ITGS Exam Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Copy Protection

Doesn't allow software to be burned or copied, and if it is copied; software will not run. These types of software are activated through serial numbers.

hyperlinks

"Hot spots" or "jumps" to locate another file or page; represented by a graphic or colored and underlined text.

white-hat hacker

"ethical" hacker that helps companies know about security weaknesses.

hashtag

#wabitgs is an example. Used on Twitter to help others follow certain conversations. Users tag their comments.

stereolithography

'3D printer' that can produce actual objects from computer models.

document

(computer science) a computer file that contains text (and possibly formatting instructions) using 7-bit ASCII characters

electronic mail

(computer science) a system of world-wide electronic communication in which a computer user can compose a message at one terminal that is generated at the recipient's terminal when he logs in

printer

(computer science) an output device that prints the results of data processing

operating system

(computer science) software that controls the execution of computer programs and may provide various services

Central processing unit

(computer science) the part of a computer (a microprocessor chip) that does most of the data processing

Advantages of Simulations

-Simulation of Nuclear Meltdown:Safer

A printed paper copy of data.

...

CRT or Cathode Ray Tube monitor

...

Device that uses a projector for output and touch inputs, using a special pen.

...

High speed printer.

...

Information which is produced by a computer system.

...

LCD or Liquid Crystal Display screen

...

Output device for displaying content on large screens.

...

Output device for sound.

...

Output device which produces paper copies.

...

Output device. Older type of monitor, now almost obsolete.

...

Output device. The newer type of monitor which is flat.

...

Printer that works by spraying ink through nozzles at a sheet of paper.

...

Resolution of an LCD display that produces the best display quality.

...

Speed at which a printer produces output.

...

hard copy

...

i. The applications include: phone, satellite TV encryption, and as a credit card.

...

inkjet printer

...

interactive whiteboard

...

laser printer

...

native resolution

...

output

...

pages per minute

...

printer

...

projector

...

scanner

...

speaker

...

Gigahertz

1 billion operations per second

Advantages of Computer Aided Design (CAD) (4)

1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited

Factors that control image quality (2)

1) color depth; 2) resolution

Disadvantages of hypertext (4)

1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want, leaving them frustrated because they can't easily get from here to there; 3) documents may contain "lost" links, especially on the web, where even a popular page can disappear without a trace; 4) hardware can be hard on humans because reading a computer screen is more tiring than reading printed pages

Rules of thumb for using Powerpoint (6)

1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be "stingy" with words (bullets, summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)

Advantages and disadvantages to databases

1. Databases can be easily searched though 2. Databases are not easy to destroy as paper. They are stored. 3. Faster and easier to record and store. And not easily altered.

Opt-out

1. Defines a person to choose what kind of information he gets and how much he wants distributed. Opt-out gives a choice. 2. A 'terms of agreement' or contract would be opt-out policy.

Solutions to problems with e-voting

1. The first solution to this problem would be to have a sort of receipt or a paper that shows who voted, for who and when, so that if anything wrong happens in the voting process, the person has physical evidence that he did vote for that person or if he didn't, he could change the vote. It also wastes paper, but has a much larger purpose and would work completely well.2. Another solution for the e-voting systems, especially for DRE machines, would be to create 3 separate locations to store the vote of the person. This would be more expensive but more efficient and more hack-proof. One place to store the data would be in the smart cards that DRE machines already have, but under lock and key. Another location would be on a hack-proof server in a central location that cannot be easily penetrated, such as the state capitol. The 3rd location to save the vote and their information would be the state's mainframe for voting, where it is kept under lock and key and cannot be hacked.

Problems of E-voting

1. The main problem for e-voting is that e-voting is relatively new, and through DRE machines huge problems are presented. Through DRE machines, votes are stored onto disks or smart cards and so no paper trail is left. Some DRE machines have poor programming and have manipulated and/or destroyed voting results in the past. They are not overly safe as any hacker can rig the machine or place a card reader and even steal the entire person's personal information. Since the machines are also touch screen, some people could be inept on how to use the machines and they could also have hardware faults and failures.

Opt-in

1. Unless a person tells a company that he doesn't want any information related to him published or distributed, the company will go ahead and publish the data. A person has to make sure the company doesn't distribute his information. 2. Checkboxes to choose what services the person would like would be opt-in.

digital tv

16x9 aspect ratio with a resolution 1080i or 1080p, brings traditional tv or computers closer, more than 1/2 of american homes have HDTV

MAC adress

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

Media Access Control (mac) address

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

personal digital assistant

A PDA is a handheld device with Wi-Fi connectivity, built in web browser and personal organizer. A modern PDA also includes 3G and cellular phone functions.

templates

A basic foundation of a webpage that tells you how to create it, a format used to provide a consistent look and feel to a production; can be predefined by the software or created by the developer

byte

A byte is another word for character; generally represented by 8 bits.

Credit-Card cloning

A card reader is inserted into a card reader which duplicates information and transfers information to a new credit card.

ASCII (Unicode and American Standard Code for Information Interchange)

A character encoding scheme based on the ordering of the alphabet which helps computers understand how to represent text on the screen.

Bar Chart

A chart that shows relative values with bars, appropriate when data fall into categories.

Line Chart

A chart that shows trends or relationships over time, or a relative distribution of one variable through another.

check digit

A check digit is a form of redundancy check used for error detection, the decimal equivalent of a binary checksum. It consists of a single digit computed from the other digits in the message.

data verification

A check to ensure the data collected and stored matches and continues to match the source of data.

database

A collection of organized data that allows access, retrieval, and use of data

creating simple macros

A command that memorizes a list of simple repetetive tasks to keep the user from having to perform them over and over again.

MP4

A compressed file format that can be used for audio or video; appropriate for streaming

System Unit

A computer case that contains the CPU, power supply, memory, and storage

system unit

A computer case that contains the CPU, power supply, memory, and storage

Simulation

A computer model of a real life situation used to see how a model responds under certain conditions.

desktop computer

A computer that is intended for use at a single location. A desktop computer consists of a case that houses the main components of the computer, plus peripheral devices.

server

A computer that provides resources to other computers on a network.

Flat file

A data file that is not related to or does not contain any linkages to another file.

specialized databases

A database that is specialized for a specific type of data.

Relational file

A database that maintains a set of separate related files (tables), but combines data elements from the files for queries and reports when required.

Direct Connection

A dedicated, direct connection to the Internet through a LAN, with the computer having its own IP address

smart card reader

A device that can read a smart card used to authenticate a person onto a network.

Spam Filters

A device that catches unwanted email and filters it out before it gets delivered internally. The filtering is done based on rules that are established (block email coming from certain IP addresses, email that contains particular words in the subject line, and the like). They usually scan incoming messages but they can scan outgoing ones too... which helps to determine if there's a PC on the network with a virus

DVD/CD-RW Drive

A disk drive that combines DVD-ROM and CD-RW in a single unit

DNS (Domain Name System)

A distributed database that maps IP addresses to domain names. A _____ server, also known as a name server, keeps a list of names and their associated IP addresses.

"What if" Questions

A feature of spreadsheet software that allows speculation by providing instant answers to hypothetical question.

Drag-and-Drop

A feature that allows a user to select text using a mouse or pointing device, and quickly move (drag) it to a different location

Word Wrap

A feature that automatically advances text to the next line without pressing the Enter key

word wrap

A feature that automatically advances text to the next line without pressing the Enter key

Key field

A field in a record that holds unique data which identifies that record from all the other records in the file or database.

TTL (time to live)

A field in an IP header of a packet, indicating the length of time a packet is valid.

zipped file

A file which has been compressed with PKZIP or compatible software. Zip files are indicated by the .ZIP filename extension, and can be unpacked with PKUNZIP or UnZip.

optical fiber

A flexible optically transparent fiber, usually made of glass or plastic, through which light can be transmitted by successive internal reflections. Transmits data.

mpeg

A format for the compression of digitized videos and animations developed by the Moving Pictures Expert Group.

cell merge

A function in database software that allows multiple adjacent cells to be combined into a single larger cell.

Cell format

A function of spreadsheet software that enables users to change appearance of the contents of a cell.

mouse

A hand-operated electronic device that controls the coordinates of a cursor on your computer screen as you move it around on a pad

Internal Drives

A hard drive that is installed inside the system unit

key field (primary/secondary)

A key field is a field or set of fields of a database table which together form a unique identifier for a database record

primary key

A key field is a field or set of fields of a database table which together form a unique identifier for a database record

utility software

A kind of system software designed to help analyze, configure, optimize and maintain the computer

Automatic Link

A link between worksheets in a spreadsheet that ensures a change in one worksheet is reflected in the other.

absolute links

A link which shows the full URL of the page being linked at.

intranet

A local or restricted communications network, esp. a private network created using World Wide Web software.

Motion Picture Audio Layer (MP3)

A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.

microprocessor

A microprocessor incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit,[1] (IC) or at most a few integrated circuits.

eSATA

A modern type of connector for attaching external hard disks

Quad-core

A multi-core system with four processor cores.

dual core

A multi-core system with two processor cores.

Host Name

A name that identifies a computer, printer, or other device on a network

hubs

A network device that allows devices to communicate on a network.

Pay Per Lead (PPL)

A person is referred from a site to the affiliate site, the referred person then has to sign up to something for the website to make money.

Field

A physical unit of data that is one or more bytes in size.

Pixel

A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.

avi (audio video interleaved)

A popular format for video files created by Microsoft.

Function

A predefined set of calculations such as SUM and AVERAGE, in spreadsheet software.

logic functions

A predefined spreadsheet formula that is normally used to test data for a specific condition -- for example, an IF test.

touch pad

A pressure sensitive pad that moves a pointer on the computer screen by capturing the motion of a finger or fingers across its surface.

hard copy

A printed paper copy of data.

software

A program or instructions that give directions to the computer.

file management

A program that allows you to view, rename, copy, move, and delete files and folders., the process of organizing files and folders; naming appropriately, using folders, etc.

audit trial

A record of transactions in an information system that provides verification of the activity of the system. A step-by-step record by which financial data can be traced to its source.

Range

A rectangular block of cells.

Absolute Reference

A reference in a spreadsheet to a specific cell address.

Relative Reference

A reference in a spreadsheet, in relation to a current cell.

Pie Chart

A round pie-shaped chart with slices that show the relative proportions of the parts to a whole.

protocols

A rules that describes how data is transmitted and how computers "communicate". Protocols are essential for communications among computers using different operating systems or different character code sets. Protocols may define (1) the electrical standards to be observed, (2) the orders of bits and bytes, (3) error detection, and (4) error corrections. Protocols also define data formatting, and the syntax of electronic commands and messages. Protocols may define how terminals communicate with to computers or clients with servers. Character sets and how machine command messages are sequenced.

PHP (Personal Home Page)

A server-side programing language used to create webpages.

bit

A single binary digit (a 1 or a 0). The smallest unit of storage inside a computer.

multitasking

A single processor running multiple tasks by switching rapidly between them.

widgets

A small gadget or mechanical device. An application, or a component of an interface, that enables a user to perform a function or access a service

twitter.com

A social networking and blogging service that allows users to send and read tweets (updates)

cell types

A specialized class of cells characterized by a specific appearance, location, and function.

