1/151
Vocabulary flashcards covering ICT concepts, cybersecurity, web basics, social/cloud technologies, multimedia tools, and common software (Word, PowerPoint, Excel).
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ICT
Information and Communication Technology; use of devices and systems to send, save, edit, and transmit electronic information.
Information
Facts provided or learned about something or someone.
Communication
Imparting or exchanging of information or news.
Technology
Scientific knowledge for practical purposes, especially in industry; machinery and equipment from applied science.
World Wide Web (WWW)
A system of interlinked documents accessed via the Internet; created by Tim Berners‑Lee.
Electronic mail; messages sent electronically over the Internet.
Chat
Real-time text-based or voice communication online.
Immateriality
Information that can be moved or transmitted without physical form.
Interconnection
Link between different technologies enabling communication across systems.
Digitization
Converting information into a single universal digital format.
Interactivity
Exchange of information between user and computer.
Instantaneity
Transmitting information over long distances with extreme speed.
Innovation
Development of new means to enhance communication.
Influenciality
Ability to access large amounts of information and build knowledge through connections with others.
Diversity of information
Information that can impact broad groups and sectors like economy and education.
Importance of ICT
ICT as a source of knowledge, a medium to transfer knowledge, a medium of interaction, and a means of seeking help.
Advantages of ICT
Benefits such as improved communication, globalization, cost-effectiveness, greater availability, and bridging cultural gaps.
Disadvantages of ICT
Negative aspects like harmful content, unemployment, privacy concerns, lack of job security, and cultural dominance.
Cybercrime
Illegal acts done using the Internet.
Phishing
Attempt to acquire sensitive information (usernames, passwords, credit card details).
Spoofing
An attacker impersonates another device or user on a network to launch attacks or steal data.
Blackmail/extortion
Forcing payment or services through coercion.
Hacking (Accessing stored communication)
Intentionally accessing a facility providing electronic communications without authorization.
Sports betting
Gambling on sports events or contests over the Internet.
Electronic/cyber harassment
Online harassment or bullying.
Child pornography
Exploitation of children by clients of child prostitutes.
Online prostitution
Persuading or coercing individuals to engage in prostitution via interstate commerce.
Online drug trafficking
Engaging drug trafficking on the Internet.
Criminal copyright infringement
Piracy for profit; illegal copying/distribution of copyrighted works.
Information source
Origin of information; the starting point of data.
Encoder
Device that converts information into a signal for transmission.
Transmitter
Device that sends the signal.
Receiver
Device that receives the signal.
Decoder
Device that converts received signal back into usable information.
Storage
Saving information for later retrieval.
Retrieval
Accessing stored information when needed.
Information destination
End-point where information is delivered.
Synchronous
Communication where both parties send data at the same time.
Asynchronous
Communication with a time delay between sending and receiving.
Online chat
Text-based real-time chat conducted online.
Satellite
Technology used for TV channels and video conferencing; part of communications.
Mobile technology
Communication via mobile devices like smartphones and tablets.
Internet
Global system of connected networks using TCP/IP to link billions of devices.
LAN (Local Area Network)
Collection of devices connected in one physical location.
WAN (Wide Area Network)
Large network not tied to a single location; can span regions/worlds.
Static Web Pages
Web pages that cannot be manipulated by the user; non-interactive content.
Dynamic Web Pages
Web pages that allow user contribution and interaction.
Folksonomy
Classification using freely chosen words (e.g., hashtags).
Rich User Experience
Dynamic, responsive design that reacts to user input.
User Participation
Users can contribute content (comments, reviews, etc.).
Long Tail
Services offered on demand rather than one-time purchases.
Software as a Service (SaaS)
Software delivered over the Internet via subscription rather than purchase.
Mass Participation
Broad sharing of information through universal web access.
Semantic Web (3.0)
Web where machines understand user preferences to tailor content.
Technological Convergence
Synergy of tech advancements working toward common goals.
Social Media
Platforms enabling users to create, co-create, discuss, and share content.
Social Networks
Sites that connect people with shared interests or backgrounds.
Bookmarking sites
Sites to store/manage links and tags for easy search/share.
Social News
Sites where users post news items or links to sources.
Media Sharing
Sites for uploading and sharing media (images, music, video).
Microblogging
Sites focusing on short updates for followers.
Blogs and Forums
Sites where users post content; blogs and discussion forums.
iOS
Apple's mobile operating system used on iPhone/iPad.
Android
Open-source mobile OS developed by Google.
Blackberry OS
Operating system used on BlackBerry devices.
Windows Phone OS
Microsoft’s closed proprietary mobile OS.
Symbian
Original smartphone OS used on some Nokia devices.
WebOS
OS originally for smartphones; now used in some smart TVs.
Windows Mobile
Microsoft’s mobile operating system.
Assistive Media
Non‑profit service to help people with visual/reading impairments.
Cloud Computing
Accessing software and storage remotely over the Internet; data lives in the cloud.
Client Computers
Devices used by end users to access cloud services.
Distributed Servers
Servers in different locations acting as a single system.
Datacenters
Facilities housing servers and storage for cloud services.
Public Cloud
Cloud services available to the general public; potentially less secure.
Private Cloud
Cloud services restricted to a single organization with higher security.
Community Cloud
Clouds shared by a group of organizations.
Hybrid Cloud
Combination of public and private cloud use.
Internet Safety
Online safety and security of people and their information.
Internet Security
Strategies and tools to protect online activities and data.
CIA Triad – Confidentiality
Protecting data from unauthorized disclosure.
CIA Triad – Integrity
Maintaining data accuracy and trustworthiness; not tampered with.
CIA Triad – Availability
Ensuring data/services are accessible when needed.
Masquerader
Unauthorized user who uses someone else’s credentials.
Misfeasor
Authorized user who misuses privileges or accesses beyond authorization.
Clandestine User
User with elevated access who evades auditing.
Computer Crime
Criminal acts involving computers (fraud, theft, etc.).
Hackers
People who gain unauthorized access to systems for various purposes.
Crackers
Criminals who break into systems or bypass protections.
Damage to computers
Destruction or impairment of computer hardware or software.
Theft
Stealing hardware, software, data, or time.
View/Manipulation
Unauthorized entry into or alteration of data.
Dormant Phase
Virus phase when it has accessed but is not yet active.
Propagation Phase
Virus phase where it multiplies and spreads.
Triggering Phase
Phase when the virus becomes activated.
Execution Phase
Virus payload is released and operations begin.
Trojan Horse
Malicious code that looks legitimate but controls the system.
Spyware
Software that runs in the background to monitor user activity.
Adware
Software that displays unwanted advertisements.
Ransomware
Malware that blocks access to data and demands payment.