ITGS Exam Review
Copy Protection
Doesn't allow software to be burned or copied, and if it is copied; software will not run. These types of software are activated through serial numbers.
hyperlinks
"Hot spots" or "jumps" to locate another file or page; represented by a graphic or colored and underlined text.
white-hat hacker
"ethical" hacker that helps companies know about security weaknesses.
hashtag
#wabitgs is an example. Used on Twitter to help others follow certain conversations. Users tag their comments.
stereolithography
'3D printer' that can produce actual objects from computer models.
document
(computer science) a computer file that contains text (and possibly formatting instructions) using 7-bit ASCII characters
electronic mail
(computer science) a system of world-wide electronic communication in which a computer user can compose a message at one terminal that is generated at the recipient's terminal when he logs in
printer
(computer science) an output device that prints the results of data processing
operating system
(computer science) software that controls the execution of computer programs and may provide various services
Central processing unit
(computer science) the part of a computer (a microprocessor chip) that does most of the data processing
Advantages of Simulations
-Simulation of Nuclear Meltdown:Safer
A printed paper copy of data.
...
CRT or Cathode Ray Tube monitor
...
Device that uses a projector for output and touch inputs, using a special pen.
...
High speed printer.
...
Information which is produced by a computer system.
...
LCD or Liquid Crystal Display screen
...
Output device for displaying content on large screens.
...
Output device for sound.
...
Output device which produces paper copies.
...
Output device. Older type of monitor, now almost obsolete.
...
Output device. The newer type of monitor which is flat.
...
Printer that works by spraying ink through nozzles at a sheet of paper.
...
Resolution of an LCD display that produces the best display quality.
...
Speed at which a printer produces output.
...
hard copy
...
i. The applications include: phone, satellite TV encryption, and as a credit card.
...
inkjet printer
...
interactive whiteboard
...
laser printer
...
native resolution
...
output
...
pages per minute
...
printer
...
projector
...
scanner
...
speaker
...
Gigahertz
1 billion operations per second
Advantages of Computer Aided Design (CAD) (4)
1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited
Factors that control image quality (2)
1) color depth; 2) resolution
Disadvantages of hypertext (4)
1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want, leaving them frustrated because they can't easily get from here to there; 3) documents may contain "lost" links, especially on the web, where even a popular page can disappear without a trace; 4) hardware can be hard on humans because reading a computer screen is more tiring than reading printed pages
Rules of thumb for using Powerpoint (6)
1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be "stingy" with words (bullets, summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)
Advantages and disadvantages to databases
1. Databases can be easily searched though 2. Databases are not easy to destroy as paper. They are stored. 3. Faster and easier to record and store. And not easily altered.
Opt-out
1. Defines a person to choose what kind of information he gets and how much he wants distributed. Opt-out gives a choice. 2. A 'terms of agreement' or contract would be opt-out policy.
Solutions to problems with e-voting
1. The first solution to this problem would be to have a sort of receipt or a paper that shows who voted, for who and when, so that if anything wrong happens in the voting process, the person has physical evidence that he did vote for that person or if he didn't, he could change the vote. It also wastes paper, but has a much larger purpose and would work completely well.2. Another solution for the e-voting systems, especially for DRE machines, would be to create 3 separate locations to store the vote of the person. This would be more expensive but more efficient and more hack-proof. One place to store the data would be in the smart cards that DRE machines already have, but under lock and key. Another location would be on a hack-proof server in a central location that cannot be easily penetrated, such as the state capitol. The 3rd location to save the vote and their information would be the state's mainframe for voting, where it is kept under lock and key and cannot be hacked.
Problems of E-voting
1. The main problem for e-voting is that e-voting is relatively new, and through DRE machines huge problems are presented. Through DRE machines, votes are stored onto disks or smart cards and so no paper trail is left. Some DRE machines have poor programming and have manipulated and/or destroyed voting results in the past. They are not overly safe as any hacker can rig the machine or place a card reader and even steal the entire person's personal information. Since the machines are also touch screen, some people could be inept on how to use the machines and they could also have hardware faults and failures.
Opt-in
1. Unless a person tells a company that he doesn't want any information related to him published or distributed, the company will go ahead and publish the data. A person has to make sure the company doesn't distribute his information. 2. Checkboxes to choose what services the person would like would be opt-in.
digital tv
16x9 aspect ratio with a resolution 1080i or 1080p, brings traditional tv or computers closer, more than 1/2 of american homes have HDTV
MAC adress
A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.
Media Access Control (mac) address
A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.
personal digital assistant
A PDA is a handheld device with Wi-Fi connectivity, built in web browser and personal organizer. A modern PDA also includes 3G and cellular phone functions.
templates
A basic foundation of a webpage that tells you how to create it, a format used to provide a consistent look and feel to a production; can be predefined by the software or created by the developer
byte
A byte is another word for character; generally represented by 8 bits.
Credit-Card cloning
A card reader is inserted into a card reader which duplicates information and transfers information to a new credit card.
ASCII (Unicode and American Standard Code for Information Interchange)
A character encoding scheme based on the ordering of the alphabet which helps computers understand how to represent text on the screen.
Bar Chart
A chart that shows relative values with bars, appropriate when data fall into categories.
Line Chart
A chart that shows trends or relationships over time, or a relative distribution of one variable through another.
check digit
A check digit is a form of redundancy check used for error detection, the decimal equivalent of a binary checksum. It consists of a single digit computed from the other digits in the message.
data verification
A check to ensure the data collected and stored matches and continues to match the source of data.
database
A collection of organized data that allows access, retrieval, and use of data
creating simple macros
A command that memorizes a list of simple repetetive tasks to keep the user from having to perform them over and over again.
MP4
A compressed file format that can be used for audio or video; appropriate for streaming
System Unit
A computer case that contains the CPU, power supply, memory, and storage
system unit
A computer case that contains the CPU, power supply, memory, and storage
Simulation
A computer model of a real life situation used to see how a model responds under certain conditions.
desktop computer
A computer that is intended for use at a single location. A desktop computer consists of a case that houses the main components of the computer, plus peripheral devices.
server
A computer that provides resources to other computers on a network.
Flat file
A data file that is not related to or does not contain any linkages to another file.
specialized databases
A database that is specialized for a specific type of data.
Relational file
A database that maintains a set of separate related files (tables), but combines data elements from the files for queries and reports when required.
Direct Connection
A dedicated, direct connection to the Internet through a LAN, with the computer having its own IP address
smart card reader
A device that can read a smart card used to authenticate a person onto a network.
Spam Filters
A device that catches unwanted email and filters it out before it gets delivered internally. The filtering is done based on rules that are established (block email coming from certain IP addresses, email that contains particular words in the subject line, and the like). They usually scan incoming messages but they can scan outgoing ones too... which helps to determine if there's a PC on the network with a virus
DVD/CD-RW Drive
A disk drive that combines DVD-ROM and CD-RW in a single unit
DNS (Domain Name System)
A distributed database that maps IP addresses to domain names. A _____ server, also known as a name server, keeps a list of names and their associated IP addresses.
"What if" Questions
A feature of spreadsheet software that allows speculation by providing instant answers to hypothetical question.
Drag-and-Drop
A feature that allows a user to select text using a mouse or pointing device, and quickly move (drag) it to a different location
Word Wrap
A feature that automatically advances text to the next line without pressing the Enter key
word wrap
A feature that automatically advances text to the next line without pressing the Enter key
Key field
A field in a record that holds unique data which identifies that record from all the other records in the file or database.
TTL (time to live)
A field in an IP header of a packet, indicating the length of time a packet is valid.
zipped file
A file which has been compressed with PKZIP or compatible software. Zip files are indicated by the .ZIP filename extension, and can be unpacked with PKUNZIP or UnZip.
optical fiber
A flexible optically transparent fiber, usually made of glass or plastic, through which light can be transmitted by successive internal reflections. Transmits data.
mpeg
A format for the compression of digitized videos and animations developed by the Moving Pictures Expert Group.
cell merge
A function in database software that allows multiple adjacent cells to be combined into a single larger cell.
Cell format
A function of spreadsheet software that enables users to change appearance of the contents of a cell.
mouse
A hand-operated electronic device that controls the coordinates of a cursor on your computer screen as you move it around on a pad
Internal Drives
A hard drive that is installed inside the system unit
key field (primary/secondary)
A key field is a field or set of fields of a database table which together form a unique identifier for a database record
primary key
A key field is a field or set of fields of a database table which together form a unique identifier for a database record
utility software
A kind of system software designed to help analyze, configure, optimize and maintain the computer
Automatic Link
A link between worksheets in a spreadsheet that ensures a change in one worksheet is reflected in the other.
absolute links
A link which shows the full URL of the page being linked at.
intranet
A local or restricted communications network, esp. a private network created using World Wide Web software.
Motion Picture Audio Layer (MP3)
A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
microprocessor
A microprocessor incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit,[1] (IC) or at most a few integrated circuits.
eSATA
A modern type of connector for attaching external hard disks
Quad-core
A multi-core system with four processor cores.
dual core
A multi-core system with two processor cores.
Host Name
A name that identifies a computer, printer, or other device on a network
hubs
A network device that allows devices to communicate on a network.
Pay Per Lead (PPL)
A person is referred from a site to the affiliate site, the referred person then has to sign up to something for the website to make money.
Field
A physical unit of data that is one or more bytes in size.
Pixel
A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.
avi (audio video interleaved)
A popular format for video files created by Microsoft.
Function
A predefined set of calculations such as SUM and AVERAGE, in spreadsheet software.
logic functions
A predefined spreadsheet formula that is normally used to test data for a specific condition -- for example, an IF test.
touch pad
A pressure sensitive pad that moves a pointer on the computer screen by capturing the motion of a finger or fingers across its surface.
hard copy
A printed paper copy of data.
software
A program or instructions that give directions to the computer.
file management
A program that allows you to view, rename, copy, move, and delete files and folders., the process of organizing files and folders; naming appropriately, using folders, etc.
audit trial
A record of transactions in an information system that provides verification of the activity of the system. A step-by-step record by which financial data can be traced to its source.
Range
A rectangular block of cells.
Absolute Reference
A reference in a spreadsheet to a specific cell address.
Relative Reference
A reference in a spreadsheet, in relation to a current cell.
Pie Chart
A round pie-shaped chart with slices that show the relative proportions of the parts to a whole.
protocols
A rules that describes how data is transmitted and how computers "communicate". Protocols are essential for communications among computers using different operating systems or different character code sets. Protocols may define (1) the electrical standards to be observed, (2) the orders of bits and bytes, (3) error detection, and (4) error corrections. Protocols also define data formatting, and the syntax of electronic commands and messages. Protocols may define how terminals communicate with to computers or clients with servers. Character sets and how machine command messages are sequenced.
PHP (Personal Home Page)
A server-side programing language used to create webpages.
bit
A single binary digit (a 1 or a 0). The smallest unit of storage inside a computer.
multitasking
A single processor running multiple tasks by switching rapidly between them.
widgets
A small gadget or mechanical device. An application, or a component of an interface, that enables a user to perform a function or access a service
twitter.com
A social networking and blogging service that allows users to send and read tweets (updates)
cell types
A specialized class of cells characterized by a specific appearance, location, and function.