Worksheet

A spreadsheet document that appears on the screen as a grid of numbered rows and columns.

mp3

A standard format for music files sent over the Internet that compresses music.

Musical Instrument Digital Interface (MIDI)

A standard interface that allows electronic instruments and computers to communicate with each other and work together.

protocols

A standard set of rules for performing tasks, such as communication.

http (Hyper Text Transfer Protocol)

A standard used when tranferring data between a web server & a web browser.

Self-checkout stations

A station where a person can go and perform the buying actions himself.

san (storage area network)

A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, andoptical jukeboxes, accessible to servers so that the devices appear like locally attached devices to theoperating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices

bit torrents

A system for rapidly exchanging large computer files among users; works over internet and can be used to distribute any digital content.

Digital Cash

A system that allows a person to pay for goods and services by transmitting a # from one computer to another. Each digital cash is unique established by a bank.

multiprocessing

A system with more than one processor, to increase its performance.

radio tag

A tag that can be easily affixed to the inside of an ID badge and can be read by an RFID transceiver

data compression

A technique of reducing the storage space occupied by a file.

radio frequency identification

A technology that uses radio waves to identify objects, such as goods in supply chains

Clipboard

A temporary storage area in your computer's memory where data that has been cut or copied is stored until it is pasted in a new location

blogs

A type of Internet notebook. Many people have blogs where they write about miscellaneous subjects.

UPC

A type of barcode.

UPC or Universal Product Code

A type of barcode.

Universal Product Code

A type of barcode.

date field

A type of data, used for storing dates and times in a specific format

cloud computing

A type of grid computing in which resources such as data, applications, ect are distributed across the Internet rather than confined to a single machine.

flash memory/flash drive

A type of secondary storage device that uses electronic circuits to read and store data. The advantage of this is that is has no moving parts, making it faster and less likely to be damaged if dropped. Also called flash memory. (Compare magnetic storage with optical storage and solid state storage)

solid state storage

A type of secondary storage device that uses electronic circuits to read and store data. The advantage of this is that is has no moving parts, making it faster and less likely to be damaged if dropped. Also called flash memory. (Compare magnetic storage with optical storage and solid state storage)

byte

A unit used to measure storage capacity. One ____ equals about one character.

virtual worlds and learning environments

A virtual world is a genre of online community that often takes the form of a computer-based simulated environment, through which users can interact with one another and use and create objects. The physical or virtual setting in which learning takes place.

Zombies

A virus that gives a person power over an infected computer.

warranty

A warranty is simply (1) a formal promise by a vendor that the product is defect free, meaning that it will do what it promises to do, and that if it fails to do so, (2) how the vendor will go about rectifying defects.

watermarking

A watermark stored in a data file refers to a method for ensuring data integrity which combines aspects of data hashing and digital watermarking. Both are useful for tamper detection, though each has its own advantages and disadvantages.

social networking

A way to connect and communicate to people on the Internet. many websites are made solely for metworking

Ajax

A web development technique that allows portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload.

Flickr

A website that hosts pictures and videos from registered users for others to see.

public key

A website that required secure information such as credit card details and passwords, sends this key to the user's computer. The key is then used to encrypt the information, so it is unreadable and can be sent across the internet to the website. The website then uses another key, called the private key, to decrypt the information.

Hyperlink

A word, phrase, or picture that acts as a button, enabling the user to explore the Web or a multimedia document with mouse clicks.

Data matching

AKA computer matching; means combining and comparing information from different databases, often using an identifier such as a person's social security #.

Boolean operators

AND, OR, and NOT operators used in a query.

alphanumeric

A______ is a type of data that consists of words, letters, numbers, and other symbols.

Remote access

Ability to connect to a computer, over a network, as though you were physically present at the keyboard.

speech synthesis

Accessibility feature for users with eyesight problems, reads text from the computer out loud.

Text-to-speech

Accessibility feature for users with eyesight problems.

sip and puff

Accessibility hardware for users with very limited mobility

input switches

Accessibility hardware that lets a user input data by pressing a simple on-off switch.

head wand

Accessibility hardware that lets a user input using a wand connected to their head.

high contrast mode

Accessibility setting for users with eyesight problems.

screen magnification

Accessibility setting for users with eyesight problems.

sticky keys

Accessibility setting for users with movement problems.

head control systems

Accessibility software that tracks a users head movements to allow them to input data.

eye tracking software

Accessibility software that tracks where a user is looking on the screen.

ASP

Active Server Pages

geotagging

Adding geospatial metadata (such as latitude, longitude, or altitude) to digital media.

AAC

Advanced Audio Control

Transportation

Airline reservation systems, navigation, package tracking, traffic control systems, IT systems in cars

browser functionality:

Allower users to access a list of resources based on their search terms.

VPN (Virtual Private Network)

Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected

Row

Along with columns, compromise the grid of a spreadsheet.

Column

Along with rows, compromise the grid of a spreadsheet

DVD

Also called Digital Versatile Disk; full-length movies can be stored on this medium.

Automatic Toll Gates

Also known as electronic toll collection systems where RFID tag systems are used. These systems work by putting a small RFID tags on the front windshield of the car so that when a car passes through a toll gate, the person can just go through and a charge in made. The RFID tag contains an electronic connection to online banks, where when one passes through an electronic toll, the gate uses the unique tag from the RFID and sends a transaction to the bank, where the person is charged and will pay later. A person just has to mount the tag, pass through a toll gate and will be charged and will pay the bill later.

DPI (Dots Per Inch)

Also known as printer resolution. The number of dots of colour a printer is capable of producing in a certain amount of space.

central processing unit

Also known as the microprocessor; the brains of the computer.

Dvorak keyboard

Alternative keyboard layout to improve typing speed.

Dvorak keyboards

Alternative keyboard layout to improve typing speed.

forums

An Internet message board

plug-in

An additional feature added to an internet browser that is usually downloaded free from the internet.

Pay Per Sale (PPS)

An affiliate program pays a commission for a sale. The sale gets generated when someone buys something of the affiliate programs site.

chat rooms

An area in a program that allows users to "chat" or communicate by using their keyboards.

Hyperlinks

An area on a web page that, when highlighted and clicked on, will take you to another location on the web

cell padding nested table

An attribute of the tag specifying the amount of space (in pixels) between the sides of an individual cell and its contents.

Affiliate programs

An automated marketing program where a web advertiser puts banner ads or buttons on the website. The web advertiser pays a user to put the advertisement and will get commission if a user clicks on the banner

virtual private network (vpn)

An encrypted network that creates secure tunnels through the Internet or intranets.

microphone

An input device that uses vibration to create an electrical signal proportional to the vibration, which is usually an air pressure wave; usually into a computer or synthesizer.

Peripherals

An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)

peripherals

An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)

Hypertext

An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.

legacy system

An old, out of date IT system which is still used because it is essential to an organisation.

Speakers

An output device that allows you to hear voice, music, and other sounds from your computer

speakers

An output device that allows you to hear voice, music, and other sounds from your computer.

ADC/DAC

Analog-to-digital conversion and Digital-to-analog conversion are the processes that allow digital computers to interact with these everyday signals.

disk utility software

Any software that performs some specific task that is secondary to the main purpose of using the computer (the latter would be called application programs) but is not essential to the operation of the computer ( system software).

Backup Media

Any writable mass storage device, removable or fixed in place

backup media

Any writable mass storage device, removable or fixed in place.

ASP

Application Service Provider

web browsers

Application programs that enable you to explore the Web by clicking hyperlinks in Web pages stored on Web sites.

spreadsheet

Application software for performing numerical calculations and analysis.

data transfer

Application that moves data from one DataBase to another or bring data together

AJAX

Asynchronous Javascript and XML

podcast

Audio broadcast, an audio broadcast that has been converted to an MP3 file or other audio file format for playback in a digital music player or computer

AR

Augmented Reality

ATM

Automated Teller Machine

Presentation-Graphics Software

Automates the creation of visual aids for lectures, training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software, but most commonly used for creating and displaying a series of onscreen slides to serve as visual aids for presentations.

Replication

Automatic replication of values, labels, and formulas, a feature of spreadsheet software.

UPS

Backup power system which powers a computer if the mains electricity fails.

Uninterruptible Power Supply

Backup power system which powers a computer if the mains electricity fails.

Incremental backup

Backup that copies only the changed data since the last backup.

Traditional businesses

Banks, including ATM (automatic teller machines), EFT (electronic funds transfer), hotels, supermarkets, travel agencies

Biometrics

Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.

Color Depth

Bit depth; the number of bits devoted to each pixel.

Floating ads

Blocks screen and mouse, floats around the page.

microblog

Blog-like system which limited post length, such as Twitter.

Published and broadcast information

Books, newspapers, digital radio and TV, e-books, podcasts

BCI

Brain Computer Interface

Analyze

Break down in order to bring out the essential elements or structure.

e-commerce

Buying and selling goods and services on the Internet, especially the World Wide Web.

character

C_____ is a type of data that consists of words, letters, numbers, and other symbols.

digital video camera

Camera that saves digital video

digital video cameras

Camera that saves digital video

digital camera

Camera that saves images digitally, often in JPEG format.

digital cameras

Camera that saves images digitally, often in JPEG format.

CSS

Cascading Style Sheets

Black-hat hackers

Cause commotions, disrupt systems and steal information.

Government control and use of information

Censorship, data matching across agencies, archiving, biometric data, national identity cards

Social networking

Chat rooms, messaging, blogging, file sharing, wikis

verification

Checking whether data is correct - i.e. is the value entered in a field the actual value?

Point of Sale

Checkout system in a shop, usually connected to a store database and EFT system.

validation

Checks to ensure whether data is in the correct format.

log file

Chronological record of events, used for reporting purposes and audit trails.

data types

Classification that identifies type of data in a field (can be INT, BOOL, DOUBLE, FLOAT, TEXT, VARCHAR, BLOB, etc)

Similarities

Clicking on ad will take you to original site, irritates user, usually animated, audio and video

Modelling and simulations

Climate change, forecasting natural events or demographic changes

record

Collection of fields that represent a single entity, such as a person.

Invisible information gathering

Collection of personal information about someone without the person's knowledge.

Access to, and updating of, personal information held on government databases

Collection, storage and updating of personal data: for example, driving licence, TV licence, tax returns, passport applications and renewals, medical records, military service records, social security information, online police records

computer matching

Combining several databases to build up more information about a person or set of people.

data matching

Combining several databases to build up more information about a person or set of people.

Video ads

Commercial in page, good video and audio.

USB

Common interface for connecting peripheral devices including mice, printers, and digital cameras.

Universal Serial Bus

Common interface for connecting peripheral devices including mice, printers, and digital cameras.

web hosting

Companies who provide space on a server for clients to create their web sites & connect it to the internet.

ISP

Company that provides Internet access to homes and businesses.

Internet Service Provider

Company that provides Internet access to homes and businesses.

