be added to a variety of websites.
Sat nav (Satellite navigation)
A device, usually used in a car , that gives directions based on information received from a series of satellites
SD & SDHC cards
Secure Digital (SD) cards are one type of flash memory card which store up to 2 GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory card and they are ideal for video cameras because they can store up to 32 GB of data.
Search engine index
A list of websites which has been compiled by the search engine which drastically increases speed of searching. The search engine will search its index, which takes milliseconds , rather than millions of files, which could take hours.
Social bookmarking
A way of organising, storing and managing links to online resources, allowing users to search them easily
Social networking site
An online community where people can communicate and share information
Software as a service (SaaS)
Software as a Service (Saas), also known as Hosted Software is accessed via a web browser rather than being installed on the user’s computer.
Smartphone
A phone offering advanced features e.g the ability to send emails, surf the Internet
Spyware
Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to anther computer in the Internet.
SSL (Secure Sockets Layer)
SSL - A method of encrypting data to provide security for communications over networks such as the Internet TLS (Transport Layer Security) is a later version of SSL.
Stream
Content is sent in compressed form over the Internet and displayed by the viewer in real time. When streaming video, a web user does not have to wait to download a file to play it. Instead the media is sent in a continuous stream of data and is played as it arrives on a special player.
Sustainability
Meeting the needs of the PRESENT without compromising the needs of the FUTURE generations.
Target audience
A description of the people your products are aimed at It could include their age, the language they speak, their special needs, or any other characteristics relevant to the scenario you are given.
Teleworking
Working from home but staying in touch with others with the help of technology.
Third party payment processor
A business that offers an alternative fast, safe method to pay for online goods and services (like Paypal)
Transactional data
Data which is gathered as part of a user’s online activity. When buying something online , this could include information about the product bought but also PERSONAL DETAILS such as ADDRESS and PAYMENT DETAILS.
Trojan
A program that appears legitimate but which performs harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A TROJAN is similar to a VIRUS except that it does not replicate itself. It STAYS in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.
TLS (Transport Layer Security)
A later version of SSL - A method of encrypting data to provide security for communications over networks such as the Internet
Upload
Transfer a file from your computer to a central computer (i.e.your ISP)
User-generated reference sites
Allows users to generate content collaboratively on a website to which others can refer to inform their research
Validity
based on truth, or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.
Viral marketing
A marketing strategy that encourages people to pass on marketing messages to their friends. It uses interesting and entertaining content that people will want to share. Viral marketing uses multimedia to make the message memorable.
Virtual learning environment
An online system for education with areas for homework, classes, teacher and pupil space etc.
Virus
A program designed to cause other programs on a computer to malfunction or stop working altogether.
VoIP (Voice over Internet Protocol)
This technology is used to make telephone calls via the Internet , usually at a cheaper cost.
Wi-Fi (Wireless Fidelity)
WiFi - is similar to Bluetooth in that it is used to exchange data wirelessly, but the signals can travel greater distances
Wikis
A type of website that encourages collaboration by allowing users to add, edit and remove content.
Optical zoom
Moving the lens closer so light from the subject is brought to a focus on the sensor
Resolution
The number of pixel elements per inch