Worksheet
A spreadsheet document that appears on the screen as a grid of numbered rows and columns.
mp3
A standard format for music files sent over the Internet that compresses music.
Musical Instrument Digital Interface (MIDI)
A standard interface that allows electronic instruments and computers to communicate with each other and work together.
protocols
A standard set of rules for performing tasks, such as communication.
http (Hyper Text Transfer Protocol)
A standard used when tranferring data between a web server & a web browser.
Self-checkout stations
A station where a person can go and perform the buying actions himself.
san (storage area network)
A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, andoptical jukeboxes, accessible to servers so that the devices appear like locally attached devices to theoperating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices
bit torrents
A system for rapidly exchanging large computer files among users; works over internet and can be used to distribute any digital content.
Digital Cash
A system that allows a person to pay for goods and services by transmitting a # from one computer to another. Each digital cash is unique established by a bank.
multiprocessing
A system with more than one processor, to increase its performance.
radio tag
A tag that can be easily affixed to the inside of an ID badge and can be read by an RFID transceiver
data compression
A technique of reducing the storage space occupied by a file.
radio frequency identification
A technology that uses radio waves to identify objects, such as goods in supply chains
Clipboard
A temporary storage area in your computer's memory where data that has been cut or copied is stored until it is pasted in a new location
blogs
A type of Internet notebook. Many people have blogs where they write about miscellaneous subjects.
UPC
A type of barcode.
UPC or Universal Product Code
A type of barcode.
Universal Product Code
A type of barcode.
date field
A type of data, used for storing dates and times in a specific format
cloud computing
A type of grid computing in which resources such as data, applications, ect are distributed across the Internet rather than confined to a single machine.
flash memory/flash drive
A type of secondary storage device that uses electronic circuits to read and store data. The advantage of this is that is has no moving parts, making it faster and less likely to be damaged if dropped. Also called flash memory. (Compare magnetic storage with optical storage and solid state storage)
solid state storage
A type of secondary storage device that uses electronic circuits to read and store data. The advantage of this is that is has no moving parts, making it faster and less likely to be damaged if dropped. Also called flash memory. (Compare magnetic storage with optical storage and solid state storage)
byte
A unit used to measure storage capacity. One ____ equals about one character.
virtual worlds and learning environments
A virtual world is a genre of online community that often takes the form of a computer-based simulated environment, through which users can interact with one another and use and create objects. The physical or virtual setting in which learning takes place.
Zombies
A virus that gives a person power over an infected computer.
warranty
A warranty is simply (1) a formal promise by a vendor that the product is defect free, meaning that it will do what it promises to do, and that if it fails to do so, (2) how the vendor will go about rectifying defects.
watermarking
A watermark stored in a data file refers to a method for ensuring data integrity which combines aspects of data hashing and digital watermarking. Both are useful for tamper detection, though each has its own advantages and disadvantages.
social networking
A way to connect and communicate to people on the Internet. many websites are made solely for metworking
Ajax
A web development technique that allows portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload.
Flickr
A website that hosts pictures and videos from registered users for others to see.
public key
A website that required secure information such as credit card details and passwords, sends this key to the user's computer. The key is then used to encrypt the information, so it is unreadable and can be sent across the internet to the website. The website then uses another key, called the private key, to decrypt the information.
Hyperlink
A word, phrase, or picture that acts as a button, enabling the user to explore the Web or a multimedia document with mouse clicks.
Data matching
AKA computer matching; means combining and comparing information from different databases, often using an identifier such as a person's social security #.
Boolean operators
AND, OR, and NOT operators used in a query.
alphanumeric
A______ is a type of data that consists of words, letters, numbers, and other symbols.
Remote access
Ability to connect to a computer, over a network, as though you were physically present at the keyboard.
speech synthesis
Accessibility feature for users with eyesight problems, reads text from the computer out loud.
Text-to-speech
Accessibility feature for users with eyesight problems.
sip and puff
Accessibility hardware for users with very limited mobility
input switches
Accessibility hardware that lets a user input data by pressing a simple on-off switch.
head wand
Accessibility hardware that lets a user input using a wand connected to their head.
high contrast mode
Accessibility setting for users with eyesight problems.
screen magnification
Accessibility setting for users with eyesight problems.
sticky keys
Accessibility setting for users with movement problems.
head control systems
Accessibility software that tracks a users head movements to allow them to input data.
eye tracking software
Accessibility software that tracks where a user is looking on the screen.
ASP
Active Server Pages
geotagging
Adding geospatial metadata (such as latitude, longitude, or altitude) to digital media.
AAC
Advanced Audio Control
Transportation
Airline reservation systems, navigation, package tracking, traffic control systems, IT systems in cars
browser functionality:
Allower users to access a list of resources based on their search terms.
VPN (Virtual Private Network)
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected
Row
Along with columns, compromise the grid of a spreadsheet.
Column
Along with rows, compromise the grid of a spreadsheet
DVD
Also called Digital Versatile Disk; full-length movies can be stored on this medium.
Automatic Toll Gates
Also known as electronic toll collection systems where RFID tag systems are used. These systems work by putting a small RFID tags on the front windshield of the car so that when a car passes through a toll gate, the person can just go through and a charge in made. The RFID tag contains an electronic connection to online banks, where when one passes through an electronic toll, the gate uses the unique tag from the RFID and sends a transaction to the bank, where the person is charged and will pay later. A person just has to mount the tag, pass through a toll gate and will be charged and will pay the bill later.
DPI (Dots Per Inch)
Also known as printer resolution. The number of dots of colour a printer is capable of producing in a certain amount of space.
central processing unit
Also known as the microprocessor; the brains of the computer.
Dvorak keyboard
Alternative keyboard layout to improve typing speed.
Dvorak keyboards
Alternative keyboard layout to improve typing speed.
forums
An Internet message board
plug-in
An additional feature added to an internet browser that is usually downloaded free from the internet.
Pay Per Sale (PPS)
An affiliate program pays a commission for a sale. The sale gets generated when someone buys something of the affiliate programs site.
chat rooms
An area in a program that allows users to "chat" or communicate by using their keyboards.
Hyperlinks
An area on a web page that, when highlighted and clicked on, will take you to another location on the web
cell padding nested table
An attribute of the tag specifying the amount of space (in pixels) between the sides of an individual cell and its contents.
Affiliate programs
An automated marketing program where a web advertiser puts banner ads or buttons on the website. The web advertiser pays a user to put the advertisement and will get commission if a user clicks on the banner
virtual private network (vpn)
An encrypted network that creates secure tunnels through the Internet or intranets.
microphone
An input device that uses vibration to create an electrical signal proportional to the vibration, which is usually an air pressure wave; usually into a computer or synthesizer.
Peripherals
An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)
peripherals
An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)
Hypertext
An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.
legacy system
An old, out of date IT system which is still used because it is essential to an organisation.
Speakers
An output device that allows you to hear voice, music, and other sounds from your computer
speakers
An output device that allows you to hear voice, music, and other sounds from your computer.
ADC/DAC
Analog-to-digital conversion and Digital-to-analog conversion are the processes that allow digital computers to interact with these everyday signals.
disk utility software
Any software that performs some specific task that is secondary to the main purpose of using the computer (the latter would be called application programs) but is not essential to the operation of the computer ( system software).
Backup Media
Any writable mass storage device, removable or fixed in place
backup media
Any writable mass storage device, removable or fixed in place.
ASP
Application Service Provider
web browsers
Application programs that enable you to explore the Web by clicking hyperlinks in Web pages stored on Web sites.
spreadsheet
Application software for performing numerical calculations and analysis.
data transfer
Application that moves data from one DataBase to another or bring data together
AJAX
Asynchronous Javascript and XML
podcast
Audio broadcast, an audio broadcast that has been converted to an MP3 file or other audio file format for playback in a digital music player or computer
AR
Augmented Reality
ATM
Automated Teller Machine
Presentation-Graphics Software
Automates the creation of visual aids for lectures, training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software, but most commonly used for creating and displaying a series of onscreen slides to serve as visual aids for presentations.
Replication
Automatic replication of values, labels, and formulas, a feature of spreadsheet software.
UPS
Backup power system which powers a computer if the mains electricity fails.
Uninterruptible Power Supply
Backup power system which powers a computer if the mains electricity fails.
Incremental backup
Backup that copies only the changed data since the last backup.
Traditional businesses
Banks, including ATM (automatic teller machines), EFT (electronic funds transfer), hotels, supermarkets, travel agencies
Biometrics
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
Color Depth
Bit depth; the number of bits devoted to each pixel.
Floating ads
Blocks screen and mouse, floats around the page.
microblog
Blog-like system which limited post length, such as Twitter.
Published and broadcast information
Books, newspapers, digital radio and TV, e-books, podcasts
BCI
Brain Computer Interface
Analyze
Break down in order to bring out the essential elements or structure.
e-commerce
Buying and selling goods and services on the Internet, especially the World Wide Web.
character
C_____ is a type of data that consists of words, letters, numbers, and other symbols.
digital video camera
Camera that saves digital video
digital video cameras
Camera that saves digital video
digital camera
Camera that saves images digitally, often in JPEG format.
digital cameras
Camera that saves images digitally, often in JPEG format.
CSS
Cascading Style Sheets
Black-hat hackers
Cause commotions, disrupt systems and steal information.
Government control and use of information
Censorship, data matching across agencies, archiving, biometric data, national identity cards
Social networking
Chat rooms, messaging, blogging, file sharing, wikis
verification
Checking whether data is correct - i.e. is the value entered in a field the actual value?
Point of Sale
Checkout system in a shop, usually connected to a store database and EFT system.
validation
Checks to ensure whether data is in the correct format.
log file
Chronological record of events, used for reporting purposes and audit trails.
data types
Classification that identifies type of data in a field (can be INT, BOOL, DOUBLE, FLOAT, TEXT, VARCHAR, BLOB, etc)
Similarities
Clicking on ad will take you to original site, irritates user, usually animated, audio and video
Modelling and simulations
Climate change, forecasting natural events or demographic changes
record
Collection of fields that represent a single entity, such as a person.
Invisible information gathering
Collection of personal information about someone without the person's knowledge.
Access to, and updating of, personal information held on government databases
Collection, storage and updating of personal data: for example, driving licence, TV licence, tax returns, passport applications and renewals, medical records, military service records, social security information, online police records
computer matching
Combining several databases to build up more information about a person or set of people.
data matching
Combining several databases to build up more information about a person or set of people.
Video ads
Commercial in page, good video and audio.
USB
Common interface for connecting peripheral devices including mice, printers, and digital cameras.
Universal Serial Bus
Common interface for connecting peripheral devices including mice, printers, and digital cameras.
web hosting
Companies who provide space on a server for clients to create their web sites & connect it to the internet.
ISP
Company that provides Internet access to homes and businesses.
