IMPORTANT MUST READ

Description

Year 11 IT Flashcards on IMPORTANT MUST READ, created by Mehrab Murshed on 31/08/2017.
Mehrab Murshed
Flashcards by Mehrab Murshed, updated more than 1 year ago
Mehrab Murshed
Created by Mehrab Murshed over 7 years ago
8
0

Resource summary

Question Answer
3G Third Generation (wireless communication which allows high speed wireless data transfer)
Acceptable Use Policy Rules to which users agree, to reduce the misuse of I.T. Often found on social networking platforms and collaborative sites.
Application Software that helps users perform particular tasks.
Back Up A copy of data that is made in case the original data is lost or damaged. The backup cab be used to restore the original data.
Bandwidth The amount of data can fit through an internet collection. It is measured in bit per second (bps). This indicates the number of bits of information that can fir down the line in one second.
Biometric An automated method of reconising a person based on physical characteristics, Among the features measured are face, fingerprints, hand geometry, iris and voice.
Blog/Vlog A shared online journal where people can post diary entries about their personal experiences and hobbies. Vlog- In a video format.
Blue Jacking The ending of unwanted message to other over Bluetooth connections.
Bluetooth Allows the exchange of data over short distances from fixed and mobile device. In order for devices to communicate they must be able to understand the Bluetooth rules.
Blu-ray A disk that enables the recording, rewriting and playback of high-definition video and the storing of large amounts of data. It has more than five times the storage capacity of traditional DVD's and can hold up to 25 GB in a single-layer disk and 50 GB on a dual layer disk.
Broad Band A high sped connection to the internet.
Buffering Downloading a certain amount of data into a temporary storage before staring to play a file.
Card Code Verification A set of numbers on the back of a credit card that helps verify the use of credit card is legitimate.
Cloud Computing A system in which all computer programs and data is stored on a central server owned by a computer (E.g. Google) and accessed virtually.
Collaboratively Working together with other people.
Commercial Related to business.
Compatible The ability of a device to communicate and share information with another device
Computer Misuse Act This law restricts people from accessing or modifying data without permission.
Convergence When one device is developed to carry out functions that were originally performed by several other devices.
Cookies Small text files that are sent to your compute from websites. They track your behavior and transactions.
Copyright Gives the creator of original work exclusive rights regarding work of a certain period of time, including publication, distribution and adaptation.
Copyright, Designs and Patents Act This law protects people's original work from being used without their permission.
Credit Card A plastic card issued by banks, building societies and other businesses, which enables a person to buy goods and services without the need for cash. The holder agrees to par back the money borrowed at a later date, sometimes with interest.
Data Symbols, characters, images and number are all types of data. When data us processed and acquires meaning it becomes information. Computers process data to produce information.
Data Protection Act This law regulates how personal information is used and protects against misuse of personal detail.
Debit Card Similar to a credit card, but money is taken directly from the cardholder's bank account.
Digital Divide Unequal access to ICT for individuals or groups, usually due to financial, geographic, health or culture reasons
Digital Economy Act This law protects copyright holders from criminals who illegally distribute copyrighted material (piracy)
Digital Rights Management Allows the copyright holder or the owner of the media control over the number of viewings, plays and copies, and even which devices the media can be played or viewed on. If you download a film from iTunes you cannot burn it on to a DVD because of the DRM encoded in the film
Dongle A small piece of hardware that connects to a computer and has uses including data storage and picking up Bluetooth and 3G signals. A dongle may be portable like a USB pen
Download Transfer of a file, e.g. a video from a central computer to your computer
DVD DVDs higher storage capacity than a CD while having the same dimensions. Blank record able DVDs (DVD-R and DVD+R) can be recorded once using optical disc recording technologies and supported by optical disc drives and DVD recorders, and then function as a DVD-ROM. Re writable DVDs (DVD-RW, DVD+RW and DVD-RAM) can be recorded and erased multiple times
E-commerce Buying and selling goods electronically, usually over the internet
Electronic waste (e-waste) Rubbish compromising of digital materials e.g. old computers
Encryption For security, data is translated into a secret code according to a aset of rules in a special 'key'. To convert the data back into plain text, the reciever must also have
Ergonomics The design of equipment to increase the efficiency of the way it is used by the human body, to promote the health of users
Etiquette A set of rules that people try to abide by out of respect for other people around them. Typically for the internet the word Netiquette has evolved
Firewall A system designed to prevent unauthorized access to your computer when connected to to a network such as the internet
Flash Memory Card Used for fast and easily transferable storage in digital devices such as mobile phones, media players, and cameras. Flash memory is known as a solid state storage device, meaning there are no moving parts. Everything is electronic instead of mechanical so it is ideal for mobile devices
Fraud Tricking someone for personal gain or to damage them; for example financially by stealing money or items
Geotag To attach the exact geographical coordinates of longitude and latitude to a digital image, giving the location of where it was taken
Globalisation The increasing integration of economics and societies around the world particularly through international trade
GPS (Global Positioning System) A navigational system used in many devices which gives current location
Hacker Someone who gains unauthorized access to a computer in order to obtain data stored on it
HDMI Required for connecting devices to show high-definition video
HDTV High Definition Television
High Definition (HD) The picture on a TV screen is made of lines of pixels. In a conventional TV there are 625 lines, which are refreshed 25 times per second. HD has either 720 or 1080 lines, so it produces a clearer sharper image
Hosted Software Hosted software, also known as Softwaer as a Service (SaaS). Is accessed via a web browser rather than being installed on the users computer
Identity theft A crime that involves someone pretending to be another person in order to steal money or obtain other benefits
