N-Z Flashcards
The practice of establishing operations as close to where the end-products are sold as possible.
NEARSOURCING
The concept that all data requests on the internet should be treated equally by the internet service providers (ISPs).
NET NEUTRALITY
Rules that apply to your online behavior to ensure the proper use of data, apps and programs.
NETIQUETTE
A person who uses the internet in a socially responsible way.
NETIZEN
A series of interconnected nodes that are able to transmit, receive and exchange data.
NETWORK
Device responsible for converting data into a digital signal and communicating this data to a network.
NETWORK INTERFACE CARD
A set of agreed rules that state how to format, send and receive data.
NETWORK PROTOCOL
connection points. Examples of nodes include computers, servers and routers.
NODES
A unique digital artifact (usually drawings, music or art) combined with blockchain technology to allow a unique identification and authentication of the artifact.
NON-FUNGIBLE TOKEN (NFT)
A system designed to centralize and organize data, improve communication between workers and departments, manage calendars and facilitate collaboration in businesses.
OFFICE AUTOMATION SYSTEM
The functional and decorative components of the working environment.
OFFICE DESIGN
A group of people united by a shared interest or purpose who use digital tools to communicate with each other.
ONLINE COMMUNITY
An exhibition in a virtual venue (cyberspace).
ONLINE EXHIBITION
Any platform where people can post and discuss messages.
ONLINE FORUM
A digital platform that allows individual sellers and buyers to trade.
ONLINE MARKETPLACE
A systems that allows voters to cast their ballot online.
ONLINE VOTING
When organization incorporate external sources into their research and development strategy.
OPEN INNOVATION
Is free of charge and free of copyright, allowing the source code to be modified, often by an open-source community. No guarantee that the software will be bug free or support readily available.
OPEN-SOURCE SOFTWARE
Software that manages the hardware, software and memory of a computer as well as providing a user interface.
OPERATING SYSTEM
The 3D printing of organs using a combination of cells, proteins or biocompatible plastic that simulates the skeleton.
ORGAN PRINTING
A method of restricting access to digital content unless a subscription is paid
PAYWALL
An approach to teaching.
PEDAGOGY
A decentralized network in which each computer is equally responsible for storing and sharing data.
PEER-TO-PEER NETWORK (P2P)
The smallest type of network, consisting of the connected devices that are in close proximity to an individual.
PERSONAL AREA NETWORK (PAN)
A general purpose computer designed for individual use.
PERSONAL COMPUTER (PC)
A type of social engineering that involves sending fraudulent messages designed to trick users into revealing sensitive information.
PHISHING
The development of products with intentionally short lifespans so that companies can get repeat sales as devices are replaced or upgraded.
PLANNED OBSOLESCENSE
The introduction of substances or energy into the natural environment that cause a negative impact.
POLLUTION
The music, dances, movies, performances, art and other forms of expressive media enjoyed by a society.
POPULAR CULTURE
The use of algorithms in an attempt to forecast criminal activities.
PREDICTIVE POLICING
Original data collected for the first time for a specific purpose.
PRIMARY DATA
First-hand research in which you collect original data.
PRIMARY RESEARCH
A sorting algorithm used to prioritize tasks.
PRIORITIZATION ALGORITHM
The ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others.
PRIVACY
Semi-autonomous or fully autonomous robots developed to assist humans in commercial settings.
PROFESSIONAL SERVICE ROBOT
Biased or one-sided information.
PROPAGANDA
Is often downloaded after paying for a license or subscription. In return for payment, users can expect updates and help from the company. Proprietary software is copyrighted which denies users access to the source code and restricts the sharing of the software.
PROPRIETARY SOFTWARE
Discrimination that occurs due to correlations to indicators such as
race, disabilities or socio-economic status.
PROXY DISCRIMINATION
Computer system that acts as an intermediary between the client on the network and the internet, providing an additional layer of security.
PROXY SERVER
An analysis of people based on their activities, interests and opinions.
PSYCHOGRAPHIC ANALYSIS
A survey designed to measure an individual’s mental capabilities and
behavioral style.
