key words

?
  • Created by: Charlie
  • Created on: 02-04-13 16:21
Acceptable use policy
Document making it clear to all employess/users what is acceptable use of ICT systems & what isn't
1 of 107
Access Rights
Restrictions to a user's access to only those files they need in order to perform their job
2 of 107
American Standard Code for Information Interchange (ASCII)
A code representing characters in binary
3 of 107
Audience
A person who will only view the content. They will not alter input or change content.
4 of 107
Backup
Keeping copies of software and data so that the data can be recovered should there be a total loss of the ICT system
5 of 107
Backup File
A copy of a file which is used in the event of the original file being corrupted
6 of 107
Bandwidth
A measure of the amount of data that can be tranferred using a data transfer medium
7 of 107
Batch Processing
Type of processing where all the inputs needed are collected, batched together, inputted and processed in one go
8 of 107
Bespoke Software
Software espically written for a particular user
9 of 107
Bug
A mistake/error in a program
10 of 107
CAD
Computer Aided Design - A method of using the computer to produce technical drawings
11 of 107
CCITT
The International Committee for Data Communication - Popular standard used for electric communication
12 of 107
Client
The person who needs the solution to an ICT problem that they have identified
13 of 107
Client-Server
A network where serveral computers are connected to one or more servers
14 of 107
Coding
Producing a shorter version of the data to aid typing in and to aid validation of the data
15 of 107
Computer Misuse Act 1990
An act which makes illegal a number of activities such as delibrately planting viruses, hacking, using ICT equipment for fraud etc.
16 of 107
Copyright, Designs and Patents Act 1988
An act, which amongst other things, makes it an offence to be caught copying/stealing software
17 of 107
CPU
Central Processing Unit - The computers brain. It stores and processes data
18 of 107
Data
Raw facts and figures that have no meaning
19 of 107
Data Protection Act 1998
Law to protect the individual against the misuse of data
20 of 107
Data Subject
The living individual whom the personal information is about
21 of 107
Data type check
check to ensure the data being entered is the same type as the data type specified for the field
22 of 107
Double entry of data
Two people use the same data source to enter the details into the ICT system and only if the two sets of data are identical, will they be accepted for processing
23 of 107
Dpi
Dots per inch - A measure of resolution of images. The more dots per inch in an image, the higher the resolution
24 of 107
Erroneous data
Data that is ridiculous or totally unsuitable
25 of 107
Evaluation
The act of reviewing what has been achieved, how it was achieved and how well the solution works
26 of 107
Extranet
An external network that can be used by the customers, suppliers and partners of an organisation as well as the organisation itself
27 of 107
Federation Against Software Theft
An anti-piracy organisation who work to protect the work of software publishers
28 of 107
Firewall
Either hardware and/or software that work in a network to prevent communication that is not allowed from one network to another
29 of 107
Flash/pen drives
Popular storage media which offer cheap and large storage capacities and are ideal media for photographs, music and other data files. They consist of printed circuit boards enclosed in a plastic case
30 of 107
Format Checks
Checks performed on codes to make sure that they conform to the correct combinations of characters
31 of 107
Freedom of Information Act 2000
Act giving the right access to information held by public authorities
32 of 107
Generic software
Applications package that is appropriate for a wide range of tasks and can be used in lots of areas of work
33 of 107
GIGO
Garbage In, Garbage Out - If you put rubbish into the computer, then you get rubbish out
34 of 107
Graph Plotter
A device which draws by moving a pen. Useful for scale drawings and is used mainly with CAD packages
35 of 107
GUI
Graphical User Interface - An interface that allows users to communicate with ICT equipment by making use of icons and pull-down menus
36 of 107
Hacking
The process of trying to break into a secure computer system
37 of 107
Hardware
The physical componentts of a computer system
38 of 107
Health and Safety (Displaying Screen Equipment) Regulations 1992
Regulations making it law for employers to take certain measures to protect the health and safety of their employees who use ICT equipment
39 of 107
Health and Safety at Work Act 1974
Law making sure that employees have safe working conditions and methods
40 of 107
ICT systems
Hardware and software working together with people and procedures to do a job
41 of 107
Implementation
The process of producing the working version of the solution to the problem as identified by the client
42 of 107
Information
Facts and figures that have been processed into something meaningful
43 of 107
Ink-jet printer
A printer that works by spraying ink through nozzles onto the paper
44 of 107
Input
Act of entering data into an ICT system
45 of 107
Intergrated Software
An application package consiting of software for seveeral distinct applications. There will always be two or more applications packages in integrated software
46 of 107
Interface
The point where two objects meet. In ICT this is usually between a device such as a computer, printer, scanner, etc ..... and a human
47 of 107
Internal Threat
A threat to an ICT that comes from inside an organisation
48 of 107
Internet
A huge group of networks joined together
49 of 107
ISP
Internet Service Provider - The organisation that provides your Internet connection
50 of 107
Intranet
A private network used within an organisation that makes uses of Internet technology
51 of 107
Laser Printer
A printer which uses a laser beam to form characters on the paper
52 of 107
Length Check
Checks to make sure that the data being entered has the correct number of characters in it
53 of 107
Macro
Used to record a series of keystrokes so that, for example, your name and address can be added to the top of the page, simply by pressing a single key or clicking on the mouse
54 of 107
MICR
Magnetic Ink Character Reader - Input method making use of numbers printed into a document such as a cheque in a special magnetic ink which can be read by the magnetic ink character reader at a very high speed
55 of 107
Mail Merge
Combining a list of names and addresses with a standard letter so that a series of letters is produced with each letter being addressed to a different person
56 of 107
Malpractice
Improper or careless use or misconduct
57 of 107
Network
A group of computers which are able to communicate with each other
58 of 107
Non-volatile Memory
Memory stored on a chip which does not lose data when the power is turned off
59 of 107
Normal Data
Entering data that should be acceptable to the solution
60 of 107
OCR
Opitcal Character Recognition - This is a combination of software and a scanner which is able to read characters into the computer
61 of 107
OMR
Optical Mark Reader/Recognition - Reader that detects marks on a piece of paper. Shaded areas are detected and the computer can understand the information contained in them
62 of 107
Operating System
Software that controls the hardware of a computer ad is used to run the applications software. Operating systems control the handling of input, output, interrupts, etc
63 of 107
Output
The results from processing data
64 of 107
Package Software
A bundle of files necessary for a particular program to run along with some form of documentation to help a user get the program started
65 of 107
Peer to Peer
Network arrangement where each computer is of equal status
66 of 107
Peripheral
A device connected to & under the control of the central processing unit (CPU)
67 of 107
Presence check
Check to make sure that data had been entered into a field
68 of 107
Processing
Performing calculations or arranging the data into a meaningful order
69 of 107
Protocol
A set of standards that allows the transfer of data between computers on a network
70 of 107
RAID
Redundant array of inexpensive disks - A system used by networks to keep backups
71 of 107
RAM
Random Access Memory - Used to hold the data temporarily whilst the computer is working on it. Contents are lost when the computer is switched off
72 of 107
Range Check
Data validation technique which checks that the data input into a computer is within a certain range
73 of 107
Real-time Processing
The input data is processed immediately as it arrives. The results have direct effect on the next set of available data.
74 of 107
RDMS
Relational database Managemnet System - Database system where the data is held in table with relationships established between them. The software is used to set up and hold the data as well as to extract and manipulate the stored data
75 of 107
ROM
Read Only Memory - Memory stored on a chip which does not lose data when the power is turned off
76 of 107
Router
Hardware device which is able to make the decision about the path that an individual packet of data should take so that it arrives in the swhortest possible time
77 of 107
RSI
Repetitive Strain Injury - A painful muscular condition caused by repeatedly using certain muscles in the same way
78 of 107
Security
Making sure that the hardware, software and data of an ICT system does not come to any harm
79 of 107
Software
Programs which supply the instructions to the hardware
80 of 107
Software Licence
Document which sets out the terms by which the software can be used. It will refer to the number of computers on which it can be run simultaneously
81 of 107
Spam
Unsolicited bulk email
82 of 107
Specific Software
Software that only performs one task
83 of 107
Spyware
Software which collects information about the user of a computer connected to the internet without their consent
84 of 107
Systems Software
Any computer software that manages and controls the hardware thus allowing the applications software to do a useful job. Systems software consists
85 of 107
Test Plan
The approach that will be used to test the whole solution and consists of a suite of tests
86 of 107
Topology
The way a particular network is arranged
87 of 107
Transaction Processing
Processing as each transaction arises
88 of 107
Trancription error
Error made when typing data in using a document as the source of data
89 of 107
Transmission Medium
The material in whih forms the connection between the computers in a network
90 of 107
Transmission Rate
The speed of data flow in bits per second
91 of 107
Transposition Error
Error made when characters are swapped around so they are in the wrong order
92 of 107
Trojans
Lines of a computer codes stored in your PC without you knowing
93 of 107
UPS
Uninterruptible Power Supply - A backup power supply which will keep the computer running should the mains power supply fail
94 of 107
URL
Uniform Resource Locator - The web address used to locate a webpage
95 of 107
User
A person who makes active use of an ICT solution to solve an ICT problem
96 of 107
Utility Programs
Software which helps the user perform tasks such as virsus checking, file compression, etc
97 of 107
Validation Checks
Checks as a devloper of a solution creates, using the software, in order to restrict the data that a user can enter so as to reduce errors
98 of 107
Verification
Checking that the data being enetered into the ICT system perfectly matches the source of the data
99 of 107
Virsus
A program that replicates itself automatically and ususlly carries with it some payload which causes damage
100 of 107
Volatile Memory
Memory which loses data when the power is turned off
101 of 107
Web Browser
The software program you use to access the internet. (e.g. Mircrosoft Internet Explorer)
102 of 107
Webpage
Single document on the WWW
103 of 107
Wi-Fi
A trademark for the certification of products that meet certain standards for transmitting data over wireless networks
104 of 107
WIMP
Windows Icon Menus Pointing Device - The GUI way of using a computer rather than typing in commands at the command line
105 of 107
WWW
World Wide Web - A means of accessing information contained on the Internet. It is an information sharing model that is built on top of the Internet
106 of 107
Worm
Aprogram that keeps replicating itself automatically, and as it does so it takes more and more disk space and also uses a greater proportion of the system's resources for each copy
107 of 107

Other cards in this set

Card 2

Front

Access Rights

Back

Restrictions to a user's access to only those files they need in order to perform their job

Card 3

Front

American Standard Code for Information Interchange (ASCII)

Back

Preview of the front of card 3

Card 4

Front

Audience

Back

Preview of the front of card 4

Card 5

Front

Backup

Back

Preview of the front of card 5
View more cards

Comments

Jo

Report

Very useful for those doing AQA AS ICT :) Thanks a lot! ;) **

Johnny B

Report

Really good, thanks !!

Similar ICT resources:

See all ICT resources »