ICT definitions

HideShow resource information
  • Created by: Amy_MaeB
  • Created on: 04-06-13 10:20
The ability for users to log on to a network from locations outside the building where the network is
Remote Access
1 of 84
Software of hardware that limits the data that can be sent or from a computer, preventing unauthorised access
Firewall
2 of 84
A technology that allowed mobile phone users to view phone-friendly versions of websites on a phone screen
WAP
3 of 84
All the data about one person or thing. Made up of fields.
Record
4 of 84
Web pages that allow people who read them to edit them and add content to them.
Wikis
5 of 84
A file you can send along with your e-mail
Attachment
6 of 84
A database with just one table of data
Flatfile database
7 of 84
Using ICT to hold a virtual meeting with two-way video and audio transmitted in real time
Video conferencing
8 of 84
The data in a file is unreadable
Corrupt
9 of 84
A database containing two or more tables that are linked to each other.
Relational database
10 of 84
Areas of a page that change when the mouse hovers over or clicks on them.
Hotspots
11 of 84
A uer interface with windows, icons, menus and pointers.
GUI
12 of 84
A website that is used like a diary to discuss what they have been doing or other events. People read the entries and post comments as feedback.
Blog
13 of 84
Computer programs that are designed to carry out specific tasks.
Applications Software
14 of 84
The smallest amount of information that a computer can store.
Bit
15 of 84
The way the user interacts with the computer- input and output devices as well as the screen display.
User interface
16 of 84
Also called the primary key. A field in a table which uniquely identifies each record in that table.
Key field
17 of 84
The part of the computer that does most of the data processing.
CPU
18 of 84
Audio and video files downloaded from the Internet, normally updated daily or weekly.
Podcast
19 of 84
A small text file that is stored on your computer when you visit some websites. They can help the site identify you so you don't have to re-enter personal information every time you visit.
Cookie
20 of 84
Accessing a computer system you are not authorised to use.
Hacking
21 of 84
E-mails that are not welcome or solicited, they are often sent in bulk and fill up inboxes
Junk mail
22 of 84
Online discussion spaces where people can post messages and get responses from other people.
Bulletin Boards
23 of 84
Raw figures or words with no meaning or context
Data
24 of 84
The physical objects that make up a computer system.
Hardware
25 of 84
Storing data in a logical or structured way.
Database
26 of 84
An interface where the user chooses from a restricted list of options
Menu user interface
27 of 84
A piece of program code that makes copies of itself by attaching itself to another program. It wastes the host's resources, and sometimes destroys or changes files.
Virus
28 of 84
Ensures that data is sensible in the context in which it is being used in- e.g. range check
Validation
29 of 84
Scrambling data to make it secure. Only users with the key to the code can unscramble it and read the data
Encryption
30 of 84
Replacing data with a code which shortens it.
Encoding
31 of 84
A software application that provides a way to view and interact with pages on the World Wide Web.
Browser
32 of 84
Software that is downloaded onto a computer without the owner's knowledge or permission. It sends data back from owner's computer.
Spyware
33 of 84
A process that is repetitive, for example where a document is revised, edited and proofread to improve the final product.
Recursive
34 of 84
Column headings in a database tables, they are part of a record.
Fields
35 of 84
Sending e-mails pretending to be from bank or orgnisation that handles financial transactions, asking users to click on a link and enter banking information such as passwords.
Phishing
36 of 84
A series of 8 bits. One characters on a keyboard is a single
Byte
37 of 84
Devices that enter data into a system. e.g. keyboard, mouse, microphone
Input device
38 of 84
Devices that take action after an input has been processed. E.g. speaker, monitor
Output device
39 of 84
A silicon chip that contains the central processing unit, which acts as the 'brain' of the computer
Microprocessor
40 of 84
Software that control and manages the computer. E.g. windows
Operating systems software
41 of 84
Read-only memory (permanent storage)
ROM
42 of 84
Random- access memory (temporary storage)
RAM
43 of 84
Links to other web pages or files, usually accessed y clicking on a word or image
Hyperlinks
44 of 84
A code that defines the type of file. At the end of the ile name there is a dot plus the extension, for example letter.doc is a document file called letter
File extension
45 of 84
Copies of data stored in case the original is stolen or becomes corrupt
Backup
46 of 84
A system of internet servers that support a collection of web pages on the Internet which hyperlink to each other
World Wide Web
47 of 84
A network connecting computers in the same area/building
Local Area Network (LAN)
48 of 84
A network that covers a geographical area larger than a single building; it may be global or national.
Wide Area Network (WAN)
49 of 84
Short message service- used for text messaging
SMS
50 of 84
electronic device used to connect computers via a telephone line. It converts digital data to analog and vice versa.
Modern
51 of 84
Signals that take on only two values, off or on, in binary code.
Digital signals
52 of 84
Electrical signals that vary continuously
Analog signals
53 of 84
The rate at which data can be transferred.
Bandwidth
54 of 84
a small piece of hardware that connects to a computer's USB port. It allows a computer user to use certain pieces of software.
Dongle
55 of 84
Uses interviews, questionnaires or observations to gather information about how the present system works.
Feasibility study
56 of 84
Statements of what levels of performance the finished product should have. An example might be that a web page must link to another specified web page.
Performance criteria
57 of 84
A piece of code that updates a software package. Often downloaded from the software company's website.
Patch
58 of 84
Software that is used to create slideshows . Text, video, graphics and sound can be used.
Presentations software
59 of 84
Features that may appear in mny types of applications software.
Generic features
60 of 84
E-mail
A letter or message or info. sent from computer to computer over the internet.
61 of 84
BCC
Blind Carbon Copy. Sending an e-mail message to many people in such a way that it hides the fact that it is being addressed to other people as well.
62 of 84
Two or more people working together on a common goal.
Collaborative working
63 of 84
The main folder that stores the emails you receive.
Inbox
64 of 84
A text form of communication, such as a conversation between people over the Internet that happens in real-time
Instant messaging
65 of 84
An Internet Service Provider, is a company which, usually for a monthly subscription fee, will allow a user to connect to the Internet. They can also provide extra facilities such as remote storage of data files and e-mail accounts for their users
ISP
66 of 84
A portable/light-weight/easy to carry device that can be used almost anywhere
Mobile Device
67 of 84
A series of characters or words used to gain access to a computer system.
Passwords
68 of 84
Post Office Protocol is used to retrieve e-mail from a mail server.
POP
69 of 84
Rich Site Summary - a way of publishing frequently updated sites in a standardised format.
RSS feed
70 of 84
A block of text that is added to the end of an email message you send
Signature
71 of 84
The way in which the presentation changes from one slide to another (eg. next slide flies in from the right after clicking the mouse.
Slide transition
72 of 84
............. means to check the data that you have entered against the original source data. Example of entering your password twice if you change it.
Verification
73 of 84
A piece of software that replicates itself, can copy, destroy and corrupt data
Virus
74 of 84
Documents that store data in a grod of rows and columns. They allow the data to be analysed using formulae and calculations.
Spreadsheets
75 of 84
A function that adds together all number specified in a list or range
SUM
76 of 84
A function that returns the largest value in a set of values
MAX
77 of 84
A function that returns the lowest value in a set of values
MIN
78 of 84
A function that returns the average of a set of values
AVERAGE
79 of 84
the total length of time that data is being recorded.
Logging period
80 of 84
the length of time between recording each measurement.
Logging interval
81 of 84
software used to programme robots and devices with instructions so that they can act remotely or automatically.
Control software
82 of 84
Sending a copy of an e-mail to someone who is not directly affected by the message.
Carbon copy
83 of 84
Another name for a website
Uniform resource locator (URL)
84 of 84