Internet Service Provider
Company that provides Internet access to homes and businesses.
CAD
Computer Aided Design
CAM
Computer Aided Manufacturing
CIM
Computer Integrated Manufacturing
CTI
Computer Telephony Integration
Global Climate Model
Computer model used to predict possible future climate change.
relationship between a model and a simulation
Computer modeling cn be used to for simulation purposes
World Wide Web (www)
Computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol
LAN
Computer network in a small area such as an office building.
LAN (Local Area Network)
Computer network in a small area such as an office building.
Local Area Network
Computer network in a small area such as an office building.
MAN
Computer network over a large area such as a city.
MAN (Metropolitan Area Network)
Computer network over a large area such as a city.
Metropolitan Area Network.
Computer network over a large area such as a city.
WAN (Wide Area Network)
Computer network over a large area, such as a country or several countries.
server
Computer on a network that provides services or performs work for others.
print server
Computer on a network that receives and processes print requests.
proxy server
Computer on a network which acts on behalf of another, or through which all Internet data must pass.
Embedded systems
Computer system hidden inside another device, such as a car engine management system.
zombie
Computer which has been compromised by malware and is part of a botnet.
HTPC
Computer with multimedia capabilities designed specifically for watching television and films.
Home Theatre PC
Computer with multimedia capabilities designed specifically for watching television and films.
External Drives
Connect by USB or Firewire ports; Contained in their own case; May be compatible with more than one OS
To What Extent
Consider the merits of otherwise of an argument or concept. Opinions and conclusions should be presented clearly and supported with appropriate evidence and sound argument.
CMS
Content Management System
Macro
Custom-designed embedded procedure that automates tasks in application programs.
data verification
Data Verification is a process wherein the data is checked for accuracy and inconsistencies after data migration is done.
metadata
Data about data, such as that which describes how, when, and by whom a particular set of data was collected and formatted.
data redundancy
Data in a database which is needlessly duplicated.
redundancy
Data in a database which is needlessly duplicated.
redundant data
Data in a database which is needlessly duplicated.
data integrity
Data integrity is data that has a complete or whole structure. All characteristics of the data including business rules, rules for how pieces of data relate, dates, definitions and lineage must be correct for data to be complete.
input
Data or information that is entered into the computer.
data redundancy
Data redundancy means that some data are stored twice, or that some data can be derived from other data.
data reliability
Data redundancy means that some data are stored twice, or that some data can be derived from other data.
sensitive data
Data such as medical records which, if shared, could cause serious negative impacts on the data subject.
asynchronous
Data transfer method in which the sender and receiver are not synchronised.
personal data
Data which could identify a user, or lead to social impacts such as identity theft.
personally identifiable data
Data which could identify a user, or lead to social impacts such as identity theft.
DBMS
Database Management System
relational database
Database containing multiple related tables and no redundant data.
foreign key
Database field whose sole purpose is to form part of a relationship with another table.
parameter query
Database query whose criteria are decided by the user at run-time.
flat file database
Database which consists of just one table.
tagging
Defining a piece of information, file, image, or other type of digital media in a non-hierarchical system that helps describe what the information is
Terms
Definitions
DoS
Denial of Service
keyword density
Denotes how close to the start of an area of a page that a keyword appears
touch sensitive device
Describes a device that responds to the touch of a finger by transmitting the coordinates of a touch print to a computer.
soundwaves
Determined by amplitude, frequency and wavelength, also determined by a pitch which is how high or low the sound is.
E-waste
Development, disposal and recycling of IT equipment, monitoring organizations such as the Basel Action Network
MODEM
Device for connecting a computer to a telephone line, used in dialup connections.
microphone
Device for converting sound waves into electrical energy
bar code scanner
Device that reads the special lines of bar codes. Can be used to track documents in litigation or physical objects such as office furniture and equipment.
interactive whiteboard
Device that uses a projector for output and touch inputs, using a special pen.
Smart card readers
Device to read a smart card.
RFID tags (Radio-frequenci identification)
Devices that are able to retrieve and store data that forms an identification.
DAW
Digital Audio Worksheet
digital radio
Digital Radio allows digital audio and data to be transmitted alongside existing AM and FM analogue signals, thus allowing perfect CD quality sound and eliminating static or hiss found in analogue radio broadcasting.
DRM
Digital Rights Management
DSL
Digital Subscriber Line
digital signatures
Digital code attached to electronic document to verify sender and contents
DVD/CD-RW
Digital versatile disk, compact disk, rewritable disk
disaster recovery
Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster
Scatter Chart
Discovers a relationship between two variables.
CD-ROM
Disk that can store up to 680 MB of data; data can only be read from it.
Construct
Display information in a diagrammatic or logical form.
DDoS
Distributed Denial of Service
DNS
Domain Name System
DPI
Dots Per Inch
Use of IT in teaching and learning
Educational software, online research and forums, virtual learning environments (VLE), e-books, Web 2.0 educational networks, use of mobile devices, game-based learning, fully immersive environments, filtering and monitoring of students' internet use, 1-to-1, m-learning
navigation systems
Electronic map combined with route instructions, usually displayed on a dashboard video screen. The system communicates with a satellite to display, on the screen, the vehicle's geographic location and direction of travel.
Spreadsheet software
Enables the user to control numbers, mainpulating them in various ways. The software can manage budgeting, investment management, business speculation, an other tasks involving numbers.
Painting Software
Enables you to "paint" pixels on the screen with a pointing device.
ASCII
Encoding system to store text, where one byte is used for each character. Compare Unicode.
American Standard Code for Information Interchange
Encoding system to store text, where one byte is used for each character. Compare Unicode.
Unicode
Encoding system to store text, with support for multiple languages and alphabets. Compare ASCII.
EULA
End User License Agreement
character check
Ensuring a field contains only the specified character types.
data integrity
Ensuring data is correct, consistent, and update to date.
data validation
Ensuring that data entered into the database is valid.
data synchronisation
Exchanging data between a computer and a portable device such as a smart phone.
Formulate
Express precisely and systematically the relevant concept(s) or arguments.
mainframe
Exspepnsive, room-sized computer, used mostly used for large computing jobs.
XML
Extensible Markup Language
Face recognition software
Face recognition software recognizes faces through cameras and databases.
supercomputers
Fastest computers available, capable of performing trillions of calculations per second.
advanced functions:
Features like loopkup, pivot tables, macros, and worksheet modeling
alternative key
Field by which a database is often searched.
index
Field by which a database is often searched.
secondary key
Field by which a database is often searched.
key field
Field which contains a different value for every record in that table.
primary key
Field which contains a different value for every record in that table.
FTP
File Transfer Protocol
CSV
File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values).
Comma Separated Values
File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values).
TSV
File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.
TSV (Tab Seperated Values)
File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.
Tab Separated Values
File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.
tab-delimited text files
File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV.
Digital entertainment
Films, photographs, music, arts, online and digital games, gambling, virtual worlds
Computer security
Firewall for intrusion detection; SSL for secure transactions.
FIFO
First In First Out
Read-only memory (ROM)
Fixed memory stored on a chip in a computer that provides startup and other system instructions.
flv
Flash file that cannot be played back directly. Must be embedded in an SWF file.
Monospaced Fonts
Fonts like those in the Courier family that mimic typewriters; characters, no matter how skinny or fat, always take up the same amount of space
monospaced fonts
Fonts like those in the Courier family that mimic typewriters; characters, no matter how skinny or fat, always take up the same amount of space.
Proportionally Spaced Fonts
Fonts that enable more room for wide than for narrow characters
proportionally spaced fonts
Fonts that enable more room for wide than for narrow characters.
Social engineering
Fooling people into disclosing personal information. Hackers would pretend to be part of a company.
Government information sites
For example, travel warnings, tourist information, environmental information and warnings, government policies, city government websites
data types
Format of data in a field, such as text, number, or date.
Freeware
Freeware is software that is available for use at no cost or for an optional fee, but usually with one or more restricted usage rights.
serious games
Games designed to teach players about an issue.
GIGO
Garbage In Garbage Out
Traditional Media
Generally refers to channels of communication that were widely used prior to the computer and digital technology for communication. Types of media: newspapers, cable TV, magazines
Mapping, virtual globes
Geographic information systems (GIS), global positioning systems (GPS), cell/mobile phone tracking, online journey planning, online maps
GIS
Geographical Info System
Outline
Give a brief account or summary.
Explain
Give a detailed account including reasons or causes.
Describe
Give a detailed account.
State
Give a specific name, value or other brief answer without explanation or calculation.
Contrast
Give an account of the differences between two (or more) items or situations, referring to both (all) of them throughout.
Compare
Give an account of the similarities between two (or more) items or scenarios, referring to both (all) of them throughout.
Define
Give the precise meaning of a word, phrase, concept, or physical quantity.
Justify
Give valid reasons or evidence to support an answer or conclusion.
GPS
Global Positioning System
Medical research
Global collaboration, database for the Human Genome Project, improving patient rehabilitation
GUI
Graphical User Interface
inline graphics
Graphics images that are embedded within a text document. Inline graphics on the Web are actually HTML pages with links to graphics files stored on the Web server. The browser displays the text and images as if they were physically on the same page.
Bitmapped Graphics
Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
bitmap
Graphics that represents the digital image created using pixels. These are most common form of graphics and are used to produce digital photographs, scanned pictures & pictures found on the internet.
Web design software
HTML editors, digital image editors, animation software, digital sound software.
Phone Phreaking
Hackers committed virus pranks and manipulated the phone systems.
Hacktivism
Hackers hacking information and other things to promote political cause.
White-hat hackers
Hackers who show security companies their results and vulnerabilities.
Electronic payment systems
Handled in conjunction with the bank.
hub
Hardware device for connecting several computers on a network.
switch
Hardware device for connecting several computers on a network.
Router
Hardware device used to connect two separate networks.
full motion platform
Hardware device which can move in many directions to increase the realism of simulators.
Central Processing Unit
Hardware responsible for processing all instructions the computer runs.
microprocessor
Hardware responsible for processing all instructions the computer runs.
processor
Hardware responsible for processing all instructions the computer runs.
HDTV
High Defintion Televison
mainframe
High end computer system that achieves very high data throughput.
backbone
High speed connections that connect main Internet sites.
laser printer
High speed printer.
Distance learning over large areas
Hospitals, prisons, retirement homes, schools
HTML
HypeText Makeup Language
HTTP
HyperText Transfer Protocol. The standard protocol of the world wide web.
PHP
Hypertext Preprocessor
Homes and home network
IT management of home systems: for example, lighting, security, entertainment centres
planned obsolescence
Idea that IT equipment is designed to have a short life expectancy before failing or becoming obsolete.
Convergence
Idea that one device performs the same functions as many separate devices.
Feedback Loop
In a computer simulation the user and the computer responding to data from each other.
field
In a database, a ______ is a single characteristic of data that appears in a table as a column.
record
In a database, a ______ lists information about one person or one thing.
data type
In a database, this indicates the type of data that can be stored in a field.
table
In a databbase, a _______ is a set data arranged in rows and columns.
