More cards in this set

Card 6

Front

This law regulates how personal information is used and protecta against misuse of personal details.

Back

Preview of the front of card 6

Card 7

Front

Unequal access to ICT for individuals or groups, usually due to financial, geographic, health or cultural circumstances.

Back

Preview of the front of card 7

Card 8

Front

Transfer of a file from a central computer to your computer.

Back

Preview of the front of card 8

Card 9

Front

For security, data is translated into a secret code according to a set of rules in a special key. To convert the data back into plain text, the receiver must have the key.

Back

Preview of the front of card 9

Card 10

Front

A system designed to prevent unauthorised access to your computer when connected to the internet.

Back

Preview of the front of card 10

Card 11

Front

Tricking someone for personal gain or to damage them, usually involving money.

Back

Preview of the front of card 11

Card 12

Front

A navigational system used in many devices which gives current location.

Back

Preview of the front of card 12

Card 13

Front

What does GPS stand for?

Back

Preview of the front of card 13

Card 14

Front

The time delay between the moment something is initiated and the moment it becomes detectable.

Back

Preview of the front of card 14

Card 15

Front

External devices connected to a computer e.g. microphone, printer

Back

Preview of the front of card 15
View more cards