Btec ICT

  • Created by: BethG24
  • Created on: 12-12-17 14:27
Restricted access to files depending on your roles and training.
Access levels
1 of 50
Malware that displays unwanted ads,often as pop ups.
2 of 50
Method of reducing data to make size of file smaller (compress)
Algorithm(file compression)
3 of 50
Utility software that scans files and deletes or quarantines viruses.
Anti-virus software
4 of 50
File(s) that is sent along with an e-mail
5 of 50
Image selected to represent someone
6 of 50
A copy of data kept in a different location so it can be restored.
7 of 50
Speed of an internet connection measured in 'bits per second'
8 of 50
Send email to many people but hide addresses from each other
9 of 50
An online journal or diary that's meant to be updated regularly
10 of 50
Type of data in a database field that can be true/false or yes/no
Boolean(data type)
11 of 50
A high speed internet connection that's 'always on'
12 of 50
Software application used for viewing webpages e.g Google Chrome
13 of 50
Email terms for sending copies of messages
14 of 50
Use digits in a code to check the data is right e.g in a barcode
Check digit(validation)
15 of 50
Means the computer you use to view webpages e.g on a tablet
16 of 50
Means interactive parts of webpages made using code scripts
Client-side processing
17 of 50
Keeping your files on an online server,not your own computer
Cloud storage
18 of 50
Solid copper wire with thick shielding that connects Tv and aerial
19 of 50
Computer program that speeds transmission of audio and video
20 of 50
People working together on same document stored on the Cloud
Collaborative working
21 of 50
Use of technology to track people's messages e.g. by the Police
Communication monitoring
22 of 50
Reducing the amount of data in a file for storage & sending
Compression (files)
23 of 50
Anti-hacking law that's focused on 'un-authorised' access
Computer Misuse Act
24 of 50
Small file stored on computer used to track online behaviour
25 of 50
Anti-piracy law to protect rights of makers of music, movies etc.
Copyright, Designs & Patents Act
26 of 50
Privacy law to force organisations to look after personal data
Data Protection Act
27 of 50
A structured collection of information e.g. for products in a shop
28 of 50
A type of data that can be stored in a database e.g. date of birth
Date/Time (Data Type)
29 of 50
Software that allows you to create & use your own databases
30 of 50
Old fashioned way to connect to Internet via modem & phone
31 of 50
The name of a site & the main part of the address e.g.
Domain name (URL)
32 of 50
Scrambling data before sending online so hackers can't decode
33 of 50
Dedicated email application or program , such as MS Outlook.
Email client software
34 of 50
Cable made from strands of glass that carry data as light
Fibre optic
35 of 50
One item of data in a database, such as a Surname field
Field (Database)
36 of 50
Control what you can do to a file: Read, Read/Write, Full Control
File permissions
37 of 50
Software that monitors data coming in and out of a network
38 of 50
Special field that links two tables in a relational database
Foreign Key (Relational Db)
39 of 50
Check that input data is in required format e.g. date is DD/MM/YY
Format check (Data Validation)
40 of 50
Law gives the right to see data stored about you by public sector
Freedom of Information Act
41 of 50
Old set of rules to handle uploads & downloads from a server
FTP (File Transfer Protocol)
42 of 50
Lets you delete a file, as well as read (view) & write (edit)
Full control (file permission)
43 of 50
Data transmits in both directions but not simultaneous
44 of 50
Coding language used to create webpages using tags
45 of 50
Set of rules that controls loading webpages
46 of 50
Rules for secure webpages where data is scrambled for privacy
HTTPS (secure webpages)
47 of 50
Set of rules that handles webmail for access 'anytime, anywhere'
IMAP (webmail)
48 of 50
Stores details of all the cut words so a document can be remade
Index (File compression)
49 of 50
Special database that stores details of billions of webpages
Index (Search engine)
50 of 50

Other cards in this set

Card 2


Malware that displays unwanted ads,often as pop ups.



Card 3


Method of reducing data to make size of file smaller (compress)


Preview of the front of card 3

Card 4


Utility software that scans files and deletes or quarantines viruses.


Preview of the front of card 4

Card 5


File(s) that is sent along with an e-mail


Preview of the front of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all unit 1 resources »