IT Btec glossary

Descripción

GCSE ICT Apunte sobre IT Btec glossary, creado por hirsta10 el 22/06/2014.
hirsta10
Apunte por hirsta10, actualizado hace más de 1 año
hirsta10
Creado por hirsta10 hace alrededor de 10 años
84
1

Resumen del Recurso

Página 1

A service which is used on the internet which provides help or something for the user e.g information, calculation, buying or selling itemsAn online biography which provides information about the personA group of friends communicating onlineA network of people communicating through the internet which concern a common interestA world that exists online e.g MinecraftCommunicating in messages in real timeA virtual area online where users can communicate in real time Internet etiquette the rules and way to act onlinePromoting the sale of goods or businesses on the internetAdvertising involving websites/ search engines. A business pays for the advert to appear on the website, if the advert is clicked on it it will direct the surfer to the businesses website. A percentage of the income created by those who click on the advert is paid to the web site/ search engine e.g Google. Frequently updated online blogs or journals which users can express their thoughts, feelings and daily activities through which can be through multimedia e.g images and clips e.g TumblrShort text entries which can be created in sites and be exchanged or used in blogsWebsites which provide information for the user, it can be edited by other visitors and allows them to share research.a message sent from one person to another through the computer not in real-timeShort messages sent between users in real-time chatA community of people which share a common interest, subscribe to a site to get up to date information sent to themSites where you can meet and communicate with people around the worldWhere groups of people in different areas meet together and discuss business onlineOnline journals of individuals or groupsLike blogs but with video or sound filesVoice over Internet protocol allows the user to talk in real time over video communication or clips with no additional chargeWhen you move a file from your system to another from your computer to the webpageWhen you move a file from a different system or the world wide web and onto your system A mathematical step by step sequence to work out different calculations/ a set of instructions to work out a calculation the user setsThe saving of a file immediately after the file has been edited or after a certain period of time.A way of tracking changes in documents to make sure you are working with the most up-to date version in case the most up-to-date version is lost or corrupted and therefore cannot be usedWhen a document cannot be opened and only becomes unlocked when you are the only one trying to access itThe access rights which grant specific users the ability to read/edit a documentWhen a user can only read the documentWhen a user can read and edit the documentfull control is the ability to read/edit/ lock/ delete etcUsing another computers services to store information -host.Advanced computing which can take place in any location or format involving the placing of processes which connect to the internet.Radio Frequency Identification - a chip which uses radio waves to transfer data to a tag so it can be tracked. The tags contain information so it can be transferred so it can identify which tag it is e.g cat flap and collars.An access point to the internet an ISP uses several POPs in an area to allow good access to the internetAn interchange between networks within the internet allowing ISPs to connect with each otherThe protocol to route packets across the internetThis protocol transmits data from the client's application program to the IP network it dissembles and reassembles data for transfer across the internet.A protocol which allows files to be uploaded or downloaded/ transferring between two computers to download programs to your computer or upload web pages to the server in the World wide web hosting them on the internetISP provide a gateway to the internet e.g BT/ virgin media/ skyThe main computer or programme which serves the clients computers. It has specific server software to fulfil requirements. Main connecting data routes between the internet and the small networks between local communities to the router of a clientHardware which directs the piece of information the computer requires to the ISP (the data then goes to the internet and DNS Server to find the IP of the site). The data can also be sent in the other way and the router directs the data in the opposite direction The user of the network who uses the services provided by the serverWhen the network connection isn't using cables but electromagnetic waves.Using cable network connection to connect to the internetIt uses the telephone lines as connections to the internet for those in countryside areas.The amount of available network capacity to carry the data across the network in bits per secondThe measure of the number of pieces of data transferred in a period of time in bits per secondpart of the internet which holds all the websites and can be accessed with a browser. It is made up of a large number of servers which host webpageshypertext markup language is a computer language used to create web pagesUniform resource locator a specific character string which relates to a specific server so that the user can find the correct webpageProtocol=method which browsers use to read webpagesSimilar but it is a secure siteCarbon copy- in emails it is used to send messages to more than one recipient they can be seen by all of the recipientsBlind carbon copy- similar to Cc but recipients can't see the other recipients.Used to send messages across IP networks in server to server transfers  also used to send a message to an email server.To retrieve emails from an email server downloading emails to their computer and deleting them from the email server.Email retrieval protocol -do not download the email they remain on the email server.

