1/99
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
query criterion
A condition that you specify for a field.
digital divide
access to technology
A go od example of convergence
iphone
COUNTIF
calculates the values in cells according
to a given condition or criteria
Proprietary software is software
for which a licence needs to be purchased in order to use it
Ctrl + Enter
The shortcut key to insert a page break
RANDBETWEEN
Generates a random whole number
between the
numbers that you specify.
template
A pattern that can be used to design documents
e.g. memo forms
level 1 cache memory
Where instructions which might be used next by
the processor are stored for quick access.
malware
Malicious software
record
A collection of fields in Access that includes all the
particulars of a specific person.
hyperlink
Underlined text on a web page which redirects
you to another web page or resource.
phishing
Attempts
to con a user in to providing personal
information such as a PIN.
motherboard
connects the different parts of the computer,
and provides a way for these parts to
communicate with each other
cookie
A small text file generated by a website and
stored on your computer s hard disk for later use
by the website.
bot
Computers connected to the internet that are
being remotely controlled by another computer
card reader
would be useful if you want to transfer photos from your digita l
camera to your computer
BYOD
Bring your own device
ergonomics
designing equipment to reduce health issues
SSD
Solid State Drive
OCR
The software breaks the image
down into blocks and compares the
shape of the individual letters to the letters in a database
what does OCR stand for?
Optical Character Recognition
shortcut to task manager
Control + Alt + Delete
social engineering
Any attempt to manipulate or con someone into revealing information such as passwords or account numbers which can be used to impersonate them.
Quarantine
virus/malware is stored in a separate area
on the hard drive until it can be removed.
zombie
A robot (bot) is a computer that has been compromised (infected) and can be controlled remotely when it is connected to the internet
primary key
unique field
file format to save the document where it could be studied and printed, but not edited.
cap
limit on the amount of data that can be uploaded or
downloaded.
shaped connection
connection gives preference to e mail, downloading and browsing
unshaped connection
no priorities or preferences
Web browser
Software that allows one to view and explore pages on the
internet
Search engine
A program that searches documents located on the Internet using keywords entered by a person looking for information
ADSL
permanent connection to the internet (always on).
SYNCING
files are updated in folders and then copies of the same files on other computers on the system are automatically updated.
closed question
limited responses available for selection by the respondent
PIM
Programs that assist users to organise personal information.
metadata
Additional data about a file.
Open source software
allows users to use, change and redistribute it free
of charge.
Shareware
software that you can download for free and use for a trial period
linux
example of open source operating system
gmail
Webmail/web based e mail .
cookie
A file created by a website that is stored in the user's
computer
dropbox
An example of an online storage facility or service
e-commerce
The term used for the marketing, purchase and sale of
products or services over the Internet
throttling
ISP slows down your Internet
connection
server
A computer that provides resources and / or services to other computers on a network
podcast
A multimedia file downloaded from the Internet and can
then be transferred to computers or portable media
players
crowd funding
website where a single idea or business practice is
funded by a large number of small donations of volunteer
contributors, usually at the beginning of the business
GUI
An interface type that is represented graphically by
means of icons and other visual aids
Graphical User Interface
GUI
switch
A device that causes communication between computers
in a network
fiber optic
cables are lighter and can transfer data faster than other cables
both an input and an output device
touch screen
landscape
refers to the orientation of a page in a word
processing document
carpel tunnel syndrome
injuries due to rapid repetitive actions
HTTPS
secure site
Blog
website that allows users to add or update content to a site by
using their own web browsers.
hardware
The physical parts of a computer
compatibility
the ability of two or more systems or their components to work together without intervention or modification by the user.
UPS
Uninterruptible power supply
UPS
An uninterruptible power supply is an electrical device that supplies power as the power supply, typically the main power source, failure
Defragmentation
tool that rearranges data on your hard drive and reunited fragmented file segments so your computer can work better
soft copy
information visible on the screen and not printed on paper
multitasking operating system
An operating system that is capable of allowing multiple software processes to run at the same time
VoIP
Voice-over-Internet Protocol
VoIP
Voice-over-Internet Protocol
e-zine
A magazine published electronically on the Internet
plagiarism
If you use words and ideas without giving clear recognition to the source of information
bibliography
list of references (in alphabetical order) or anything you used in the research and preparation of a project
citation
when you quote someone or quote something from a book or website
open ended question
if there is more than one possible answer for this question.
closed ended question
if the question can only be answered with a YES or NO
hit
a particular page request command that seeks access to a record on a Web server
geo-tagging
geographical location of an item is added to the metadata of the file using its longitude and latitude.
Click-jacking
users are tricked into clicking on an item on a web page which acts as a concealed link
grid computing
Mutual computer systems where the machines collectively use the same resources
ransomware
type of malware that is designed to access your computer system and files until you pay a sum of money
push email
new e-mails received are sent by the e-mail server directly to a mobile phone
wizard
a program/software/set of dialogs that guides/helps the user to complete a task by taking them through a sequence of steps/presenting them with various options
IM
real-time communication between two people who have immediate response time
ISP
Internet service provider
App
computer software, or a program, usually a small application used for a particular mobile device
URL shortener
an instrument or service that converts a long URL to a shorter version
IoT (Internet of Things)
The interconnection of computer devices (via the Internet) embedded in daily objects, enabling data to be sent and received
Malware
any software developed to damage the computer
uncapped
They are not limited to a set amount of data per month
keylogger
program whereby keys that are entered on your computer's keyboard are captured in a way without the person knowing.
5 ms
example of a monitor's refresh rate
digital signature
An encrypted code that is attached to an email to verify the identity of the sender
Dot Matrix
A type of printer that can create 'carbon copies'.
Bandwidth
the total amount of data that can be carried from one point to another at a given period of time
wireless
The most suitable type of network connection for a university where connections need to be made between different buildings
social networking
The process of interacting online with people who share similar interests and activities.
SOHO
small office/home office
SOHO
A category of a computer user who often works from home
Open Source
Software freely available for use and where the source code can be altered/changed as needed.
graphics card
A component that determines the quality of the display on the screen
SATA
A type of interface or connection used by an internal hard drive
switch
A central node where all the computers on a network plug in