CAD

Computer Aided Design

CAM

Computer Aided Manufacturing

CIM

Computer Integrated Manufacturing

CTI

Computer Telephony Integration

Global Climate Model

Computer model used to predict possible future climate change.

relationship between a model and a simulation

Computer modeling cn be used to for simulation purposes

World Wide Web (www)

Computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol

LAN

Computer network in a small area such as an office building.

LAN (Local Area Network)

Computer network in a small area such as an office building.

Local Area Network

Computer network in a small area such as an office building.

MAN

Computer network over a large area such as a city.

MAN (Metropolitan Area Network)

Computer network over a large area such as a city.

Metropolitan Area Network.

Computer network over a large area such as a city.

WAN (Wide Area Network)

Computer network over a large area, such as a country or several countries.

server

Computer on a network that provides services or performs work for others.

print server

Computer on a network that receives and processes print requests.

proxy server

Computer on a network which acts on behalf of another, or through which all Internet data must pass.

Embedded systems

Computer system hidden inside another device, such as a car engine management system.

zombie

Computer which has been compromised by malware and is part of a botnet.

HTPC

Computer with multimedia capabilities designed specifically for watching television and films.

Home Theatre PC

Computer with multimedia capabilities designed specifically for watching television and films.

External Drives

Connect by USB or Firewire ports; Contained in their own case; May be compatible with more than one OS

To What Extent

Consider the merits of otherwise of an argument or concept. Opinions and conclusions should be presented clearly and supported with appropriate evidence and sound argument.

CMS

Content Management System

Macro

Custom-designed embedded procedure that automates tasks in application programs.

data verification

Data Verification is a process wherein the data is checked for accuracy and inconsistencies after data migration is done.

metadata

Data about data, such as that which describes how, when, and by whom a particular set of data was collected and formatted.

data redundancy

Data in a database which is needlessly duplicated.

redundancy

Data in a database which is needlessly duplicated.

redundant data

Data in a database which is needlessly duplicated.

data integrity

Data integrity is data that has a complete or whole structure. All characteristics of the data including business rules, rules for how pieces of data relate, dates, definitions and lineage must be correct for data to be complete.

input

Data or information that is entered into the computer.

data redundancy

Data redundancy means that some data are stored twice, or that some data can be derived from other data.

data reliability

Data redundancy means that some data are stored twice, or that some data can be derived from other data.

sensitive data

Data such as medical records which, if shared, could cause serious negative impacts on the data subject.

asynchronous

Data transfer method in which the sender and receiver are not synchronised.

personal data

Data which could identify a user, or lead to social impacts such as identity theft.

personally identifiable data

Data which could identify a user, or lead to social impacts such as identity theft.

DBMS

Database Management System

relational database

Database containing multiple related tables and no redundant data.

foreign key

Database field whose sole purpose is to form part of a relationship with another table.

parameter query

Database query whose criteria are decided by the user at run-time.

flat file database

Database which consists of just one table.

tagging

Defining a piece of information, file, image, or other type of digital media in a non-hierarchical system that helps describe what the information is

Terms

Definitions

DoS

Denial of Service

keyword density

Denotes how close to the start of an area of a page that a keyword appears

touch sensitive device

Describes a device that responds to the touch of a finger by transmitting the coordinates of a touch print to a computer.

soundwaves

Determined by amplitude, frequency and wavelength, also determined by a pitch which is how high or low the sound is.

E-waste

Development, disposal and recycling of IT equipment, monitoring organizations such as the Basel Action Network

MODEM

Device for connecting a computer to a telephone line, used in dialup connections.

microphone

Device for converting sound waves into electrical energy

bar code scanner

Device that reads the special lines of bar codes. Can be used to track documents in litigation or physical objects such as office furniture and equipment.

interactive whiteboard

Device that uses a projector for output and touch inputs, using a special pen.

Smart card readers

Device to read a smart card.

RFID tags (Radio-frequenci identification)

Devices that are able to retrieve and store data that forms an identification.

DAW

Digital Audio Worksheet

digital radio

Digital Radio allows digital audio and data to be transmitted alongside existing AM and FM analogue signals, thus allowing perfect CD quality sound and eliminating static or hiss found in analogue radio broadcasting.

DRM

Digital Rights Management

DSL

Digital Subscriber Line

digital signatures

Digital code attached to electronic document to verify sender and contents

DVD/CD-RW

Digital versatile disk, compact disk, rewritable disk

disaster recovery

Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster

Scatter Chart

Discovers a relationship between two variables.

CD-ROM

Disk that can store up to 680 MB of data; data can only be read from it.

Construct

Display information in a diagrammatic or logical form.

DDoS

Distributed Denial of Service

DNS

Domain Name System

DPI

Dots Per Inch

Use of IT in teaching and learning

Educational software, online research and forums, virtual learning environments (VLE), e-books, Web 2.0 educational networks, use of mobile devices, game-based learning, fully immersive environments, filtering and monitoring of students' internet use, 1-to-1, m-learning

navigation systems

Electronic map combined with route instructions, usually displayed on a dashboard video screen. The system communicates with a satellite to display, on the screen, the vehicle's geographic location and direction of travel.

Spreadsheet software

Enables the user to control numbers, mainpulating them in various ways. The software can manage budgeting, investment management, business speculation, an other tasks involving numbers.

Painting Software

Enables you to "paint" pixels on the screen with a pointing device.

ASCII

Encoding system to store text, where one byte is used for each character. Compare Unicode.

American Standard Code for Information Interchange

Encoding system to store text, where one byte is used for each character. Compare Unicode.

Unicode

Encoding system to store text, with support for multiple languages and alphabets. Compare ASCII.

EULA

End User License Agreement

character check

Ensuring a field contains only the specified character types.

data integrity

Ensuring data is correct, consistent, and update to date.

data validation

Ensuring that data entered into the database is valid.

data synchronisation

Exchanging data between a computer and a portable device such as a smart phone.

Formulate

Express precisely and systematically the relevant concept(s) or arguments.

mainframe

Exspepnsive, room-sized computer, used mostly used for large computing jobs.

XML

Extensible Markup Language

Face recognition software

Face recognition software recognizes faces through cameras and databases.

supercomputers

Fastest computers available, capable of performing trillions of calculations per second.

advanced functions:

Features like loopkup, pivot tables, macros, and worksheet modeling

alternative key

Field by which a database is often searched.

index

Field by which a database is often searched.

secondary key

Field by which a database is often searched.

key field

Field which contains a different value for every record in that table.

primary key

Field which contains a different value for every record in that table.

FTP

File Transfer Protocol

CSV

File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values).

Comma Separated Values

File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values).

TSV

File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.

TSV (Tab Seperated Values)

File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.

Tab Separated Values

File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.

tab-delimited text files

File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.

Digital entertainment

Films, photographs, music, arts, online and digital games, gambling, virtual worlds

Computer security

Firewall for intrusion detection; SSL for secure transactions.

FIFO

First In First Out

Read-only memory (ROM)

Fixed memory stored on a chip in a computer that provides startup and other system instructions.

flv

Flash file that cannot be played back directly. Must be embedded in an SWF file.

Monospaced Fonts

Fonts like those in the Courier family that mimic typewriters; characters, no matter how skinny or fat, always take up the same amount of space

monospaced fonts

Fonts like those in the Courier family that mimic typewriters; characters, no matter how skinny or fat, always take up the same amount of space.

Proportionally Spaced Fonts

Fonts that enable more room for wide than for narrow characters

proportionally spaced fonts

Fonts that enable more room for wide than for narrow characters.

Social engineering

Fooling people into disclosing personal information. Hackers would pretend to be part of a company.

Government information sites

For example, travel warnings, tourist information, environmental information and warnings, government policies, city government websites

data types

Format of data in a field, such as text, number, or date.

Freeware

Freeware is software that is available for use at no cost or for an optional fee, but usually with one or more restricted usage rights.

serious games

Games designed to teach players about an issue.

GIGO

Garbage In Garbage Out

Traditional Media

Generally refers to channels of communication that were widely used prior to the computer and digital technology for communication. Types of media: newspapers, cable TV, magazines

Mapping, virtual globes

Geographic information systems (GIS), global positioning systems (GPS), cell/mobile phone tracking, online journey planning, online maps

GIS

Geographical Info System

Outline

Give a brief account or summary.

Explain

Give a detailed account including reasons or causes.

Describe

Give a detailed account.

State

Give a specific name, value or other brief answer without explanation or calculation.

Contrast

Give an account of the differences between two (or more) items or situations, referring to both (all) of them throughout.

Compare

Give an account of the similarities between two (or more) items or scenarios, referring to both (all) of them throughout.

Define

Give the precise meaning of a word, phrase, concept, or physical quantity.

Justify

Give valid reasons or evidence to support an answer or conclusion.

GPS

Global Positioning System

Medical research

Global collaboration, database for the Human Genome Project, improving patient rehabilitation

GUI

Graphical User Interface

inline graphics

Graphics images that are embedded within a text document. Inline graphics on the Web are actually HTML pages with links to graphics files stored on the Web server. The browser displays the text and images as if they were physically on the same page.

Bitmapped Graphics

Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.

bitmap

Graphics that represents the digital image created using pixels. These are most common form of graphics and are used to produce digital photographs, scanned pictures & pictures found on the internet.

Web design software

HTML editors, digital image editors, animation software, digital sound software.

Phone Phreaking

Hackers committed virus pranks and manipulated the phone systems.

Hacktivism

Hackers hacking information and other things to promote political cause.

White-hat hackers

Hackers who show security companies their results and vulnerabilities.

Electronic payment systems

Handled in conjunction with the bank.

hub

Hardware device for connecting several computers on a network.

switch

Hardware device for connecting several computers on a network.

Router

Hardware device used to connect two separate networks.

full motion platform

Hardware device which can move in many directions to increase the realism of simulators.

Central Processing Unit

Hardware responsible for processing all instructions the computer runs.

microprocessor

Hardware responsible for processing all instructions the computer runs.

processor

Hardware responsible for processing all instructions the computer runs.

HDTV

High Defintion Televison

mainframe

High end computer system that achieves very high data throughput.

backbone

High speed connections that connect main Internet sites.

laser printer

High speed printer.

Distance learning over large areas

Hospitals, prisons, retirement homes, schools

HTML

HypeText Makeup Language

HTTP

HyperText Transfer Protocol. The standard protocol of the world wide web.

PHP

Hypertext Preprocessor

Homes and home network

IT management of home systems: for example, lighting, security, entertainment centres

planned obsolescence

Idea that IT equipment is designed to have a short life expectancy before failing or becoming obsolete.

Convergence

Idea that one device performs the same functions as many separate devices.

Feedback Loop

In a computer simulation the user and the computer responding to data from each other.

field

In a database, a ______ is a single characteristic of data that appears in a table as a column.

record

In a database, a ______ lists information about one person or one thing.

data type

In a database, this indicates the type of data that can be stored in a field.

table

In a databbase, a _______ is a set data arranged in rows and columns.

