IB Digital Society S-Z

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

SaaS

Software as a service; a software distribution model in which a third-party provider hosts the applications with end- users accessing the software through the internet.

<p>Software as a service; a software distribution model in which a third-party provider hosts the applications with end- users accessing the software through the internet.</p>
2
New cards

Sabotage

The disruption of computers and systems that operate military, economic infrastructure or other vulnerable networks.

<p>The disruption of computers and systems that operate military, economic infrastructure or other vulnerable networks.</p>
3
New cards

SAMR model

A framework for analysing educational technology.

<p>A framework for analysing educational technology.</p>
4
New cards

Secondary data

Data that has already been collected by someone else for a different purpose.

<p>Data that has already been collected by someone else for a different purpose.</p>
5
New cards

Secondary research

Research carried out by someone else.

<p>Research carried out by someone else.</p>
6
New cards

Secondary storage

Is non-volatile, long-term memory, used to store programs and data until they are required.

<p>Is non-volatile, long-term memory, used to store programs and data until they are required.</p>
7
New cards

Secure Socket Layer (SSL)

Is a protocol developed for sending information securely over the Internet by using an encrypted link between a web server and a browser. Self-guided learning: A strategy that allows students to direct their own learning.

<p>Is a protocol developed for sending information securely over the Internet by using an encrypted link between a web server and a browser. Self-guided learning: A strategy that allows students to direct their own learning.</p>
8
New cards

Server

A large computer dedicated to managing network resources. They can use specialised server hardware or can be a regular computer with a server-specific operating system capable of managing network resources.

<p>A large computer dedicated to managing network resources. They can use specialised server hardware or can be a regular computer with a server-specific operating system capable of managing network resources.</p>
9
New cards

Service robot

Robot developed to assist humans in completing tasks that are less desirable, such as dull, dirty or dangerous jobs.

<p>Robot developed to assist humans in completing tasks that are less desirable, such as dull, dirty or dangerous jobs.</p>
10
New cards

Sharing economy

Assets or services that are shared between individuals, often using an online booking system.

<p>Assets or services that are shared between individuals, often using an online booking system.</p>
11
New cards

Singularity

The hypothetical future where artificial intelligence becomes so advanced that it is superior to human intelligence.

<p>The hypothetical future where artificial intelligence becomes so advanced that it is superior to human intelligence.</p>
12
New cards

Smart city

A city that integrates sensors, voice recognition and other new technologies to better manage transportation, energy distribution and other services.

<p>A city that integrates sensors, voice recognition and other new technologies to better manage transportation, energy distribution and other services.</p>
13
New cards

Smart home

Home equipped with internet-connected lighting, heating and other electronic devices.

<p>Home equipped with internet-connected lighting, heating and other electronic devices.</p>
14
New cards

Social class

A method of classifying people and communities according to their social status.

<p>A method of classifying people and communities according to their social status.</p>
15
New cards

Social engineering

In internet security, this means tricking a user into sharing their username and password with a fraudster.

<p>In internet security, this means tricking a user into sharing their username and password with a fraudster.</p>
16
New cards

Social media addiction

Psychological or behavioural dependence on social media to the detriment of other important parts of life.

<p>Psychological or behavioural dependence on social media to the detriment of other important parts of life.</p>
17
New cards

Social-emotional learning

The integration of social and emotional skills into the curriculum.

<p>The integration of social and emotional skills into the curriculum.</p>
18
New cards

Solid pollution

Solid waste material.

<p>Solid waste material.</p>
19
New cards

Spamming

Sending unsolicited emails, mainly for the purpose of advertising.

<p>Sending unsolicited emails, mainly for the purpose of advertising.</p>
20
New cards

Speed

The length of time it takes for data to be transferred, measured in megabits per second (Mbps).

21
New cards

Stratification

The unequal distribution of resources between people/nations.

22
New cards

Streaming

Multimedia (especially video and audio) that is delivered digitally with little or no intermediate storage.

<p>Multimedia (especially video and audio) that is delivered digitally with little or no intermediate storage.</p>
23
New cards

Strong Al

Artificial intelligence that can develop consciousness and make decisions better than humans.

24
New cards

Subculture

Smaller cultural groups that exist within a larger culture.

<p>Smaller cultural groups that exist within a larger culture.</p>
25
New cards

Subtractive manufacturing

Creating an object by cutting or carving a larger material into the desired shape.

26
New cards

Super Al

Artificial intelligence that surpasses human intelligence.

