IT Edexcel Key Words

HideShow resource information
Computer programs that can replicate themselves and cause a lot of damage to computers.
1 of 61
Malicous software - This is designed to upset the normal operation of a computer or secretly access sensitive information.
2 of 61
Standards about what makes an e-mail polite or impolite.
3 of 61
Social Media
Online networking sites such as Facebook.
4 of 61
Unwanted e-mails offering products and services, they can also contain viruses and are normally from companies of a disreputable nature. There is no option to unsunscribe.
5 of 61
Connection method
This is how hardware devices are connected on a network. Ethernet is the standard set of protocols for connecting devices in most LAN networks, others include Bluetooth and Firewire
6 of 61
Used to describe the layout, shape or arrangement of a network.
7 of 61
Used to describe the area the network covers.
8 of 61
A computer that has been specially configured to perform a specific task.
9 of 61
A relationship in a computer network where computers 'request' data or services from the server e.g. individual workstations.
10 of 61
Ring Network
All computers are connected in a circle by a cable and a token is passed around the network to carry data.
11 of 61
Mesh Network
Every computer is connected to every other computer either by cable or wirelessly.
12 of 61
Wireless Network
Uses radio waves and Wi-Fi technology to transmit data rather than cables.
13 of 61
Bus Network
The simplest topology. The computers are connected by a backbone.
14 of 61
Star Network
All computers are atatched to a server through a switch.
15 of 61
When digital devices are brought together into one thing.
16 of 61
DAB or Digital Broadcasting
Method of receiving radio stations via a DAB radio with high quality and less interference.
17 of 61
An industry protocol that allows electronic instruments and computers to comminicate with each other
18 of 61
Input Device
A device that is used to enter information to a computer.
19 of 61
Binary code
A system in which the digits 0 and 1 are used to represent other items such as letters or instructions.
20 of 61
The range of frequencies that are used for transmitting a signal.
21 of 61
File Extension
The letters after the dot in a file name (e.g. .doc)
22 of 61
The type of file that something is
23 of 61
Word processing file
24 of 61
Spreadsheets file
25 of 61
Web page file
26 of 61
Graphics file
27 of 61
Flash drives
Small portable devices used for storing and transporting files (e.g. USB stick)
28 of 61
Peripheral devices
External devices that are not part of a computer
29 of 61
Collaborative working
This is when people work together on soemthing at a time - a network allows people to access the same files and folders
30 of 61
Network Interface Card (NIC)
The hardware required to communicate with another computer or peripheral device
31 of 61
Twisted-pair cables
Ethernet cabling - the most common type
32 of 61
Coaxial cables
Better at resisting interference and can be run for longer lengths, but are not as flexible
33 of 61
Fibre optic cables
Have a central core made of glass and transmit signals using light. They are faster but more expensive
34 of 61
Devices that are used to connect multiple computers togetehr on a network - a ethernet cable connects each computer's NIC to the hub so computers can share data.
35 of 61
Connect multiple computers togehter on a network. They are more intelligent than hubs but are more expensive.
36 of 61
Connection devices that can work on a network level - they allow LANs to connect to a WAN
37 of 61
Network Address
A number identifying which computer is which on a network
38 of 61
Small segments of data
39 of 61
IP address
Internet protocol address - a unique number given to a computer linked to the internet which identifies that physical computer
40 of 61
HyperText Mark-up Language - standard language for writing web pages
41 of 61
A set of rules for encoding and decoding data so that it is understoof correctly. It is like a computer being told which language to use when deciphering data.
42 of 61
Hypertext Transfer Protocol - the first part of many web addresses and it states the protocol the website will use to communicate
43 of 61
Post Office Protocol - a protocol used by e-mail customers to retrieve e-mail
44 of 61
Voice over Internet Protocol - a protocol used when communicating by voice over the internet
45 of 61
Internet Message Across Protocol - allows e-mail clients to remotely access mail servers
46 of 61
Network Coverage
The geogrpahical area over which a mobile network is accessible from a mobile device
47 of 61
Network speeds
The rate at which data can be transferred to a network
48 of 61
Uniform Resource Locator, it is the websitr address
49 of 61
A description of the features of a system
50 of 61
Type of screen on a computer or TV. TFT stands for 'thin film transistor' and is a stype of LCD (liquid crystal display) screen.
51 of 61
Solid-state memory
Memory storage that has no moving parts
52 of 61
Downloadable programs that perform specific functions on a digtial device.
53 of 61
A type of data transfer
54 of 61
Global System for Mobile Communications - the most popular standard for mobile technology in the world. Using GSM means that phones from one country can be used (roaming) in another. It is a 2G technology that allows for the sending of voice and SMS.
55 of 61
Wireless Fidelity - a trademark used to classify products that adhere to a standard for connecting devices wirelessly.
56 of 61
General Packet Radio Service - it groups data into packets for faster transmission, it can also be used to access the Internet on a phone but data transfer speeds are limited.
57 of 61
Third Generation - this technology allows for faster data transfer and can facilitate video calls, mobile TV and locations services.
58 of 61
A short range wireless communication technology - can be used to create a PAN when connecting a mobile device to a computer
59 of 61
Personal Area Network
60 of 61
The process by which one device takes on the functionality of multiple devices
61 of 61

Other cards in this set

Card 2


Malicous software - This is designed to upset the normal operation of a computer or secretly access sensitive information.



Card 3


Standards about what makes an e-mail polite or impolite.


Preview of the back of card 3

Card 4


Online networking sites such as Facebook.


Preview of the back of card 4

Card 5


Unwanted e-mails offering products and services, they can also contain viruses and are normally from companies of a disreputable nature. There is no option to unsunscribe.


Preview of the back of card 5
View more cards




how to use this?????

Similar ICT resources:

See all ICT resources »See all Application software resources »