ICT Keywords Info 2 part 2 topics 5-9

?
The process of coding files before they are sent over a network to protect them from hackers. Can also be done to saved files to prevent them being understood if they are stolen.
Encryption
1 of 16
A piece of software, hardware or both that is able to protect a network from hackers.
Firewall
2 of 16
A series of characters chosen by the user that are used to check the identity of the user to allow them access to the computer system or network.
Password
3 of 16
A name or number that is used to identify a certain user of a network or system.
User ID
4 of 16
The person who holds responsibility of controlling how the organisation processes personal data.
Data Controller
5 of 16
The living individual that the personal information is about.
Data Subject
6 of 16
The person responsible for enforcing the data protection act 1998.
Information commissioner
7 of 16
Data about a living person which is specific to that person
Personal data
8 of 16
The process of letting the Information Commissioner's Office know that personal data is being processed.
Notification
9 of 16
The process of illegally processing software.
Piracy
10 of 16
A document which sets out the terms by which the software can be used, this is how many computers the software can be run on simultaneously.
Software Licence
11 of 16
Copies of software and data so that if this is lost on the original computer system it can be recovered.
Backup
12 of 16
Crimes committed with an ICT system as its major part.
Cybercrime
13 of 16
Unsolicited bulk email, ie emails from people you do not know sent to masses of people in the hope it is successful.
Spam
14 of 16
setting up bogus companies with bogus websites and then tricking people into giving them their money.
Scam
15 of 16
A measure of the amount of data that can be transferred using a data transfer medium.
Bandwidth
16 of 16

Other cards in this set

Card 2

Front

A piece of software, hardware or both that is able to protect a network from hackers.

Back

Firewall

Card 3

Front

A series of characters chosen by the user that are used to check the identity of the user to allow them access to the computer system or network.

Back

Preview of the front of card 3

Card 4

Front

A name or number that is used to identify a certain user of a network or system.

Back

Preview of the front of card 4

Card 5

Front

The person who holds responsibility of controlling how the organisation processes personal data.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Systems and Software resources »