Information and Communication Technology (ICT) Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/103

flashcard set

Earn XP

Description and Tags

Glossary-style flashcards covering key ICT concepts, terms, and tools from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

104 Terms

1
New cards

ICT

Information and Communication Technology: Use of communication technology/devices to send, save, and edit information; products that store, process, transmit, convert, duplicate, or receive electronic information.

2
New cards

Information

Facts provided or learned about something or someone.

3
New cards

Communication

Imparting or exchanging of information or news.

4
New cards

Technology

Scientific knowledge for practical purposes, especially in industry; machinery and equipment from applying scientific knowledge.

5
New cards

Immateriality

Information that you have and can move from one place to another (intangible in form).

6
New cards

Interconnection

Link between various technologies.

7
New cards

Digitization

Information processed in a single universal format.

8
New cards

Interactivity

Exchange of information between user and computer.

9
New cards

Instantaneity

Transmitting information over long distances with extreme speed.

10
New cards

Innovation

Development of new methods or means to enhance communication.

11
New cards

Influenciality

Accessing a large amount of information to build knowledge through association with other connected users.

12
New cards

Diversity of information

Information that can impact multiple areas (economy, education, etc.).

13
New cards

Importance of ICT

ICT as a source of knowledge, a medium to transfer knowledge, a medium of interaction, and a means of seeking help.

14
New cards

Advantages of ICT

Benefits include communication, globalization, cost-effectiveness, greater availability, and bridging cultural gaps.

15
New cards

Disadvantages of ICT

Destructive/immoral content, unemployment, privacy concerns, lack of job security, and domination by some cultures.

16
New cards

Cybercrime

Illegal acts done using the internet; crimes committed online.

17
New cards

Phishing

Attempt to acquire sensitive information (usernames, passwords, credit card details).

18
New cards

Spoofing

Impersonation on a network to launch attacks, steal data, or bypass access controls.

19
New cards

Blackmail/Extortion

Unlawfully obtaining money or resources through coercion.

20
New cards

Accessing stored communication

Unauthorized access to an electronic communication facility or service.

21
New cards

Sports betting

Gambling on sports events over the internet.

22
New cards

Electronic/Cyber harassment

Online harassment or bullying.

23
New cards

Child pornography

Exploitation of children by clients of child prostitution.

24
New cards

Online prostitution

Inducing or coercing individuals to engage in prostitution via interstate commerce.

25
New cards

Online drug trafficking

Drug trafficking conducted over the internet.

26
New cards

Criminal copyright infringement (PirateBay)

Piracy of copyrighted material for financial gain.

27
New cards

LAN

Local Area Network: collection of devices connected in one physical location.

28
New cards

WAN

Wide Area Network: large network not tied to a single location; can span the world.

29
New cards

World Wide Web

Information system connected by hypertext links; documents are navigated via the web.

30
New cards

Static Web Pages

Web pages that cannot be manipulated by the user (non-interactive).

31
New cards

Dynamic Web Pages

Web pages that users can contribute to or comment on (interactive).

32
New cards

Folksonomy

Categorizing information with freely chosen words or tags (e.g., hashtags).

33
New cards

Rich User Experience

Dynamic, responsive design that reacts to user input.

34
New cards

User Participation

Users can contribute content (comments, reviews, etc.).

35
New cards

Long Tail

Services offered on demand rather than one-time purchases.

36
New cards

Software as a Service (SaaS)

Users subscribe to software only when needed, via the cloud.

37
New cards

Mass Participation

Diverse information sharing through universal web access.

38
New cards

3.0 Semantic Web

Web pages designed so machines can understand user preferences to tailor content (AI).

39
New cards

Technological Convergence

Synergy of different technologies working toward a common goal.

40
New cards

Social Media

Platforms enabling creation, co-creation, discussion, modification, and exchange of user-generated content.

41
New cards

Social Networks

Sites that connect people with shared interests (e.g., Facebook).

42
New cards

Bookmarking sites

Websites that store/manage links with tags for easy search/sharing.

43
New cards

Social News

Sites where users post news items or links (e.g., Reddit).

44
New cards

Media Sharing

Sites where users upload/share media content (images, music, videos) with likes and comments.

45
New cards

Microblogging

Sites focused on short user updates that followers receive.

46
New cards

Blogs and Forums

Sites where users post content; examples include Blogger, WordPress, Tumblr.

