ICT definitions

HideShow resource information
  • Created by: Amy_MaeB
  • Created on: 04-06-13 10:20
The ability for users to log on to a network from locations outside the building where the network is
Remote Access
1 of 84
Software of hardware that limits the data that can be sent or from a computer, preventing unauthorised access
2 of 84
A technology that allowed mobile phone users to view phone-friendly versions of websites on a phone screen
3 of 84
All the data about one person or thing. Made up of fields.
4 of 84
Web pages that allow people who read them to edit them and add content to them.
5 of 84
A file you can send along with your e-mail
6 of 84
A database with just one table of data
Flatfile database
7 of 84
Using ICT to hold a virtual meeting with two-way video and audio transmitted in real time
Video conferencing
8 of 84
The data in a file is unreadable
9 of 84
A database containing two or more tables that are linked to each other.
Relational database
10 of 84
Areas of a page that change when the mouse hovers over or clicks on them.
11 of 84
A uer interface with windows, icons, menus and pointers.
12 of 84
A website that is used like a diary to discuss what they have been doing or other events. People read the entries and post comments as feedback.
13 of 84
Computer programs that are designed to carry out specific tasks.
Applications Software
14 of 84
The smallest amount of information that a computer can store.
15 of 84
The way the user interacts with the computer- input and output devices as well as the screen display.
User interface
16 of 84
Also called the primary key. A field in a table which uniquely identifies each record in that table.
Key field
17 of 84
The part of the computer that does most of the data processing.
18 of 84
Audio and video files downloaded from the Internet, normally updated daily or weekly.
19 of 84
A small text file that is stored on your computer when you visit some websites. They can help the site identify you so you don't have to re-enter personal information every time you visit.
20 of 84
Accessing a computer system you are not authorised to use.
21 of 84
E-mails that are not welcome or solicited, they are often sent in bulk and fill up inboxes
Junk mail
22 of 84
Online discussion spaces where people can post messages and get responses from other people.
Bulletin Boards
23 of 84
Raw figures or words with no meaning or context
24 of 84
The physical objects that make up a computer system.
25 of 84
Storing data in a logical or structured way.
26 of 84
An interface where the user chooses from a restricted list of options
Menu user interface
27 of 84
A piece of program code that makes copies of itself by attaching itself to another program. It wastes the host's resources, and sometimes destroys or changes files.
28 of 84
Ensures that data is sensible in the context in which it is being used in- e.g. range check
29 of 84
Scrambling data to make it secure. Only users with the key to the code can unscramble it and read the data
30 of 84
Replacing data with a code which shortens it.
31 of 84
A software application that provides a way to view and interact with pages on the World Wide Web.
32 of 84
Software that is downloaded onto a computer without the owner's knowledge or permission. It sends data back from owner's computer.
33 of 84
A process that is repetitive, for example where a document is revised, edited and proofread to improve the final product.
34 of 84
Column headings in a database tables, they are part of a record.
35 of 84
Sending e-mails pretending to be from bank or orgnisation that handles financial transactions, asking users to click on a link and enter banking information such as passwords.
36 of 84
A series of 8 bits. One characters on a keyboard is a single
37 of 84
Devices that enter data into a system. e.g. keyboard, mouse, microphone
Input device
38 of 84
Devices that take action after an input has been processed. E.g. speaker, monitor
Output device
39 of 84
A silicon chip that contains the central processing unit, which acts as the 'brain' of the computer
40 of 84
Software that control and manages the computer. E.g. windows
Operating systems software
41 of 84
Read-only memory (permanent storage)
42 of 84
Random- access memory (temporary storage)
43 of 84
Links to other web pages or files, usually accessed y clicking on a word or image
44 of 84
A code that defines the type of file. At the end of the ile name there is a dot plus the extension, for example letter.doc is a document file called letter
File extension
45 of 84
Copies of data stored in case the original is stolen or becomes corrupt
46 of 84
A system of internet servers that support a collection of web pages on the Internet which hyperlink to each other
World Wide Web
47 of 84
A network connecting computers in the same area/building
Local Area Network (LAN)
48 of 84
A network that covers a geographical area larger than a single building; it may be global or national.
Wide Area Network (WAN)
49 of 84
Short message service- used for text messaging
50 of 84
electronic device used to connect computers via a telephone line. It converts digital data to analog and vice versa.
51 of 84
Signals that take on only two values, off or on, in binary code.
Digital signals
52 of 84
Electrical signals that vary continuously
Analog signals
53 of 84
The rate at which data can be transferred.
54 of 84
a small piece of hardware that connects to a computer's USB port. It allows a computer user to use certain pieces of software.
55 of 84
Uses interviews, questionnaires or observations to gather information about how the present system works.
Feasibility study
56 of 84
Statements of what levels of performance the finished product should have. An example might be that a web page must link to another specified web page.
Performance criteria
57 of 84
A piece of code that updates a software package. Often downloaded from the software company's website.
58 of 84
Software that is used to create slideshows . Text, video, graphics and sound can be used.
Presentations software
59 of 84
Features that may appear in mny types of applications software.
Generic features
60 of 84
A letter or message or info. sent from computer to computer over the internet.
61 of 84
Blind Carbon Copy. Sending an e-mail message to many people in such a way that it hides the fact that it is being addressed to other people as well.
62 of 84
Two or more people working together on a common goal.
Collaborative working
63 of 84
The main folder that stores the emails you receive.
64 of 84
A text form of communication, such as a conversation between people over the Internet that happens in real-time
Instant messaging
65 of 84
An Internet Service Provider, is a company which, usually for a monthly subscription fee, will allow a user to connect to the Internet. They can also provide extra facilities such as remote storage of data files and e-mail accounts for their users
66 of 84
A portable/light-weight/easy to carry device that can be used almost anywhere
Mobile Device
67 of 84
A series of characters or words used to gain access to a computer system.
68 of 84
Post Office Protocol is used to retrieve e-mail from a mail server.
69 of 84
Rich Site Summary - a way of publishing frequently updated sites in a standardised format.
RSS feed
70 of 84
A block of text that is added to the end of an email message you send
71 of 84
The way in which the presentation changes from one slide to another (eg. next slide flies in from the right after clicking the mouse.
Slide transition
72 of 84
............. means to check the data that you have entered against the original source data. Example of entering your password twice if you change it.
73 of 84
A piece of software that replicates itself, can copy, destroy and corrupt data
74 of 84
Documents that store data in a grod of rows and columns. They allow the data to be analysed using formulae and calculations.
75 of 84
A function that adds together all number specified in a list or range
76 of 84
A function that returns the largest value in a set of values
77 of 84
A function that returns the lowest value in a set of values
78 of 84
A function that returns the average of a set of values
79 of 84
the total length of time that data is being recorded.
Logging period
80 of 84
the length of time between recording each measurement.
Logging interval
81 of 84
software used to programme robots and devices with instructions so that they can act remotely or automatically.
Control software
82 of 84
Sending a copy of an e-mail to someone who is not directly affected by the message.
Carbon copy
83 of 84
Another name for a website
Uniform resource locator (URL)
84 of 84

Other cards in this set

Card 2




Software of hardware that limits the data that can be sent or from a computer, preventing unauthorised access

Card 3




Preview of the back of card 3

Card 4




Preview of the back of card 4

Card 5




Preview of the back of card 5
View more cards



The definitions are on the front and the words on the back. Sorry I did it the wrong way round :?


No problem. It's a shame we can't edit the cards on here :(

Nigel Thornberry




Similar Computing resources:

See all Computing resources »See all resources »