ICT Keywords

Third-Generation wireless communication which allows high-speed wireless data transfer.
1 of 104
Acceptable use policy
Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.
2 of 104
Application (Application software)
Software that helps users perform particular tasks.
3 of 104
Copy of data that is made in case the original data is lost or damaged.
4 of 104
Amount of data that can fit through an Internet connection.
5 of 104
Automated method of recognising a person based on physical characteristics.
6 of 104
A shared online journal where people can post diary enteries about their personal experiences and hobbies.
7 of 104
The sending of unwanted messages to others over Bluetooth connections.
8 of 104
Allows exchange of data over short distances from fixed and mobile devices.
9 of 104
A disk that enables the recording, rewriting and playback of high-definition video and the storing of large amount of data.
10 of 104
A high-speed connection to the Internet.
11 of 104
Download a certain amount of data into temporary storage before starting to play a file.
12 of 104
Card Code Verification (CCV)
A set of numbers on the back of a credit card that help verify that the use of the credit card is legitimate.
13 of 104
Cloud computing
A system in which all computer programs and data is stored on a central server owned by a company and accessed virtually.
14 of 104
Working together with other people
15 of 104
Related to a business
16 of 104
The ability of a device to communicate and share information with another device.
17 of 104
Computer misues act
This law restricts people from accessing or modifying data without permission.
18 of 104
When one device is developed to carry out functions that were originally performed by several different devices.
19 of 104
Small text files that are sent to your computer from certain websites and track your behaviour.
20 of 104
Gives the creator ofan orginal work exclusive rights regarding that work for a certain period of time.
21 of 104
Copyright, Designs and Patents act
This law protects peoples original work from being used without their permission.
22 of 104
Credit Card
A plastic card, issued by banks, enables a person to buy goods and services without the need for cash. Holder agrees to pay back money borrowed at a later date.
23 of 104
Symbols, characters, images and numbers are all types of data. When data is processed and acquires meaning it becomes information.
24 of 104
Data protection act
This law regulates how personal information is used and protects against misuse of personal details.
25 of 104
Debit Card
Similar to a credit card, but the money is taken directly from the cardholders bank account.
26 of 104
Digital Divide
Unequal access to ICT for individuals or groups, usually due to financial, geographic, health, or cultural reasons.
27 of 104
Digital Enconomy Act
Law protects copyright holders from criminals who illegally distribute copyrighted material.
28 of 104
Digital Rights Movement
Allows the copyright holder or the owner of the media control over the number of viewings, plays and copies, and even which device the media can be played or viewed on.
29 of 104
A small piece of hardware that connects to a computer and has uses including data storage and picking up bluetooth and 3G signals.
30 of 104
Transfer of a file from a central computer to your computer.
31 of 104
DVDs offer higher storage capacity than compact discs, whilst having the same dimensions.
32 of 104
Buying and selling goods electronically, usually over the internet.
33 of 104
Electronic Waste (E-Waste)
Rubbish comprising of digital materials e.g. old computers
34 of 104
For security, data is translated into a secret code according to a set of rules in a special 'key'. To convert text back, reciever must also have the key.
35 of 104
The design of equipment to increase the efficiency of the way it is used by the human body
36 of 104
Set of rules that people abide by out of respect for other around them.
37 of 104
System designed to prevent unauthorised access to your computer when connected to a network like the internet.
38 of 104
Flash Memory Card
Used for fast and easily transferable information storage in digital devices such as mobile phones, media players and cameras.
39 of 104
Tricking someone for personal gain or to damage them.
40 of 104
To attach the exact geographical coordinates of longitude and latitude to a digital image, giving it a location.
41 of 104
The increasing integration of economies and societies around the world, particularly through international trade.
42 of 104
GPS (Global Positioning System)
Navigational system used in many devices which gives current location.
43 of 104
Someone who gains unauthorised access to a computer in order to obtain data stored on it.
44 of 104
HDMI (High definition multimedia interface)
Required for connecting devices to show high definition video.
45 of 104
High-definition television.
46 of 104
High Definition (HD)
Picture on a TV screen is made of lines of pixels.HD has 720 or 1080 lines, so it produces a clearer image.
47 of 104
Hosted software
Software as service (SaaS) is accessed via a web browser rather than being installed.
48 of 104
Identity theft
A crime that involves someone pretending to be another person in order to steal money or obtain other benefits.
49 of 104
Information overload
Having so much information that the user feels overwhelmed.
50 of 104
ISP (Internet Service Provider)
A company that provides Internet access to its customers
51 of 104
IP (Internet Protocol) address
Personal address of your computer so that the server knows where to send the information you have requested.
52 of 104
Slow computer functonality often caused by high latency or low performance hardware.
53 of 104
The time delay between the moment something is initiated and the moment it becomes detectable.
54 of 104
Locally installed software