Information Overload Having so much information that the user feels overwhelmed
ISP A company that provides internet access to its customers
IP Address. The personal address of your computer, that servers know where to send information you have requested
LAG Slow computer functionality often caused by high latency or low performance hardware
Latency The time delay between the moment something is initiated and the moment it becomes detectable
Locally installed software Software which is installed on the user's computer
Microblog Short messages which may include short sentences, individual images or video links. An example is Twitter
Multifuncional Having the ability to do many different things using the same device
Near field communication (NFC) Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other
Non-physical goods Items for sale which are delivered digitally e.g. music files from iTunes. Sometimes called DLC (downloaded content)
On Demand Entertainment Technology that allows users to view programme's at the time of their choosing by streaming them.
Online Banking A service offered by banks that allows account holders to view their account information online and carry out various fianancial transactions.
Online Community A group of members of a website who communicate and share ideas online, often about a a shared interest.
Open Source Software Software that is available to download free of charge, e.g. OpenOffice.org, which is suite of applications
Overheads The ongoing expenses of operating a business, e.g. rent, fuel bills, salaries.
Peer-to-Peer (P2P) Sharing files among groups of people who are logged on to a file-sharing network.
Peripherals External devices connected to a computer e.g. printer, microphone.
Personalised Learning Learning that is tailored towards the individuals to allow them to make progress.
Personalisation Techniques Ways of making content relevant to particular customer using their interests, geographical position, etc.
Phishing A form of Internet fraud that aims to steal valuable information such as credit details, usernames and passwords.
Physical Goods Items for sale which can be touched and must be delivered by post in some way.
Plagiarism Copying someone else's work and presenting it as your own.
Privacy The protection of personal data.
Proprietary Software Software for which you have to pay for a licence to use (e.g. Microsoft)
Protocol A set of rules used by computers to communicate with each other across a network.
Query To search, usually when talking about a database.
Repetitive Strain Injury(RSI) Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
RSS Feeds A web feed format used for content which is frequently updated e.g. news, in a standard format so it can be added to a variety of websites.
Sat nav A device, usually used in a car, that gives directions based on information received from a series of satellites.
SD and SDHC cards Secure Digital (SD) cards are one type of flash memory card which store up to 2GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory card and they are ideal for video cameras because they can store up to 32GB of data.
Search Engine Index A list of websites which have compiled by the search engine which drastically increase the speed of searching. The search engine will search its index, which takes milliseconds, rather then millions of file, which could take hours.
Social Bookmarking A way of organising, storing and managing links to online resources, allowing users to search them easily.
Social Networking Site An online community where people can communicate and share information.
Smartphone A phone offering advanced features, e.g. the ability to send emails, surf the Internet.
Spyware Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and send details to another computer on the Internet.
SSL (Secure Sockets Layer) A method of encrypting data to provide security for communications over networks such as the Internet. TLS (Transport Layer Security) is a later version of SSL.
Stream Content is sent in compressed form over the Internet and displayed by the viewer in real time. When streaming video, a web user does not have to wait to download a file to play it. Instead, the media is sent in a continuous stream of data and is played as it arrives on a special player.
Sustainablilty Meeting the needs of the present without compromising the needs of future generations.
Target Audience A description of the people your products are aimed at. It could include their age, the language they speak, their specific needs, or any other characteristics relevant to the scenario you are given.
Targeted Marketing Identifying a specific target audience by identifying preferences or other personal details and then creating promotional or advertising campaigns to match their preferences.
Teleworking Working from home but staying in touch with others with the help of technology.
Third party payment processor A business that offers customers an alternative fast, safe method to pay for online goods and services.
Transactional Data Data which is gathered as part of user's online activity. When buying something online, this could include information about the product bought but also personal details from the buyer such as address and payment details.
Trojan A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A trojan is similar to a virus except that it does not replicate itself. It stays in the computer doing damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.
Upload Transfer a file from your computer to a central computer, e.g. your ISP.
User-generated Reference Sites User-generated reference sites allow users to generate content collaboratively on a website to which others can refer to inform their research.
Validity Based on truth, or reason,. It is important to judge where information found online is valid because it could be biased or untruthful.
Viral Marketing A marketing strategy that encourages people to pass on a marketing message to their friends. It uses interesting and entertaining content that people will want to share. Viral marketing uses multimedia to makes the message memorable.
Virtual Learning Environment An online system for education with areas for homework, classes, teacher and pupil space etc.
Virus A program designed to cause other programs on a computer to malfunction or stop working altogether.
VoIP (Voice over Internet Protocol) This technology is used to make telephone calls via the internet, usually at a cheaper cost.
Wi-Fi (Wireless Fidelity) It is similar to Bluetooth in that it is used to exchange data wirelessly, but the signals can travel at greater distances.
Wikis A type of website that encourages collaboration by allowing users to add, edit and remove content.
Show full summary Hide full summary

Similar

Common Technology Terms
Julio Aldine Branch-HCPL
Project Communications Management
farzanajeffri
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane