GCSE ICT Key Terms

?
3G
Third-generation wireless communication.
1 of 104
Acceptable use policy
Rules to which users agree, to reduce the misuse of ICT.
2 of 104
Application (Applications software)
Software that helps users perform particular tasks.
3 of 104
Backup
A copy of data that is made in case the original data is lost/damaged.
4 of 104
Bandwidth
The amount of data that can fit through an Internet connection.
5 of 104
Biometric
An automated method of recognising a person based on physical characteristics.
6 of 104
Blog
A shared online journal where people can post diary entries about their personal experiences and hobbies.
7 of 104
Blue-jacking
The sending of unwanted messages to others over Bluetooth connections.
8 of 104
Bluetooth
Allows the exchange of data over short distances from fixed and mobile devices.
9 of 104
Blu-ray
A disk that enables the recording, rewriting and playback of high-definition video and the storing of large amounts of data.
10 of 104
Broadband
A high-speed connection to the Internet.
11 of 104
Buffering
Downloading a certain amount of data into temporary storage before starting to play a file.
12 of 104
Card Code Verification (CCV)
A set of numbers on the back of a credit card that help verify that the use of the credit card is legitimate.
13 of 104
Cloud computing
A system in which all computer programs and data is stored on a central server owned by a company and accessed virtually.
14 of 104
Collaboratively
Working together to achieve common goals.
15 of 104
Commercial
Related to a nusiness
16 of 104
Compatible
The ability of a device to communicate and share information with another device.
17 of 104
Computer Misuse Act
The law that restricts people from accessing or modifying data without permission.
18 of 104
Convergence
When one device is developed to carry out functions that were originally performed by several different devices.
19 of 104
Cookies
Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.
20 of 104
Copyright
Gives the creator of an original work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.
21 of 104
Copyright, Designs and Patens Act
The law that protects people's original work from being used without their permission
22 of 104
Credit Card
A plastic card, issued by banks, building societies, retail stores and other businesses, which enables a person to buy goods and services without the need for cash.
23 of 104
Data
Symbols, characters, images and numbers are all types of data. When data is processed and acquires meaning it becomes information.
24 of 104
Data Protection Act
This law regulates how personal information is used and protects against misuse of personal details.
25 of 104
Debit Card
When money is taken directly from the holder’s bank account.
26 of 104
Digital divide
Unequal access to ICT for individuals or groups.
27 of 104
Digital Economy Act
The law which protects copyright holders from criminals who illegally distribute copyrighted material (piracy).
28 of 104
Digital Rights Management
Allows the copyright holder or the owner of the media control over the number of viewings, plays and copies, and even which devices the media can be played or viewed on.
29 of 104
Dongle
A small piece of hardware that connects to a computer and has uses including data storage and picking up Bluetooth and 3G signals.
30 of 104
Download
Transfer of a file from a central computer to your computer.
31 of 104
DVD
A type of compact disc able to store large amounts of data, especially high-resolution audiovisual material.
32 of 104
E-commerce
Buying and selling goods electronically, usually over the Internet.
33 of 104
Electronic waste (e-waste)
Rubbish comprising of digital materials.
34 of 104
Encryption
When data is translated into a secret code according to a set of rules in a special 'key'.
35 of 104
Ergonomics
The design of equipment to increase the efficiency of the way it is used by the human body, to promote the health of users.
36 of 104
Etiquette
A set of rules that people try to abide by out of respect for other people around them.
37 of 104
Firewall
A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.
38 of 104
Flash memory card
Used for fast and easily transferable information storage in digital devices such as mobile phones, media players and cameras.
39 of 104
Fraud
Used for fast and easily transferable information storage in digital devices such as mobile phones, media players and cameras.
40 of 104
Geotag
To attach the exact geographical coordinates of longitude and latitude to a digital image, giving the location of where it was taken.
41 of 104
Globalisation
The increasing integration of economies and societies around the world, particularly through international trade.
42 of 104
GPS (global positioning system)
A navigational system used in many devices which gives current location, directions from current location to specified destination and distance from current location to specified destination using signals from satellites.
43 of 104
Hacker
Someone who gains unauthorised access to a computer in order to obtain data stored on it.
44 of 104
Hardware
The physical parts of a computer system.
45 of 104
HDMI
Required for connecting devices to show high-definition video.
46 of 104
HDTV
High-definition TV.
47 of 104
High definition (HD)
A television system providing an image resolution that is of substantially higher resolution than that of standard-definition television.
48 of 104
Hosted software
Software accessed via a web browser rather than being installed onto a computer.
49 of 104
Identity theft
A crime that involves someone pretending to be another person in order to steal money or obtain other benefits.
50 of 104
Information overload
Having so much information available that the user feels overwhelmed and is unable to take any of it in, possibly leading to stress.
51 of 104
ISP (Internet service provider)
A company that provides Internet access to its customers.
52 of 104
IP (Internet Protocol) address
The personal address of your computer so that servers know where to send the information you have requested.
53 of 104
Lag
Slow computer functionality often caused by high latency or low performance hardware.
54 of 104
Latency
The time delay between the moment something is initiated and the moment it becomes detectable.
55 of 104
Locally installed software
Software which is installed on the user's computer.
56 of 104
Microblog
Short messages which may include short sentences, individual images or video links,
57 of 104
Multifunctional
Having the ability to do many different things using the same device.
58 of 104
Near field communication (NFC)
Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other.
59 of 104
Non-physical goods
Items for sale which are delivered digitally.
60 of 104
On-demand entertainment
Technology that allows users to view programmes at the time of their choosing by streaming them.
61 of 104
Online banking
A service offered by banks that allows account holders to view their account information online and
62 of 104
Online community
A group of members of a website who communicate and share ideas online.
63 of 104
Open source software
Software that is available to download free of charge.
64 of 104
Overheads
The ongoing expenses of operating a business, e.g. rent, fuel bills, salaries.
65 of 104
Peer-to-peer (P2P)
Sharing files among groups of people who are logged on to a file-sharing network.
66 of 104
Peripherals
External devices connected to a computer.
67 of 104
Personalised learning
Learning that is tailored towards the individual to allow them to make progress.
68 of 104
Personalisation techniques
Ways of making content relevant to a particular customer using their interests, geographical location etc.
69 of 104
Phishing
A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
70 of 104
Physical goods
Items for sale which can be touched and must be delivered by post in some way.
71 of 104
Plagiarism
Copying someone else's work and presenting it as your own.
72 of 104
Privacy
The protection of personal data.
73 of 104
Proprietary software
Software for which you have to pay for a license to use.
74 of 104
Protocol
A set of rules used by computers to communicate with each other across a network.
75 of 104
Public domain
Materials that are available for anyone to use for any purpose (not subject to laws of copyright).
76 of 104
Query
To search, usually when talking about a database.
77 of 104
Repetitive strain injury (RSI)
Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
78 of 104
RSS feeds
A web feed format used for content which is frequently updated.
79 of 104
Sat nav
A device, usually used in a car, that gives directions based on information received from a series of satellites.
80 of 104
SD and SDHC cards
Secure Digital (SD) cards are a type of flash memory card which store up to 2 GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory that can store up to 32 GB of data.
81 of 104
Search engine index
A list of websites which has been compiled by the search engine which drastically increases speed of searching.
82 of 104
Social bookmarking
A way of organising, storing and managing links to online resources, allowing users to search them easily.
83 of 104
Social networking site
An online community where people can communicate and share information.
84 of 104
Software
Programs that give instructions to a computer and which allow the user to carry out different tasks.
85 of 104
Smartphone
A phone offering advanced features.
86 of 104
Spyware
Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the Internet.
87 of 104
SSL (Secure Sockets Layer)
A method of encrypting data to provide security for communications over networks.
88 of 104
Stream
Content is sent in compressed form over the Internet and displayed by the viewer in real time.
89 of 104
Sustainability
Meeting the needs of the present without compromising the needs of future generations
90 of 104
Target audience
A description of the people your products are aimed at.
91 of 104
Teleworking
Working from home but staying in touch with others with the help of technology.
92 of 104
Third party payment processor
A business that offers customers an alternative fast, safe method to pay for online goods and services.
93 of 104
Transactional data
Data which is gathered as a part of a users' online activity.
94 of 104
Trojan
A program that appears legitimate but which performs some harmful activity when it is run. I
95 of 104
Upload
Transfer a file from your computer to a central computer.
96 of 104
User-generated reference sites
Allow users to generate content collaboratively on a website to which others can refer to inform their research.
97 of 104
Validation
The process of checking that the data entered is reasonable or one of the expected options.
98 of 104
Viral marketing
A marketing strategy that encourages people to pass on a marketing message to their friends. It uses interesting and entertaining content that people will want to share. Viral marketing uses multimedia to make the message memorable.
99 of 104
Virtual learning environment (VLE)
An online system for education with areas for homework, classes, teacher and pupil space.
100 of 104
Virus
A program designed to cause other programs on a computer to malfunction or stop working altogether.
101 of 104
VoIP (Voice over Internet Protocol)
This technology is used to make telephone calls via the Internet, usually at a cheaper cost.
102 of 104
Wi-Fi
Used to exchange data and the signals can travel further distances.
103 of 104
Wikis
A type of website that encourages collaboration by allowing users to add, edit and remove content.
104 of 104

Other cards in this set

Card 2

Front

Rules to which users agree, to reduce the misuse of ICT.

Back

Acceptable use policy

Card 3

Front

Software that helps users perform particular tasks.

Back

Preview of the back of card 3

Card 4

Front

A copy of data that is made in case the original data is lost/damaged.

Back

Preview of the back of card 4

Card 5

Front

The amount of data that can fit through an Internet connection.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Key Words resources »