Label

In a spreadsheet, A TEXT entry that provides information on what a column or row represents.

absolute cell reference

In a spreadsheet, a cell reference which does not change when moved.

Adress

In a spreadsheet, the location of a cell, determined by row number and column letter. Ex. B2

optical

In computing, an optical disc drive (ODD) is a disk drive that uses laser light or electromagnetic waves near the light spectrum as part of the process of reading or writing data to or from optical discs.

table

In databases, a collection of records representing a type of item.

filtering

In functional programming, filter is a higher-order function that processes a data structure (typically a list) in some order to produce a new data structure containing exactly those elements of the original data structure

motherboard

In personal computers, a motherboard is the central printed circuit board (PCB) in many modern computers and holds many of the crucial components of the system, providing connectors for other peripherals. The motherboard is sometimes alternatively known as the mainboard, system board, or, on Apple computers, the logic board.

Open source

In production and development, open source is a philosophy, or pragmatic methodology that promotes free redistribution and access to an end product's design and implementation details.

bit rates

In telecommunications and computing, bitrate (sometimes written bit rate, data rate or as a variable R or fb) is the number of bits that are conveyed or processed per unit of time.

Personal information

Includes any information relating to, or traceable to, an individual person. Associated with a person's handle

Provision for special needs

Inclusive software, Braille keyboards, accessibility

network administrator

Individual responsible for maintaining and running a network.

future warrior

Information technology designed to improve a soldier's understanding of the battlefield around him.

wired soldiers

Information technology designed to improve a soldier's understanding of the battlefield around him.

output

Information which is produced by a computer system.

multi-touch

Input device able to recognise touches and gestures made with multiple fingers.

Touch pad

Input device commonly found on laptops instead of a mouse.

touch pad

Input device commonly found on laptops instead of a mouse.

microphone

Input device for sound data

Keyboards

Input device that lets the user enter text and numeric data.

keyboard

Input device that lets the user enter text and numeric data.

touch screen

Input device that lets the user touch areas of the display to perform tasks.

OCR

Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.

OCR or Optical Character Recognition

Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.

Optical Character Recognition

Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.

MICR

Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.

MICR or Magnetic Ink Character Recognition

Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.

Magnetic Ink Character Recognition

Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.

magnetic stripe reader

Input device that reads the magnetic stripe on cards like ATM cards and bank cards.

magnetic stripe readers

Input device that reads the magnetic stripe on cards like ATM cards and bank cards.

bar code scanners

Input device that uses a laser to read a bar code.

barcode scanner

Input device that uses a laser to read a barcode.

trackball

Input device that uses a rotating ball to control the cursor.

joystick

Input device used for games playing and flight simulators.

stylus

Input device used in conjunction with touch screens.

mouse

Input device used to control a cursor or pointer.

scanner

Input device used to digitise photographs and paper copies of data.

Webcam

Input device used to record video, often found in laptop computers.

webcam

Input device used to record video, often found in laptop computers.

game controller

Input device with buttons used for games playing.

game controllers

Input device with buttons used for games playing.

OMR

Input devices that reads simple multiple-choice style answers by looking for marks on the paper.

OMR or Optical Mark Recognition

Input devices that reads simple multiple-choice style answers by looking for marks on the paper.

Optical Mark Recognition

Input devices that reads simple multiple-choice style answers by looking for marks on the paper.

sensors

Input devices used to measure certain traits, such as sound, heat, or light.

date functions

Insert date and time into a powerpoint

IM

Instant Messenger

firewire

Interface for attaching external hard disks and digital video cameras.

IDE

Interface for attaching internal hard disks.

SATA

Interface for connecting storage devices like hard disks.

IP

Internet Protocol

ISP

Internet Service Provider

Social Media

Involves electronic technologies that link people to networks and allow the exchange of personal and professional information as well as common interests such as product and brand preferences. Any tool or service that uses the Internet to facilitate conversations

Local Area Network (LAN)

Is a network that spans a small area of computers and internet access and function. A LAN can be found in a building or an office, a house, etc. A Wide Area Network (WAN) is LANs connected over long distances using telephone lines and radio waves. A WAN network can be a school or university. A LAN network includes nodes, which are essentially single computers that can share information or functions through the local area network.

Denial Service Attack

Is an attempt to make a computer resource unavailable to its intended users. Generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely

Electronic Data Interchange (EDI)

Is the transfer of data through either networks, such as LANs and WANs, or the internet. Many companies that wish to interact with each other, such as the stock market or a broker, use special software for the data interchange.

jpeg (Joint Photographic Experts Group)

It is a compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.

cookies

It is contrasted with pull, where the request for the transmission of information push technology sends information, small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie

Worm

Jams and disrupts OS of a computer through software; does not destroy information.

Soft keyboard

Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.

soft keyboard

Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.

virtual keyboard

Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.

multimedia keyboard

Keyboard with buttons to perform common tasks such as program launching.

concept keyboard

Keyboard with keys that perform programmable, customised functions.

Script Kiddies

Kids that obtain hacking programs to disrupt other programs.

Kbps

Kilobits per second. Measure of network bandwidth.

SQL

Language for managing databases by typing commands.

Structured Query Language

Language for managing databases by typing commands.

Hardware and network technologies in the classroom

Laptop computers, handheld devices, interactive whiteboards

Copyright

Law protecting intellectual property from unauthorized copying.

Creative Commons

Legal rights to a piece of work were the creator chooses what can be done to their work.

End User License Agreement

Licence agreement for software that sets out the users rights and responsibilities.

Creative Commons

Licensing system for authors who wish to distribute their work freely.

netbook

Lightweight laptop computer designed for portability.

url

Links that lead to online media, uniform resource locator; the address of a website

desktop systems

Literally, the synchronization of information between all the things mentioned by the Internet cloud, and file servers and applications.

LAN

Local area network

WiMax

Long range wireless network technology.

narrowband

Low speed network connection.

MP3

MPEG-Audio Layer III

card reader

Machine that captures the card number from the magnetic strip

Magnetic Stripe

Made up of particles of personal data: address, name, age, etc. Magnetic readers read the particles and analyze them and bring up the functions to which the card belongs to; bank, gift-card, etc.

hard disk

Magnetic secondary storage device found in most desktop and laptop computers.

Evaluate

Make an appraisal by weighing up the strengths and limitations.

Distinguish

Make clear the differences between two or more concepts or items.

compression/decompression

Making files smaller using special code schemes. Saves space on disk.

Pay Per Click (PPC)

Marketing formula; advertiser and maker get cash for each click.

MMORPG

Massively Multiplayer Online Role Playing Games

custom built (bespoke) software

May be designed in stage by stage processes, allowing nuances and possible hidden dangers to to be taken into account

uptime

Measure of how long a computer system has been operating without restarting.

Medical information, administration, marketing and sales

Medical advice, e-prescriptions, telemedicine, electronic health records, international health cards

mbps

Megabits per second. Measure of network bandwidth.

queries

Method of extracting data from a database that matches specific criteria

searching

Method of extracting data from a database that matches specific criteria

MSDOS

Microsoft Disk Operating System

An example of presentation-graphics software

Microsoft Powerpoint

Military

Military Cyberwarfare, smart weapons, espionage, battlefield technology

MIPS

Millions of Instructions Per Second. A way of measuring processor speed.

PDA

Mobile device bigger than a phone but smaller than a laptop. Probably has a keyboard or at least a stylus (pen) and a touch-screen.

Personal Digital Assistant

Mobile device bigger than a phone but smaller than a laptop. Probably has a keyboard or at least a stylus (pen) and a touch-screen.

smartphones

Mobile phone with capabilities including Internet access and a camera.

Digital policing

Monitoring organizations such as the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA)

MPEG

Moving Picture Experts Group

Interactive Multimedia

Multimedia that enables the user to take an active part in the experience.

MIDI

Musical Instrument Digital Interface

NOS

Network Operating System

SAN

Network dedicated to providing disk storage to other computers on the network.

SAN (Storage Area Network)

Network dedicated to providing disk storage to other computers on the network.

Storage Area Network

Network dedicated to providing disk storage to other computers on the network.

P2P

Network in which all computers are equal and there are no centralised servers.

P2P (Peer to Peer)

Network in which all computers are equal and there are no centralised servers.

Peer to peer

Network in which all computers are equal and there are no centralised servers.

Pop-ups

New window opens, sent behind current window, so the user has to close it manually.

NLE

Non-linear Editing

proxy server

Not to be confused with VPN. An intermediary server between a user and the Internet. It intercepts internal user requests and then processes that request on behalf of the user.

port

Number used to determine the type of service required when a computer connects to another.

Calculate

Obtain a numerical answer showing the relevant stages in the working.

Discuss

Offer a considered and balanced review that includes a range of arguments, factors or hypotheses. Opinions or conclusions should be presented clearly and supported by appropriate evidence.

product development and technical documentation

One of the final steps of the development life cycle, in which the product is developed and documented.

gigahertz (ghz)

One thousand million hertz (cycles persecond). A typical processor speed these days is between 1 and 2 GHz. See also hertz and megahertz

Political processes

Online campaigning, voting, lobbying, fund-raising and advertising.

Click and Mortar

Operates online and offline. Essence of e-commerce

OS

Operating System

CD-ROM

Optical secondary storage device capable of holding 650-700MB of data.

BluRay

Optical secondary storage device capable of storing 16GB+.

DVD

Optical secondary storage device capable of storing up to 8GB.

sorting

Ordering records based on a field (e.g. alphabetically).

projectors

Output device for displaying content on large screens.

speakers

Output device for sound.

printers

Output device which produces paper copies.

CRT monitor

Output device. Older type of monitor, now almost obsolete.

LCD screen

Output device. The newer type of monitor which is flat.

augmented reality

Overlapping layers of computer data with images of the real world.

Distributed Denials

Overloading target sites with thousands of requests and information.

Hits

Pages that contain the requested keywords

Banner ads

Payment when someone clicks on it. Highlights product.

Residual programs

Pays commission on all recurring fees

P2P

Peer to Peer

Hackers

People very knowledgeable about computers who use their knowledge to invade other people's computers

PAN

Personal Area Network

PIM

Personal Information Manager

smishing

Phishing attacks committed using text messages (SMS).

Bricks and Mortar

Physical and has only offline operations

hardware

Physical parts of a computer system.

PPI

Pixels Per Inch

Ports

Places on the outside of the computer that connect to the motherboard and allows hardware to work

Law and order

Police surveillance, terrorist monitoring, DNA data

privacy policy

Policy governing what data a company or web site will collect about you and how it will be used.

PDF

Portable Document Format

laptop

Portable computers that come in many shapes and sizes.

Hardware, software and networks

Portable digital devices and their ability to remotely control other devices, IT-enabled appliances

external hard disk

Portable storage device often used for backups.

Right-Click

Pressing the right mouse button to access special features of an application

composite key

Primary key which consists of more than one field.

primary storage

Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required.

RAM

Primary storage which is fast, relatively expensive, and volatile.

Random Access Memory

Primary storage which is fast, relatively expensive, and volatile.

ROM

Primary storage whose contents are written at manufacture and cannot be altered later.

