Btec ICT

?
  • Created by: BethG24
  • Created on: 12-12-17 14:27
Restricted access to files depending on your roles and training.
Access levels
1 of 50
Malware that displays unwanted ads,often as pop ups.
Adware
2 of 50
Method of reducing data to make size of file smaller (compress)
Algorithm(file compression)
3 of 50
Utility software that scans files and deletes or quarantines viruses.
Anti-virus software
4 of 50
File(s) that is sent along with an e-mail
Attachment
5 of 50
Image selected to represent someone
Avatar
6 of 50
A copy of data kept in a different location so it can be restored.
Backup
7 of 50
Speed of an internet connection measured in 'bits per second'
Bandwidth
8 of 50
Send email to many people but hide addresses from each other
BCC
9 of 50
An online journal or diary that's meant to be updated regularly
Blog
10 of 50
Type of data in a database field that can be true/false or yes/no
Boolean(data type)
11 of 50
A high speed internet connection that's 'always on'
Broadband
12 of 50
Software application used for viewing webpages e.g Google Chrome
Browser
13 of 50
Email terms for sending copies of messages
CC
14 of 50
Use digits in a code to check the data is right e.g in a barcode
Check digit(validation)
15 of 50
Means the computer you use to view webpages e.g on a tablet
Client
16 of 50
Means interactive parts of webpages made using code scripts
Client-side processing
17 of 50
Keeping your files on an online server,not your own computer
Cloud storage
18 of 50
Solid copper wire with thick shielding that connects Tv and aerial
Co-axial
19 of 50
Computer program that speeds transmission of audio and video
CODEC
20 of 50
People working together on same document stored on the Cloud
Collaborative working
21 of 50
Use of technology to track people's messages e.g. by the Police
Communication monitoring
22 of 50
Reducing the amount of data in a file for storage & sending
Compression (files)
23 of 50
Anti-hacking law that's focused on 'un-authorised' access
Computer Misuse Act
24 of 50
Small file stored on computer used to track online behaviour
Cookie
25 of 50
Anti-piracy law to protect rights of makers of music, movies etc.
Copyright, Designs & Patents Act
26 of 50
Privacy law to force organisations to look after personal data
Data Protection Act
27 of 50
A structured collection of information e.g. for products in a shop
Database
28 of 50
A type of data that can be stored in a database e.g. date of birth
Date/Time (Data Type)
29 of 50
Software that allows you to create & use your own databases
DBMS
30 of 50
Old fashioned way to connect to Internet via modem & phone
Dial-up
31 of 50
The name of a site & the main part of the address e.g. Nike.com
Domain name (URL)
32 of 50
Scrambling data before sending online so hackers can't decode
Encryption
33 of 50
Dedicated email application or program , such as MS Outlook.
Email client software
34 of 50
Cable made from strands of glass that carry data as light
Fibre optic
35 of 50
One item of data in a database, such as a Surname field
Field (Database)
36 of 50
Control what you can do to a file: Read, Read/Write, Full Control
File permissions
37 of 50
Software that monitors data coming in and out of a network
Firewall
38 of 50
Special field that links two tables in a relational database
Foreign Key (Relational Db)
39 of 50
Check that input data is in required format e.g. date is DD/MM/YY
Format check (Data Validation)
40 of 50
Law gives the right to see data stored about you by public sector
Freedom of Information Act
41 of 50
Old set of rules to handle uploads & downloads from a server
FTP (File Transfer Protocol)
42 of 50
Lets you delete a file, as well as read (view) & write (edit)
Full control (file permission)
43 of 50
Data transmits in both directions but not simultaneous
Half-Duplex
44 of 50
Coding language used to create webpages using tags
HTML
45 of 50
Set of rules that controls loading webpages
HTTP (URL)
46 of 50
Rules for secure webpages where data is scrambled for privacy
HTTPS (secure webpages)
47 of 50
Set of rules that handles webmail for access 'anytime, anywhere'
IMAP (webmail)
48 of 50
Stores details of all the cut words so a document can be remade
Index (File compression)
49 of 50
Special database that stores details of billions of webpages
Index (Search engine)
50 of 50

Other cards in this set

Card 2

Front

Malware that displays unwanted ads,often as pop ups.

Back

Adware

Card 3

Front

Method of reducing data to make size of file smaller (compress)

Back

Preview of the front of card 3

Card 4

Front

Utility software that scans files and deletes or quarantines viruses.

Back

Preview of the front of card 4

Card 5

Front

File(s) that is sent along with an e-mail

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all unit 1 resources »