1/171
These flashcards provide definitions and explanations for key vocabulary terms relevant to Information Technology, covering various topics from digital devices to software and networking.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Digital Devices
Pieces of hardware that use computers or microcontrollers to receive, store, process, or send digital information.
Hardware
The physical parts of computing devices that can be touched.
Embedded Systems
A computer system made from hardware and software used to perform a specific task.
Peripheral Devices
Devices connected to a computer that provide input or output.
Multifunctional Devices
Devices that can perform multiple functions, such as smartphones.
Convergence
The integration of separate technologies into a single device.
User Interface (UI)
The means by which a user interacts with a computer or digital device.
Command Line Interface (CLI)
A user interface where commands are entered using text.
Menu-Driven Interface
An interface that provides a menu of options to choose from.
Graphical User Interface (GUI)
A visual interface that allows users to interact with electronic devices through graphical icons and visual indicators.
Voice Interface
An interface that recognizes spoken commands from users.
Gesture Interface
An interface that allows users to control devices using physical gestures.
Portability
The ease with which a device can be carried and used in various locations.
Processor
The component of a computer that carries out instructions from software.
Random Access Memory (RAM)
Volatile memory used by a computer to store data temporarily.
Network Protocol
A set of rules governing the communications between devices on a network.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A set of protocols used for data communication over the Internet.
OSI Model (Open Systems Interconnection)
A conceptual framework used to understand network interactions in seven layers.
IP Addressing
A numerical label assigned to each device connected to a computer network.
Dynamic Host Configuration Protocol (DHCP)
A network protocol that assigns IP addresses to devices on a network.
Network Security
The policies and practices aimed at protecting network infrastructure from unauthorized access.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
Cloud Storage
Online space where users can store data that can be accessed from any location.
Software
A set of electronic program instructions or data that a computer processor reads to perform a task.
Operating System (OS)
Software that manages a computer's hardware and software resources.
Application Software
Programs designed to perform a specific task for users.
Database
An organized collection of structured information or data.
Structured Query Language (SQL)
A standard language for managing and manipulating relational databases.
Relational Database
A database structured to recognize relations among stored data.
Primary Key
A unique identifier for a record in a database table.
Foreign Key
A field in one table that links to the primary key of another table.
Data Flow Diagram (DFD)
A graphical representation of the flow of data through an information system.
Entity Relationship (ER) Diagram
Flowchart that illustrates how entities relate to each other within a system.
Sample Rate
The frequency at which samples of a signal are taken.
Digital Footprint
The trail of data you leave while using the internet.
VoIP (Voice over Internet Protocol)
A technology that allows voice communication over the internet.
Static IP Address
An IP address that does not change.
Dynamic IP Address
An IP address that is assigned by a DHCP server and can change over time.
Packet Loss
Failure of one or more packets to reach their destination in a network.
Latency
The delay from input into a system to the desired outcome.
Throughput
The measure of how many units of information a system can process in a given time.
Bandwidth
The maximum data transfer rate of a network.
Ad Hoc Network
A temporary network of devices communicating directly with each other.
Smart Home
A residence that utilizes internet-connected devices for remote monitoring and management.
Smart City
A city that uses technology and data to optimize its operations and improve quality of life.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Smart Meter
An electronic device that records consumption of electric energy and communicates that information.
Biometrics
Technologies that measure physiological characteristics to identify individuals.
NFC (Near Field Communication)
A set of communication protocols that allows two electronic devices to establish communication by bringing them close.
QR Code (Quick Response Code)
A two-dimensional barcode that can store various types of data.
Artificial Intelligence (AI)
Simulation of human intelligence in machines programmed to think like humans.
Data Mining
The process of discovering patterns and knowledge from large amounts of data.
Encryption
The process of encoding information to prevent unauthorized access.
Cloud Computing
The delivery of computing services over the Internet.
Digital Signage
Electronic displays that convey information and advertising.
Data Breach
An incident where unauthorized access to confidential data occurs.
Phishing
Attempt to acquire sensitive information by masquerading as a trustworthy entity.
Malware
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Adware
Software that automatically displays or downloads advertisements when a user is online.
Social Media
Websites and applications that enable users to create and share content or to participate in social networking.
Remote Working
A working arrangement in which employees do not commute to a central place of work.
E-waste
Discarded electrical or electronic devices.
User Authentication
A process that verifies the identity of a user trying to access a system.
Database Normalization
The process of structuring a relational database to minimize data redundancy.
Machine Learning
A subset of artificial intelligence that enables systems to learn from data and improve over time.
IT Infrastructure
The components that support the delivery of IT services.
Data Visualization
The graphical representation of information and data.
Content Management System (CMS)
Software application that enables users to create and manage digital content.
Web Server
A server that stores, processes, and delivers web pages to users.
API (Application Programming Interface)
Set of rules that allow different software entities to communicate with each other.
IT Governance
Framework that ensures that IT investments support business goals.
Information Security
The practice of protecting information by mitigating information risks.
File Sharing
Distributing or providing access to digital media.
ISP (Internet Service Provider)
A company that provides users with access to the Internet.
Social Engineering
Manipulating individuals into divulging confidential information.
Server Farm
A collection of servers maintained by an organization.
Network Topology
The arrangement of different elements (links, nodes, etc.) in a computer network.
Ransomware
Malicious software that locks or encrypts files, demanding payment for access.
IoT (Internet of Things)
The interconnection of everyday devices to the internet, enabling them to send and receive data.
Spam
Unwanted or unsolicited messages, usually sent in bulk.
Local Area Network (LAN)
A network that connects computers within a limited area, such as a residence or office.
Wide Area Network (WAN)
A telecommunications network that extends over a large geographical area.
Bluetooth
A wireless technology standard for exchanging data over short distances.
VPN (Virtual Private Network)
A service that encrypts your internet connection and protects your online privacy.
User Experience (UX)
Overall experience of a person using a product, especially in terms of how pleasant or easy it is.
Mobile Application
A software application designed to run on mobile devices.
Big Data
Large and complex data sets that traditional data processing software can't manage.
Data Analytics
The science of analyzing raw data to make conclusions about that information.
Version Control
The management of changes to documents, computer programs, and other collections of information.
Digital Rights Management (DRM)
Technologies used to control how digital content is used and distributed.
Web Hosting
The service of providing storage space and access for websites.
SaaS (Software as a Service)
A software distribution model in which applications are hosted by a provider and made available to customers over the Internet.
PaaS (Platform as a Service)
Cloud computing model that delivers hardware and software tools over the internet.
IaaS (Infrastructure as a Service)
Cloud computing model that provides virtualized computing resources over the internet.
AI Ethics
The field of study concerned with the moral implications of AI technologies.
BYOD (Bring Your Own Device)
A policy allowing employees to use their personal devices for work purposes.
DevOps
A set of practices that combine software development (Dev) and IT operations (Ops).
Agile
A project management methodology that focuses on iterative development and flexibility.
Software Development Life Cycle (SDLC)
The process of planning, creating, testing, and deploying software.
Static Website
A website with fixed content that doesn't change with user interaction.