Read Only Memory

Primary storage whose contents are written at manufacture and cannot be altered later.

inkjet printer

Printer that works by spraying ink through nozzles at a sheet of paper.

Privacy audits

Privacy audits check for leaks of information and review company's privacy policy.

fragmentation

Problem that occurs as files are saved on non-contiguous sectors on a disk.

login

Process of authenticating oneself before using a computer system.

normalization

Process of converting a database from a flat file database to a relational database.

Multi-core

Processor with more than one processor core, to increase its performance.

product design

Product design is the process of creating a new product to be sold by a business to its customers.

Sniffer

Programs which can read information on the Internet and can extract passwords.

copyright

Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work.

HTTPS (hypertext Transfer Protocol Secure)

Protocol to ensure secure communication over the Internet

Identify

Provide an answer from a number of possibilities.

Smart Shelves

RFID system where transceiver is placed near antennae in a shelf and transceiver sends data to device and real-time readings are recorded.

RFID

Radio frequency identification device; sends data through frequencies to different devices.

data throughput

Rate at which data is processed and output by a system.

read-only memory (rom)

Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware (software that is very closely tied to specific hardware, and unlikely to need frequent updates).

optical mark recognition

Reads hend-drawn marks such as small circles or rectangles

RSS

Really Simple Sindication

RSS

Really Simple Syndicate. A push technology.

School administration

Record-keeping of staff and finances, libraries, student records, EDI (electronic data interchange)

auditing

Recording database transactions made by users (e.g. all edits, reads) for security purposes.

speed throttling

Reducing a processor's clock speed to save power when not in use.

RAID

Redundant Array of Inexpensive Disks. A way of having two (or more) hard disks in a computer and having the exact same data written to each of them automatically. If one of the disks fails, the computer can switch to the other disk and continue running normally (since the second disk is an exact copy).

Viral marketing

Refers to marketing technique that uses pre-existing social networks to produce increases in brand awareness or to achieve other marketing objectives such as product sales through self-replication viral processes, analogous to the spread of pathological and computer viruses.

Read / write web

Refers to web pages which allow user interaction and collaboration.

Serial number

Registration number needed during software installation, used to reduce illegal copies.

IT issues involving ethics

Related to getting and downloading music. In some countries it might be legal but not morally or ethically right according to musicians and copyrights. In other countries it might be illegal but other ethically right; so this situation is questions all over to debate over legality and morality.

RDBMS

Relational DBMS. See Database Management System.

Satellite communication

Remote sensing devices, satellite imagery, tagging

Two-tier

Represents a compensation, or payment plan, for affiliates that sell products for affiliate companies

frequency

Represents the range of signals that are audible to the human ear

native resolution

Resolution of an LCD display that produces the best display quality.

Why be Ethical

Rule interactions with each other people and our actions that affect other people.

color depth

SAME as bit depth (refer to bit depth)

SVG

Scalable Vector Graphics

take-back scheme

Scheme operated by IT manufacturers to accept customers' old hardware for recycling at its end of life.

data entry form

Screen used to input data into a database.

forms

Screen used to input data into a database.

data mining

Searching collections of data for hidden patterns.

knowledge discovery

Searching collections of data for hidden patterns.

secondary storage

Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage.

HTTPS

Secure version of HTTP which offers encrypted communication.

disk wiping

Securing deleting files from a disk, beyond recovery.

secure deletion

Securing deleting files from a disk, beyond recovery.

Pharming

Seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming 'poisons' a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere.

probes

Sensors, probes and real time data collection transform a physical quantity into a electrical signal through waves

real time data collector

Sensors, probes and real time data collection transform a physical quantity into a electrical signal through waves

Data logging

Sensors, probes, real-time data collection

Serif Fonts

Serif fonts have small strokes at the end of the letters Sans Serif fonts do not have the decorative part of the font.

Web hosting

Servers, routers, modems.

Shill bidding

Shill bidding is the act of bidding on your own auction against other bidders in order to raise the price at which your item will eventually sell. It is a violation of both eBay rules and federal law.

SWF

Shockwave Flash

PAN

Short range network between a computer and a mobile phone or similar portable device.

PAN (Personal Area Network)

Short range network between a computer and a mobile phone or similar portable device.

Personal Area Network

Short range network between a computer and a mobile phone or similar portable device.

Bluetooth

Short range, low bandwidth wireless technology often used for mobile phone headsets or earphones.

IrDA

Short range, low bandwidth, line-of-sight wireless communication technology.

non-volatile storage

Short range, low bandwidth, line-of-sight wireless communication technology.

photocasts

Similar to a podcast but contain photos

field

Single item of data about a single record in a database.

Search engine marketing

Sites pay search engines to be placed as the first sites to be visited. Search engine directs traffic to certain sites that re either popular or pay to be noticed.

microblogs

Smaller version of blog. Users can write on microblogs when they are not home.

personal firewall

Software application that controls network access to and from a single computer.

account management

Software designed to set up accounts and keep track of money flow.

Pop-up Blockers

Software enabling users to disable pop-ups on every website. Can also be used to allow certain pop-ups to go through user's discretion.

Video Editing Software

Software for editing digital video, including titles, sound and special effects.

Concurrent license

Software licence that allows a specific number of copies to be used at one time.

Multi-user license

Software licence that allows a specific number of copies to be used at one time.

Site license

Software licence that allows an organisation to use software on an unlimited number of computers.

Single- user license

Software licence that allows the use of only a single copy on a single computer.

key logger

Software or hardware which records all key strokes on a computer system.

keystroke monitoring

Software or hardware which records all key strokes on a computer system.

browsers

Software programs loaded on personal computers and used to download and view web files.

Image Processing Software

Software that enables the user to manipulate photographs and other high-resolution images.

database management system

Software that handles the storage, retrieval, and updating of data in a computer system.

operating systems

Software that manages the computer system and controls the hardware.

Malware

Software that preforms malicious activity.

spyware

Software that tracks user activity and forwards it to a third identity (keylogging and web browsing history)

route planning

Software to plan the optimum route between two points.

fleet management

Software to track and manage fleets of vehicles, including route planning and data analysis functions.

desktop publishing

Software used mainly to produce print publications

DBMS

Software used to create, enter, edit, and retrieve data in a database.

Database Management System

Software used to create, enter, edit, and retrieve data in a database.

Commercial Software

Software which is sold for profit.

Free and open source software

Software whose source code is freely available and can be changed and distributed.

MMC

Solid state secondary storage device, often used for digital cameras.

CompactFlash

Solid state storage device usually used in digital cameras.

Braille keyboard

Special keyboard designed for users with eyesight problems.

Kensington lock

Special lock for securing portable devices to immovable objects to prevent theft.

Braille printer

Special printer that can produce Braille text.

Electronic Article Surveillance

Special tags are fixed to merchandise or books. These tags are removed or deactivated by the clerks when the item is properly bought or checked out

pages per minute

Speed at which a printer produces output.

clock speed

Speed of a processor, in ticks per second.

Stack Chart

Stacked bars to show how proportions of a whole change over time.

RTF

Standard file format that can store documents that include formatting data.

Rich Text Format

Standard file format that can store documents that include formatting data.

Internet Protocol

Standard protocol used on many LANs and on the Internet. See TCP.

wizard

Step by step help system to guide a user through a task.

Formula

Step-by-step procedure for calculating a number in a spreadsheet. Ex. =(B2)*(B3)

cache

Storage area for frequently used information, to speed up access.

optical storage

Storage devices which use lasers to store and read data. Examples include CDs and DVDs.

Secondary storage

Storage systems which are connected externally to the computer's motherboard.

Primary storage

Storage systems which are found inside the computer and are electronic. RAM and ROM are examples.

KB

Storage unit: 1024 bytes

Kilobyte

Storage unit: 1024 bytes

ZB

Storage unit: 1024 exabytes

zettabyte

Storage unit: 1024 exabytes

TB

Storage unit: 1024 gigabytes

Terabyte

Storage unit: 1024 gigabytes

MB

Storage unit: 1024 kilobytes

Megabyte

Storage unit: 1024 kilobytes

GB

Storage unit: 1024 megabytes.

Gigabyte

Storage unit: 1024 megabytes.

EB

Storage unit: 1024 petabytes.

exabyte

Storage unit: 1024 petabytes.

PB

Storage unit: 1024 terabytes

Petabyte

Storage unit: 1024 terabytes

YB

Storage unit: 1024 zettabyes

yottabyte

Storage unit: 1024 zettabyes

byte

Storage unit: 8 bits. Enough to store a single ASCII text character.

non-volatile storage

Storage which does not lose its contents when the power is removed.

volatile storage

Storage which loses its contents when the power is removed.

solid state storage

Storage, such as flash memory, with no moving parts. Solid-state storage is likely to replace disk storage in the future.

Drawing Software

Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.

Standards and protocols

Strand 1: Technical rules and conventions that enable compatibility and therefore facilitate communication between different IT systems and their components.

Privacy and anonymity

Strand 1: ability of people to determine for themselves when, how, and to what extent information is shared with others. At an extreme a person uses "it" to conceal their true identity.

Digital Citizenship

Strand 1: can be defined as appropriate behavior that represents the responsible, ethical and legal approach that individuals take in any situation with respect to the use of IT.

Policies

Strand 1: enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies.

Authenticity

Strand 1: establishing a user's identity beyond reasonable doubt. (user login)

People and machines

Strand 1: fear of people that future systems will be programmed to make decisions that would be better taken by humans.

Intellectual Property

Strand 1: includes ideas, discoveries, writings, works of art, software, collections, and presentations of data

Integrity

Strand 1: refers to safeguarding the accuracy and completeness of stored data.

Reliability

Strand 1: refers to the operation of hardware, design of the software, accuracy of data or correspondence of data with the real world.

Security

Strand 1: refers to the protection of hardware, software, machines and networks from unauthorized access.

Globalization and Cultural Diversity

Strand 1: the diminishing importance of geographical, political, economic, and cultural boundaries.

Digital Divide and Equality of Access

Strand 1: the growth of the use of IT systems has led to disparities in the use of, and access to , information technologies.

Surveillance

Strand 1: the use of IT to monitor the actions of people.

Health

Strand 2: Medical research, information, administration, marketing and sales

Business and employment

Strand 2: coverage should address the IT systems that exist as well as the ethical issues and social impacts that arise from the increased use of IT for employers and employees

Education and Training

Strand 2: distance learning over large areas; use of IT in teaching and learning; hardware and network technologies in the classroom; provision for special needs; school administration

Home and leisure

Strand 2: homes and home network; digital entertainment; social networking; published and broadcast information; digital policing; hardware, software and networks

Environment

Strand 2: modeling and simulations; data logging; satellite communication; mapping, virtual globes; E-waste; Resource depletion

Politics and government

Strand 2: political processes; government information sites; access to, and updating of, personal information, held on government databases; government control and use of information; law and order; military

Introduction to project management

Strand 3: All IT development requires a management method.

Personal and Public Communications

Strand 3: Developments in technology have allowed an increasing number of mobile devices to be developed that enable people to communicate anytime, anyplace, and anywhere.