Software that is installed on the users computer.
55 of 104
Short messages which may include short sentences individual images or video links.
56 of 104
Having the ability to do many different things using the same device.
57 of 104
Near field communication (NFC)
Allows the wireless exchange of data between 2 devices by touching them together or holeding them very close to eachother.
58 of 104
Non-physical goods
Items for sale which are delivered digitally (iTunes)
59 of 104
On-demand entertainment
Technology that allows users to view programmes at the time of their choosing by streaming them.
60 of 104
Online banking
A service offered by banks that allows users to view their account information online and carry out various financial transactions.
61 of 104
Online community
A group of members of a website who communicate and share ideas online.
62 of 104
Open source software
Software that is available to download free of charge.
63 of 104
Over heads
The ongoing expenses of operating a business.
64 of 104
Peer-to-Peer (P2P)
Sharing files among groups of people who are logged on to a file sharing network.
65 of 104
External devices connected to a computed (printer, microphone)
66 of 104
Personalised learning
Learning that is tailored towards the individual to allow them to make progress.
67 of 104
Personalisation techniques
Ways of making content relevant to a particular customer using their interests.
68 of 104
a form of internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
69 of 104
Physicalm goods
Items for sale which can be touched and must be delivered by post in some way.
70 of 104
Copying someone else's work and presenting it as your own.
71 of 104
The protection of personal data.
72 of 104
proprietary software
Software for wihc you must pay for a license to use.
73 of 104
Set of rules used by computers to communicate with eachother across a network.
74 of 104
Public domain
Materials that are available for anyone to use for any purpose.
75 of 104
To search, usually when talking about a database.
76 of 104
Repetitive Strain Injury (RSI)
Damage cause to the muscles, tendons, ligaments, nerves or joints usually because of repeating the same action.
77 of 104
RSS feeds
Web feed format used for content which is frequently updated.
78 of 104
Sat Nav
A device that gives directions based on information recieved from a series of satellites.
79 of 104
SD and SDHC cards
Secure digital (SD) cards are a type of memory that can store up to 2GB of data. Secure Digital High Capacity (SDHC) cards are another type os flash memore that can store up to 32 GB of data.
80 of 104
Search engine index
List of websites which has been compiled by the search engine which drastically increases speed of searching.
81 of 104
Social Bookmarking
Way of organising, storing and managing links to online resources, allowing users to search them easily.
82 of 104
Social networking site
An online community where people can communicate and share information.
83 of 104
Software as a service
See Hosted Software
84 of 104
A phone offering advanced features (Emails, Internet, Camera)
85 of 104
Software that can be installed on your computer withour your knowledge, collects information about your logins and passwords etc
86 of 104
SSL (Secure Sockets Layer)
Method of encrypting data to provide security for communications over networks. (TSL is a later version of SSL)
87 of 104
Content is sent in compressed form over the internet and displayed by the viewer in real time.
88 of 104
Meeting the needs of the present without compromising the needs of future generations.
89 of 104
Target Audience
Description of people your products are aimed at.
90 of 104
Targeted marketing
Identifying a specific target audience by identifying perferences or other personal details and then creating promotional or advertising campaigns to match their preferences.
91 of 104
Working from home but staying in touch with others with the help of technology.
92 of 104
Third party payment processor
A business that offers customers an alternative fast, safe method to pay for online goods and services.
93 of 104
Transactional Data
Data which is gathered as part of a users online activity.
94 of 104
Program that appears legitimate but which performs some harmful activity when it is run. Could be used to locate password information, or make the system more vunerable to future entry.
95 of 104
Transfer a file from your computer to a central server.
96 of 104
User-generated reference sites
Allow users to generate content collaboratively on a website to which others can refer to inform their research
97 of 104
Based on truth, or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.
98 of 104
Viral marketing
Marketing stratergy that encourages people to pass on a marketing message to their friends.
99 of 104
Virtual learning enviroment (VLE)
Online system for education with areas for homework etc
100 of 104
Program designed to cause other programs on a computer to malfunction or stop working all together.
101 of 104
VoIP (Voice over internet protocol)
Technology is used to make telephone calls via the internet.
102 of 104
Wi-Fi (Wireless Fidelity)
It is simlilar to bluetooth in that it is used to exchange data wirelessly. Signal can travel greater distances.
103 of 104
Type of website that encourages collaboration by allowing users to add, edit, and remove content.
104 of 104

Other cards in this set

Card 2


Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.


Acceptable use policy

Card 3


Software that helps users perform particular tasks.


Preview of the back of card 3

Card 4


Copy of data that is made in case the original data is lost or damaged.


Preview of the back of card 4

Card 5


Amount of data that can fit through an Internet connection.


Preview of the back of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Keywords resources »