Topic 3 - Definitions Part 2 Flashcards
Fill in
To enter or complete missing information in a form, database, or document (e.g., “Users must fill in their login details to access the system”).
Stock data
Information related to the quantity, type, and status of products available in a business (e.g., “The store updates its stock data daily to track inventory levels”).
Stock
The total quantity of goods or materials a company has available for sale or use (e.g., “The warehouse holds a large stock of electronic devices”).
Reduce waste and costs
Implementing efficient processes to minimize unnecessary use of resources and lower expenses (e.g., “Automated inventory management helps reduce waste and costs in production”).
Customer service
Assistance provided to customers before, during, and after a purchase to ensure satisfaction (e.g., “The company improved customer service by introducing a chatbot for instant support”).
Service
The act of providing help, support, or functionality to users, either in business or IT (e.g., “Cloud storage is an online service for saving files”).
Fradulently
Acting in a dishonest or illegal way to deceive someone, often for financial gain (e.g., “Hackers fraudulently obtained user passwords through phishing”).
Decrypt
The process of converting encrypted data back into its original readable format using a decryption key (e.g., “The receiver must decrypt the message using a secret key”).
Encrypt
The process of converting data into a coded format to protect it from unauthorized access (e.g., “Sensitive files are encrypted before being stored on the cloud”).
Key
A crucial piece of information or tool that enables access, understanding, or success (e.g., “Strong cybersecurity measures are key to preventing data breaches”).
Unauthorised (adj)
Not having official permission or access to a system, data, or resource (e.g., “An unauthorised user attempted to access the database”).
Authorised (adj)
Having official permission or rights to access a system, data, or perform specific actions (e.g., “Only authorised personnel can modify system settings”).
Acquire
To obtain or gain something, such as data, software, or access rights (e.g., “The company acquired new software to improve efficiency”).
Blog
A regularly updated online platform where individuals or organizations post content, often in a casual or informative style (e.g., “The IT expert writes a blog on cybersecurity tips”).
Article
A written piece of content published in digital or print media, typically informative or opinion-based (e.g., “She wrote an article about emerging AI technologies”).
Large following
A significant number of people who regularly engage with or support a website, blog, or social media account (e.g., “The tech influencer has a large following on YouTube”).
Following
The group of users who subscribe to or regularly engage with an online account, blog, or website (e.g., “The brand’s social media following grew after launching new products”).
Site
A location on the internet, such as a webpage or platform, where information and services are provided (e.g., “The company launched a new site for customer support”).
Assuming
Taking something as true without proof, or taking over a role/responsibility (e.g., “The system is assuming all users have read the security policy”).
Store
To save or keep data, files, or information for future use (e.g., “Users can store their documents in cloud storage”).
Copy
To duplicate digital data or files without modifying the original (e.g., “Always copy important files before making changes”).
Recover
To restore lost, corrupted, or deleted data (e.g., “The IT team managed to recover deleted files from the backup”).
Access
The ability to enter or retrieve data, systems, or resources (e.g., “Users need a password to access their accounts”).
Synchronise
To update and match data across multiple devices or platforms in real time (e.g., “Cloud storage allows users to synchronise files across all devices”).
Using
The act of employing a tool, software, or system for a specific purpose (e.g., “The company is using AI to improve cybersecurity”).
App (application)
A software program designed to perform specific functions on computers or mobile devices (e.g., “The weather app provides real-time updates”).