ICT KEY TERMS

?
Data
Raw facts or figures or a set of values, measurements or records of transactions.
1 of 70
Information
Consists of processed data or data with a context.
2 of 70
Knowledge
Is derived from information by applying rules to it.
3 of 70
Transcription Error
Error made when typing data in using a document as the source of the data.
4 of 70
Transposition Error
Error made when characters are swapped around so they are in the wrong order.
5 of 70
Range Check
Data validation technique checks that the data input to a computer is within a certain range.
6 of 70
Validation Checks
Checks a developer of a solution creates, using the software, in order to restrict the data that a user can enter, so as to reduce errors.
7 of 70
Verification
Checks that the data being typed in matches exactly the data on the document used to supply the information.
8 of 70
Validation
The process which ensures that data accepted for processing is sensible and reasonable.
9 of 70
Proof Reading
Carefully reading what has been typed in and comparing it with what is on the data source for any errors, which can then be corrected.
10 of 70
Spellchecker
Facility offered by software where there is a dictionary against which all words typed in are checked.
11 of 70
Grammar Checker
Used to check the grammar in a sentence and to highlight problems and suggest alternatives.
12 of 70
Validation Expression/Rule
The command that a developer must type in order to set up the validation for a particular field/cell.
13 of 70
Validation Message
The message the user will see if they type in data that does not meet the validation rules for that field.
14 of 70
CAD
The use of computer systems for design.
15 of 70
CAM
The use of computer-based systems to control the machinery in manufacturing processes.
16 of 70
Electronic Funds Transfer (EFT)
The process of transferring money electronically without the need for paperwork or the delay that using paperwork brings.
17 of 70
Computer Assisted Learning (CAL)
Using a computer interactively for the learning process.
18 of 70
Computer Based Training (CBT)
Using a computer interactively for training, usually on a person's occupation.
19 of 70
E-Learning
Using ICT to help in the learning process.
20 of 70
Multimedia
Making use of many media, such as text, image , sound, animation and video.
21 of 70
Backup
Copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system.
22 of 70
Distributed Database
Database where the data is stored on a number of servers rather than just one. These servers are often in different locations. The user will not know that data is being obtained from different servers.
23 of 70
Extranet
Extranets are intranets opened to a select group of users outside the company such as customers, suppliers etc.
24 of 70
Intranet
Private internal network which allows employees of an organisation to access information resources within the organisation.
25 of 70
Artificial Intelligence (AI)
Creating computer programmes or computers that behave in a similar way to the human brain by learning from the experience, etc.
26 of 70
Expert System
an ICT system that emulates the decision making ability of a human expert.
27 of 70
Expert System Shell
Allows people to create their own expert systems without the need for programming skills or the need to start from scratch.
28 of 70
Neural Network
An ICT system that processes information in the same way that the human brain does. It uses a series of processing elements which work in parallel to solve a specific problem. They cannot be programmed but instead learn by example.
29 of 70
Download
To copy files from a distant computer to the one you are working on.
30 of 70
MP3
There are lots of ways to compress a music file but the most popular way is by using MP3.
31 of 70
Format
The style in which the information is organised and presented.
32 of 70
Media
The means by which information is communicated.
33 of 70
Table
A more visual way of displaying data, especially numeric data.
34 of 70
Multimedia
Making use of many media such as text, image, sound animation and video.
35 of 70
Header
Text placed at the top of the document.
36 of 70
Footer
Text placed at the bottom of the document.
37 of 70
Bullet Point
A block or paragraph of text that has a symbol placed in front to make the section of text stand out.
38 of 70
Templates
When you key in text in a document is based on a template which specifies such things as the font, font size, page layout, formatting. You can create your own templates which saves having to set these up each time you want something to be the same.
39 of 70
Macro
A series of commands and instructions that you can group together as a single command in order to complete a task automatically. Macros save time when you wish to perform tasks.
40 of 70
Desktop Publishing
Combining text and pictures on the screen to produce posters, newsletters and brochures.
41 of 70
Placeholder Text
Text that is included to show the position of text in a template and that you can delete and replace with your own text.
42 of 70
Compression
Storing data in a format that requires less space. Bitmapped graphics such as photographs are usually compressed to a fraction of their normal file size.
43 of 70
Relational Database
Database where the data is held in tables with relationships established between them. The software is used to set up and hold the data as well as to extract and manipulate the stored data.
44 of 70
Relationship
The way tables are related to each other; they can be one-to-one, one-to-many or many-to-many.
45 of 70
Report
The output from a database in which the results are presented in a way that is controlled user.
46 of 70
Tweening
When a graphic is tweened, the animation software creates all the in-between frames, which means that a smooth movement is produced.
47 of 70
Transmission Medium
The material which forms the connection between the computers in a network.
48 of 70
Network
A group of computers that are able to communicate with each other.
49 of 70
Networking Software
This is systems software which allows computers connected together to funtion as a network.
50 of 70
Hot Spot
A region where the Internet can be accessed wirelessly.
51 of 70
Wi-Fi
A trademark for the certification of products that meet certain standards for transmitting data over wireless networks.
52 of 70
Local Area Network (LAN)
A network where the linked hardware is confined to a single office or site and where all the wires and other devices need for the LAN are owned by the organisation.
53 of 70
Wide Area Network (WAN)
A network where the hardware is spread over a wide geographical area and where the organisation does not own some or all of the telecommunications equipment used.
54 of 70
File Attachment
A file that is attached to an e-mail.
55 of 70
Ergonomics
An applied science concerned with designing and arranging things people use so that the people and things interact most efficiently and safely.
56 of 70
Repetitive Strain Injury (RSI)
A painful muscular condition caused by repeatedly using certain muscles in the same way.
57 of 70
Crime
An illegal act.
58 of 70
Malpractice
Improper or careless use of misconduct.
59 of 70
Data Controller
The person whose responsibilty it is in an organisation to control the way that personal data is processed.
60 of 70
Data Subject
The living individual whom the personal information is about.
61 of 70
Information Commissioner
The person responsible for enforcing the Act. They also promote good practice and make everyone aware of the implications of the Act.
62 of 70
Personal Data
Data about a living identifiable person, which is specific to that person.
63 of 70
Data Subject
The person whom the personal information is about.
64 of 70
Notification
The process of letting the Information Commissioner's Office know that personal data is being processed.
65 of 70
Piracy
The process of illegally copying software.
66 of 70
Software Licence
Document which sets out the terms by which the software can be used - it will refer to the number of computers on which it can be run simultaneously.
67 of 70
Access Rights
Restrictions to a user's access to only those files needed in order to perform their job. Also covers what they can do with the data once accessed.
68 of 70
Password
A series of characters which need to be typed in before access to certain ICT resources is allowed.
69 of 70
Simulation
The imitation with a computer program of some system or some phenomenon that can be described mathematically.
70 of 70

Other cards in this set

Card 2

Front

Consists of processed data or data with a context.

Back

Information

Card 3

Front

Is derived from information by applying rules to it.

Back

Preview of the back of card 3

Card 4

Front

Error made when typing data in using a document as the source of the data.

Back

Preview of the back of card 4

Card 5

Front

Error made when characters are swapped around so they are in the wrong order.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all All resources »