Creado por Eden Goddard
hace casi 11 años
|
||
Pregunta | Respuesta |
Latency | A delay in processing data over a network. Also known as lag |
Bandwidth is the measure of capacity of the network. | |
VOIP | Voice Over Internet Protocol. eg. Skype |
Image:
wi_fi_image (image/png)
|
Wi-fi - a wireless method of connecting wi-fi enabled devices together |
Streaming | Data sent compressed over the internet & viewer sees in real time. |
Malware | Software designed to cause problems for users |
Broadband | A high speed connection to the internet |
Smartphone | A phone offering advanced features. eg. send emails, surf internet |
Multifunctional | Having the ability to do many different things using the same device. |
SD (Secure Digital) card SDHC (Secure Digital High Capacity) card | A type of flash memory card. SDHC up to 32GB - ideal for video |
Compatible | The ability of a device to communication & share data with another device |
Bluetooth | A method of connecting compatible devices over a short distance (10m) |
Wi-Fi (Wireless fidelity) | A method of wireless connection used to exchange data. Wider range than Bluetooth |
GPS (Global Positioning System) | Navigational system used in many devices to give current location, directions & distance to location by using satellite signals |
User interface | The way in which a user interacts with a system. eg. computer, phone etc |
RSI (repetitive strain injury) | Damage to muscles, tendons, ligaments, nerves or joints due to repeating same action |
Etiquette | A set of rules that people abide by out of respect. eg. when using SN sites |
VOIP (Voice over internet protocol) | The tech used to make phone calls via the internet, usually cheaper |
3G | 3G wireless communication allows high speed wireless data transfer |
ISP (Internet Service Provider) | A company that provides Internet access to its customers |
Social Networking site | An online community where people can communicate & share info |
Blog (Short for web log) | A shared online journal where people post entries about personal experiences |
Spam | Unwanted or junk email sent to lots of recipients at the same time |
Protocol | A set of rules used by computers to communicate with each other |
Collaboratively | Working together with other people. Can be done using online tools. |
Information overload | Having so much info that the user feels overwhelmed, possibly leading to stress |
Virus | A program designed to cause other programs on a computer to malfunction or stop |
Fraud | Tricking someone for personal gain or to damage them |
P2P (Peer-to-Peer) | Sharing files among groups of people who are logged on to a file-sharing network |
Hacker | Someone who gains unauthorised access to a computer to get data |
Identity theft | Crime involving someone pretending to be someone else to steal money |
E-Commerce | Buying & selling goods and services over the Internet |
Biometrics | Using physical characteristics as a method of security. eg. fingerprints, face, iris & voice recognition |
USB (Universal Serial Bus) | A standard method of connecting devices |
Flash memory card (Solid State Storage Device) | Used for extra storage & to transfer data between digital devices |
Solid State Memory (eg. flash card) | Has no moving parts so hard to break |
Cyber cafe | A cafe that offers internet-connected computers. Usually charged by hour |
Hotspot | A venue offering a wi-fi interent connection. Often free. eg. hotels, airports, McDs! |
Cloud computing | System in which programs & data is stored on a central server, eg. Google, & accessed remotely by users |
Web Application | Any application that can be accessed using a web browser. |
Metadata | Info stored about the content of a digital item. eg. time, date, camera |
Geotag | To attach the longitude & latitude co-ordinates to a digital image |
HD (High definition) | A screen having more pixels than conventional screen giving clearer image |
HDMI (High Definition Media Interface) | Required for connecting devices to show HD videos |
Blu-ray | Large capacity HD disk for recording/playing HD video. 5 x more storage than a DVD |
Download | To transfer a file from a central computer to your computer/phone etc |
Broadband | A high speed connection to the internet |
Firewall | System designed to prevent unauthorised access to your computer when connected to a network (incl. internet) |
Spyware | Software installed on a computer to collect info about logins/passwords. It sends the details to another computer on the internet |
IP address (Internet Protocol) | Personal address of your computer so servers know where t send the info you have requested |
Encryption | Data scrambled for sending over the internet. Requires a 'key' to read it. |
DRM (Digital Rights Management) | Allows copyright holder to control playback & copying of the media. eg. itunes |
Malware | Software designed to cause problems for users |
Cookies | Small text files stored on your computer from some websites. Track preferences & transactions. |
Dongle | Piece of portable hardware that connects to your computer via USB port & gives access to internet using 3G |
Viral marketing | A strategy designed to get people to pass on a marketing message to friends, often using SN sites |
Validation (eg. age not entered as 200) | Process of checking that entered data is reasonable or expected. |
Verification | Process of checking data is accurate. eg. by asking for it to be re-entered |
Credit card | User can buy goods without having the money & pay back the credit card company later, sometimes with interest. |
Debit card | User can buy goods but money is taken instantly from their account |
SSL (Secure Socket Layer) | Method of encrypting data to provide security for comms sent over internet |
Online Banking http://www.banksafeonline.org.uk/ | Account holders can manage their info online & carry out transactions |
Third-Party payment processor (eg. Paypal) | Business that offers users a fast, safe method to pay for online goods. |
PIN (Personal Identification Number) | A type of password - applied to a credit/debit card or online bank account |
Trojan | Piece of malware that is disguised as useful software. eg. game download |
Phishing | A type of internet fraud where emails try & trick people into giving up passwords, user names and credit card details. |
Proprietary software | Software owned by someone else. You purchase the licence to use |
Open Source software | Software, usually free, that includes the source code |
Cloud-based applications | Software available & stored online. Accessible from anywhere there is an internet connection |
RSS | Really Simple Syndication - a method of subscribing to online content |
QR codes (Quick Response codes) | A graphic that provides a link to online services using a camera & QR reader |
Cloud computing | Online data storage & hosted applications combined to provide a cloud computing facility |
IP Filtering | This prevents data from entering a network. eg. preventing access from certain locations |
Acceptable Use Policy (AUP) | Sets out the expectations of users when accessing a website, network or service |
Firewire & Thunderbolt | These are high speed data ports for wired connections to a network or internet |
Media Station | Device that provides video/audio to a TV. eg. Apple TV |
¿Quieres crear tus propias Fichas gratiscon GoConqr? Más información.