PSYCHOMETRIC SURVEY
Descriptive, non-numerical data.
QUALITATIVE
Data that can be measured and converted into numbers.
QUANTITATIVE
The technology that uses quantum mechanics to create powerful quantum hardware which can solve complex problems faster than existing supercomputers.
QUANTUM COMPUTING
The use of the internet to share ideas and resources that are radically different from those in mainstream society.
RADICALIZATION
Short-term memory where data is stored temporarily while
it is being processed or viewed on screen.
RANDOM ACCESS MEMORY (RAM)
Malware that infects a computer and effectively locks the user out of their own device and demands a payment to unlock it.
RANSOMWARE
The assignment of a number or short description to data to indicate first to
the last in a data set.
RANKING SYSTEM
The tendency to reoffend.
RECIDIVISM
The process of converting waste into reusable materials.
RECYCLE
A database that has more than one table.
RELATIONAL DATABASE
Education that occurs over a network connection, (ex. video-conferencing)
REMOTE LEARNING
Conducting business and completing tasks from anywhere that employees are able to connect to the essential networks.
REMOTE WORKING
Work on innovating, improving and introducing new
services or products.
RESEARCH AND DEVELOPMENT
Radio-frequency identification.
FRID
A ceremony that marks when an individual leaves one group, enters another.
RITE OF PASSAGE
A programmable machine that can complete a set task with little or no human intervention.
ROBOT
Surgery carried out using robotic systems,
ROBOTIC SURGERY
A networking technology that transfers data from one network to another by the most efficient route available.
ROUTER
Software as a service; a software distribution model in which a third-party provider hosts the applications with end-users accessing the software through the internet.
SaaS
The disruption of computers and systems that operate military, economic infrastructure or other vulnerable networks.
SABOTAGE
A framework for analyzing educational technology (Substitution, Augmentation, Modification and Redefinition).
SAMR MODEL
Data that has already been collected by someone else for a different purpose.
SECONDARY DATA
Research carried out by someone else.
SECONDARY RESEARCH
Is non-volatile, long-term memory, used to store programs and data until they are required.
SECONDARY STORAGE
Is a protocol developed for sending information securely over the Internet by using an encrypted link between a web server and a browser.
SECURE SOCKET LAYER (SSL)
Robot developed to assist humans in completing tasks that are less desirable, such as dull, dirty or dangerous job.
SERVICE ROBOT
Assets or services that are shared between individuals, often using an online booking system.
SHARING ECONOMY
A strategy that allows students to direct their own learning.
SELF-GUIDED LEARNING
A large computer dedicated to managing network resources. They can use specialized server hardware or can be a regular computer with a server-specific operating system capable of managing network resources.
SERVER
Home equipped with internet-connected lighting, heating and other electronic devices.
SMART HOME
The hypothetical future where artificial intelligence becomes so advanced that it is superior to human intelligence.
SINGULARITY
A city that integrates sensors, voice recognition and other new technologies to better manage transportation, energy distribution and other services.
SMART CITY
In internet security, this means tricking a user into sharing their username and password with a fraudster.
SOCIAL ENGINEERING
Psychological or behavioral dependence on social media to the detriment of other important parts of life.
SOCIAL MEDIA ADDICTION
The integration of social and emotional skills into the curriculum.
SOCIAL-EMOTIONAL LEARNING
The length of time it takes for data to be transferred, measured in megabits per second (Mbps).
SPEED
Sending unsolicited emails, mainly for the purpose of advertising.
SPAMMING
The unequal distribution of resources between people/nations.
STRATIFICATION
Multimedia (especially video and audio) that is delivered digitally with little or no intermediate storage.
STREAMING
Artificial intelligence that can develop consciousness and make decisions better than humans.
STRONG AI
Creating an object by cutting or carving a larger material into the desired shape.
SUBTRACTIVE MANUFACTURING
Smaller cultural groups that exist within a larger culture.
SUBCULTURE
Artificial intelligence that surpasses human intelligence.