Other cards in this set

Card 2

Front

Firewall

Back

Software of hardware that limits the data that can be sent or from a computer, preventing unauthorised access

Card 3

Front

WAP

Back

Preview of the back of card 3

Card 4

Front

Record

Back

Preview of the back of card 4

Card 5

Front

Wikis

Back

Preview of the back of card 5
View more cards

Comments

Amy_MaeB

The definitions are on the front and the words on the back. Sorry I did it the wrong way round :?

RevisionMeister

No problem. It's a shame we can't edit the cards on here :(

the real ryan fayers

I need a hard revision buddy, do you know anyone?

Hello

sup?

RagedGamerNerd

I know a guy called mark

RagedGamerNerd

Lets make a revision group

Ryan Fayers

who wants to come round my house to do some revising?

the real ryan fayers

I think we should team up jack and mark to do some ******** gangbang revision!

the real ryan fayers

ill come diddler! start soft on me!

Ryan Fayers

What a good idea!!!!!

Hello

hi

the real ryan fayers

like the picture jack

Ryan Fayers

ME GUSTA

Hello

is this a raid?

Jaja Binks

Hey There ;)

Hello

+markstheholehaver

im up for that

Hello

shut up ja ja you ruined starwars!

Jaja Binks

NO I DIDNT RYAN FAYERS YOU FAG

Hello

come at me bro!

Jaja Binks

Ryan I just googled you your only 15 so I might leave you alone but I know what school you go to so STOP OR ELSE!

Mr. Smith- as if anyone would actually believe I'm a moderator! Lol

this is Mr. Smith of the get revising moderation team

I would like to kindly ask you all to stop using profane language. 

I would also ask Ryan Fayers and markstheholehaver to check their private message box for I have made attempts to contact them privately.

- Mr Smith

the real ryan fayers

my I add im the real 'ryan fayers' not some imposing as me

Chris Carrott (fake just to prank a downy)

Ryan Fayers please check your message box.

Chris Carrott (fake just to prank a downy)

dude actually thought I was the real Mr Carrott! Lololol

Mr. Smith- as if anyone would actually believe I'm a moderator! Lol

pranking a dumb dumb (in the hood) (gone wrong) (gone sexual) (cops called) (Ebola contracted)

Mr. Smith- as if anyone would actually believe I'm a moderator! Lol

btw if any random people see this chat...

It's a long story

Daniel Pointon

This is a strange chat

Similar Computing resources:

See all Computing resources »See all resources »