Glossary of IT terms

Online serviceProfileNetwork of friendsOnline communityVirtual worldChatChat roomNetiquetteOnline advertisingPPC -pay per click advertisingWeblogsMicrobloggingWikisElectronic mailinstant messagingNewsgroupSocial networkingConferencingBlogsVlogs/podcastsVoIPUploadDownloadAlgorithmAutomatic back upVersion controlLockedFile permissionsRead only accessRead/write access Full controlCloud computingUbiquitous computingRFIDPOP-Point of presenceNAP- network access pointIP- internet protocolTCP -transmission control protocolFTP- File Transfer protocolISP- internet service providerServerNetwork connectionRouterClientWireless broadbanddial upbandwidthtransmission rateworld wide webHTMLURLHypertext transfer protocolHTTPSCcBccSMTPPOP3IMAP

CODECSimplexHalf duplexDuplexUTP/STP cablesCoaxialFibre opticSerialParallelbi-directional transmissionclient-side processingserver side processingUSBdata storagetablerecordFieldRelationshipData typeprimary keyForeign keyDBMSMalwareOpportunistVirusSpam PhishingTrojanIdentity theftPhysical barrierPasswordsAnti-virus softwareFirewallEncryptionBack up and RecoveryData protection actAccidental damage

Allows you to encode or decode data for added securityCommunication can only happen one way e.g computer to printerCommunication can happen 2 way but only one way at a timeCommunication can happen 2 ways at the same timeUnshielded twisted pair of cables or shielded twisted pair which transmit dataA solid wire core with plastic insulation sheath with a copper outer casing to earth the cableGlass or plastic tubes which use total internal reflection of electromagnetic to transmit databits are transmitted at one at a time over a single channela number of bits can be transmitted simultaneously over an equal number of  channelstransmission in two directionsData stored on your computer or a process that occurs on your computer- a scripting language to create code on web pages Data stored on a server and can only be accessed through a network e.g search engine searchUniversal serial bus is a serial transmission method to hold information and transfer it from computer to computer.Holding data on a computer system normally on a database.A grid of fields which store information about a certain thingA row of a data base- a group of data which is associated in some wayEvery column a single piece of data recorded in a databaseLinks and connections between dataThe type of data entered into a database e.g text, number, date/time, logical, autonumbera single key to identify each record in a tableA key which can be used to cross reference and access associated information across different tablesDatabase management systems are programs which allow the user to create, filter, organize and search through data and allows different levels of access and users to access at the same time.A hostile, intrusive annoying piece of software or code which infiltrates into the computerPeople who find computers that are still logged on to their system and steal/damage or view private information of the ownerSmall programs that replicate themselves and spread through networks by attaching to files- they change the system, damage or steal informationirrelevant or unsolicited messages normally sent to a large number of recipients to advertise; for phishing or for spreading virusesA threat which attempts to access financial or personal information or passwords normally by emails or instant messagingA type of malware code which once activated normally tries to steal or access informationWhen someone steals s persons personal details in order to open bank accounts, cards, loans, passports or a driving license in their nameInclude turning off the computers when unattended to protect information and prevent damage by people and the environmentSequences of characters known only to the computer user  to access information or a network Used to intercept computer viruses before they become resident on the computer, can isolate the virus, remove it and sometimes can repair the damageUsed to monitor data arriving and leaving your computer to stop anything harmful or unwantedCan codify data so it cannot be read by anyone who doesn't have the key to the code. An algorithm is applied to cipher the data at the receiving end.Making a backup of data to recover it from damage, separate to the computer in a safe area to protect it from anything that could destroy the master systemA law to protect the personal data of the clients in databasesDamage to software or hardware caused without intent of harm e.g a natural disaster which results in the loss of data or hardware.

Glossary of IT terms- continued

New Page

New Page

Mostrar resumen completo Ocultar resumen completo

Similar

Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Networks
Will8324
General ICT Quiz
leahshaw
ICT Revison Flash Cards
Arun Johal
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Online World - Learning Aim A
andysedge
Business Aims and ICT Strategies
scrt
User Interfaces
Skeletor
General ICT Quiz
Jade Fantom