ICT and Digital Technologies - Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/151

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering ICT concepts, cybersecurity, web basics, social/cloud technologies, multimedia tools, and common software (Word, PowerPoint, Excel).

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

152 Terms

1
New cards

ICT

Information and Communication Technology; use of devices and systems to send, save, edit, and transmit electronic information.

2
New cards

Information

Facts provided or learned about something or someone.

3
New cards

Communication

Imparting or exchanging of information or news.

4
New cards

Technology

Scientific knowledge for practical purposes, especially in industry; machinery and equipment from applied science.

5
New cards

World Wide Web (WWW)

A system of interlinked documents accessed via the Internet; created by Tim Berners‑Lee.

6
New cards

E-mail

Electronic mail; messages sent electronically over the Internet.

7
New cards

Chat

Real-time text-based or voice communication online.

8
New cards

Immateriality

Information that can be moved or transmitted without physical form.

9
New cards

Interconnection

Link between different technologies enabling communication across systems.

10
New cards

Digitization

Converting information into a single universal digital format.

11
New cards

Interactivity

Exchange of information between user and computer.

12
New cards

Instantaneity

Transmitting information over long distances with extreme speed.

13
New cards

Innovation

Development of new means to enhance communication.

14
New cards

Influenciality

Ability to access large amounts of information and build knowledge through connections with others.

15
New cards

Diversity of information

Information that can impact broad groups and sectors like economy and education.

16
New cards

Importance of ICT

ICT as a source of knowledge, a medium to transfer knowledge, a medium of interaction, and a means of seeking help.

17
New cards

Advantages of ICT

Benefits such as improved communication, globalization, cost-effectiveness, greater availability, and bridging cultural gaps.

18
New cards

Disadvantages of ICT

Negative aspects like harmful content, unemployment, privacy concerns, lack of job security, and cultural dominance.

19
New cards

Cybercrime

Illegal acts done using the Internet.

20
New cards

Phishing

Attempt to acquire sensitive information (usernames, passwords, credit card details).

21
New cards

Spoofing

An attacker impersonates another device or user on a network to launch attacks or steal data.

22
New cards

Blackmail/extortion

Forcing payment or services through coercion.

23
New cards

Hacking (Accessing stored communication)

Intentionally accessing a facility providing electronic communications without authorization.

24
New cards

Sports betting

Gambling on sports events or contests over the Internet.

25
New cards

Electronic/cyber harassment

Online harassment or bullying.

26
New cards

Child pornography

Exploitation of children by clients of child prostitutes.

27
New cards

Online prostitution

Persuading or coercing individuals to engage in prostitution via interstate commerce.

28
New cards

Online drug trafficking

Engaging drug trafficking on the Internet.

29
New cards

Criminal copyright infringement

Piracy for profit; illegal copying/distribution of copyrighted works.

30
New cards

Information source

Origin of information; the starting point of data.

31
New cards

Encoder

Device that converts information into a signal for transmission.

32
New cards

Transmitter

Device that sends the signal.

33
New cards

Receiver

Device that receives the signal.

34
New cards

Decoder

Device that converts received signal back into usable information.

35
New cards

Storage

Saving information for later retrieval.

36
New cards

Retrieval

Accessing stored information when needed.

37
New cards

Information destination

End-point where information is delivered.

38
New cards

Synchronous

Communication where both parties send data at the same time.

39
New cards

Asynchronous

Communication with a time delay between sending and receiving.

40
New cards

Online chat

Text-based real-time chat conducted online.

41
New cards

Satellite

Technology used for TV channels and video conferencing; part of communications.

42
New cards

Mobile technology

Communication via mobile devices like smartphones and tablets.

43
New cards

Internet

Global system of connected networks using TCP/IP to link billions of devices.

44
New cards

LAN (Local Area Network)

Collection of devices connected in one physical location.

45
New cards

WAN (Wide Area Network)

Large network not tied to a single location; can span regions/worlds.

46
New cards

Static Web Pages

Web pages that cannot be manipulated by the user; non-interactive content.

47
New cards

Dynamic Web Pages

Web pages that allow user contribution and interaction.

