ICT Keywords

HideShow resource information

3G

Third - generation wireless communication which allows high-speed wireless data transfer

1 of 37

Acceptable use policy

Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.

2 of 37

Backup

A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.

3 of 37

Bandwidth

The amount of data that can fit through an internet connection. You can compare it to a ten-lane motorway which can fit more cars on it than a four-lane motorway . Bandwidth is measured in bits per second (bps). This indicates the number of bits of information that can fit down the line in one second. Kb or Kbps means thousands of bits per second; Mb or Mbps means millions of bits per second.

4 of 37

Biometric

An automated method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice.

5 of 37

Blog

A shared online journal where poeple can post diary entries about their personal experiences and hobbies.

6 of 37

Blue- Jacking

The sending of unwanted messages to others over bluetooth connections.

7 of 37

Bluetooth

Allows the exchange of data over short distances from fixed and mobile devices. In order for devices to communicate they must be able to understand the Bluetooth rules. (protocols)

8 of 37

Blu- Ray

A disk that enables the recording, rewriting and playback of high-definition video and the storing of large amounts of data. It has more than five times the storage capcity of traditional DVD's and can hold up to 25 GB on a single - layer disk and 50 GB on a dual-layer disk.

9 of 37

Broadband

A high-speed connection to the internet.

10 of 37

Buffering

Download a certain amount of data into temporary storage before starting to play a file.

11 of 37

Card code Verification (CCV)

A set of numbers on the back of a credit card that help verify that the use of the credit card is legitiamte.

12 of 37

Cloud computing

A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually. 

13 of 37

Collaboratively

Working together with other poeple.

14 of 37

Compatible

The ablility of a device to communicate ad share information with another device.

15 of 37

Computer Misuse Act

This law restricts people from accessing or modifying data without permision.

16 of 37

Convergence

When one device is developed to carry out functions that were originally performed by several different devices.

17 of 37

Cookies

Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.

18 of 37

Copyright

Gives the creater of an orgninal work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.

19 of 37

Copyright, Designs and Patents Act.

This law protects poeple's original work from being used without their permission.

20 of 37

Credit card

A plastic card, issued by banks, building societies, retail stores and other buisnesses, which enables a person to buy goods and serices without the need for cash. The holder agrees to pay back the money borrowed at a later date, sometimes with interest.

21 of 37

Data

Symbols, characters, images and number are all types of data. When data is processed and aquires meaning it becomes information. Computers process data to produce information.

22 of 37

Data Protection Act

This law regulated how personal information is used and protects against musise of personal details.

23 of 37

Debit card

Similar to a credit card, but the money is taken directly from the cardholder's bank account.

24 of 37

Digital divide

Unequal access to ICT for individuals or groups, usually due to financial, geographic, health or cultural reasons. 

25 of 37

Digital Economy Act

This law protects copyright holders from criminals who illegally distribute copyrighted material (provacy).

26 of 37

Digital Rights Management

Allows the copyright holder or the owner of the media control over the number of viewings , plays and copies, and even which devices the media can be played or viewed on. If you download a filom from iTunes, you cannot burn it to a DVD because of the DRM encoded in the film.

27 of 37

Dongle

A small piece of hardware that connects to a computer and has uses including data storage and picking up Bluetooth and 3G signals. A dongle may be portale like a USB pen.

28 of 37

Download

Transferof a file, e.g, a video , from a central computer to your computer.

29 of 37

DVD

DVD's offer higher storage capacity than Compact Discs (CD's) while having the same dimensions. Blank recordable DVD's (DVD-R and DVD+R) can be recorded once using optical disc recording technologies and supported by optical disk drives and DVD recorders and then function as a DVD-ROM. Rewritable DVD's (DVD-RW, DVD+RW. and DVD-RAM) can be recorded and erased multiple times.

30 of 37

E-commerce

Buying and selling goods electronically, usually over the internet.

31 of 37

Electronic Waste (e-waste)

Rubbish comprising of digital materials e.g old computers.

32 of 37

Encryption

For securtiy, data is translated into a secret code according to a set of rules in a special 'key'. To convert the data back into plain text , the reciever must also have the key.

33 of 37

Ergonomics

The design of equipment to increase the efficiency of the way it is used by the human body, to promote the health of users.

34 of 37

Etiquette

A set of rules that people try to abide by out of respect for other people around them.

35 of 37

Firewall

A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.

36 of 37

FLash memory card

37 of 37

Comments

No comments have yet been made

Similar All resources:

See all All resources »See all Keyterms resources »