47
New cards

Mobile Technology

Rise of mobile devices (phones/tablets) enabling tasks previously done on PCs.

48
New cards

Mobile Devices Operating Systems

iOS, Android, Blackberry OS, Windows Phone OS, Symbian, Web OS, Windows Mobile.

49
New cards

Assistive Media

Non-profit service aiding people with visual or reading impairments.

50
New cards

Cloud Computing

Accessing software and storage over the internet (the cloud) rather than locally.

51
New cards

Client Computers

End-user devices used to interact with cloud services.

52
New cards

Distributed Servers

Servers in multiple locations working together as a single system.

53
New cards

Datacenters

Facilities housing many servers where applications run and are accessed via the internet.

54
New cards

Public Cloud

Cloud services accessible to the general public; often less secure due to openness.

55
New cards

Private Cloud

Cloud services restricted to a single organization with higher security.

56
New cards

Community Cloud

Cloud services shared by a group of organizations.

57
New cards

Hybrid Cloud

Combination of public and private clouds for different workloads.

58
New cards

Internet Safety

Online security and safety of people and information when using the internet.

59
New cards

Internet Security

Range of security practices to protect online activities and transactions.

60
New cards

CIA Triad

Confidentiality, Integrity, Availability—core security goals.

61
New cards

Masquerader

Outside attacker who uses someone else’s credentials to access a system.

62
New cards

Misfeasor

Inside user who misuses privileges or accesses unauthorized areas.

63
New cards

Clandestine User

User (inside/outside) who evades auditing and access controls.

64
New cards

Computer Crime

Criminal acts involving computers (damage, theft, manipulation).

65
New cards

Computer Criminals

People who commit computer crimes (employees, outsiders, organized crime, hackers).

66
New cards

Virus

Malware that requires a host to activate and spread.

67
New cards

Worm

Self-replicating malware that spreads without a host trigger.

68
New cards

Trojan Horse

Malicious code that hides as legitimate software to take control.

69
New cards

Spyware

Software that runs in the background to monitor user activity.

70
New cards

Adware

Software that displays unwanted advertisements, often as pop-ups.

71
New cards

Ransomware

Malware that blocks access to data or demands ransom for release.

72
New cards

Spam

Unwanted email, typically sent by bots or advertisers.

73
New cards

Dormant Phase

Virus has infected the system but remains inactive.

74
New cards

Propagation Phase

Virus multiplies and spreads to other files or programs.

75
New cards

Triggering Phase

Virus activates in response to a condition or date.

76
New cards

Execution Phase

Virus payload is released; end users notice problems.

77
New cards

Worm vs Virus vs Trojan Horse

Worms spread automatically; viruses require a host; trojans disguise as legitimate software.

78
New cards

Mail Merge

Word feature to create multiple documents by combining a main document with a data source.

79
New cards

Main Document

The primary document in a mail merge that contains the message body.

80
New cards

Data Source

Source data (e.g., an Excel file) used to populate a mail merge.

81
New cards

Ribbon

Collection of tools organized under a tab (e.g., Home) in Word/PowerPoint.

82
New cards

Slide

A single page in a PowerPoint presentation.

83
New cards

Slide Deck

Group of slides that comprise a presentation.

84
New cards

Design Template

Pre-designed styles applied to slides to set appearance.

85
New cards

Slide Show Button

Control that starts the presentation in full-screen mode.

86
New cards

Animation

Effects applied to text or graphics on a slide.

87
New cards

Transition

Effects that move from one slide to the next.

88
New cards

Normal View

Default PowerPoint/Word editing view.

89
New cards

Notes Page View

View showing speaker notes for each slide.

90
New cards

Outline View

Displays slide text in outline form for quick editing.

91
New cards

Slide Sorter View

Thumbnails of slides to reorder and organize the deck.

92
New cards

Column

Vertical component in Excel, identified by letters.

93
New cards

Row

Horizontal component in Excel, identified by numbers.

94
New cards

Cell

Intersection of a row and column; unique address on a worksheet.

95
New cards

Cell Reference

The address of a cell (e.g., B5) used in formulas.

96
New cards

SUM

Function that adds numbers in a specified range.

97
New cards

COUNT

Function that counts numeric cells in a range.

98
New cards

MIN

Function that returns the smallest value in a range.

99
New cards

MAX

Function that returns the largest value in a range.

100
New cards

AVERAGE

Function that returns the arithmetic mean of a range.