Spreadsheets, modeling and simulations

Strand 3: The increasing capabilities of computers have allowed individuals and organizations to develop software that can be used to test "what-if" scenarios and create simulations and models of real-world events.

Internet

Strand 3: World Wide Web, web-based languages, social networking, web databases

Networks

Strand 3: a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information.

Hardware

Strand 3: deals with a computer system consisting of input devices, output devices, a central processing unit and storage.

Software

Strand 3: deals with the programs associated with a typical computer system.

Multimedia/Digital media

Strand 3: involves the use and integration of media to create digital products that are available online or offline.

Databases

Strand 3: lies at the heart of most IT systems whether in businesses, organizations or other institutions.

magnetic stripe

Strips of magnetic tape, which are usually, found on the back of plastic credit and debit cards. The strip usually holds information concerning Customers name and Account number

SQL

Structured Query Langauge

Ethics

Study and Evaluation of human conduct in the light of moral principles

Diagnostic and therapeutic tools

Surgery, prosthetic devices, diagnostic technology, rehabilitation, patient monitoring, individualized IT solutions for disabled people, accessibility

FTP (File Transfer Protocol)

System for transferring files over the Internet, often used for uploading web sites.

DNS ( Domain Name System)

System for translating domain names into IP addresses.

opt-out

System in which users must explicitly decide not to participate.

opt-in

System in which users must explicitly decide to participate.

follow-the-sun working

System of moving work to different offices around the globe as the day progresses, ending work in each location as the end of the day approaches, and moving it to a new office elsewhere where the day is just beginning.

GPS

System of satellites which can pinpoint a users location on the Earth.

Global Positioning System

System of satellites which can pinpoint a users location on the Earth.

RFID

System of tags which contain data that can be read from a distance using radio waves.

Radio Frequency Identification

System of tags which contain data that can be read from a distance using radio waves.

VoIP

System that lets users make telephone calls over the Internet.

Voice over Internet Protocol

System that lets users make telephone calls over the Internet.

command line interface

System the user controls by typing in commands.

paywall

System to prevent access to a web site's content unless the user pays a subscription fee.

TLS (Transport Layer Security)

System used to encrypt https web traffic.

Redundant Array of Inexpensive Disks

System where multiple hard disks contain duplicate data, to be used in the event of one failing.

push technology

System which notifies users of changes to web pages without them having to visit the page.

Redundant system

System which will take over the role of a primary system if it fails.

failover system

System which will take over the role of a primary system if it fails.

safety critical system

System whose failure could result in injury or loss of life.

text

T___ is a type of data that consists of words, letters, numbers, and other symbols.

Electronic Article Surveillance

Tag-and-alarm system. A product needs to be untagged by the system's computer so that the alarm doesn't go off.

radio tag

Tags which broadcast their position over a large distance using radio waves.

pharming

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

Virtual Reality (VR)

Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.

RAM (Random Access Memory)

Temporary memory that resides on the motherboard.

plain text

Text file which contains no formatting data

Business Software Alliance (BSA)

The Business Software Alliance (BSA) is a trade group established in 1988 and representing a number of the world's largest software makers and is a member of the International Intellectual Property Alliance. Its principal activity is trying to stop copyright infringement of software produced by its members.

swf

The Flash (Shockwave) format was developed by Macromedia. The Shockwave format requires an extra component to play which comes preinstalled with web browsers like Firefox and Internet Explorer.

mov

The QuickTime format is developed by Apple. QuickTime is a common format on the Internet, but QuickTime movies cannot be played on a Windows computer without an extra (free) component installed.

accessing

The ability to access information, whether on the cloud or on the PC.

URL (uniform resource locator)

The address of a website

What is computer ethics

The analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology

HTML (HyperText Markup Language)

The authoring language used to create documents on the World Wide Web. _____ defines the structure and layout of a Web document by using a variety of tags and attributes.

M-commerce

The buying and selling of goods and services through a wireless, handheld device. Many sites have 'mobile' sites where it is the normal site but compressed for easier access through a phone.

Motherboard

The circuit board to which the internal computer components connect: the CPU, the RAM, the ROM, and the secondary storage devices

clock speed:

The clock rate typically refers to the frequency that a CPU is running at. It uses the SI unit Hertz.

Hypermedia

The combination of text, numbers, graphics, animation, sound effects, music and other media in a hyperlinked document.

Resolution

The density of pixels, measured by the number of dots per inch.

Validators

The equivalent of spelling and grammar checkers for calculations that helps users check complex worksheets for CONSISTENCY OF ENTRIES AND FORMULA LOGIC.

copyright

The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same

presentation formats

The format of a business plan depends on its presentation context. It is not uncommon for businesses, especially start-ups to have three or four formats for the same business plan:

software

The instructions and programs which are run by the CPU.

Cell

The intersection of a raw and a column on the grid of a spreadsheet. (the thing you write in)

motherboard

The main circuit board of a microcomputer. The motherboard contains the connectors for attaching additional boards.

Point Size

The measurement, or size of a font (text); each point is approximately 1/72 of an inch

point size

The measurement, or size of a font (text); each point is approximately 1/72 of an inch

Emergency Power Off (EPO)

The mechanism is a simple button that is used in data centers where massive amounts of data is stored on servers, and the switch is flipped in case of huge emergencies, such as potential danger to a person, or the servers will be damaged or the building in which the servers are in will be damaged. The EPO will erase some data due to the fact that the EPO is not meant to be regularly used.

packets

The method for data being sent over the Internet. Data is broken into smaller digital packets. The packet consisting of header, data, and trailer.

Microsoft Windows

The most common operating system for IBM and IBM-compatible PCs

relational database

The most common standard for databases, whereby tables (files) are related based on common keys.

Facebook.com

The most popular social networking Web site with over 100 million active users. Users create personal "profiles"to represent themselves, listing interests and posting photos and communicating withothers through private or public messages.

HTML5

The newest version of HTML under development is ___ and is designed to replace the current versions of HTML and XHTML. It is a language for structuring and presenting content for the World Wide Web. This new technology allows video, app and Cloud services.

Clock speed

The number of operations that the CPU can carry out in 1 second

sample rate

The number of samples of a sound that are taken per second to represent the event digitally.

Value

The numbers that are the raw material used by spreadsheet software to perform calculations.

Peer-to-Peer File Sharing (P2P)

The online sharing of music or other computer files directly among individual computer users' hard drives, rather than through posting the files on central servers.

Mac OS

The operating system for the Apple Macintosh computer

central processing unit

The part of a computer in which operations are controlled and executed

optical character recognition

The process by which a scanned image is electronically "read" to convert it into text so it can be edited in a word processing program.

sampling

The process of converting analog data into digital computer data.

linking tables to a relational database

The process of having two or more tables in a database rely on other tables. For example, customer names and Ids are stored in one table while products purchased are stored in another table. Both tables are linked by customerID.

File Compression

The process of reducing the size of a file so that you can fit more files into the same amount of disk space

file compression

The process of reducing the size of a file so that you can fit more files into the same amount of disk space.

File Decompression

The process of restoring a compressed file back to its original state

file decompression

The process of restoring a compressed file back to its original state.

Animation

The process of simulation motion with a series of still pictures.

DTP

The process of using the computer and specific types of software to combine text and graphics to produce documents such as newsletters, brochures, books, etc.

TCP/IP (Transmission Control Protocol/Internet Protocol.)

The protocol (set of rules) that lets information travel across the internet.

Public domain

The public domain refers to works whose intellectual property rights have expired, been forfeited, or are inapplicable.

Data mining

The searching and analyzing masses of data to find patterns and develop new information or knowledge.

packet loss

The situation in which data bits are lost in transit, requiring them to be resent which significantly increases the time required for an intact message to arrive at its destination. With a firewall, packets with IP destinations that are blocked, are not passed on resulting in packet loss.

packet switching

The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination, where they are reunited.

Vector Graphics

The storage of pictures as collections of lines, shapes and other objects.

Shareware

The term shareware is proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

bytes

The unit of data storage in computers. A byte is usually considered to be the code for a single character (see ASCII). A byte is 8 bits long. The English alphabet has 52 characters (upper and lower case) and computers commonly also use punctuation marks and a few special characters such as the full stop (.), exclamation mark (!), slashes (/ and \), equals sign (=), tilde (~), ampersand (&), currency symbols (?, £, $), percent mark (%), asterisk (*), plus sign (+) and carriage return. Including punctuation marks and special characters, we need approximately 100 unique codes. Each bit can exist in only two states, 0 or 1. Thus, a 6-bit word can define only 64 characters (26), a 7-bit word can define 128 (27) characters, and an 8-bit word can define 256 characters. If one bit is used to check the integrity of the entire byte, then we need at least an 8-bit byte (or "word") for common computer uses.

Augmented Reality

The use of computer displays that add virtual information to a person's sensory perceptions, supplementing rather than replacing (as in virtual reality) the world the user sees.

Modeling

The use of computers to create abstract models of objects, organisms, organizations, and processes.

Computer Aided Design (CAD)

The use of computers to draw products or process designs on the screen.

Dataveillance

The use of myriad personal-data systems to investigate or monitor people

keyword prominance

The way sites are categorized in terms of most useful and most popular among Internet users.

Reasons why being ethical is practical

There are virtues, morals and ideas that benefit everyone, although sometimes obeying the law is not ethical but there have been so many opportunities and events that change the way of thinking; therefore establishing practicality as acting ethically

domain name

These are part of the URL. It includes a suffix such as .org, .edu, .com, etc. The suffix indicates the type of organization or business.

pixel (picture element)

These small little dots are what make up the images on computer displays. The screen is divided up into a matrix of thousands or even millions of ______.

VPN (Virtual Private Network)

This creates a tunnel over the Internet and encrypts a message.

yottabyte (yb)

This is 2^80 bytes, or 1024 zettabytes.

http (hypertext transfer protocol)

This is a set of rules computers use to transfer web pages across the Internet.

Double-Click

This mouse term refers to tapping the left mouse button twice in quick succession

platform

This refers to the hardware and/or operating system that a IT system may be run on (Mac, Windows).

flat-file database

This type of database stores all of its information in one table. While this type of database is still used to store smaller amounts of information, it is not a good solution for larger information stores.

digitize

To convert data from analog to digital form.

Copy

To copy something, such as text, data, pictures, etc.

Cut

To cut something

Paste

To paste something that was copied

Sort

To record data into a new sequence.

Databases

To store costumer records, financial information.

Trans-border data flow

Transfer of data between countries.

TCP/IP

Transmission Control Protocol/Internet Protocol

rootkit

Type of malware which infiltrates the operating system and attempts to hide itself from view

magnetic storage

Type of secondary storage that users magnets to read and store data. Examples include floppy disks and hard disks.

serif fonts

Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes.

Sans-Serif Fonts

Typeface fonts in which the characters have plain and clean lines rather than embellishments at the ends of the main strokes

fibre optic

Types of network connection that offers extremely high speed transfers.

desktop computer

Typical computer system with a separate screen and system unit.