SUPER AI
Refers to high-performance computers capable of high-speed calculations that are required in scientific and engineering fields.
SUPERCOMPUTERS
Is undertaken to collect information about people which can be used for a variety of purposes, both positive and negative, even though surveillance has mainly negative connotations. Surveillance can be conducted using technology, or through observations by people. The information collected can be used to control and influence those being observed and others.
SURVEILLANCE
The ability to meet human development goals without depleting the natural resources that we depend on.
SUSRAINABLE DEVELOPMENT
A networking device that forwards data packets more efficiently than a hub.
SWITCH
Remote learning that happens in real time with a live teacher.
SYNCHRONOUS
A way to think about structure and order in human, natural and built environments.
SYSTEMS THINKING
The way an artist uses their technical skills to create their art.
TECHNIQUE
The remote treatment of patients.
TELEMEDICINE
The unauthorized use of violence/force to create fear and coerce a government or its people toward a political or social cause.
TERRORISM
A system designed to incorporate all of the resources, software and hardware needed to manage sales, purchases and other transactions.
TRANSACTION PROCESSING SYSTEM
A movement that aims to use technology to evolve and augment the human experience.
TRANSHUMANISM
Protocol that defines where data is to be sent to and from (IP), and how the data is to be broken down into smaller sections before sending (TCP).
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)
An app that translates one language into another allowing communication in real time.
TRANSLATION APP
The ability to understand and be able to explain the inner workings of the algorithm.
TRANSPARENCY IN ALGORITHMS
Is an improved version of SSL and is a protocol that provides security between client and server applications communicating over the Internet.
TRANSPORT LAYER SECURITY (TLS)
A topic that experiences a sudden surge in popularity on social media platforms for a limited period of time.
TRENDING
Technology that uses three satellites to pinpoint our phone’s location.
TRILATERATION
The means by which human users interact with a digital technology. The intent is to make the user’s experience straight forward, intuitive, and requiring minimum effort to achieve the desired outcome.
USER INTERFACE
Software designed to perform specific useful tasks that either help to analyze, configure or maintain the computer.
UTILITY SOFTWARE
In databases, this means that only valid (suitable) data can be entered.
VALIDATION
In databases, these are checks that the data entered is the actual data that you want, or that the data entered matches the original source of data
VERIFICATION
Psychological or behavioral dependence on playing video games to the detriment of other important parts of life.
VIDEO GAME ADDICTION
Voice-controlled helper mainly found in smart speakers or mobile phones.
VIRTUAL PERSONAL ASSISTANT
Digital platform that allows multiple users to video chat at the same time (Zoom or Google Meet.)
VIRTUAL CONFERENCING PLATFORM
A simulation that provides a completely immersive environment for the user.
VIRTUAL REALITY
Therapy designed to reduce a person’s fear and anxiety by confronting the experiences in a computer-generated virtual environment.
VIRTUAL REALITY EXPOSURE THERAPY
A type of malicious software comprised of small pieces of code, often attached to legitimate programs or emails.
VIRUS
Allows users to make voice calls using a broadband Internet connection instead of an analogue phone line.
VoIP (VOICE OVER INTERNET PROTOCOL)
The technologies and systems that give directions to people as they navigate a physical space.
WAFINDING
Artificial intelligence that has a limited function or can only perform a specific task.
WEAK/NARROW AI
A device that can be worn to provide continuous, real-time data to improve the treatment, diagnosis and monitoring of patients.
WEARABLE MEDICAL DEVICE
A national or international network; the largest example is the internet.
WIDE AREA NETWORK (WAN)
A device that creates a wireless local area network to improve coverage throughout a building.
WIRELESS ACCESS POINT
Use of wireless technologies to connect the different nodes to form a network.
WIRELESS NETWORKS
The application of knowledge.
WISDOM
The websites and web services that are hosted on web servers and identified by their URL (uniform resource locator).
WORLD WIDE WEB (WWW)
The culture and social norms of teenagers and young adults.
YOUTH CULTURE