Label
In a spreadsheet, A TEXT entry that provides information on what a column or row represents.
absolute cell reference
In a spreadsheet, a cell reference which does not change when moved.
Adress
In a spreadsheet, the location of a cell, determined by row number and column letter. Ex. B2
optical
In computing, an optical disc drive (ODD) is a disk drive that uses laser light or electromagnetic waves near the light spectrum as part of the process of reading or writing data to or from optical discs.
table
In databases, a collection of records representing a type of item.
filtering
In functional programming, filter is a higher-order function that processes a data structure (typically a list) in some order to produce a new data structure containing exactly those elements of the original data structure
motherboard
In personal computers, a motherboard is the central printed circuit board (PCB) in many modern computers and holds many of the crucial components of the system, providing connectors for other peripherals. The motherboard is sometimes alternatively known as the mainboard, system board, or, on Apple computers, the logic board.
Open source
In production and development, open source is a philosophy, or pragmatic methodology that promotes free redistribution and access to an end product's design and implementation details.
bit rates
In telecommunications and computing, bitrate (sometimes written bit rate, data rate or as a variable R or fb) is the number of bits that are conveyed or processed per unit of time.
Personal information
Includes any information relating to, or traceable to, an individual person. Associated with a person's handle
Provision for special needs
Inclusive software, Braille keyboards, accessibility
network administrator
Individual responsible for maintaining and running a network.
future warrior
Information technology designed to improve a soldier's understanding of the battlefield around him.
wired soldiers
Information technology designed to improve a soldier's understanding of the battlefield around him.
output
Information which is produced by a computer system.
multi-touch
Input device able to recognise touches and gestures made with multiple fingers.
Touch pad
Input device commonly found on laptops instead of a mouse.
touch pad
Input device commonly found on laptops instead of a mouse.
microphone
Input device for sound data
Keyboards
Input device that lets the user enter text and numeric data.
keyboard
Input device that lets the user enter text and numeric data.
touch screen
Input device that lets the user touch areas of the display to perform tasks.
OCR
Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.
OCR or Optical Character Recognition
Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.
Optical Character Recognition
Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.
MICR
Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.
MICR or Magnetic Ink Character Recognition
Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.
Magnetic Ink Character Recognition
Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.
magnetic stripe reader
Input device that reads the magnetic stripe on cards like ATM cards and bank cards.
magnetic stripe readers
Input device that reads the magnetic stripe on cards like ATM cards and bank cards.
bar code scanners
Input device that uses a laser to read a bar code.
barcode scanner
Input device that uses a laser to read a barcode.
trackball
Input device that uses a rotating ball to control the cursor.
joystick
Input device used for games playing and flight simulators.
stylus
Input device used in conjunction with touch screens.
mouse
Input device used to control a cursor or pointer.
scanner
Input device used to digitise photographs and paper copies of data.
Webcam
Input device used to record video, often found in laptop computers.
webcam
Input device used to record video, often found in laptop computers.
game controller
Input device with buttons used for games playing.
game controllers
Input device with buttons used for games playing.
OMR
Input devices that reads simple multiple-choice style answers by looking for marks on the paper.
OMR or Optical Mark Recognition
Input devices that reads simple multiple-choice style answers by looking for marks on the paper.
Optical Mark Recognition
Input devices that reads simple multiple-choice style answers by looking for marks on the paper.
sensors
Input devices used to measure certain traits, such as sound, heat, or light.
date functions
Insert date and time into a powerpoint
IM
Instant Messenger
firewire
Interface for attaching external hard disks and digital video cameras.
IDE
Interface for attaching internal hard disks.
SATA
Interface for connecting storage devices like hard disks.
IP
Internet Protocol
ISP
Internet Service Provider
Social Media
Involves electronic technologies that link people to networks and allow the exchange of personal and professional information as well as common interests such as product and brand preferences. Any tool or service that uses the Internet to facilitate conversations
Local Area Network (LAN)
Is a network that spans a small area of computers and internet access and function. A LAN can be found in a building or an office, a house, etc. A Wide Area Network (WAN) is LANs connected over long distances using telephone lines and radio waves. A WAN network can be a school or university. A LAN network includes nodes, which are essentially single computers that can share information or functions through the local area network.
Denial Service Attack
Is an attempt to make a computer resource unavailable to its intended users. Generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely
Electronic Data Interchange (EDI)
Is the transfer of data through either networks, such as LANs and WANs, or the internet. Many companies that wish to interact with each other, such as the stock market or a broker, use special software for the data interchange.
jpeg (Joint Photographic Experts Group)
It is a compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
cookies
It is contrasted with pull, where the request for the transmission of information push technology sends information, small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie
Worm
Jams and disrupts OS of a computer through software; does not destroy information.
Soft keyboard
Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.
soft keyboard
Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.
virtual keyboard
Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.
multimedia keyboard
Keyboard with buttons to perform common tasks such as program launching.
concept keyboard
Keyboard with keys that perform programmable, customised functions.
Script Kiddies
Kids that obtain hacking programs to disrupt other programs.
Kbps
Kilobits per second. Measure of network bandwidth.
SQL
Language for managing databases by typing commands.
Structured Query Language
Language for managing databases by typing commands.
Hardware and network technologies in the classroom
Laptop computers, handheld devices, interactive whiteboards
Copyright
Law protecting intellectual property from unauthorized copying.
Creative Commons
Legal rights to a piece of work were the creator chooses what can be done to their work.
End User License Agreement
Licence agreement for software that sets out the users rights and responsibilities.
Creative Commons
Licensing system for authors who wish to distribute their work freely.
netbook
Lightweight laptop computer designed for portability.
url
Links that lead to online media, uniform resource locator; the address of a website
desktop systems
Literally, the synchronization of information between all the things mentioned by the Internet cloud, and file servers and applications.
LAN
Local area network
WiMax
Long range wireless network technology.
narrowband
Low speed network connection.
MP3
MPEG-Audio Layer III
card reader
Machine that captures the card number from the magnetic strip
Magnetic Stripe
Made up of particles of personal data: address, name, age, etc. Magnetic readers read the particles and analyze them and bring up the functions to which the card belongs to; bank, gift-card, etc.
hard disk
Magnetic secondary storage device found in most desktop and laptop computers.
Evaluate
Make an appraisal by weighing up the strengths and limitations.
Distinguish
Make clear the differences between two or more concepts or items.
compression/decompression
Making files smaller using special code schemes. Saves space on disk.
Pay Per Click (PPC)
Marketing formula; advertiser and maker get cash for each click.
MMORPG
Massively Multiplayer Online Role Playing Games
custom built (bespoke) software
May be designed in stage by stage processes, allowing nuances and possible hidden dangers to to be taken into account
uptime
Measure of how long a computer system has been operating without restarting.
Medical information, administration, marketing and sales
Medical advice, e-prescriptions, telemedicine, electronic health records, international health cards
mbps
Megabits per second. Measure of network bandwidth.
queries
Method of extracting data from a database that matches specific criteria
searching
Method of extracting data from a database that matches specific criteria
MSDOS
Microsoft Disk Operating System
An example of presentation-graphics software
Microsoft Powerpoint
Military
Military Cyberwarfare, smart weapons, espionage, battlefield technology
MIPS
Millions of Instructions Per Second. A way of measuring processor speed.
PDA
Mobile device bigger than a phone but smaller than a laptop. Probably has a keyboard or at least a stylus (pen) and a touch-screen.
Personal Digital Assistant
Mobile device bigger than a phone but smaller than a laptop. Probably has a keyboard or at least a stylus (pen) and a touch-screen.
smartphones
Mobile phone with capabilities including Internet access and a camera.
Digital policing
Monitoring organizations such as the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA)
MPEG
Moving Picture Experts Group
Interactive Multimedia
Multimedia that enables the user to take an active part in the experience.
MIDI
Musical Instrument Digital Interface
NOS
Network Operating System
SAN
Network dedicated to providing disk storage to other computers on the network.
SAN (Storage Area Network)
Network dedicated to providing disk storage to other computers on the network.
Storage Area Network
Network dedicated to providing disk storage to other computers on the network.
P2P
Network in which all computers are equal and there are no centralised servers.
P2P (Peer to Peer)
Network in which all computers are equal and there are no centralised servers.
Peer to peer
Network in which all computers are equal and there are no centralised servers.
Pop-ups
New window opens, sent behind current window, so the user has to close it manually.
NLE
Non-linear Editing
proxy server
Not to be confused with VPN. An intermediary server between a user and the Internet. It intercepts internal user requests and then processes that request on behalf of the user.
port
Number used to determine the type of service required when a computer connects to another.
Calculate
Obtain a numerical answer showing the relevant stages in the working.
Discuss
Offer a considered and balanced review that includes a range of arguments, factors or hypotheses. Opinions or conclusions should be presented clearly and supported by appropriate evidence.
product development and technical documentation
One of the final steps of the development life cycle, in which the product is developed and documented.
gigahertz (ghz)
One thousand million hertz (cycles persecond). A typical processor speed these days is between 1 and 2 GHz. See also hertz and megahertz
Political processes
Online campaigning, voting, lobbying, fund-raising and advertising.
Click and Mortar
Operates online and offline. Essence of e-commerce
OS
Operating System
CD-ROM
Optical secondary storage device capable of holding 650-700MB of data.
BluRay
Optical secondary storage device capable of storing 16GB+.
DVD
Optical secondary storage device capable of storing up to 8GB.
sorting
Ordering records based on a field (e.g. alphabetically).
projectors
Output device for displaying content on large screens.
speakers
Output device for sound.
printers
Output device which produces paper copies.
CRT monitor
Output device. Older type of monitor, now almost obsolete.
LCD screen
Output device. The newer type of monitor which is flat.
augmented reality
Overlapping layers of computer data with images of the real world.
Distributed Denials
Overloading target sites with thousands of requests and information.
Hits
Pages that contain the requested keywords
Banner ads
Payment when someone clicks on it. Highlights product.
Residual programs
Pays commission on all recurring fees
P2P
Peer to Peer
Hackers
People very knowledgeable about computers who use their knowledge to invade other people's computers
PAN
Personal Area Network
PIM
Personal Information Manager
smishing
Phishing attacks committed using text messages (SMS).
Bricks and Mortar
Physical and has only offline operations
hardware
Physical parts of a computer system.
PPI
Pixels Per Inch
Ports
Places on the outside of the computer that connect to the motherboard and allows hardware to work
Law and order
Police surveillance, terrorist monitoring, DNA data
privacy policy
Policy governing what data a company or web site will collect about you and how it will be used.
Portable Document Format
laptop
Portable computers that come in many shapes and sizes.
Hardware, software and networks
Portable digital devices and their ability to remotely control other devices, IT-enabled appliances
external hard disk
Portable storage device often used for backups.
Right-Click
Pressing the right mouse button to access special features of an application
composite key
Primary key which consists of more than one field.
primary storage
Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required.
RAM
Primary storage which is fast, relatively expensive, and volatile.