27
New cards

Supercomputers

Refers to high-performance computers capable of high-speed calculations that are required in scientific and engineering fields.

<p>Refers to high-performance computers capable of high-speed calculations that are required in scientific and engineering fields.</p>
28
New cards

Surveillance

Is undertaken to collect information about people which can be used for a variety of purposes, both positive and negative, even though surveillance has mainly negative connotations. Surveillance can be conducted using technology, or through observations by people.

<p>Is undertaken to collect information about people which can be used for a variety of purposes, both positive and negative, even though surveillance has mainly negative connotations. Surveillance can be conducted using technology, or through observations by people.</p>
29
New cards

Sustainable development

The ability to meet human development goals without depleting the natural resources that we depend on.

30
New cards

Switch

A networking device that forwards data packets more efficiently than a hub.

<p>A networking device that forwards data packets more efficiently than a hub.</p>
31
New cards

Synchronous

Remote learning that happens in real time with a live teacher.

32
New cards

Systems thinking

A way to think about structure and order in human, natural and built environments.

33
New cards

Technique

The way an artist uses their technical skills to create their art.

34
New cards

Telemedicine

The remote treatment of patients.

35
New cards

Terrorism

The unauthorised use of violence/force to create fear and coerce a government or its people toward a political or social cause.

36
New cards

Transaction processing system

A system designed to incorporate all of the resources, software and hardware needed to manage sales, purchases and other transactions.

37
New cards

Transhumanism

A movement that aims to use technology to evolve and augment the human experience.

38
New cards

Translation app

An app that translates one language into another allowing communication in real time.

39
New cards

Transmission control protocol/internet protocol (TCP/IP)

Protocol that defines where data is to be sent to and from (IP), and how the data is to be broken down into smaller sections before sending (TCP).

40
New cards

Transparency in algorithms

the ability to understand and be able to explain the inner workings of the algorithm.

41
New cards

Transport Layer Security (TLS)

Is an improved version of SSL and is a protocol that provides security between client and server applications communicating over the Internet.

42
New cards

Trending

A topic that experiences a sudden surge in popularity on social media platforms for a limited period of time.

43
New cards

Trilateration

Technology that uses three satellites to pinpoint our phone's location.

44
New cards

User interface

The means by which human users interact with a digital technology. The intent is to make the user's experience straight forward, intuitive, and requiring minimum effort to achieve the desired outcome.

45
New cards

Utility software

Software designed to perform specific useful tasks that either help to analyse, configure or maintain the computer.

46
New cards

Validation

In databases, this means that only valid (suitable) data can be entered.

47
New cards

Vertical diversification

When a business takes over a new part of their supply or production chain.

48
New cards

Video game addiction

Psychological or behavioural dependence on playing video games to the detriment of other important parts of life.

49
New cards

Virtual conferencing platform

Digital platform that allows multiple users to video chat at the same time, for example Zoom or Google Meet.

50
New cards

Virtual personal assistant

Voice-controlled helper mainly found in smart speakers or mobile phones.

51
New cards

Virtual reality (VR)

A simulation that provides a completely immersive environment for the user.

52
New cards

Virtual reality exposure therapy (VRET)

Therapy designed to reduce a person's fear and anxiety by confronting the experiences in a computer-generated virtual environment.

53
New cards

Virus

A type of malicious software comprised of small pieces of code, often attached to legitimate programs or emails.

54
New cards

VoIP (voice over internet protocol)

Allows users to make voice calls using a broadband Internet connection instead of an analogue phone line.

55
New cards

Water pollution

Pollution released into water.

56
New cards

Wayfinding

The technologies and systems that give directions to people as they navigate a physical space.

57
New cards

Weak/narrow Al

Artificial intelligence that has a limited function or can only perform a specific task.

58
New cards

Wearable medical device

A device that can be worn to provide continuous, real-time data to improve the treatment, diagnosis and monitoring of patients.

59
New cards

Wide area network (WAN)

A national or international network; the largest example is the internet.

60
New cards

Wireless access point (WAP)

A device that creates a wireless local area network to improve coverage throughout a building.

61
New cards

Wireless networks

Use of wireless technologies to connect the different nodes to form a network.

62
New cards

Wisdom

The application of knowledge.

63
New cards

World Wide Web (WWW)

The websites and web services that are hosted on web servers and identified by their URL (uniform resource locator).

64
New cards

Youth culture

The culture and social norms of teenagers and young adults.

65
New cards

Verification

In databases, these are checks that the data entered is the actual data that you want, or that the data entered matches the original source of data.