ICT Keywords

HideShow resource information
3G
Third-Generation wireless communication which allows high-speed wireless data transfer.
1 of 104
Acceptable use policy
Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.
2 of 104
Application (Application software)
Software that helps users perform particular tasks.
3 of 104
Back-up
Copy of data that is made in case the original data is lost or damaged.
4 of 104
Bandwidth
Amount of data that can fit through an Internet connection.
5 of 104
Biometric
Automated method of recognising a person based on physical characteristics.
6 of 104
Blog
A shared online journal where people can post diary enteries about their personal experiences and hobbies.
7 of 104
Blue-jacking
The sending of unwanted messages to others over Bluetooth connections.
8 of 104
Bluetooth
Allows exchange of data over short distances from fixed and mobile devices.
9 of 104
Blu-Ray
A disk that enables the recording, rewriting and playback of high-definition video and the storing of large amount of data.
10 of 104
Broadband
A high-speed connection to the Internet.
11 of 104
Buffering
Download a certain amount of data into temporary storage before starting to play a file.
12 of 104
Card Code Verification (CCV)
A set of numbers on the back of a credit card that help verify that the use of the credit card is legitimate.
13 of 104
Cloud computing
A system in which all computer programs and data is stored on a central server owned by a company and accessed virtually.
14 of 104
Collaboratively
Working together with other people
15 of 104
Commercial
Related to a business
16 of 104
Compatible
The ability of a device to communicate and share information with another device.
17 of 104
Computer misues act
This law restricts people from accessing or modifying data without permission.
18 of 104
Convergence
When one device is developed to carry out functions that were originally performed by several different devices.
19 of 104
Cookies
Small text files that are sent to your computer from certain websites and track your behaviour.
20 of 104
Copyright
Gives the creator ofan orginal work exclusive rights regarding that work for a certain period of time.
21 of 104
Copyright, Designs and Patents act
This law protects peoples original work from being used without their permission.
22 of 104
Credit Card
A plastic card, issued by banks, enables a person to buy goods and services without the need for cash. Holder agrees to pay back money borrowed at a later date.
23 of 104
Data
Symbols, characters, images and numbers are all types of data. When data is processed and acquires meaning it becomes information.
24 of 104
Data protection act
This law regulates how personal information is used and protects against misuse of personal details.
25 of 104
Debit Card
Similar to a credit card, but the money is taken directly from the cardholders bank account.
26 of 104
Digital Divide
Unequal access to ICT for individuals or groups, usually due to financial, geographic, health, or cultural reasons.
27 of 104
Digital Enconomy Act
Law protects copyright holders from criminals who illegally distribute copyrighted material.
28 of 104
Digital Rights Movement
Allows the copyright holder or the owner of the media control over the number of viewings, plays and copies, and even which device the media can be played or viewed on.
29 of 104
Dongle
A small piece of hardware that connects to a computer and has uses including data storage and picking up bluetooth and 3G signals.
30 of 104
Download
Transfer of a file from a central computer to your computer.
31 of 104
DVD
DVDs offer higher storage capacity than compact discs, whilst having the same dimensions.
32 of 104
E-commerce
Buying and selling goods electronically, usually over the internet.
33 of 104
Electronic Waste (E-Waste)
Rubbish comprising of digital materials e.g. old computers
34 of 104
Encryption
For security, data is translated into a secret code according to a set of rules in a special 'key'. To convert text back, reciever must also have the key.
35 of 104
Ergonomics
The design of equipment to increase the efficiency of the way it is used by the human body
36 of 104
Etiquette
Set of rules that people abide by out of respect for other around them.
37 of 104
Firewall
System designed to prevent unauthorised access to your computer when connected to a network like the internet.
38 of 104
Flash Memory Card
Used for fast and easily transferable information storage in digital devices such as mobile phones, media players and cameras.
39 of 104
Fraud
Tricking someone for personal gain or to damage them.
40 of 104
Geotag
To attach the exact geographical coordinates of longitude and latitude to a digital image, giving it a location.
41 of 104
Globalisation
The increasing integration of economies and societies around the world, particularly through international trade.
42 of 104
GPS (Global Positioning System)
Navigational system used in many devices which gives current location.
43 of 104
Hacker
Someone who gains unauthorised access to a computer in order to obtain data stored on it.
44 of 104
HDMI (High definition multimedia interface)
Required for connecting devices to show high definition video.
45 of 104
HDTV
High-definition television.
46 of 104
High Definition (HD)
Picture on a TV screen is made of lines of pixels.HD has 720 or 1080 lines, so it produces a clearer image.
47 of 104
Hosted software
Software as service (SaaS) is accessed via a web browser rather than being installed.
48 of 104
Identity theft
A crime that involves someone pretending to be another person in order to steal money or obtain other benefits.
49 of 104
Information overload
Having so much information that the user feels overwhelmed.
50 of 104
ISP (Internet Service Provider)
A company that provides Internet access to its customers
51 of 104
IP (Internet Protocol) address
Personal address of your computer so that the server knows where to send the information you have requested.
52 of 104
Lag
Slow computer functonality often caused by high latency or low performance hardware.
53 of 104
Latency
The time delay between the moment something is initiated and the moment it becomes detectable.
