1/219
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Reliability
The quality of being able to be trusted
or believed because of working or
behaving well
integrity
The quality of being honest and having
strong moral principles that you refuse
to change
Diligence
The quality of working carefully and
with a lot of effort
fairness
The quality of treating people equally or in a way that is right or reasonable
conscience
The part of you that judges how moral your own actions are and makes you feel guilty about bad things that you have done or things you feel responsible for
preliminary
Coming before a more important
action or event
complacency
A feeling of calm satisfaction with your
own abilities that prevents you from
trying harder
subsequent
Happening after something else
to adhere to
To continue to obey a rule or have a belief/follow the practices
to comply with
To act according to an order, set of rules, or request
disengagement
The fact of stopping being involved in
something
to minimize
To reduce something to the least
possible level or amount
median
A narrow strip of land between two
sides of a large road, separating the
vehicles moving in opposite directions
to rotate
To turn around
dark pattern
Describing a user interface feature
designed to trick users into doing
something more beneficial to the
company over the user. E.g., making it difficult to unsubscribe
terms of service
A contract or agreement made
between a company and the end- user
using the product. If the user voids the
agreement, the user may be inflicted with penalties
copyright
A protection for any published work
that helps to prevent that work from
being used without prior authorization.
A copyright may be indicated by the by the word 'Copyright', or a C surrounded by a circle (©)
digital footprint
Alternatively known as digital exhaust, describes activities that can be tracked when an individual uses the Internet or other online services such as a search engine
malicious software
This kind of software or computer programs are designed to damage other people's computers and prevent them from working normally
spyware
Software that collects information about how someone uses the Internet, or personal information such as passwords, without the user being aware of it
trojan horse
a seemingly harmless computer program that has been deliber- ately designed to breach the security of a computer system and/or destroy information, or to allow someone to steal it
ransomware
This disables the victim's access to
data until ransom is paid
adware
Software that automatically displays or
downloads (unwanted) advertisements
to a user when he/she is online
to spur
to encourage an activity
to outlaw
to make something illegal or unacceptable
deep packet inspection
also known as packet sniffing - this is a method of examining the content of data packets as they pass by a checkpoint of a network; it may then decide to alert or block the content; it's used for internet censorship but also to check for malicious code ...
endorsement
the act of saying that you approve of or support something or someone
telcos
telecommunications companies
to dub
to give something or someone a particular name
node
a place where things such as lines or systems join
encryption
the process of changing electronic information or signals into a secret code (= system of letters, numbers or symbols) that people cannot understand or use without special equipment
to decode
to discover the meaning of information given in a secret or complicated way
to encode
to change something into a system for sending messages secretly, or to represent complicated information in a simple or short way
to intercept
to stop and catch something or someone before that thing or person is able to reach a particular place
unauthorized
without someone's official permission to do something or be in a particular place
geo-blocking
technology that restricts access to internet content based upon the user's geographical location
VPN
Virtual Private Network - a VPN allows a user to connect to a network through a tunnelling protocol and to access internal internet and intranet websites and email
to deploy
to use something or someone, especially in an effective way
to prohibit
to officially refuse to allow something, to forbid something
suppression
the act of preventing something from being seen or expressed or from operating
non-disclosure agreement
an agreement a tester or developer signs with a company, committing them not to disclose any of the company's intellectual property or secrets; for example, if you are beta testing a game, you usually agree to an NDA, which means you cannot post anything about the game while it is still being tested (has not been officially released)
to outsource
when a company pays to have part of its work done by another company
to refute
to say or prove that a person, statement, opinion ... is wrong or false
precedent
an action, situation or decision that has already happened and can be used as a reason why a similar action or decision should be performed or made
default
the option offered to you, which is either recommended (by the provider) or safe to choose if you're not sure
cryptography
the practice and study of mathematically manipulating data so that it can be stored and transmitted securely
blacklist
a list of people or groups that are banned from something
cancel culture
a way of behaving where you completely reject and stop supporting someone because they have said or done something that offends you; a modern form of ostracism, especially on social media; exclusion of someone from a society or group
to deplatform
to prevent a person from contributing to a discussion or forum, especially on social media (e.g. Trump was banned from Twitter, he was deplatformed)
disinformation
misinformation that is deliberately misleading and intended to deceive
liable
responsible by law, legally responsible
shadow ban
to block a user on a website or chatroom without their knowledge, so that they continue to see their own posts and comments but nobody else does
subjectivity
the quality of being based on or influenced by personal opinions or feelings
monopoly
an organization or group that has complete control of something
provider
a company that sells a particular type of product/service
unprecedented
never having happened in the past
to freeze somebody out
to stop a person or organization from being included in a particular activity or arrangement
a third-party purchase
a person other than the main participants buys something
allegedly
used when something is said to be true that has not been proved
core process
An activity or operation that is part of the main business and therefore delivers customer value.
drawback
a disadvantage
machine learning
computers carry out tasks by learning from new data, without a human being needing to give instructions
to relay
to repeat something you have heard
usury
activity of lending someone money with the agreement that they will pay back a very much larger amount of money later
commission
a payment to someone who sells goods that is directly related to the amount sold, or a system that uses such payment
protocol
a computer language allowing computers that are connected to each other to communicate
domain
a group of computers or websites that are organised by purpose, e.g. to provide education or sell products
subscription
amount of money you pay regularly to receive a product or service
duopoly
a situation in which only two companies control all the business in a particular industry
terms & conditions
the document governing the contractual relationship between the provider of a service and a user you usually need to agree to
ISP
Internet Service Provider - a company that provides use of the internet, allows you to use email, and gives you space on the internet to show documents
data cap
a limit that a cell phone etc. enforces to prevent any single user from overloading a network
common carrier
an entity that provides wired and wireless communication services to the general public for free
end user
the person or organization that uses a product or service
end-to-end principle
this states tat network features should be implemented as close to the end points of the network (the applications) as possible - this means that all the intelligence is held by producers and users, not by the networks that connect them
provision
the act of providing goods or services for use
web hosting
the business or activity of providing storage space and access for websites
web-enabled
designed or able to be used on the internet
information superhighway
the internet and other systems that allow people to share information electronically
cybersquatting
a term used to describe an individual or company who intentionally purchases a domain which is identical or similar to other trademarks, brands or company names and then holds it for resale at a premium price
to extend
to cover or reach into
surveillance
the careful watching of a person or place, especially by the police, army or someone else in charge/with authority
repression
the use of force or violence to control a group of people
dissent
a strong difference of opinion on a particular subject, especially about an official suggestion or plan or a popular belief
consumer privacy
the handling and protection of all the sensitive personal information provided by customers each time they do online transactions
data transfer
the collection, replication, and transmission of large datasets from one organization or business unit to another
to require
to make it officially necessary for someone to do something
to add insult to injury
to make an unfavourable situation even worse
piracy
the act of illegally copying a computer program, music, film ... and then selling it
Intellectual Property (IP)
someone's idea, invention ... that can be protected by law from being copied by someone else
through lines
a common or consistent element shared by parts of a whole
to expropriate
to take away money or property especially for public use without payment to the owner, or for personal use illegally
dissident
a person who publicly disagrees with and criticizes their government
tangible
real and not imaginary; able to be shown, touched, or experienced
brazen
obvious, without any attempt to be hidden
hoax
to deceive someone, especially by playing a trick on them
to compel
to force someone to do something
to allege
to say that someone has done something illegal or wrong without giving any proof
to log
to write something down to make an official record of it
incredulous
not wanting or not able to believe something