Topic 3 - Definitions Part 2 Flashcards

1
Q

Fill in

A

To enter or complete missing information in a form, database, or document (e.g., “Users must fill in their login details to access the system”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stock data

A

Information related to the quantity, type, and status of products available in a business (e.g., “The store updates its stock data daily to track inventory levels”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stock

A

The total quantity of goods or materials a company has available for sale or use (e.g., “The warehouse holds a large stock of electronic devices”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reduce waste and costs

A

Implementing efficient processes to minimize unnecessary use of resources and lower expenses (e.g., “Automated inventory management helps reduce waste and costs in production”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Customer service

A

Assistance provided to customers before, during, and after a purchase to ensure satisfaction (e.g., “The company improved customer service by introducing a chatbot for instant support”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Service

A

The act of providing help, support, or functionality to users, either in business or IT (e.g., “Cloud storage is an online service for saving files”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fradulently

A

Acting in a dishonest or illegal way to deceive someone, often for financial gain (e.g., “Hackers fraudulently obtained user passwords through phishing”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decrypt

A

The process of converting encrypted data back into its original readable format using a decryption key (e.g., “The receiver must decrypt the message using a secret key”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encrypt

A

The process of converting data into a coded format to protect it from unauthorized access (e.g., “Sensitive files are encrypted before being stored on the cloud”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key

A

A crucial piece of information or tool that enables access, understanding, or success (e.g., “Strong cybersecurity measures are key to preventing data breaches”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorised (adj)

A

Not having official permission or access to a system, data, or resource (e.g., “An unauthorised user attempted to access the database”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorised (adj)

A

Having official permission or rights to access a system, data, or perform specific actions (e.g., “Only authorised personnel can modify system settings”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acquire

A

To obtain or gain something, such as data, software, or access rights (e.g., “The company acquired new software to improve efficiency”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Blog

A

A regularly updated online platform where individuals or organizations post content, often in a casual or informative style (e.g., “The IT expert writes a blog on cybersecurity tips”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Article

A

A written piece of content published in digital or print media, typically informative or opinion-based (e.g., “She wrote an article about emerging AI technologies”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Large following

A

A significant number of people who regularly engage with or support a website, blog, or social media account (e.g., “The tech influencer has a large following on YouTube”).

17
Q

Following

A

The group of users who subscribe to or regularly engage with an online account, blog, or website (e.g., “The brand’s social media following grew after launching new products”).

18
Q

Site

A

A location on the internet, such as a webpage or platform, where information and services are provided (e.g., “The company launched a new site for customer support”).

19
Q

Assuming

A

Taking something as true without proof, or taking over a role/responsibility (e.g., “The system is assuming all users have read the security policy”).

20
Q

Store

A

To save or keep data, files, or information for future use (e.g., “Users can store their documents in cloud storage”).

21
Q

Copy

A

To duplicate digital data or files without modifying the original (e.g., “Always copy important files before making changes”).

22
Q

Recover

A

To restore lost, corrupted, or deleted data (e.g., “The IT team managed to recover deleted files from the backup”).

23
Q

Access

A

The ability to enter or retrieve data, systems, or resources (e.g., “Users need a password to access their accounts”).

24
Q

Synchronise

A

To update and match data across multiple devices or platforms in real time (e.g., “Cloud storage allows users to synchronise files across all devices”).

25
Q

Using

A

The act of employing a tool, software, or system for a specific purpose (e.g., “The company is using AI to improve cybersecurity”).

26
Q

App (application)

A

A software program designed to perform specific functions on computers or mobile devices (e.g., “The weather app provides real-time updates”).