ICT Definition Cards

?
What is 3G?
Third-generation wireless communication which allows high-speed wireless data transfer.
1 of 44
What is Bandwidth?
The amount of data you can fit through an internet connection. It's measured in bits per second.
2 of 44
What is Bluetooth?
Allows the exchange of data over short distances from fixed and mobile devices.
3 of 44
What's Blu-Ray?
A disk that enables the recording, rewriting and playback of high definition video and the storing of large amounts of data. It has 5 times the storage capacity of DVDs.
4 of 44
What is Broadband?
A high speed connection to the internet.
5 of 44
What is Buffering?
Downloading a certain amount of data into a temporary storage before starting to play a file.
6 of 44
What is CCV?
Card Code Verification- A set of numbers on the back of a credit card that help verify that the use of the credit card is legitimate.
7 of 44
What is Cloud Computing?
A system in which all computer programs and data is stored on a central server owned by a company and accessed virtually.
8 of 44
What is the Computer Misuse Act?
This law restricts people from accessing or modifying data without permission.
9 of 44
What is Convergence?
When one device is developed to carry out functions that were originally performed by several different devices.
10 of 44
What are Cookies?
Small text files that are sent to your computer from certain websites.
11 of 44
What is the Copyright Designs and Patents Act?
This law
12 of 44
What is the Data Protection Act?
This law regulates how personal information is used and protects against misuse of personal details.
13 of 44
What is Digital Divide?
Unequal access to ICT for individuals or groups, usually due to financial, geographic, health or cultural reasons.
14 of 44
What is the Digital Economy Act?
This law protects copyright holders from criminals who illegally distribute copyrighted material.
15 of 44
What is E-Commerce?
Buying and selling goods electronically, usually over the internet.
16 of 44
What is Encryption?
For security, data is translated into a secret code according to a set of rules in a special key. To convert the data back into plain text, the receiver must also have the key.
17 of 44
What is a Firewall?
A system designed to prevent unauthorized access to your computer when connected to a network such as the internet.
18 of 44
What is Fraud?
Tricking someone for personal gain or to damage them.
19 of 44
What is Geo-tagging?
Attaching the exact geographical coordinates of longitude and latitude to a digital image, giving the location of where it was taken.
20 of 44
What is Hosted Software?
Accessed via a web browser rather than being installed on the user's computer.
21 of 44
What is Information Overload?
Having so much information that the user feels overwhelmed.
22 of 44
What is ISP?
Internet Service Provider- A company that provides internet access to it's customers.
23 of 44
What is Latency?
The time delay between the moment something is initiated and the moment it becomes detectable.
24 of 44
What is an NFC?
Near Field Communication- Allows the wireless exchange of a data between two devices by touching them together or holding them very close to each other.
25 of 44
What is Peer-to-Peer?
Sharing files among groups of people who are logged on to a file-sharing network.
26 of 44
What are Peripherals?
External devices connected to a computer- printer, microphone, headphones
27 of 44
What is Phishing?
A form of internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
28 of 44
What is Plagiarism?
Copying someone else's worl and presenting it as your own.
29 of 44
What is Proprietary Software?
Software for which you have to pay fora licence to use.
30 of 44
What is RSI?
Repetitive Strain Injury- Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
31 of 44
What is RSS Feeds?
A web feed format used for content which is frequently updated in a standard format so it can be added to a variety of websites.
32 of 44
What is Spyware?
Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the internet.
33 of 44
What is SSL?
Secure Sockets Layer- A method of encrypting data to provide security for communications over networks such as the internet.
34 of 44
What is Stream?
Content is sent in compressed form over the internet and displayed by the viewer in real time. When streaming a video, a web user does not have to wait to download a file to play it.
35 of 44
What is Teleworking?
Working from home but staying in touch with other with the help of technology.
36 of 44
What is Transactional Data?
Data that is gathered as part of a user's online activity. When buying online, this could include information about the product bought but also personal details from the buyer such as address and payment details.
37 of 44
What is Trojan?
A program that appears legitimate but performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk.
38 of 44
What is a Virus?
A program designed to cause other programs on a computer to malfunction or stop working altogether.
39 of 44
List some online communities.
Social networks ( Facebook etc), Blogs (Twitter etc), Online Work Spaces (Adope Connect etc), User Generated Reference Sites (Forums,Message Boards,Wikis etc), Virtual Worlds, Virtual Learning Environments, Webmail
40 of 44
What is IMAP?
Internet Message Access Protocol- If the recipient uses IMAP to read emails, the email is read on the server. The email is not deleted from the server and can be accesses anywhere using any computer with an internet connection.
41 of 44
What is POP?
Post Office Protocol- If the recipient uses POP to read emails, the mail server will download the email to the computer. The email is then deleted from the server and can be read offline.
42 of 44
What are some advantages to the customer of online shopping?
Far greater choice. You can shop all day and every day. You can find the best price using price comparison sites. You dont have to leave the house. You can read reviews of products.
43 of 44
What are some disadvantages to the customer of online shopping?
You need internet access and computer skills. You cant pay using cash. You cant see or touch products or try on clothes. You usually have to pay for delivery. You need to submit personal details through a website. Risk of details being stolen.
44 of 44

Other cards in this set

Card 2

Front

What is Bandwidth?

Back

The amount of data you can fit through an internet connection. It's measured in bits per second.

Card 3

Front

What is Bluetooth?

Back

Preview of the front of card 3

Card 4

Front

What's Blu-Ray?

Back

Preview of the front of card 4

Card 5

Front

What is Broadband?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Everything resources »