ICT deffinitions

?
  • Created by: Faolan
  • Created on: 09-05-15 21:55
Access level
The level to which the someone can gain access to different parts of a computer system
1 of 62
ADSL
High Band width which is a broadband technology which uses copper telephone technology. It is permanently switched on
2 of 62
Band width
The rate at which data travels along a communication line
3 of 62
Back up
Taking a second copy of data so that if the original copy get corrupted then the back up is still available
4 of 62
Barcode
Normally has 13 digits. The thick and thin bars are read by lasers. The collected data is compared to the overall database and the price is returned to the POS. it contains the product code, manufacturer code, country of origin and check digit
5 of 62
Blu-Ray
Optical disk technology using blue violet technology
6 of 62
Bluetooth
Open wireless protocol for exchanging data over short distances form mixed and mobile devices. Uses short length radio waves
7 of 62
Cache
is a part of the main memory. stores locations form RAM that are frequently accessed. Assists with the speeding up of the processing power
8 of 62
CAL
Pupils can learn at their own pace. Can revisit topics. can record pupil performance
9 of 62
Chip and pin
A method associated with a plastic card in which the data is stored on a micro chip on the card and can only be accessed by a pin
10 of 62
Check digit
A character placed at the end of a list of numbers to ensure that the numbers have been entered correctly
11 of 62
Carbon footprint
A measure of impact that our actions have on the environment
12 of 62
Compression
Using special software to reduce the size of files. the file is compressed. At the other end it then needs decompression software to read it
13 of 62
Data
Raw facts and figures without meaning
14 of 62
Data subject
The person who the data is about
15 of 62
Data controller
The person in a company who is responsible for controlling th away in which the data is processed
16 of 62
Data loging
Recording data over time by using sensors
17 of 62
Digital video
The storing of videos using 1's and 0's
18 of 62
Data commissioner
Responsible for enforcing the data protection act and enlightening the public about their rights
19 of 62
Download
Transferring a file form the internet onto a PC
20 of 62
Email
A method of sending documents
21 of 62
Feedback
When the output front the system is influenced is put into the system
22 of 62
Encryption
The process of transforming information using an algorithm to make it unreadable to anyone expect those possessing special knowledge usually referred to as a key
23 of 62
Digital signature
Is an encryption key assigned to a specific person. The signature is made up of a very long binary number
24 of 62
Firewall
Is designed to help protect a computer network against intruder.
25 of 62
Intranet
Is a private network within a company and it is only available to staff part of the organisation
26 of 62
Boot up
means to start a computer
27 of 62
Flight mode
A feature is many mobile phones or PDAs that allows you to use basic operations of the device while the transmitting function is switched off
28 of 62
Gateway
Converts data passing between dissimilar networks so that each side can communicate with each other.
29 of 62
Masterfile
A collection of records pertaining to one of the main subjects of an information system, such as computers, employees, products and vendors
30 of 62
Hub
A network is a hardware device that connects multiple to share data packets
31 of 62
Bridge
A bridge joins two networks together so as far as data packets are concerned it looks like one large network
32 of 62
Real time processing
A method of processing data where each transaction is dealt with within a guaranteed time. it is used in computer controlled systems where fast responces are needed
33 of 62
Batch Processing
A method of data processing where similar transactions are saved up and processed at a convenient time. e.g. bank statements
34 of 62
Transaction protocol
A form of computing. Moving a chunk of data from one place to another whilst making sure everything within the system is still consistent
35 of 62
Gradnfather-father-son update
A method of backing up data
36 of 62
Switch
A hardware device that acts as a single point of to connect to a group of computers
37 of 62
Teleconferencing
Using commuters to communicate with other computers somewhere else
38 of 62
Teleworking
Working from home
39 of 62
Virtual reality
A system that enables a person to react and move according to certain simulated conditions
40 of 62
Upload
Taking in information from you computer and transfer it to another computer
41 of 62
Validation
A method of ensuring that data entered into a system is reasonable and correct
42 of 62
verification
a way of ensuring data has been entered into a Computer correctly
43 of 62
VOIP
Technology for the delivery of voice communications under IP networks such as the Internet or other packet switched networks
44 of 62
Video conferencing
A method of conferencing using more than one computer. Each person can see and talk to the other person
45 of 62
VLE
A system's environment that is designed to support teaching
46 of 62
Virus
A program that is designed to deliberately do damage to a computer system
47 of 62
WAN
A network that covers a wide geographical area
48 of 62
WI-FI
Wireless fidelity. WIFI uses radio networks to transmit data between its users
49 of 62
Range check
A validation check that ensures that the data entered is between two defined limits. An upper limit and a lower limit
50 of 62
Resolution
The number of pixels that make up a screen image
51 of 62
Router
A hardware device which connects two or more networks together. It works out the best route for each packet of data to travel along
52 of 62
Simulation
A program which models a real life situation by putting values into the model to see how it behaves in different environments
53 of 62
Sensor
A device which measure physical quantity
54 of 62
Streaming video
Multimedia that is constantly received by and normally presented to a user by a streaming provider
55 of 62
Spyware
Software that cna steal a person's information from their computer system
56 of 62
Transaction file
A collection of transaction records the data in transaction files used to update the master file.
57 of 62
Baud rate
A communication term. it is the numerous of symbols transmitted per second
58 of 62
Smart Card
is a small plastic card that has and embedded micro chip.
59 of 62
Data integrity
Acurate data that has not been changed by unauthorised users or programs
60 of 62
Digital TV
This is television that receives it's signal from a satellite of 'freeview receiver' this Is digital in nature
61 of 62
Microfiche
A flat piece of film containing microphoto graphs of the pages of a newspaper, catalogue or other document.
62 of 62

Other cards in this set

Card 2

Front

High Band width which is a broadband technology which uses copper telephone technology. It is permanently switched on

Back

ADSL

Card 3

Front

The rate at which data travels along a communication line

Back

Preview of the back of card 3

Card 4

Front

Taking a second copy of data so that if the original copy get corrupted then the back up is still available

Back

Preview of the back of card 4

Card 5

Front

Normally has 13 digits. The thick and thin bars are read by lasers. The collected data is compared to the overall database and the price is returned to the POS. it contains the product code, manufacturer code, country of origin and check digit

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Deffinitions resources »