Random Access Memory
Primary storage which is fast, relatively expensive, and volatile.
ROM
Primary storage whose contents are written at manufacture and cannot be altered later.
Read Only Memory
Primary storage whose contents are written at manufacture and cannot be altered later.
inkjet printer
Printer that works by spraying ink through nozzles at a sheet of paper.
Privacy audits
Privacy audits check for leaks of information and review company's privacy policy.
fragmentation
Problem that occurs as files are saved on non-contiguous sectors on a disk.
login
Process of authenticating oneself before using a computer system.
normalization
Process of converting a database from a flat file database to a relational database.
Multi-core
Processor with more than one processor core, to increase its performance.
product design
Product design is the process of creating a new product to be sold by a business to its customers.
Sniffer
Programs which can read information on the Internet and can extract passwords.
copyright
Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work.
HTTPS (hypertext Transfer Protocol Secure)
Protocol to ensure secure communication over the Internet
Identify
Provide an answer from a number of possibilities.
Smart Shelves
RFID system where transceiver is placed near antennae in a shelf and transceiver sends data to device and real-time readings are recorded.
RFID
Radio frequency identification device; sends data through frequencies to different devices.
data throughput
Rate at which data is processed and output by a system.
read-only memory (rom)
Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware (software that is very closely tied to specific hardware, and unlikely to need frequent updates).
optical mark recognition
Reads hend-drawn marks such as small circles or rectangles
RSS
Really Simple Sindication
RSS
Really Simple Syndicate. A push technology.
School administration
Record-keeping of staff and finances, libraries, student records, EDI (electronic data interchange)
auditing
Recording database transactions made by users (e.g. all edits, reads) for security purposes.
speed throttling
Reducing a processor's clock speed to save power when not in use.
RAID
Redundant Array of Inexpensive Disks. A way of having two (or more) hard disks in a computer and having the exact same data written to each of them automatically. If one of the disks fails, the computer can switch to the other disk and continue running normally (since the second disk is an exact copy).
Viral marketing
Refers to marketing technique that uses pre-existing social networks to produce increases in brand awareness or to achieve other marketing objectives such as product sales through self-replication viral processes, analogous to the spread of pathological and computer viruses.
Read / write web
Refers to web pages which allow user interaction and collaboration.
Serial number
Registration number needed during software installation, used to reduce illegal copies.
IT issues involving ethics
Related to getting and downloading music. In some countries it might be legal but not morally or ethically right according to musicians and copyrights. In other countries it might be illegal but other ethically right; so this situation is questions all over to debate over legality and morality.
RDBMS
Relational DBMS. See Database Management System.
Satellite communication
Remote sensing devices, satellite imagery, tagging
Two-tier
Represents a compensation, or payment plan, for affiliates that sell products for affiliate companies
frequency
Represents the range of signals that are audible to the human ear
native resolution
Resolution of an LCD display that produces the best display quality.
Why be Ethical
Rule interactions with each other people and our actions that affect other people.
color depth
SAME as bit depth (refer to bit depth)
SVG
Scalable Vector Graphics
take-back scheme
Scheme operated by IT manufacturers to accept customers' old hardware for recycling at its end of life.
data entry form
Screen used to input data into a database.
forms
Screen used to input data into a database.
data mining
Searching collections of data for hidden patterns.
knowledge discovery
Searching collections of data for hidden patterns.
secondary storage
Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage.
HTTPS
Secure version of HTTP which offers encrypted communication.
disk wiping
Securing deleting files from a disk, beyond recovery.
secure deletion
Securing deleting files from a disk, beyond recovery.
Pharming
Seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming 'poisons' a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere.
probes
Sensors, probes and real time data collection transform a physical quantity into a electrical signal through waves
real time data collector
Sensors, probes and real time data collection transform a physical quantity into a electrical signal through waves
Data logging
Sensors, probes, real-time data collection
Serif Fonts
Serif fonts have small strokes at the end of the letters Sans Serif fonts do not have the decorative part of the font.
Web hosting
Servers, routers, modems.
Shill bidding
Shill bidding is the act of bidding on your own auction against other bidders in order to raise the price at which your item will eventually sell. It is a violation of both eBay rules and federal law.
SWF
Shockwave Flash
PAN
Short range network between a computer and a mobile phone or similar portable device.
PAN (Personal Area Network)
Short range network between a computer and a mobile phone or similar portable device.
Personal Area Network
Short range network between a computer and a mobile phone or similar portable device.
Bluetooth
Short range, low bandwidth wireless technology often used for mobile phone headsets or earphones.
IrDA
Short range, low bandwidth, line-of-sight wireless communication technology.
non-volatile storage
Short range, low bandwidth, line-of-sight wireless communication technology.
photocasts
Similar to a podcast but contain photos
field
Single item of data about a single record in a database.
Search engine marketing
Sites pay search engines to be placed as the first sites to be visited. Search engine directs traffic to certain sites that re either popular or pay to be noticed.
microblogs
Smaller version of blog. Users can write on microblogs when they are not home.
personal firewall
Software application that controls network access to and from a single computer.
account management
Software designed to set up accounts and keep track of money flow.
Pop-up Blockers
Software enabling users to disable pop-ups on every website. Can also be used to allow certain pop-ups to go through user's discretion.
Video Editing Software
Software for editing digital video, including titles, sound and special effects.
Concurrent license
Software licence that allows a specific number of copies to be used at one time.
Multi-user license
Software licence that allows a specific number of copies to be used at one time.
Site license
Software licence that allows an organisation to use software on an unlimited number of computers.
Single- user license
Software licence that allows the use of only a single copy on a single computer.
key logger
Software or hardware which records all key strokes on a computer system.
keystroke monitoring
Software or hardware which records all key strokes on a computer system.
browsers
Software programs loaded on personal computers and used to download and view web files.
Image Processing Software
Software that enables the user to manipulate photographs and other high-resolution images.
database management system
Software that handles the storage, retrieval, and updating of data in a computer system.
operating systems
Software that manages the computer system and controls the hardware.
Malware
Software that preforms malicious activity.
spyware
Software that tracks user activity and forwards it to a third identity (keylogging and web browsing history)
route planning
Software to plan the optimum route between two points.
fleet management
Software to track and manage fleets of vehicles, including route planning and data analysis functions.
desktop publishing
Software used mainly to produce print publications
DBMS
Software used to create, enter, edit, and retrieve data in a database.
Database Management System
Software used to create, enter, edit, and retrieve data in a database.
Commercial Software
Software which is sold for profit.
Free and open source software
Software whose source code is freely available and can be changed and distributed.
MMC
Solid state secondary storage device, often used for digital cameras.
CompactFlash
Solid state storage device usually used in digital cameras.
Braille keyboard
Special keyboard designed for users with eyesight problems.
Kensington lock
Special lock for securing portable devices to immovable objects to prevent theft.
Braille printer
Special printer that can produce Braille text.
Electronic Article Surveillance
Special tags are fixed to merchandise or books. These tags are removed or deactivated by the clerks when the item is properly bought or checked out
pages per minute
Speed at which a printer produces output.
clock speed
Speed of a processor, in ticks per second.
Stack Chart
Stacked bars to show how proportions of a whole change over time.
RTF
Standard file format that can store documents that include formatting data.
Rich Text Format
Standard file format that can store documents that include formatting data.
Internet Protocol
Standard protocol used on many LANs and on the Internet. See TCP.
wizard
Step by step help system to guide a user through a task.
Formula
Step-by-step procedure for calculating a number in a spreadsheet. Ex. =(B2)*(B3)
cache
Storage area for frequently used information, to speed up access.
optical storage
Storage devices which use lasers to store and read data. Examples include CDs and DVDs.
Secondary storage
Storage systems which are connected externally to the computer's motherboard.
Primary storage
Storage systems which are found inside the computer and are electronic. RAM and ROM are examples.
KB
Storage unit: 1024 bytes
Kilobyte
Storage unit: 1024 bytes
ZB
Storage unit: 1024 exabytes
zettabyte
Storage unit: 1024 exabytes
TB
Storage unit: 1024 gigabytes
Terabyte
Storage unit: 1024 gigabytes
MB
Storage unit: 1024 kilobytes
Megabyte
Storage unit: 1024 kilobytes
GB
Storage unit: 1024 megabytes.
Gigabyte
Storage unit: 1024 megabytes.
EB
Storage unit: 1024 petabytes.
exabyte
Storage unit: 1024 petabytes.
PB
Storage unit: 1024 terabytes
Petabyte
Storage unit: 1024 terabytes
YB
Storage unit: 1024 zettabyes
yottabyte
Storage unit: 1024 zettabyes
byte
Storage unit: 8 bits. Enough to store a single ASCII text character.
non-volatile storage
Storage which does not lose its contents when the power is removed.
volatile storage
Storage which loses its contents when the power is removed.
solid state storage
Storage, such as flash memory, with no moving parts. Solid-state storage is likely to replace disk storage in the future.
Drawing Software
Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.
Standards and protocols
Strand 1: Technical rules and conventions that enable compatibility and therefore facilitate communication between different IT systems and their components.
Privacy and anonymity
Strand 1: ability of people to determine for themselves when, how, and to what extent information is shared with others. At an extreme a person uses "it" to conceal their true identity.
Digital Citizenship
Strand 1: can be defined as appropriate behavior that represents the responsible, ethical and legal approach that individuals take in any situation with respect to the use of IT.
Policies
Strand 1: enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies.
Authenticity
Strand 1: establishing a user's identity beyond reasonable doubt. (user login)
People and machines
Strand 1: fear of people that future systems will be programmed to make decisions that would be better taken by humans.
Intellectual Property
Strand 1: includes ideas, discoveries, writings, works of art, software, collections, and presentations of data
Integrity
Strand 1: refers to safeguarding the accuracy and completeness of stored data.
Reliability
Strand 1: refers to the operation of hardware, design of the software, accuracy of data or correspondence of data with the real world.
Security
Strand 1: refers to the protection of hardware, software, machines and networks from unauthorized access.
Globalization and Cultural Diversity
Strand 1: the diminishing importance of geographical, political, economic, and cultural boundaries.
Digital Divide and Equality of Access
Strand 1: the growth of the use of IT systems has led to disparities in the use of, and access to , information technologies.
Surveillance
Strand 1: the use of IT to monitor the actions of people.
Health
Strand 2: Medical research, information, administration, marketing and sales
Business and employment
Strand 2: coverage should address the IT systems that exist as well as the ethical issues and social impacts that arise from the increased use of IT for employers and employees
Education and Training
Strand 2: distance learning over large areas; use of IT in teaching and learning; hardware and network technologies in the classroom; provision for special needs; school administration
Home and leisure
Strand 2: homes and home network; digital entertainment; social networking; published and broadcast information; digital policing; hardware, software and networks
Environment
Strand 2: modeling and simulations; data logging; satellite communication; mapping, virtual globes; E-waste; Resource depletion
Politics and government
Strand 2: political processes; government information sites; access to, and updating of, personal information, held on government databases; government control and use of information; law and order; military
Introduction to project management
Strand 3: All IT development requires a management method.