Data Protection Act

UK law that governs the collection and use of personal data.

Crackers

Ultra-professional hackers. Did all types of damage to current computers.

URL

Uniform Resource Locator

IP address

Unique address assigned to every computer on a network.

MAC address

Unique address embedded in network connected devices.

hardware address

Unique address embedded in network connected devices.

User Name

Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user

user name

Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.

MHz

Unit of measurement for a processor's clock speed.

megahertz

Unit of measurement for a processor's clock speed.

THz

Unit of measurement for a processor's clock speed. 1000 GHz.

terahertz

Unit of measurement for a processor's clock speed. 1000 GHz.

GHz

Unit of measurement for a processor's clock speed. 1000 MHz.

gigahertz

Unit of measurement for a processor's clock speed. 1000 MHz.

Resource depletion

Use of non-renewable resources for manufacturing components, electrical consumption of IT systems

Secondary use

Use of personal information for a purpose other than the one for which it was supplied for.

voice recognition

Use of software to convert spoken words into text.

voice control

Use of spoken commands to control a computer.

digital video camera

Used to record a video and then transfer it to the computer

lookup

Using a list of values to limit what can be entered into a field. For example, for the 'Gender' field, the values are limited to 'male' and 'female'.

secondary use

Using data for a purpose other than the one for which it was collected.

Multimedia

Using some combination of text, graphics, animation, video, music, voice and sound effects to communicate.

consistency check

Validation check in which two fields' values are mutually dependent.

range check

Validation technique. Ensures a field is between a certain range of values.

input mask

Validation technique. Ensures only the specified characters can be entered into a field.

field size

Validation technique. Number of characters that can be stored in a field.

length check

Validation technique. Number of characters that can be stored in a field.

presence check

Validation technique. Requires a field to be completed.

data warehouses

Vast databases containing many gigabytes of data.

Side bars

Vertical, bigger and cannot be scrolled off. Gets more clicks.

YouTube.com

Video Sharing site where users can upload, share, download, and view others videos. Launched in Feb. 2005. Purchased by Google for $1.65 Billion. Used by Amateur Video graphers.

Morph

Video clip in which one image metamorphoses into another.

Digital Video

Video reduced to a series of numbers (0 and 1), which can be edited, stored, and played back without loss of quality.

Video surveillance

Video surveillance systems are used by people and government to visually monitor people.

VPN

Virtual Private Network

VoIP

Voice Over Internet Telephony

check digit

Way of checking mathematically if a item of data has been correctly entered.

Portals

Web pages that users launch when they first log on to the Web

online encyclopaedias

Web site containing a large number of articles for research purposes.

social network

Web site that lets users create personal profile pages and share them with friends.

social bookmarking

Web site that lets users store and manage their favourite links, and share them with others.

amplitude

When a current waveform reaches its maximum absolute value

deleting records

When a user deletes a row from a table in a database

report generation

When both simple and complex reports can be produced just by identifying what items and the appearance then the software capable of this task is often called a report generator.

Identity Theft

When hackers or stalkers or whoever, manages to steal personal information from a person and completely become that person in every way; according to the data.

Identity Theft

When someone uses your name, Social Security number, credit card number, and other personal information without your permission

Inbox

Where incoming e-mail messages are stored and retreived

Random-access memory (RAM)

Where instructions and data are stored on a temporary basis. This memory is volatile.

WAN

Wide area network

WMA

Windows Media Audio

WAP

Wireless Access Point

Blue tooth

Wireless network technology, designed for short-range; mobile phone and headset, PDA an

DTP software

Word processors (word, ppt), image editing (photoshop), illustration software

Online businesses (e-commerce)

Working practices such as teleworking and home working

Blink Card

Works with the RFID systems and is read from a distance, hands free and works like a credit-card where it also contains embedded particles.

WWW

World Wide Web

free software

Written in programmer code. Charges little or nothing at all for software.

authenticity

_______ is whether or not the source is actually what it seems to be. The state or quality of being genuine, or of the origin and authorship claimed. For example, with photo-journalism, Is a photo ________ or has it been tampered with?

data-driven websites:

a Web site that that can display dynamic, changeble content wihtout having constantly redesigned pages, due to a database that separates the site's content from its design. Ex: Amazon.com

digital camera

a camera that encodes an image digitally and store it for later reproduction

credit cards

a card issued by a financial company giving the user an option to borrow funds.

motherboard

a circuit board that contains all of the computer system's main components.

Web Site

a computer connected to the internet that maintains a series of web pages on the World Wide Web

web site

a computer connected to the internet that maintains a series of web pages on the World Wide Web

Document

a computer file that contains text (and possibly formatting instructions) using 7-bit ASCII characters

Internet

a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange

internet

a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange

Search Engine

a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)

search engine

a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)

applications

a computer program used to do a specific kind of work

computer model

a computer-generated simulation based on mathematical subjects with important social impact

Secondary storage

a data storage device that is not the main memory of a computer.

composite device

a device that combines multiple interfaces (like buttons and joysticks) which can be controlled independently of each other

router

a device that forwards data packets between computer networks

webcam

a digital camera designed to take digital photographs and transmit them over the internet

Find-and-Replace

a feature that scans a document, searches for occurrences of specific text, symbols or formatting, and allows a user to replace it with new text, symbols or formatting

banners

a form of advertising on the World Wide Web delivered by an ad server. This form of online advertising entails embedding an advertisement into a web page

algorithm

a formula or set of steps for solving a particular problem

Icon

a graphic symbol (usually a simple picture) that denotes a program or a command or a data file or a concept in a graphical user interface

Mouse

a hand-operated electronic device that controls the coordinates of a cursor on your computer screen as you move it around on a pad

Directory/Subject Tree

a hierarchical catalog of web sites compiled by researchers

binary

a language the computer understands. A number system that has two unique values: 0 and 1.

personal digital assistant

a lightweight consumer electronic device that looks like a hand-held computer but instead performs specific tasks

secure transactions

a loan or a credit transaction in which the lender acquires a security interest in collateral owned by the borrower and is entitled to foreclose on or repossess the collateral in the event of the borrower's default

hard disk

a magnetic medium used to store electronic data that can be read by a computer

Asynchronous Transfer Mode (ATM)

a network technology based on transferring data in cells or packets of a fixed size.

wifi

a network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet

Monitor

a piece of electronic equipment that keeps track of the operation of a system continuously and warns of trouble

monitor

a piece of electronic equipment that keeps track of the operation of a system continuously and warns of trouble

laptop

a portable computer small enough to use in your lap

Removable Media

a portable device allowing for the storage of computer data

USB (universal serial bus) flash drive

a portable storage device that stores data in flash memory and connects to a computer through a USB port. Also called thumb drives or jump drives

pop-up blocker

a program that prevents pop-ups from displaying in a user's Web browser

ftp (file transfer protocol)

a protocol used for copying a file from one computer to another through the internet.

Hard Disk

a rigid magnetic disk mounted permanently in a drive unit

Backup Copy

a second copy of the same data in case the primary copy is destroyed is called

backup copy

a second copy of the same data in case the primary copy is destroyed is called

byte

a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single unit of information

file

a set of related records (either written or electronic) kept together

javascript

a simple code that can be included in a Web page to allow an action to occur

model

a simplified representation of a system at some particular point in time or space intended to promote understanding of a real system

personal computer

a small digital computer based on a microprocessor and designed to be used by one person at a time

Virus

a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer

virus

a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer

Typeface

a specific size and style of type within a type family

font

a specific size and style of type within a type family

typeface

a specific size and style of type within a type family

Optical Drive

a storage device that stores files using removable disks that reads and writes using a laser

optical drive

a storage device that stores files using removable disks that reads and writes using a laser

Extension

a string of characters beginning with a period and followed by one to three letters

smart shelves

a system of shelves or other container, that constantly keeps track of the individual items it contains

Electronic Mail

a system of world-wide electronic communication in which a computer user can compose a message at one terminal that is generated at the recipient's terminal when he logs in

clipboard

a temporary storage area for items that are cut or copied

terabyte

a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024 gigabytes

gigabyte

a unit of information equal to one billion (1,073,741,824) bytes or 1024 megabytes

megabyte

a unit of information equal to one million (1,048,576) bytes

kilobyte

a unit of information equal to one thousand (1024) bytes

bit

a unit of measurement of information (from Binary + digIT)

Terahertz

a unit of measurement that is equal to 1,000,000,000 cycles per second

graphical user interface (gui)

a user interface based on graphical displays with a mouse, the user points to icons that represent files, folder, & disks, documents are displayed in windows, the user selects commands from the menus

ATMs (steps)

a. Card reader reads a card. b. Person enters PIN (or unique #) to access account from any place in the world. c. Person selects how much cash to withdraw, deposit or consult. d. Whichever action, the person receives receipt and the credit card.

Smart Cards

a. Has an integrated circuit microprocessor chip; better because of security and is read from afar and has a longer life.

smart card readers

about the shape, it's the same of a credit card, but inside it's different. Inside it contains a microprocessor that is used to do operations that need data that is placed in the microprocessor.

social engineering

act of manipulating people into performing actions or divulging confidential infromation

pharming

act of planting fake internet adresses in the tables of a DNS, makig innocent people enter fake bank accounts, enabling crimes.

viral marketing

advertising and/or marketing technique that spreads like a virus by getting passed on from consumer to consumer and market to market.

cracker

aka hacker

Remote Access

allows users to connect to an intranet from a distant location

Button

an electrical switch operated by pressing a button

display

an electronic device that represents information in visual form

Memory

an electronic memory device

memory

an electronic memory device

grayscale

an image in which the value of each pixel is a single sample, that is, it carries only intensity information. Images of this sort, also known as black-and-white, are composed exclusively of shades of gray, varying from black at the weakest intensity to white at the strongest.

blink card

an innovation designed to make cashless consumer purchases faster, while boosting sales for retailers. Instead of traditional credit card processing involving a swipe of a card, all that's required is a quick wave of a card near a check stand reader to complete the transaction.

Keyboard

an input device that enters data with letters, numbers, symbols, and special function keys

keyboard

an input device that enters data with letters, numbers, symbols, and special function keys.

anonymizer

an intermediary which prevents websites from seeing a user's Internet Protocol (IP) address.

projector

an optical instrument that projects an enlarged image onto a screen

Printer

an output device that prints the results of data processing

sensor

any device that receives a signal or stimulus (as heat or pressure or light or motion etc.) and responds to it in a distinctive manner

Magnetic storage

any storage medium in which different patterns of magnetization are used to represent stored bits or bytes of information

Personal Computer

are computes typically used by a single user , for use in the home or office for general computing tasks such as word processing, working with photographs or graphics, email, and internet access.

DDOS(Distributed Denial of Service attack)

attack of a network that floods it with useless traffick, forcing it to shutdown and deny the service to its legitimate users.

Universal product Code (UPC)

barcode symbology, widely used in Canada and the United States for tracking trade items in stores.