54 of 104
Locally installed software
Software that is installed on the users computer.
55 of 104
Microblog
Short messages which may include short sentences individual images or video links.
56 of 104
Multifunctional
Having the ability to do many different things using the same device.
57 of 104
Near field communication (NFC)
Allows the wireless exchange of data between 2 devices by touching them together or holeding them very close to eachother.
58 of 104
Non-physical goods
Items for sale which are delivered digitally (iTunes)
59 of 104
On-demand entertainment
Technology that allows users to view programmes at the time of their choosing by streaming them.
60 of 104
Online banking
A service offered by banks that allows users to view their account information online and carry out various financial transactions.
61 of 104
Online community
A group of members of a website who communicate and share ideas online.
62 of 104
Open source software
Software that is available to download free of charge.
63 of 104
Over heads
The ongoing expenses of operating a business.
64 of 104
Peer-to-Peer (P2P)
Sharing files among groups of people who are logged on to a file sharing network.
65 of 104
Peripheral
External devices connected to a computed (printer, microphone)
66 of 104
Personalised learning
Learning that is tailored towards the individual to allow them to make progress.
67 of 104
Personalisation techniques
Ways of making content relevant to a particular customer using their interests.
68 of 104
Phishing
a form of internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
69 of 104
Physicalm goods
Items for sale which can be touched and must be delivered by post in some way.
70 of 104
Plagiarism
Copying someone else's work and presenting it as your own.
71 of 104
Privacy
The protection of personal data.
72 of 104
proprietary software
Software for wihc you must pay for a license to use.
73 of 104
Protocol
Set of rules used by computers to communicate with eachother across a network.
74 of 104
Public domain
Materials that are available for anyone to use for any purpose.
75 of 104
Query
To search, usually when talking about a database.
76 of 104
Repetitive Strain Injury (RSI)
Damage cause to the muscles, tendons, ligaments, nerves or joints usually because of repeating the same action.
77 of 104
RSS feeds
Web feed format used for content which is frequently updated.
78 of 104
Sat Nav
A device that gives directions based on information recieved from a series of satellites.
79 of 104
SD and SDHC cards
Secure digital (SD) cards are a type of memory that can store up to 2GB of data. Secure Digital High Capacity (SDHC) cards are another type os flash memore that can store up to 32 GB of data.
80 of 104
Search engine index
List of websites which has been compiled by the search engine which drastically increases speed of searching.
81 of 104
Social Bookmarking
Way of organising, storing and managing links to online resources, allowing users to search them easily.
82 of 104
Social networking site
An online community where people can communicate and share information.
83 of 104
Software as a service
See Hosted Software
84 of 104
Smartphone
A phone offering advanced features (Emails, Internet, Camera)
85 of 104
Spyware
Software that can be installed on your computer withour your knowledge, collects information about your logins and passwords etc
86 of 104
SSL (Secure Sockets Layer)
Method of encrypting data to provide security for communications over networks. (TSL is a later version of SSL)
87 of 104
Stream
Content is sent in compressed form over the internet and displayed by the viewer in real time.
88 of 104
Sustainability
Meeting the needs of the present without compromising the needs of future generations.
89 of 104
Target Audience
Description of people your products are aimed at.
90 of 104
Targeted marketing
Identifying a specific target audience by identifying perferences or other personal details and then creating promotional or advertising campaigns to match their preferences.
91 of 104
Teleworking
Working from home but staying in touch with others with the help of technology.
92 of 104
Third party payment processor
A business that offers customers an alternative fast, safe method to pay for online goods and services.
93 of 104
Transactional Data
Data which is gathered as part of a users online activity.
94 of 104
Trojan
Program that appears legitimate but which performs some harmful activity when it is run. Could be used to locate password information, or make the system more vunerable to future entry.
95 of 104
Upload
Transfer a file from your computer to a central server.
96 of 104
User-generated reference sites
Allow users to generate content collaboratively on a website to which others can refer to inform their research
97 of 104
Validity
Based on truth, or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.
98 of 104
Viral marketing
Marketing stratergy that encourages people to pass on a marketing message to their friends.
99 of 104
Virtual learning enviroment (VLE)
Online system for education with areas for homework etc
100 of 104
Virus
Program designed to cause other programs on a computer to malfunction or stop working all together.
101 of 104
VoIP (Voice over internet protocol)
Technology is used to make telephone calls via the internet.
102 of 104
Wi-Fi (Wireless Fidelity)
It is simlilar to bluetooth in that it is used to exchange data wirelessly. Signal can travel greater distances.
103 of 104
Wikis
Type of website that encourages collaboration by allowing users to add, edit, and remove content.
104 of 104

Other cards in this set

Card 2

Front

Rules to which users agree, to reduce the misuse of ICT. Often found on social networking/collaborative sites.

Back

Acceptable use policy

Card 3

Front

Software that helps users perform particular tasks.

Back

Preview of the back of card 3

Card 4

Front

Copy of data that is made in case the original data is lost or damaged.

Back

Preview of the back of card 4

Card 5

Front

Amount of data that can fit through an Internet connection.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Keywords resources »