Personal and Public Communications
Strand 3: Developments in technology have allowed an increasing number of mobile devices to be developed that enable people to communicate anytime, anyplace, and anywhere.
Spreadsheets, modeling and simulations
Strand 3: The increasing capabilities of computers have allowed individuals and organizations to develop software that can be used to test "what-if" scenarios and create simulations and models of real-world events.
Internet
Strand 3: World Wide Web, web-based languages, social networking, web databases
Networks
Strand 3: a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information.
Hardware
Strand 3: deals with a computer system consisting of input devices, output devices, a central processing unit and storage.
Software
Strand 3: deals with the programs associated with a typical computer system.
Multimedia/Digital media
Strand 3: involves the use and integration of media to create digital products that are available online or offline.
Databases
Strand 3: lies at the heart of most IT systems whether in businesses, organizations or other institutions.
magnetic stripe
Strips of magnetic tape, which are usually, found on the back of plastic credit and debit cards. The strip usually holds information concerning Customers name and Account number
SQL
Structured Query Langauge
Ethics
Study and Evaluation of human conduct in the light of moral principles
Diagnostic and therapeutic tools
Surgery, prosthetic devices, diagnostic technology, rehabilitation, patient monitoring, individualized IT solutions for disabled people, accessibility
FTP (File Transfer Protocol)
System for transferring files over the Internet, often used for uploading web sites.
DNS ( Domain Name System)
System for translating domain names into IP addresses.
opt-out
System in which users must explicitly decide not to participate.
opt-in
System in which users must explicitly decide to participate.
follow-the-sun working
System of moving work to different offices around the globe as the day progresses, ending work in each location as the end of the day approaches, and moving it to a new office elsewhere where the day is just beginning.
GPS
System of satellites which can pinpoint a users location on the Earth.
Global Positioning System
System of satellites which can pinpoint a users location on the Earth.
RFID
System of tags which contain data that can be read from a distance using radio waves.
Radio Frequency Identification
System of tags which contain data that can be read from a distance using radio waves.
VoIP
System that lets users make telephone calls over the Internet.
Voice over Internet Protocol
System that lets users make telephone calls over the Internet.
command line interface
System the user controls by typing in commands.
paywall
System to prevent access to a web site's content unless the user pays a subscription fee.
TLS (Transport Layer Security)
System used to encrypt https web traffic.
Redundant Array of Inexpensive Disks
System where multiple hard disks contain duplicate data, to be used in the event of one failing.
push technology
System which notifies users of changes to web pages without them having to visit the page.
Redundant system
System which will take over the role of a primary system if it fails.
failover system
System which will take over the role of a primary system if it fails.
safety critical system
System whose failure could result in injury or loss of life.
text
T___ is a type of data that consists of words, letters, numbers, and other symbols.
Electronic Article Surveillance
Tag-and-alarm system. A product needs to be untagged by the system's computer so that the alarm doesn't go off.
radio tag
Tags which broadcast their position over a large distance using radio waves.
pharming
Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.
Virtual Reality (VR)
Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.
RAM (Random Access Memory)
Temporary memory that resides on the motherboard.
plain text
Text file which contains no formatting data
Business Software Alliance (BSA)
The Business Software Alliance (BSA) is a trade group established in 1988 and representing a number of the world's largest software makers and is a member of the International Intellectual Property Alliance. Its principal activity is trying to stop copyright infringement of software produced by its members.
swf
The Flash (Shockwave) format was developed by Macromedia. The Shockwave format requires an extra component to play which comes preinstalled with web browsers like Firefox and Internet Explorer.
mov
The QuickTime format is developed by Apple. QuickTime is a common format on the Internet, but QuickTime movies cannot be played on a Windows computer without an extra (free) component installed.
accessing
The ability to access information, whether on the cloud or on the PC.
URL (uniform resource locator)
The address of a website
What is computer ethics
The analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology
HTML (HyperText Markup Language)
The authoring language used to create documents on the World Wide Web. _____ defines the structure and layout of a Web document by using a variety of tags and attributes.
M-commerce
The buying and selling of goods and services through a wireless, handheld device. Many sites have 'mobile' sites where it is the normal site but compressed for easier access through a phone.
Motherboard
The circuit board to which the internal computer components connect: the CPU, the RAM, the ROM, and the secondary storage devices
clock speed:
The clock rate typically refers to the frequency that a CPU is running at. It uses the SI unit Hertz.
Hypermedia
The combination of text, numbers, graphics, animation, sound effects, music and other media in a hyperlinked document.
Resolution
The density of pixels, measured by the number of dots per inch.
Validators
The equivalent of spelling and grammar checkers for calculations that helps users check complex worksheets for CONSISTENCY OF ENTRIES AND FORMULA LOGIC.
copyright
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
presentation formats
The format of a business plan depends on its presentation context. It is not uncommon for businesses, especially start-ups to have three or four formats for the same business plan:
software
The instructions and programs which are run by the CPU.
Cell
The intersection of a raw and a column on the grid of a spreadsheet. (the thing you write in)
motherboard
The main circuit board of a microcomputer. The motherboard contains the connectors for attaching additional boards.
Point Size
The measurement, or size of a font (text); each point is approximately 1/72 of an inch
point size
The measurement, or size of a font (text); each point is approximately 1/72 of an inch
Emergency Power Off (EPO)
The mechanism is a simple button that is used in data centers where massive amounts of data is stored on servers, and the switch is flipped in case of huge emergencies, such as potential danger to a person, or the servers will be damaged or the building in which the servers are in will be damaged. The EPO will erase some data due to the fact that the EPO is not meant to be regularly used.
packets
The method for data being sent over the Internet. Data is broken into smaller digital packets. The packet consisting of header, data, and trailer.
Microsoft Windows
The most common operating system for IBM and IBM-compatible PCs
relational database
The most common standard for databases, whereby tables (files) are related based on common keys.
Facebook.com
The most popular social networking Web site with over 100 million active users. Users create personal "profiles"to represent themselves, listing interests and posting photos and communicating withothers through private or public messages.
HTML5
The newest version of HTML under development is ___ and is designed to replace the current versions of HTML and XHTML. It is a language for structuring and presenting content for the World Wide Web. This new technology allows video, app and Cloud services.
Clock speed
The number of operations that the CPU can carry out in 1 second
sample rate
The number of samples of a sound that are taken per second to represent the event digitally.
Value
The numbers that are the raw material used by spreadsheet software to perform calculations.
Peer-to-Peer File Sharing (P2P)
The online sharing of music or other computer files directly among individual computer users' hard drives, rather than through posting the files on central servers.
Mac OS
The operating system for the Apple Macintosh computer
central processing unit
The part of a computer in which operations are controlled and executed
optical character recognition
The process by which a scanned image is electronically "read" to convert it into text so it can be edited in a word processing program.
sampling
The process of converting analog data into digital computer data.
linking tables to a relational database
The process of having two or more tables in a database rely on other tables. For example, customer names and Ids are stored in one table while products purchased are stored in another table. Both tables are linked by customerID.
File Compression
The process of reducing the size of a file so that you can fit more files into the same amount of disk space
file compression
The process of reducing the size of a file so that you can fit more files into the same amount of disk space.
File Decompression
The process of restoring a compressed file back to its original state
file decompression
The process of restoring a compressed file back to its original state.
Animation
The process of simulation motion with a series of still pictures.
DTP
The process of using the computer and specific types of software to combine text and graphics to produce documents such as newsletters, brochures, books, etc.
TCP/IP (Transmission Control Protocol/Internet Protocol.)
The protocol (set of rules) that lets information travel across the internet.
Public domain
The public domain refers to works whose intellectual property rights have expired, been forfeited, or are inapplicable.
Data mining
The searching and analyzing masses of data to find patterns and develop new information or knowledge.
packet loss
The situation in which data bits are lost in transit, requiring them to be resent which significantly increases the time required for an intact message to arrive at its destination. With a firewall, packets with IP destinations that are blocked, are not passed on resulting in packet loss.
packet switching
The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination, where they are reunited.
Vector Graphics
The storage of pictures as collections of lines, shapes and other objects.
Shareware
The term shareware is proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.
bytes
The unit of data storage in computers. A byte is usually considered to be the code for a single character (see ASCII). A byte is 8 bits long. The English alphabet has 52 characters (upper and lower case) and computers commonly also use punctuation marks and a few special characters such as the full stop (.), exclamation mark (!), slashes (/ and \), equals sign (=), tilde (~), ampersand (&), currency symbols (?, £, $), percent mark (%), asterisk (*), plus sign (+) and carriage return. Including punctuation marks and special characters, we need approximately 100 unique codes. Each bit can exist in only two states, 0 or 1. Thus, a 6-bit word can define only 64 characters (26), a 7-bit word can define 128 (27) characters, and an 8-bit word can define 256 characters. If one bit is used to check the integrity of the entire byte, then we need at least an 8-bit byte (or "word") for common computer uses.
Augmented Reality
The use of computer displays that add virtual information to a person's sensory perceptions, supplementing rather than replacing (as in virtual reality) the world the user sees.
Modeling
The use of computers to create abstract models of objects, organisms, organizations, and processes.
Computer Aided Design (CAD)
The use of computers to draw products or process designs on the screen.
Dataveillance
The use of myriad personal-data systems to investigate or monitor people
keyword prominance
The way sites are categorized in terms of most useful and most popular among Internet users.
Reasons why being ethical is practical
There are virtues, morals and ideas that benefit everyone, although sometimes obeying the law is not ethical but there have been so many opportunities and events that change the way of thinking; therefore establishing practicality as acting ethically
domain name
These are part of the URL. It includes a suffix such as .org, .edu, .com, etc. The suffix indicates the type of organization or business.
pixel (picture element)
These small little dots are what make up the images on computer displays. The screen is divided up into a matrix of thousands or even millions of ______.
VPN (Virtual Private Network)
This creates a tunnel over the Internet and encrypts a message.
yottabyte (yb)
This is 2^80 bytes, or 1024 zettabytes.
http (hypertext transfer protocol)
This is a set of rules computers use to transfer web pages across the Internet.
Double-Click
This mouse term refers to tapping the left mouse button twice in quick succession
platform
This refers to the hardware and/or operating system that a IT system may be run on (Mac, Windows).
flat-file database
This type of database stores all of its information in one table. While this type of database is still used to store smaller amounts of information, it is not a good solution for larger information stores.
digitize
To convert data from analog to digital form.
Copy
To copy something, such as text, data, pictures, etc.
Cut
To cut something
Paste
To paste something that was copied
Sort
To record data into a new sequence.
Databases
To store costumer records, financial information.
Trans-border data flow
Transfer of data between countries.
TCP/IP
Transmission Control Protocol/Internet Protocol
rootkit
Type of malware which infiltrates the operating system and attempts to hide itself from view
magnetic storage
Type of secondary storage that users magnets to read and store data. Examples include floppy disks and hard disks.
serif fonts
Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes.