E-Government

basically all the functions that government provides on paper, such as: passport deliveries, visa issues, credit-debt, etc. E-Government functions also have online representatives; download government information, like Social Security number. E-Government also uses technology in order to carry out the online functions such as biometrics and tracking systems.

biometrics

biological characteristics that are unique (fingerprints, face structure, eyes)

Advantages and disavdvantages of e-commerce

c. Pros i. Budget increases. ii. Specialized searches. iii. Increases speed and efficiency.

location tracking

can help find people in an emergency, but it can also make your location known to strangers

Selects

chooses

File

collection of stored electronic data, such as text, pictures, video, and music

Internet Service Provider (ISP)

company that provides individuals and other companies access to the Internet along with additional related services, such as website building

World Wide Web

computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol

electronic funds transfer (EFT)

computer-based systems used to perform financial transactions electronically.

Click

depression of a button on a computer mouse

business-to-business (b2b)

describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.

requirements specification

detailed functional and non-functional requirements for acomplishing a task.

design guidelines for creating multimedia/digital media

devices and techniques associated with good design.

sans-serif fonts

do not have tails and are commonly used in headlines

Web Pages

document of the world wide web that can include text, pictures, sound, and video

web pages

document of the world wide web that can include text, pictures, sound, and video

teleworking (telecommuting?)

employment at home while communicating with the workplace by phone or fax or modem

Data Files

files created by information input by users through a software- application program

Executable Files

files, such as applications, that contain instructions that can be executed from the computer

vishing

fishing for personal information through the telephone

fraud alert

flag on credit card report that tellls credit bureau to call and confirm the opening of an account.

pop-ups

form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses

generic techniques

generalizing software components so that they can be easily reused in a wide variety of situations

avatar

graphical bodies used to represent a person in a virtual meeting place

hackivism

hacking for a political cause

smart card

have input and output operations (such as computers) can hold more information, are more secure since they have a chip which encrypts the information, are used for many applications.

POS (Point of Sale)

heckout system in a shop, usually connected to a store database and EFT system.

Folders

hold and organize files and other folders in your computer

folders

hold and organize files and other folders in your computer.

Smart phone

i. Does additional things from cell phones; voice services, email, text, video calls, internet, video, music, etc.

Cell phone

i. Only used for 2-way communications. ii. Works with frequencies to send signals in cells and packets.

Voluntary storage

i. Pros 1. In case of natural disasters and people's information destroyed, people can still have important records saved near-by. 2. Easily continue to store data ii. Cons 1. Anybody can go, with sufficient information, and access personal records. 2. Someone could sabotage data servers.

Data redundancy

i. Refers to in computer data storage, is a property of some disk arrays which provides fault tolerance, so that all or part of the data stored in the array can be recovered in the case of disk failure. ii. Redundancy is attained when the same data values are stored more than once in a table, or when the same values are stored in more than one table. iii. One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily.

Phishing

i. The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.

Cookie

i. are files a web site stores on each visitor's computer. ii. Stores information about activity on the site. iii. help provide personalized customer service and targeting advertising to the interests of each visitor.

primary key

in a database, it is a field that uniquely identifies each record in a table.

Microprocessor

integrated circuit semiconductor chip that performs the bulk of the processing and controls the parts of a system

microprocessor

integrated circuit semiconductor chip that performs the bulk of the processing and controls the parts of a system

soundcard

internal computer component that processes audio files in order to provide high-quality playback through computer speakers.

consumer-to-consumer (c2c)

involves the electronically facilitated transactions between consumers through some third party

online advertising

is a form of promotion that uses the Internet and World Wide Web for the expressed purpose of delivering marketing messages to attract customers.

pretexting

is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual

PNG (Portable Network Graphic)

is a lossless compressed file format meant to replace GIF as it can be used with most of the newer web browsers.

affiliate marketing

is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate's marketing efforts.

Social Networking Potential (SNP)

is a numeric coefficient, derived through algorithms to represent both the size of an individual's social network and their ability to influence that network.

GPS (Global Positioning System)

is a space-based global navigation satellite system that provides reliable location and time information in all weather and at all times and anywhere on or near the Earth

spyware

is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.

midi (musical instrument digital interface)

is an electronic musical instrument industry specification that enables a wide variety of digital musical instruments, computers and other related devices to connect and communicate with one another

Active Traffic Management

is an umbrella term of the ITS, Intelligent Transportation System, where specific implementations are made onto highways and roads with the objective of reducing and keeping the smooth flow of traffic. ATM, as it is known, only reduces the possibility of something happening on the road, such as a crash or major traffic jam; instead of actively trying to reduce traffic. Technology used to smooth traffic using ATM methods is: HOV and hard-shoulder lanes; sensors and cameras throughout the highway; lighting throughout the highways; and traveler information notices and warnings.

E-Voting

is the action of voting through an electronic source; it further helps a person exercise his or hers Constitutional right to vote through an electronic source. There are various sources to vote electronically, the most common one being Direct Recording Electronic (DRE) machines, where they would be located in public places, such as schools or libraries; where normal ballots or ways to vote is located. New ways of voting have appeared such as E-voting through the internet.

E-commerce

is the buying and selling of goods and services over the internet in a paperless exchange of business information b. Includes: purchase order, money transfers and invoices.

bit depth

is the number of bits used to indicate the color of a single pixel in a bitmapped image or video

targeting

is the process of selecting targets and matching the appropriate response to them on the basis of operational requirements, capabilities, and limitations.

magnetic stripe readers

it is a device that reads the information encoded in the magnetic stripe.

trojan horse

malware hidden on an innocent-looking program that a person willingly downloads.

spyware

malware used to spy on a person's actions

simulation

manipulation of a model, enabling the ability to perceive interactions in the model.

brand awareness

marketing concept that measures consumers' knowledge of a brand's existence

sniffers

monitoring and analyzing network traffic tectecting ottlenecks and problems

Psychological and physical considerations

nternet addiction, repetitive strain injury (RSI), ergonomics

patent

o The exclusive right, granted by the government, to make use of an invention or process for a specific period of time.

object code

o To get from source code to machine language, the programs must be transformed by a compiler. The compiler produces an intermediary form called object code.

Megahertz

one million periods per second

source code

original language of a program, usually in a language that average humans can read.

skimmers

people who rob credit card information, seeming to be normal people like waiters.

black-hat hackers

person that hacks with malicious intent

hacker

person who accesses computers or security systems without the owner's consent.

copyleft

programmers could edit and manipulate the software, must implement it to that particular software and return it to the company who developed it. It can still be re-edited, but must always return to the source.

Application Programs

programs used for a specific task, such as word processing, surfing the web, and playing games

application programs

programs used for a specific task, such as word processing, surfing the web, and playing games.

Intellectual property

property that is created using original thought.

ISP (Internet Service Provider)

provides Internet access and/or other services such as email and Web hosting

Electronic Data Interchange (EDI)

provides a means to exchange information electronically, dramatically improving how all of us do business.

encryption

putting data into a code before transmitting over the internet.

computer system

refers to the hardware and software components that run a computer.

data maintenance

refers to the procedures for adding, updating and deleting records

WYSIWYG

relating to or being a word processing system that prints the text exactly as it appears on the computer screen

WYSIWYG

relating to or being a word processing system that prints the text exactly as it appears on the computer screen (What You See Is What You Get)

DTP hardware

scanners, cameras, high quality printers, customized monitors

Electronic Points Of Sale (EPOS)

self-contained, computerized equipment that performs all tasks of a store checkout counter. It allows payments by bank or credit cards, verifies transactions, provides sales reports, coordinates inventory data, and performs several other services normally provided by employees.

phishing

sending millions of e-mail. fishing for information with which a crime could be done.

cookies

small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page, for example, the language.

System Software

software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management

Operating System (OS)

software that controls the execution of computer programs and may provide various services

malware

softwre designed specially to damage a system.

Flash memory

sometimes called "flash ram"; is solid-state memory that can be erased and reprogrammed; gets its name because the microchip is organized so that a section of memory cells are erased in a single action or "flash"

Automatic recalculation

spreadsheet capability that allow for easy correction of errors and makes it easy to try out different values while searching for solutions.

Optical storage

storage device that records data by burning microscopic holes in the surface of the disk with a laser

magnetic stripe

stores information on cards since tiny magnets can be magnetized and translated into binary numbers. The information on a magnetic strip can be read, altered or duplicated using a variety of devices that have been available for years.

dongle

strategy for protection: only allows software on one computer. A device that attaches to a computer to control access to a particular application.

expiration date

strategy of protection: software destroys itself after the expiration date placed on the software.

Local Area Network (LAN)

supplies networking capability to a group of computers in close proximity to each other.

chache

temporary storage of web pages to help reduce loading time and allow users to access previous pages much quicker.

CPU (Central Processing Unit)

the 'brain' of the computer that is classified by the amount of information it can process and by its speed

Uniform Resource Locator (URL)

the address of a web page on the world wide web

uniform resource locator

the address of a web page on the world wide web

phone phreaking

the art or science of cracking phone networks

push-pull technologies

the collection of procedures used to manage work flow in a collaborative environment.

Primary storage

the computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU

cryptography

the conversion of data into a secret code for transmission over a public network.

Data spillage

the inadvertent leakage of information through negligence or carelessness.

RAM

the most common computer memory which can be used by programs to perform necessary tasks while the computer is on

Formatting

the organization of information according to preset specifications (usually for computer processing)

formatting

the organization of information according to preset specifications (usually for computer processing)

Central Processing Unit (CPU)

the part of a computer (a microprocessor chip) that does most of the data processing

content management systems

the percentage of times a keyword or phrase appears on a web page compared to the total number of words on the page, provides tools to manage the creation, storage, editing, and publication of information in collaborative environment

end-user

the person who uses a product, i.e. the consumer, ___________represents the group of people in the organisation (and often external to it also) who will actually interact directly with the software application.

decryption

the process of converting encrypted data back into its original form.

encryption

the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge

market targeting

the selection of a particular market segment toward which all marketing effort is directed.

I-Beam

the shape the mouse pointer takes when it is positioned on text in a document

Font

the size, style, and design of text

business-to-consumer (b2c)

this type of retail consists of the sale of physical goods or merchandise from a fixed location, such as a department store, boutique or kiosk, or by mall, in small or individual lots for direct consumption by the purchaser

differences in files for print and online versions

to focus on images rather than the text

Query

to interrogate a collection of data such as records in a database.

embedded videos

to place a video within the HTML code of the page

end-user training

training so that the person intended to use the software understands how to use it

open source

typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community.

script-kiddy

unskilled, unexperimented hacker

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

Drag

use a computer mouse to move icons on the screen and select commands from a menu

identity theft

various crimes in which they use an identity of a unknown person

WYSIWYG

what you see is what you get

Online Bid

works just like a normal bid except that it is done over the internet through a computer or even over a phone, to buy something online. On Ebay.

Software

written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory


Ensembles d'études connexes

Pennsylvania Life Insurance - Premiums/Underwriting

View Set

Chapitre 14: La perception du mouvement et des événements

View Set

AP GOPO Midterm Review (McGuire)

View Set