IAL Information Technology – Unit 1 Vocabulary Flashcards

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/171

flashcard set

Earn XP

Description and Tags

These flashcards provide definitions and explanations for key vocabulary terms relevant to Information Technology, covering various topics from digital devices to software and networking.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

172 Terms

1
New cards

Digital Devices

Pieces of hardware that use computers or microcontrollers to receive, store, process, or send digital information.

2
New cards

Hardware

The physical parts of computing devices that can be touched.

3
New cards

Embedded Systems

A computer system made from hardware and software used to perform a specific task.

4
New cards

Peripheral Devices

Devices connected to a computer that provide input or output.

5
New cards

Multifunctional Devices

Devices that can perform multiple functions, such as smartphones.

6
New cards

Convergence

The integration of separate technologies into a single device.

7
New cards

User Interface (UI)

The means by which a user interacts with a computer or digital device.

8
New cards

Command Line Interface (CLI)

A user interface where commands are entered using text.

9
New cards

Menu-Driven Interface

An interface that provides a menu of options to choose from.

10
New cards

Graphical User Interface (GUI)

A visual interface that allows users to interact with electronic devices through graphical icons and visual indicators.

11
New cards

Voice Interface

An interface that recognizes spoken commands from users.

12
New cards

Gesture Interface

An interface that allows users to control devices using physical gestures.

13
New cards

Portability

The ease with which a device can be carried and used in various locations.

14
New cards

Processor

The component of a computer that carries out instructions from software.

15
New cards

Random Access Memory (RAM)

Volatile memory used by a computer to store data temporarily.

16
New cards

Network Protocol

A set of rules governing the communications between devices on a network.

17
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol)

A set of protocols used for data communication over the Internet.

18
New cards

OSI Model (Open Systems Interconnection)

A conceptual framework used to understand network interactions in seven layers.

19
New cards

IP Addressing

A numerical label assigned to each device connected to a computer network.

20
New cards

Dynamic Host Configuration Protocol (DHCP)

A network protocol that assigns IP addresses to devices on a network.

21
New cards

Network Security

The policies and practices aimed at protecting network infrastructure from unauthorized access.

22
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

23
New cards

Cloud Storage

Online space where users can store data that can be accessed from any location.

24
New cards

Software

A set of electronic program instructions or data that a computer processor reads to perform a task.

25
New cards

Operating System (OS)

Software that manages a computer's hardware and software resources.

26
New cards

Application Software

Programs designed to perform a specific task for users.

27
New cards

Database

An organized collection of structured information or data.

28
New cards

Structured Query Language (SQL)

A standard language for managing and manipulating relational databases.

29
New cards

Relational Database

A database structured to recognize relations among stored data.

30
New cards

Primary Key

A unique identifier for a record in a database table.

31
New cards

Foreign Key

A field in one table that links to the primary key of another table.

32
New cards

Data Flow Diagram (DFD)

A graphical representation of the flow of data through an information system.

33
New cards

Entity Relationship (ER) Diagram

Flowchart that illustrates how entities relate to each other within a system.

34
New cards

Sample Rate

The frequency at which samples of a signal are taken.

35
New cards

Digital Footprint

The trail of data you leave while using the internet.

36
New cards

VoIP (Voice over Internet Protocol)

A technology that allows voice communication over the internet.

37
New cards

Static IP Address

An IP address that does not change.

38
New cards

Dynamic IP Address

An IP address that is assigned by a DHCP server and can change over time.

39
New cards

Packet Loss

Failure of one or more packets to reach their destination in a network.

40
New cards

Latency

The delay from input into a system to the desired outcome.

41
New cards

Throughput

The measure of how many units of information a system can process in a given time.

42
New cards

Bandwidth

The maximum data transfer rate of a network.

43
New cards

Ad Hoc Network

A temporary network of devices communicating directly with each other.

44
New cards

Smart Home

A residence that utilizes internet-connected devices for remote monitoring and management.

45
New cards

Smart City

A city that uses technology and data to optimize its operations and improve quality of life.

46
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

47
New cards

Smart Meter

An electronic device that records consumption of electric energy and communicates that information.

48
New cards

Biometrics

Technologies that measure physiological characteristics to identify individuals.

49
New cards

NFC (Near Field Communication)

A set of communication protocols that allows two electronic devices to establish communication by bringing them close.

50
New cards

QR Code (Quick Response Code)

A two-dimensional barcode that can store various types of data.

51
New cards

Artificial Intelligence (AI)

Simulation of human intelligence in machines programmed to think like humans.

52
New cards

Data Mining

The process of discovering patterns and knowledge from large amounts of data.

53
New cards

Encryption

The process of encoding information to prevent unauthorized access.

54
New cards

Cloud Computing

The delivery of computing services over the Internet.

55
New cards

Digital Signage

Electronic displays that convey information and advertising.

56
New cards

Data Breach

An incident where unauthorized access to confidential data occurs.

57
New cards

Phishing

Attempt to acquire sensitive information by masquerading as a trustworthy entity.

58
New cards

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

59
New cards

Adware

Software that automatically displays or downloads advertisements when a user is online.

60
New cards

Social Media

Websites and applications that enable users to create and share content or to participate in social networking.

61
New cards

Remote Working

A working arrangement in which employees do not commute to a central place of work.

62
New cards

E-waste

Discarded electrical or electronic devices.

63
New cards

User Authentication

A process that verifies the identity of a user trying to access a system.

64
New cards

Database Normalization

The process of structuring a relational database to minimize data redundancy.

65
New cards

Machine Learning

A subset of artificial intelligence that enables systems to learn from data and improve over time.

66
New cards

IT Infrastructure

The components that support the delivery of IT services.

67
New cards

Data Visualization

The graphical representation of information and data.

68
New cards

Content Management System (CMS)

Software application that enables users to create and manage digital content.

69
New cards

Web Server

A server that stores, processes, and delivers web pages to users.

70
New cards

API (Application Programming Interface)

Set of rules that allow different software entities to communicate with each other.

71
New cards

IT Governance

Framework that ensures that IT investments support business goals.

72
New cards

Information Security

The practice of protecting information by mitigating information risks.

73
New cards

File Sharing

Distributing or providing access to digital media.

74
New cards

ISP (Internet Service Provider)

A company that provides users with access to the Internet.

75
New cards

Social Engineering

Manipulating individuals into divulging confidential information.

76
New cards

Server Farm

A collection of servers maintained by an organization.

77
New cards

Network Topology

The arrangement of different elements (links, nodes, etc.) in a computer network.

78
New cards

Ransomware

Malicious software that locks or encrypts files, demanding payment for access.

79
New cards

IoT (Internet of Things)

The interconnection of everyday devices to the internet, enabling them to send and receive data.

80
New cards

Spam

Unwanted or unsolicited messages, usually sent in bulk.

81
New cards

Local Area Network (LAN)

A network that connects computers within a limited area, such as a residence or office.

82
New cards

Wide Area Network (WAN)

A telecommunications network that extends over a large geographical area.

83
New cards

Bluetooth

A wireless technology standard for exchanging data over short distances.

84
New cards

VPN (Virtual Private Network)

A service that encrypts your internet connection and protects your online privacy.

85
New cards

User Experience (UX)

Overall experience of a person using a product, especially in terms of how pleasant or easy it is.

86
New cards

Mobile Application

A software application designed to run on mobile devices.

87
New cards

Big Data

Large and complex data sets that traditional data processing software can't manage.

88
New cards

Data Analytics

The science of analyzing raw data to make conclusions about that information.

89
New cards

Version Control

The management of changes to documents, computer programs, and other collections of information.

90
New cards

Digital Rights Management (DRM)

Technologies used to control how digital content is used and distributed.

91
New cards

Web Hosting

The service of providing storage space and access for websites.

92
New cards

SaaS (Software as a Service)

A software distribution model in which applications are hosted by a provider and made available to customers over the Internet.

93
New cards

PaaS (Platform as a Service)

Cloud computing model that delivers hardware and software tools over the internet.

94
New cards

IaaS (Infrastructure as a Service)

Cloud computing model that provides virtualized computing resources over the internet.

95
New cards

AI Ethics

The field of study concerned with the moral implications of AI technologies.

96
New cards

BYOD (Bring Your Own Device)

A policy allowing employees to use their personal devices for work purposes.

97
New cards

DevOps

A set of practices that combine software development (Dev) and IT operations (Ops).

98
New cards

Agile

A project management methodology that focuses on iterative development and flexibility.

99
New cards

Software Development Life Cycle (SDLC)

The process of planning, creating, testing, and deploying software.

100
New cards

Static Website

A website with fixed content that doesn't change with user interaction.