Sans-Serif Fonts
Typeface fonts in which the characters have plain and clean lines rather than embellishments at the ends of the main strokes
fibre optic
Types of network connection that offers extremely high speed transfers.
desktop computer
Typical computer system with a separate screen and system unit.
Data Protection Act
UK law that governs the collection and use of personal data.
Crackers
Ultra-professional hackers. Did all types of damage to current computers.
URL
Uniform Resource Locator
IP address
Unique address assigned to every computer on a network.
MAC address
Unique address embedded in network connected devices.
hardware address
Unique address embedded in network connected devices.
User Name
Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user
user name
Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
MHz
Unit of measurement for a processor's clock speed.
megahertz
Unit of measurement for a processor's clock speed.
THz
Unit of measurement for a processor's clock speed. 1000 GHz.
terahertz
Unit of measurement for a processor's clock speed. 1000 GHz.
GHz
Unit of measurement for a processor's clock speed. 1000 MHz.
gigahertz
Unit of measurement for a processor's clock speed. 1000 MHz.
Resource depletion
Use of non-renewable resources for manufacturing components, electrical consumption of IT systems
Secondary use
Use of personal information for a purpose other than the one for which it was supplied for.
voice recognition
Use of software to convert spoken words into text.
voice control
Use of spoken commands to control a computer.
digital video camera
Used to record a video and then transfer it to the computer
lookup
Using a list of values to limit what can be entered into a field. For example, for the 'Gender' field, the values are limited to 'male' and 'female'.
secondary use
Using data for a purpose other than the one for which it was collected.
Multimedia
Using some combination of text, graphics, animation, video, music, voice and sound effects to communicate.
consistency check
Validation check in which two fields' values are mutually dependent.
range check
Validation technique. Ensures a field is between a certain range of values.
input mask
Validation technique. Ensures only the specified characters can be entered into a field.
field size
Validation technique. Number of characters that can be stored in a field.
length check
Validation technique. Number of characters that can be stored in a field.
presence check
Validation technique. Requires a field to be completed.
data warehouses
Vast databases containing many gigabytes of data.
Side bars
Vertical, bigger and cannot be scrolled off. Gets more clicks.
YouTube.com
Video Sharing site where users can upload, share, download, and view others videos. Launched in Feb. 2005. Purchased by Google for $1.65 Billion. Used by Amateur Video graphers.
Morph
Video clip in which one image metamorphoses into another.
Digital Video
Video reduced to a series of numbers (0 and 1), which can be edited, stored, and played back without loss of quality.
Video surveillance
Video surveillance systems are used by people and government to visually monitor people.
VPN
Virtual Private Network
VoIP
Voice Over Internet Telephony
check digit
Way of checking mathematically if a item of data has been correctly entered.
Portals
Web pages that users launch when they first log on to the Web
online encyclopaedias
Web site containing a large number of articles for research purposes.
social network
Web site that lets users create personal profile pages and share them with friends.
social bookmarking
Web site that lets users store and manage their favourite links, and share them with others.
amplitude
When a current waveform reaches its maximum absolute value
deleting records
When a user deletes a row from a table in a database
report generation
When both simple and complex reports can be produced just by identifying what items and the appearance then the software capable of this task is often called a report generator.
Identity Theft
When hackers or stalkers or whoever, manages to steal personal information from a person and completely become that person in every way; according to the data.
Identity Theft
When someone uses your name, Social Security number, credit card number, and other personal information without your permission
Inbox
Where incoming e-mail messages are stored and retreived
Random-access memory (RAM)
Where instructions and data are stored on a temporary basis. This memory is volatile.
WAN
Wide area network
WMA
Windows Media Audio
WAP
Wireless Access Point
Blue tooth
Wireless network technology, designed for short-range; mobile phone and headset, PDA an
DTP software
Word processors (word, ppt), image editing (photoshop), illustration software
Online businesses (e-commerce)
Working practices such as teleworking and home working
Blink Card
Works with the RFID systems and is read from a distance, hands free and works like a credit-card where it also contains embedded particles.
WWW
World Wide Web
free software
Written in programmer code. Charges little or nothing at all for software.
authenticity
_______ is whether or not the source is actually what it seems to be. The state or quality of being genuine, or of the origin and authorship claimed. For example, with photo-journalism, Is a photo ________ or has it been tampered with?
data-driven websites:
a Web site that that can display dynamic, changeble content wihtout having constantly redesigned pages, due to a database that separates the site's content from its design. Ex: Amazon.com
digital camera
a camera that encodes an image digitally and store it for later reproduction
credit cards
a card issued by a financial company giving the user an option to borrow funds.
motherboard
a circuit board that contains all of the computer system's main components.
Web Site
a computer connected to the internet that maintains a series of web pages on the World Wide Web
web site
a computer connected to the internet that maintains a series of web pages on the World Wide Web
Document
a computer file that contains text (and possibly formatting instructions) using 7-bit ASCII characters
Internet
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
internet
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
Search Engine
a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)
search engine
a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)
applications
a computer program used to do a specific kind of work
computer model
a computer-generated simulation based on mathematical subjects with important social impact
Secondary storage
a data storage device that is not the main memory of a computer.
composite device
a device that combines multiple interfaces (like buttons and joysticks) which can be controlled independently of each other
router
a device that forwards data packets between computer networks
webcam
a digital camera designed to take digital photographs and transmit them over the internet
Find-and-Replace
a feature that scans a document, searches for occurrences of specific text, symbols or formatting, and allows a user to replace it with new text, symbols or formatting
banners
a form of advertising on the World Wide Web delivered by an ad server. This form of online advertising entails embedding an advertisement into a web page
algorithm
a formula or set of steps for solving a particular problem
Icon
a graphic symbol (usually a simple picture) that denotes a program or a command or a data file or a concept in a graphical user interface
Mouse
a hand-operated electronic device that controls the coordinates of a cursor on your computer screen as you move it around on a pad
Directory/Subject Tree
a hierarchical catalog of web sites compiled by researchers
binary
a language the computer understands. A number system that has two unique values: 0 and 1.
personal digital assistant
a lightweight consumer electronic device that looks like a hand-held computer but instead performs specific tasks
secure transactions
a loan or a credit transaction in which the lender acquires a security interest in collateral owned by the borrower and is entitled to foreclose on or repossess the collateral in the event of the borrower's default
hard disk
a magnetic medium used to store electronic data that can be read by a computer
Asynchronous Transfer Mode (ATM)
a network technology based on transferring data in cells or packets of a fixed size.
wifi
a network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
Monitor
a piece of electronic equipment that keeps track of the operation of a system continuously and warns of trouble
monitor
a piece of electronic equipment that keeps track of the operation of a system continuously and warns of trouble
laptop
a portable computer small enough to use in your lap
Removable Media
a portable device allowing for the storage of computer data
USB (universal serial bus) flash drive
a portable storage device that stores data in flash memory and connects to a computer through a USB port. Also called thumb drives or jump drives
pop-up blocker
a program that prevents pop-ups from displaying in a user's Web browser
ftp (file transfer protocol)
a protocol used for copying a file from one computer to another through the internet.
Hard Disk
a rigid magnetic disk mounted permanently in a drive unit
Backup Copy
a second copy of the same data in case the primary copy is destroyed is called
backup copy
a second copy of the same data in case the primary copy is destroyed is called
byte
a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single unit of information
file
a set of related records (either written or electronic) kept together
javascript
a simple code that can be included in a Web page to allow an action to occur
model
a simplified representation of a system at some particular point in time or space intended to promote understanding of a real system
personal computer
a small digital computer based on a microprocessor and designed to be used by one person at a time
Virus
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
virus
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
Typeface
a specific size and style of type within a type family
font
a specific size and style of type within a type family
typeface
a specific size and style of type within a type family
Optical Drive
a storage device that stores files using removable disks that reads and writes using a laser
optical drive
a storage device that stores files using removable disks that reads and writes using a laser
Extension
a string of characters beginning with a period and followed by one to three letters
smart shelves
a system of shelves or other container, that constantly keeps track of the individual items it contains
Electronic Mail
a system of world-wide electronic communication in which a computer user can compose a message at one terminal that is generated at the recipient's terminal when he logs in
clipboard
a temporary storage area for items that are cut or copied
terabyte
a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024 gigabytes
gigabyte
a unit of information equal to one billion (1,073,741,824) bytes or 1024 megabytes
megabyte
a unit of information equal to one million (1,048,576) bytes
kilobyte
a unit of information equal to one thousand (1024) bytes
bit
a unit of measurement of information (from Binary + digIT)
Terahertz
a unit of measurement that is equal to 1,000,000,000 cycles per second
graphical user interface (gui)
a user interface based on graphical displays with a mouse, the user points to icons that represent files, folder, & disks, documents are displayed in windows, the user selects commands from the menus
ATMs (steps)
a. Card reader reads a card. b. Person enters PIN (or unique #) to access account from any place in the world. c. Person selects how much cash to withdraw, deposit or consult. d. Whichever action, the person receives receipt and the credit card.
Smart Cards
a. Has an integrated circuit microprocessor chip; better because of security and is read from afar and has a longer life.
smart card readers
about the shape, it's the same of a credit card, but inside it's different. Inside it contains a microprocessor that is used to do operations that need data that is placed in the microprocessor.
social engineering
act of manipulating people into performing actions or divulging confidential infromation
pharming
act of planting fake internet adresses in the tables of a DNS, makig innocent people enter fake bank accounts, enabling crimes.
viral marketing
advertising and/or marketing technique that spreads like a virus by getting passed on from consumer to consumer and market to market.
cracker
aka hacker
Remote Access
allows users to connect to an intranet from a distant location
Button
an electrical switch operated by pressing a button
display
an electronic device that represents information in visual form
Memory
an electronic memory device
memory
an electronic memory device
grayscale
an image in which the value of each pixel is a single sample, that is, it carries only intensity information. Images of this sort, also known as black-and-white, are composed exclusively of shades of gray, varying from black at the weakest intensity to white at the strongest.
blink card
an innovation designed to make cashless consumer purchases faster, while boosting sales for retailers. Instead of traditional credit card processing involving a swipe of a card, all that's required is a quick wave of a card near a check stand reader to complete the transaction.
Keyboard
an input device that enters data with letters, numbers, symbols, and special function keys
keyboard
an input device that enters data with letters, numbers, symbols, and special function keys.
anonymizer
an intermediary which prevents websites from seeing a user's Internet Protocol (IP) address.
projector
an optical instrument that projects an enlarged image onto a screen
Printer
an output device that prints the results of data processing
sensor
any device that receives a signal or stimulus (as heat or pressure or light or motion etc.) and responds to it in a distinctive manner
Magnetic storage
any storage medium in which different patterns of magnetization are used to represent stored bits or bytes of information
Personal Computer
are computes typically used by a single user , for use in the home or office for general computing tasks such as word processing, working with photographs or graphics, email, and internet access.
DDOS(Distributed Denial of Service attack)
attack of a network that floods it with useless traffick, forcing it to shutdown and deny the service to its legitimate users.