48
New cards

Folksonomy

Classification using freely chosen words (e.g., hashtags).

49
New cards

Rich User Experience

Dynamic, responsive design that reacts to user input.

50
New cards

User Participation

Users can contribute content (comments, reviews, etc.).

51
New cards

Long Tail

Services offered on demand rather than one-time purchases.

52
New cards

Software as a Service (SaaS)

Software delivered over the Internet via subscription rather than purchase.

53
New cards

Mass Participation

Broad sharing of information through universal web access.

54
New cards

Semantic Web (3.0)

Web where machines understand user preferences to tailor content.

55
New cards

Technological Convergence

Synergy of tech advancements working toward common goals.

56
New cards

Social Media

Platforms enabling users to create, co-create, discuss, and share content.

57
New cards

Social Networks

Sites that connect people with shared interests or backgrounds.

58
New cards

Bookmarking sites

Sites to store/manage links and tags for easy search/share.

59
New cards

Social News

Sites where users post news items or links to sources.

60
New cards

Media Sharing

Sites for uploading and sharing media (images, music, video).

61
New cards

Microblogging

Sites focusing on short updates for followers.

62
New cards

Blogs and Forums

Sites where users post content; blogs and discussion forums.

63
New cards

iOS

Apple's mobile operating system used on iPhone/iPad.

64
New cards

Android

Open-source mobile OS developed by Google.

65
New cards

Blackberry OS

Operating system used on BlackBerry devices.

66
New cards

Windows Phone OS

Microsoft’s closed proprietary mobile OS.

67
New cards

Symbian

Original smartphone OS used on some Nokia devices.

68
New cards

WebOS

OS originally for smartphones; now used in some smart TVs.

69
New cards

Windows Mobile

Microsoft’s mobile operating system.

70
New cards

Assistive Media

Non‑profit service to help people with visual/reading impairments.

71
New cards

Cloud Computing

Accessing software and storage remotely over the Internet; data lives in the cloud.

72
New cards

Client Computers

Devices used by end users to access cloud services.

73
New cards

Distributed Servers

Servers in different locations acting as a single system.

74
New cards

Datacenters

Facilities housing servers and storage for cloud services.

75
New cards

Public Cloud

Cloud services available to the general public; potentially less secure.

76
New cards

Private Cloud

Cloud services restricted to a single organization with higher security.

77
New cards

Community Cloud

Clouds shared by a group of organizations.

78
New cards

Hybrid Cloud

Combination of public and private cloud use.

79
New cards

Internet Safety

Online safety and security of people and their information.

80
New cards

Internet Security

Strategies and tools to protect online activities and data.

81
New cards

CIA Triad – Confidentiality

Protecting data from unauthorized disclosure.

82
New cards

CIA Triad – Integrity

Maintaining data accuracy and trustworthiness; not tampered with.

83
New cards

CIA Triad – Availability

Ensuring data/services are accessible when needed.

84
New cards

Masquerader

Unauthorized user who uses someone else’s credentials.

85
New cards

Misfeasor

Authorized user who misuses privileges or accesses beyond authorization.

86
New cards

Clandestine User

User with elevated access who evades auditing.

87
New cards

Computer Crime

Criminal acts involving computers (fraud, theft, etc.).

88
New cards

Hackers

People who gain unauthorized access to systems for various purposes.

89
New cards

Crackers

Criminals who break into systems or bypass protections.

90
New cards

Damage to computers

Destruction or impairment of computer hardware or software.

91
New cards

Theft

Stealing hardware, software, data, or time.

92
New cards

View/Manipulation

Unauthorized entry into or alteration of data.

93
New cards

Dormant Phase

Virus phase when it has accessed but is not yet active.

94
New cards

Propagation Phase

Virus phase where it multiplies and spreads.

95
New cards

Triggering Phase

Phase when the virus becomes activated.

96
New cards

Execution Phase

Virus payload is released and operations begin.

97
New cards

Trojan Horse

Malicious code that looks legitimate but controls the system.

98
New cards

Spyware

Software that runs in the background to monitor user activity.

99
New cards

Adware

Software that displays unwanted advertisements.

100
New cards

Ransomware

Malware that blocks access to data and demands payment.