Universal product Code (UPC)
barcode symbology, widely used in Canada and the United States for tracking trade items in stores.
E-Government
basically all the functions that government provides on paper, such as: passport deliveries, visa issues, credit-debt, etc. E-Government functions also have online representatives; download government information, like Social Security number. E-Government also uses technology in order to carry out the online functions such as biometrics and tracking systems.
biometrics
biological characteristics that are unique (fingerprints, face structure, eyes)
Advantages and disavdvantages of e-commerce
c. Pros i. Budget increases. ii. Specialized searches. iii. Increases speed and efficiency.
location tracking
can help find people in an emergency, but it can also make your location known to strangers
Selects
chooses
File
collection of stored electronic data, such as text, pictures, video, and music
Internet Service Provider (ISP)
company that provides individuals and other companies access to the Internet along with additional related services, such as website building
World Wide Web
computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol
electronic funds transfer (EFT)
computer-based systems used to perform financial transactions electronically.
Click
depression of a button on a computer mouse
business-to-business (b2b)
describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.
requirements specification
detailed functional and non-functional requirements for acomplishing a task.
design guidelines for creating multimedia/digital media
devices and techniques associated with good design.
sans-serif fonts
do not have tails and are commonly used in headlines
Web Pages
document of the world wide web that can include text, pictures, sound, and video
web pages
document of the world wide web that can include text, pictures, sound, and video
teleworking (telecommuting?)
employment at home while communicating with the workplace by phone or fax or modem
Data Files
files created by information input by users through a software- application program
Executable Files
files, such as applications, that contain instructions that can be executed from the computer
vishing
fishing for personal information through the telephone
fraud alert
flag on credit card report that tellls credit bureau to call and confirm the opening of an account.
pop-ups
form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses
generic techniques
generalizing software components so that they can be easily reused in a wide variety of situations
avatar
graphical bodies used to represent a person in a virtual meeting place
hackivism
hacking for a political cause
smart card
have input and output operations (such as computers) can hold more information, are more secure since they have a chip which encrypts the information, are used for many applications.
POS (Point of Sale)
heckout system in a shop, usually connected to a store database and EFT system.
Folders
hold and organize files and other folders in your computer
folders
hold and organize files and other folders in your computer.
Smart phone
i. Does additional things from cell phones; voice services, email, text, video calls, internet, video, music, etc.
Cell phone
i. Only used for 2-way communications. ii. Works with frequencies to send signals in cells and packets.
Voluntary storage
i. Pros 1. In case of natural disasters and people's information destroyed, people can still have important records saved near-by. 2. Easily continue to store data ii. Cons 1. Anybody can go, with sufficient information, and access personal records. 2. Someone could sabotage data servers.
Data redundancy
i. Refers to in computer data storage, is a property of some disk arrays which provides fault tolerance, so that all or part of the data stored in the array can be recovered in the case of disk failure. ii. Redundancy is attained when the same data values are stored more than once in a table, or when the same values are stored in more than one table. iii. One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily.
Phishing
i. The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.
Cookie
i. are files a web site stores on each visitor's computer. ii. Stores information about activity on the site. iii. help provide personalized customer service and targeting advertising to the interests of each visitor.
primary key
in a database, it is a field that uniquely identifies each record in a table.
Microprocessor
integrated circuit semiconductor chip that performs the bulk of the processing and controls the parts of a system
microprocessor
integrated circuit semiconductor chip that performs the bulk of the processing and controls the parts of a system
soundcard
internal computer component that processes audio files in order to provide high-quality playback through computer speakers.
consumer-to-consumer (c2c)
involves the electronically facilitated transactions between consumers through some third party
online advertising
is a form of promotion that uses the Internet and World Wide Web for the expressed purpose of delivering marketing messages to attract customers.
pretexting
is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual
PNG (Portable Network Graphic)
is a lossless compressed file format meant to replace GIF as it can be used with most of the newer web browsers.
affiliate marketing
is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate's marketing efforts.
Social Networking Potential (SNP)
is a numeric coefficient, derived through algorithms to represent both the size of an individual's social network and their ability to influence that network.
GPS (Global Positioning System)
is a space-based global navigation satellite system that provides reliable location and time information in all weather and at all times and anywhere on or near the Earth
spyware
is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.
midi (musical instrument digital interface)
is an electronic musical instrument industry specification that enables a wide variety of digital musical instruments, computers and other related devices to connect and communicate with one another
Active Traffic Management
is an umbrella term of the ITS, Intelligent Transportation System, where specific implementations are made onto highways and roads with the objective of reducing and keeping the smooth flow of traffic. ATM, as it is known, only reduces the possibility of something happening on the road, such as a crash or major traffic jam; instead of actively trying to reduce traffic. Technology used to smooth traffic using ATM methods is: HOV and hard-shoulder lanes; sensors and cameras throughout the highway; lighting throughout the highways; and traveler information notices and warnings.
E-Voting
is the action of voting through an electronic source; it further helps a person exercise his or hers Constitutional right to vote through an electronic source. There are various sources to vote electronically, the most common one being Direct Recording Electronic (DRE) machines, where they would be located in public places, such as schools or libraries; where normal ballots or ways to vote is located. New ways of voting have appeared such as E-voting through the internet.
E-commerce
is the buying and selling of goods and services over the internet in a paperless exchange of business information b. Includes: purchase order, money transfers and invoices.
bit depth
is the number of bits used to indicate the color of a single pixel in a bitmapped image or video
targeting
is the process of selecting targets and matching the appropriate response to them on the basis of operational requirements, capabilities, and limitations.
magnetic stripe readers
it is a device that reads the information encoded in the magnetic stripe.
trojan horse
malware hidden on an innocent-looking program that a person willingly downloads.
spyware
malware used to spy on a person's actions
simulation
manipulation of a model, enabling the ability to perceive interactions in the model.
brand awareness
marketing concept that measures consumers' knowledge of a brand's existence
sniffers
monitoring and analyzing network traffic tectecting ottlenecks and problems
Psychological and physical considerations
nternet addiction, repetitive strain injury (RSI), ergonomics
patent
o The exclusive right, granted by the government, to make use of an invention or process for a specific period of time.
object code
o To get from source code to machine language, the programs must be transformed by a compiler. The compiler produces an intermediary form called object code.
Megahertz
one million periods per second
source code
original language of a program, usually in a language that average humans can read.
skimmers
people who rob credit card information, seeming to be normal people like waiters.
black-hat hackers
person that hacks with malicious intent
hacker
person who accesses computers or security systems without the owner's consent.
copyleft
programmers could edit and manipulate the software, must implement it to that particular software and return it to the company who developed it. It can still be re-edited, but must always return to the source.
Application Programs
programs used for a specific task, such as word processing, surfing the web, and playing games
application programs
programs used for a specific task, such as word processing, surfing the web, and playing games.
Intellectual property
property that is created using original thought.
ISP (Internet Service Provider)
provides Internet access and/or other services such as email and Web hosting
Electronic Data Interchange (EDI)
provides a means to exchange information electronically, dramatically improving how all of us do business.
encryption
putting data into a code before transmitting over the internet.
computer system
refers to the hardware and software components that run a computer.
data maintenance
refers to the procedures for adding, updating and deleting records
WYSIWYG
relating to or being a word processing system that prints the text exactly as it appears on the computer screen
WYSIWYG
relating to or being a word processing system that prints the text exactly as it appears on the computer screen (What You See Is What You Get)
DTP hardware
scanners, cameras, high quality printers, customized monitors
Electronic Points Of Sale (EPOS)
self-contained, computerized equipment that performs all tasks of a store checkout counter. It allows payments by bank or credit cards, verifies transactions, provides sales reports, coordinates inventory data, and performs several other services normally provided by employees.
phishing
sending millions of e-mail. fishing for information with which a crime could be done.
cookies
small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page, for example, the language.
System Software
software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management
Operating System (OS)
software that controls the execution of computer programs and may provide various services
malware
softwre designed specially to damage a system.
Flash memory
sometimes called "flash ram"; is solid-state memory that can be erased and reprogrammed; gets its name because the microchip is organized so that a section of memory cells are erased in a single action or "flash"
Automatic recalculation
spreadsheet capability that allow for easy correction of errors and makes it easy to try out different values while searching for solutions.
Optical storage
storage device that records data by burning microscopic holes in the surface of the disk with a laser
magnetic stripe
stores information on cards since tiny magnets can be magnetized and translated into binary numbers. The information on a magnetic strip can be read, altered or duplicated using a variety of devices that have been available for years.
dongle
strategy for protection: only allows software on one computer. A device that attaches to a computer to control access to a particular application.
expiration date
strategy of protection: software destroys itself after the expiration date placed on the software.
Local Area Network (LAN)
supplies networking capability to a group of computers in close proximity to each other.
chache
temporary storage of web pages to help reduce loading time and allow users to access previous pages much quicker.
CPU (Central Processing Unit)
the 'brain' of the computer that is classified by the amount of information it can process and by its speed
Uniform Resource Locator (URL)
the address of a web page on the world wide web
uniform resource locator
the address of a web page on the world wide web
phone phreaking
the art or science of cracking phone networks
push-pull technologies
the collection of procedures used to manage work flow in a collaborative environment.
Primary storage
the computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU
cryptography
the conversion of data into a secret code for transmission over a public network.
Data spillage
the inadvertent leakage of information through negligence or carelessness.
RAM
the most common computer memory which can be used by programs to perform necessary tasks while the computer is on
Formatting
the organization of information according to preset specifications (usually for computer processing)
formatting
the organization of information according to preset specifications (usually for computer processing)
Central Processing Unit (CPU)
the part of a computer (a microprocessor chip) that does most of the data processing
content management systems
the percentage of times a keyword or phrase appears on a web page compared to the total number of words on the page, provides tools to manage the creation, storage, editing, and publication of information in collaborative environment
end-user
the person who uses a product, i.e. the consumer, ___________represents the group of people in the organisation (and often external to it also) who will actually interact directly with the software application.
decryption
the process of converting encrypted data back into its original form.
encryption
the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge
market targeting
the selection of a particular market segment toward which all marketing effort is directed.
I-Beam
the shape the mouse pointer takes when it is positioned on text in a document
Font
the size, style, and design of text
business-to-consumer (b2c)
this type of retail consists of the sale of physical goods or merchandise from a fixed location, such as a department store, boutique or kiosk, or by mall, in small or individual lots for direct consumption by the purchaser
differences in files for print and online versions
to focus on images rather than the text
Query
to interrogate a collection of data such as records in a database.
embedded videos
to place a video within the HTML code of the page
end-user training
training so that the person intended to use the software understands how to use it
open source
typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community.
script-kiddy
unskilled, unexperimented hacker
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
Drag
use a computer mouse to move icons on the screen and select commands from a menu
identity theft
various crimes in which they use an identity of a unknown person
WYSIWYG
what you see is what you get
Online Bid
works just like a normal bid except that it is done over the internet through a computer or even over a phone, to buy something online. On Ebay.
Software
written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory