Download as xls, pdf, or txt
Download as xls, pdf, or txt
You are on page 1of 100

Intro

Core
application areas
ethical issues
ethics
information technology
social and ethical considerations
social impacts
stakeholders
Strand 1
anonymity
authenticity
compatibility
cultural diversity
cultural impact
digital citizenship
economic impact
environmental impact
equality of access
ergonomic impact
globalization
health impact
integrity
intellectual property
legal impact
policies
political impact
privacy
protocols
psychological impact
reliability
security
standards
surveillance
the digital divide
unauthorised access
Strand 2
Business and employment
Education and training
Environment
Health
Home and leisure
Politics and Government
Strand 3
input
networking
output
processing
storage
General terms
Page 1

Intro
RSS feed
RSS reader

Page 2

Hardware
Processing Technologies

Input Devices

clock speed
Central Processing Unit
CPU
data throughput
dual core
GHz
gigahertz
hardware
megahertz
MHz
microprocessor
MIPS
Motherboard
Multi-core
multiprocessing
multitasking
processor
Quad-core
software
speed throttling
terahertz
THz
bar code scanners
concept keyboard
digital cameras
digital video cameras
digitize
Dvorak keyboards
game controllers
joystick
Keyboards
Magnetic Ink Character Recognition
magnetic stripe readers
MICR
microphone
multi-touch
multimedia keyboard
OCR
OMR
Optical Character Recognition
Optical Mark Recognition
scanner
sensors
Smart card readers
Soft keyboard
stylus
Touch pad
touch screen
trackball
UPC
Universal Product Code
virtual keyboard
voice control
Page 3

Hardware

Output Devices

Storage

voice recognition
Webcam
CRT monitor
hard copy
inkjet printer
interactive whiteboard
laser printer
LCD screen
native resolution
output
pages per minute
printers
projectors
speakers
bit
BluRay
byte
CD-ROM
CompactFlash
data synchronisation
disk wiping
DVD
eSATA
EB
exabyte
external hard disk
firewire
flash memory/flash drive
GB
Gigabyte
hard disk
IDE
input
KB
Kilobyte
magnetic storage
MB
Megabyte
MMC
mouse
non-volatile storage
optical storage
PB
Petabyte
Primary storage
Redundant Array of Inexpensive Disks
Redundant system
RAID
ROM
RAM
Random Access Memory
Read Only Memory
SATA
Page 4

Hardware

Misc

Types of Computer

accessibility

Secondary storage
secure deletion
solid state storage
TB
Terabyte
Universal Serial Bus
USB
volatile storage
YB
ZB
yottabyte
zettabyte
ASCII
American Standard Code for Information
Convergence
failover system
Global Positioning System
GPS
RFID
Kensington lock
plain text
Radio Frequency Identification
radio tag
RFID reader
RFID tag
RTF
Rich Text Format
Unicode
UPS
uptime
Uninterruptible Power Supply
Voice over Internet Protocol
VoIP
desktop computer
Embedded systems
HTPC
Home Theatre PC
laptop
mainframe
netbook
PDA
Personal Digital Assistant
smartphones
supercomputers
Braille keyboard
Braille printer
eye tracking software
head control systems
head wand
high contrast mode
input switches
screen magnification
sip and puff
Page 5

Hardware

Networking Technologies

sticky keys
Text-to-speech
Bluetooth
IrDA

Page 6

Hardware

Speed of a processor, in ticks per second.


Hardware responsible for processing all instructions the computer runs.
See Central Processing Unit.
Rate at which data is processed and output by a system.
A multi-core system with two processor cores.
See gigahertz.
Unit of measurement for a processor's clock speed. 1000 MHz.
Physical parts of a computer system.
Unit of measurement for a processor's clock speed.
See megahertz.
See Central Processing Unit.
See Millions of Instructions Per Second
The circuit board to which the internal computer components connect: the CPU, the RAM, the ROM, and the secondary st
Processor with more than one processor core, to increase its performance.
A system with more than one processor, to increase its performance.
A single processor running multiple tasks by switching rapidly between them.
See Central Processing Unit.
A multi-core system with four processor cores.
The instructions and programs which are run by the CPU.
Reducing a processor's clock speed to save power when not in use.
See Terahertz
Unit of measurement for a processor's clock speed. 1000 GHz.
Input device that uses a laser to read a bar code.
Keyboard with keys that perform programmable, customised functions.
Camera that saves images digitally, often in JPEG format.
Camera that saves digital video
To convert data from analog to digital form.
Alternative keyboard layout to improve typing speed.
Input device with buttons used for games playing.
Input device used for games playing and flight simulators.
Input device that lets the user enter text and numeric data.
Input device that reads text written in special magnetic ink. Often used at the bottom of cheques.
Input device that reads the magnetic stripe on cards like ATM cards and bank cards.
See Magnetic Ink Character Recognition
Input device for sound data
Input device able to recognise touches and gestures made with multiple fingers.
Keyboard with buttons to perform common tasks such as program launching.
See Optical Character Recognition.
See Optical Mark Recognition.
Input device that reads printed text, scans it, and converts it to text that can be edited in a word processor.
Input devices that reads simple multiple-choice style answers by looking for marks on the paper.
Input device used to digitise photographs and paper copies of data.
Input devices used to measure physical traits, such as sound, heat, or light.
Device to read a smart card.
Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.
Input device used in conjunction with touch screens.
Input device commonly found on laptops instead of a mouse.
Input device that lets the user touch areas of the display to perform tasks.
Input device that uses a rotating ball to control the cursor.
See Universal Product Code
A type of barcode.
See soft keyboard
Use of spoken commands to control a computer.
Page 7

Hardware

Use of software to convert spoken words into text.


Input device used to record video, often found in laptop computers.
Output device. Older type of monitor, now almost obsolete.
A printed paper copy of data.
Printer that works by spraying ink through nozzles at a sheet of paper.
Device that uses a projector for output and touch inputs, using a special pen.
High speed printer.
Output device. The newer type of monitor which is flat.
Resolution of an LCD display that produces the best display quality.
Information which is produced by a computer system.
Speed at which a printer produces output.
Output device which produces paper copies.
Output device for displaying content on large screens.
Output device for sound.
A single binary digit (a 1 or a 0). The smallest unit of storage inside a computer.
Optical secondary storage device capable of storing 16GB+.
Storage unit: 8 bits. Enough to store a single ASCII text character.
Optical secondary storage device capable of holding 650-700MB of data.
Solid state storage device usually used in digital cameras.
Exchanging data between a computer and a portable device such as a smart phone.
Securing deleting files from a disk, beyond recovery.
Optical secondary storage device capable of storing up to 8GB.
A modern type of connector for attaching external hard disks
See Exabyte
Storage unit: 1024 petabytes.
Portable storage device often used for backups.
Interface for attaching external hard disks and digital video cameras.
See solid state storage.
See Gigabyte.
Storage unit: 1024 megabytes.
Magnetic secondary storage device found in most desktop and laptop computers.
Interface for attaching internal hard disks.
Data or information that is entered into the computer.
See kilobyte.
Storage unit: 1024 bytes
Type of secondary storage that users magnets to read and store data. Examples include floppy disks and hard disks.
See megabyte.
Storage unit: 1024 kilobytes
Solid state secondary storage device, often used for digital cameras.
Input device used to control a cursor or pointer.
Storage which does not lose its contents when the power is removed.
Storage devices which use lasers to store and read data. Examples include CDs and DVDs.
See petabyte.
Storage unit: 1024 terabytes
Storage systems which are found inside the computer and are electronic. RAM and ROM are examples.
System where multiple hard disks contain duplicate data, to be used in the event of one failing.
System which will take over the role of a primary system if it fails.
Redundant Array of Inexpensive Disks. A way of having two (or more) hard disks in a computer and having the exact same
See Read Only Memory.
See Random Access Memory.
Primary storage which is fast, relatively expensive, and volatile.
Primary storage whose contents are written at manufacture and cannot be altered later.
Interface for connecting storage devices like hard disks.
Page 8

Hardware

Storage systems which are connected externally to the computer's motherboard.


See disk wiping.
A type of secondary storage device that uses electronic circuits to read and store data. The advantage of this is that is has
See terabyte
Storage unit: 1024 gigabytes
Common interface for connecting peripheral devices including mice, printers, and digital cameras.
Common interface for connecting peripheral devices including mice, printers, and digital cameras.
Storage which loses its contents when the power is removed.
See Yottabyte.
See Zettabyte
Storage unit: 1024 zettabyes
Storage unit: 1024 exabytes
See American Standard Code for Information Interchange.
Encoding system to store text, where one byte is used for each character. Compare Unicode.
Idea that one device performs the same functions as many separate devices.
See Redundant system.
System of satellites which can pinpoint a users location on the Earth.
See Global Positioning System
See Radio Frequency Identification.
Special lock for securing portable devices to immovable objects to prevent theft.
Text file which contains no formatting data
System of tags which contain data that can be read from a distance using radio waves.
Tags which broadcast their position over a large distance using radio waves.
See Radio Frequency Identification.
See Radio Frequency Identification.
See Rich Text Format.
Standard file format that can store documents that include formatting data.
Encoding system to store text, with support for multiple languages and alphabets, and thousands of characters. Compare
See Uninterruptible Power Supply.
Measure of how long a computer system has been operating without restarting.
Backup power system which powers a computer if the mains electricity fails.
System that lets users make telephone calls over the Internet.
See Voice over Internet Protocol.
Typical computer system with a separate screen and system unit.
Computer system hidden inside another device, such as a car engine management system.
Computer with multimedia capabilities designed specifically for watching television and films.
Computer with multimedia capabilities designed specifically for watching television and films.
Portable computers that come in many shapes and sizes.
High end computer system that achieves very high data throughput.
Lightweight laptop computer designed for portability.
See Personal Digital Assistant.
Mobile device bigger than a phone but smaller than a laptop. Probably has a keyboard or at least a stylus (pen) and a tou
Mobile phone with capabilities including Internet access and a camera.
Fastest computers available, capable of performing trillions of calculations per second.
Special keyboard designed for users with eyesight problems.
Special printer that can produce Braille text.
Accessibility software that tracks where a user is looking on the screen.
Accessibility software that tracks a users head movements to allow them to input data.
Accessibility hardware that lets a user input using a wand connected to their head.
Accessibility setting for users with eyesight problems.
Accessibility hardware that lets a user input data by pressing a simple on-off switch.
Accessibility setting for users with eyesight problems.
Accessibility hardware for users with very limited mobility
Page 9

Hardware
Accessibility setting for users with movement problems.
Accessibility feature for users with eyesight problems, reads text from the computer out loud.
Short range, low bandwidth wireless technology often used for mobile phone headsets or earphones.
Short range, low bandwidth, line-of-sight wireless communication technology.

Page 10

Hardware

he RAM, the ROM, and the secondary storage devices

om of cheques.

ited in a word processor.


s on the paper.

the mouse or a touch screen.

Page 11

Hardware

include floppy disks and hard disks.

nd ROM are examples.


of one failing.

n a computer and having the exact same data written to each of them automatically. If one of the disks fails, the computer can switch to

Page 12

Hardware

data. The advantage of this is that is has no moving parts, making it faster and less likely to be damaged if dropped. Also called flash m

digital cameras.
digital cameras.

and thousands of characters. Compare ASCII.

board or at least a stylus (pen) and a touch-screen.

Page 13

Hardware

dsets or earphones.

Page 14

Hardware

Page 15

Hardware

e disks fails, the computer can switch to the other disk and continue running normally (since the second disk is an exact copy).

Page 16

Hardware

amaged if dropped. Also called flash memory. (Compare magnetic storage with optical storage and solid state storage)

Page 17

Hardware

Page 18

Hardware

Page 19

Hardware

s an exact copy).

Page 20

Hardware

Page 21

Hardware

Page 22

Software
accounting software
application software
application suite
assistant
audio software
automatic recalculation
backup
browser
Business Software Alliance
bug
closed source
cloud computing
command line interface
commercial software
compatibility
concurrent licence
copyright
cross-platform
database software
Defragmentation
desktop publishing software
device drivers
DTP
EULA
end user licence agreement
Federation Against Software Theft
firewall
fragmentation
free and open source software
freeware
frequently asked questions
Full backup
Graphical User Interface
graphics software
GUI
Incremental backup
mail merge
MDI
Menu Driven Interface
multi-user licence
multimedia software
open source
operating systems
platform
presentation software
product activation
productivity software
public domain
read me file
restore (a backup)
safety critical system
serial number
shareware
Page 23

Software
single-user licence
site licence
source code
spreadsheet software
tutorials
User interface
utility software
video editing software
voice controlled interface
web development software
Web-based software
wizard
word processing software

Page 24

Software
Application software for managing finances.
Software which allows users to produce work, such as documents and presentations.
Collection of application programs that perform related tasks, sold together.
See wizard.
Application software for creating, recording, and editing sound.
Spreadsheet feature that updates results when cells are changed.
Spare copy of data to be used in the event of an emergency.
Software used to view web pages.
Organisation that works to reduce illegal copying of software.
Error or mistake in a program.
Software whose source code is not publicly available.
System whereby application software and data are stored on a remote Internet server.
System the user controls by typing in commands.
Software which is sold for profit.
Idea that two systems work together and can share hardware, software, or data.
Software licence that allows a specific number of copies to be used at one time.
Law protecting intellectual property from unauthorised copying.
Hardware or software that works on multiple operating systems.
Application software for creating, recording, and finding large collections of data.
Process of reducing disk fragmentation.
Application software used to lay out pages for printed publications.
Utility software used by the operating system to communicate with peripheral devices.
See desktop publishing software.
See end user licence agreement
Licence agreement for software that sets out the users rights and responsibilities.
Organisation that works to reduce illegal copying of software.
Hardware or software that controls access to a network.
Problem that occurs as files are saved on non-contiguous sectors on a disk.
Software whose source code is freely available and can be changed and distributed.
Software which is distributed for no cost.
List of questions and answers often found in manuals and help screens.
Backup that copies all data from a system.
System the user controls using a mouse to click on icons, buttons, and windows.
Application software for creating and editing images.
See Graphical User Interface.
Backup that copies only the changed data since the last backup.
Automatically customising a standard letter with individual names and addresses.
See Menu Driven Interface
Interface that presents a series of pre-defined options to the user.
Software licence that allows a specific number of copies to be used at one time.
Application software for creating and editing presentations, animations, and video.
See free and open source.
Software that manages the computer system and controls the hardware.
Refers to a particular combination of hardware and operating system.
Application software for creating slides used for lectures, presentations, and lessons.
Process of registering software online before it can be used, to reduce illegal copies.
See application software.
Software to which the author has waived all rights.
Help file containing latest updates and information about using a system.
Copying data from a backup copy back to the main system.
System whose failure could result in injury or loss of life.
Registration number needed during software installation, used to reduce illegal copies.
Software which is free to use initially, but which must be pay for if use continues.
Page 25

Software
Software licence that allows the use of only a single copy on a single computer.
Software licence that allows an organisation to use software on an unlimited number of computers.
Instructions that make up the software, entered by the programmer using a programming language.
Application software for performing numerical calculations and analysis.
Step by step help on using a system.
Method used to communicate with a computer system.
Software used to perform maintenance jobs such as defragmenting disks.
Application software for creating and editing video.
Ability to operate a computer by issuing spoken commands.
Application software for creating HTML pages for web sites.
See cloud computing.
Step by step help system to guide a user through a task.
Application software for creating written documents such as letters or essays.

Page 26

Networks
3G
4G
application server
asynchronous
audit trails
authentication server
authorised access
backbone
bandwidth
bits per second
blog
Bluetooth
bps
cache
client computer
client-server
database server
DHCP
dialup
DNS
Domain Name System
domain names
download
DSL / cable
Dynamic Host Control Protocol
email server
ethernet
fibre optic
file server
File Transfer Protocol
firewall
FTP
gateway
Gbps
hardware address
home network
host
HTTP
HTTPS
hub
Internet Protocol
Internet Service Provider
IP address
ISP
Kbps
LAN
Local Area Network
log file
login
MAC address
MAN
mbps
Metropolitan Area Network.

System to allow Internet access using mobile phone networks.


System to allow Internet access using mobile phone networks.
Computer that stores application software for clients on a network
Data transfer method in which the sender and receiver are not syn
Record of all changes and actions performed with a system, for se
Computer that checks usernames and passwords when a user trie
User who has permission to use a system.
High speed connections that connect main Internet sites.
Measure of a network's speed.
Unit for measuring the speed of data transfer over a network conn
Web page where entries are stored chronologically, like a diary or
Short range, low bandwidth wireless technology often used for mo
Unit for measuring the speed of data transfer over a network conn
Storage area for frequently used information, to speed up access.
Computer on a network that uses services provided by a server.
Network system that uses servers to store data centrally and clien
Computer on a network that stores data for other users to access.
System that automatically assigns IP addresses to computers on
Internet access that connects using a telephone line and a MODE
System for translating domain names into IP addresses.
System for translating domain names into IP addresses.
Human readable names given to web sites, such as www.itgstextb
To transfer data from a server to a client computer.
Common type of broadband Internet connection.
System that automatically assigns IP addresses to computers on
Computer on a network that stores email for other users to access
Type of wired network connection commonly used on LANs.
Types of network connection that offers extremely high speed tran
Computer on a network that stores files for other users to access.
System for transferring files over the Internet, often used for uploa
Software or hardware used to control data entering and leaving a
System for transferring files over the Internet, often used for uploa
Computer which acts as a bridge between a local area network an
Gigabits per second. Measure of network bandwidth.
Unique address embedded in network connected devices.
Small local computer network used in homes.
Computer on a network that provides services or performs work fo
HyperText Transfer Protocol. The standard protocol of the world w
Secure version of HTTP which offers encrypted communication.
Hardware device for connecting several computers on a network.
Standard protocol used on many LANs and on the Internet. See T
Company that provides Internet access to homes and businesses
Unique address assigned to every computer on a network.
Company that provides Internet access to homes and businesses
Kilobits per second. Measure of network bandwidth.
Computer network in a small area such as an office building.
Computer network in a small area such as an office building.
Chronological record of events, used for reporting purposes and a
Process of authenticating oneself before using a computer system
Unique address embedded in network connected devices.
Computer network over a large area such as a city.
Megabits per second. Measure of network bandwidth.
Computer network over a large area such as a city.
Page 27

Networks
microblog
MODEM
narrowband
network administrator
P2P
PAN
Peer to peer
Personal Area Network
personal firewall
port
print server
protocols
proxy server
push technology
Read / write web
Remote access
Router
RSS
SAN
server
social bookmarking
social network
Storage Area Network
switch
Synchronous
tagging
TCP/IP
thin client
top-level domain
upload
URL
Virtual LAN
Virtual Private Network
VLAN
VPN
WAN
Web 2.0
Web 3.0
web server
Wide Area Network
WiFi
wiki
WiMax
wireless hotspot
WLAN
WWW

Blog-like system which limited post length, such as Twitter.


Device for connecting a computer to a telephone line, used in dial
Low speed network connection.
Individual responsible for maintaining and running a network.
Network in which all computers are equal and there are no centra
Short range network between a computer and a mobile phone or
Network in which all computers are equal and there are no centra
Short range network between a computer and a mobile phone or
Software application that controls network access to and from a s
Number used to determine the type of service required when a co
Computer on a network that receives and processes print request
A standard set of rules for performing tasks, such as communicati
Computer on a network which acts on behalf of another, or throug
System which notifies users of changes to web pages without them
Refers to web pages which allow user interaction and collaboratio
Ability to connect to a computer, over a network, as though you we
Hardware device used to connect two separate networks.
Really Simple Syndicate. A push technology.
Network dedicated to providing disk storage to other computers on
Computer on a network that provides services or performs work fo
Web site that lets users store and manage their favourite links, an
Web site that lets users create personal profile pages and share t
Network dedicated to providing disk storage to other computers on
Hardware device for connecting several computers on a network.
Data transfer method in which the sender and receiver are synchr
Adding key words to an item such as a photo to describe its conte
Transfer Control Protocol / Internet Protocol. Common protocol fo
Networking system whereby client computers rely on servers to pe
Suffix at the end of a URL, such as .com or .org.
To transfer data from a client to a server computer.
Universal Resource Locator. Describes the location of an item, su
Network form by several LANs which are in separate geographica
Allows a secure private connection over a public network, using a
Network form by several LANs which are in separate geographica
Allows a secure private connection over a public network, using a
Computer network over a large area, such as a country or several
Refers to web pages which allow user interaction and collaboratio
Proposed evolution of the world wide web.
Computer on a network that stores web pages.
Computer network over a large area, such as a country or several
Most common type of wireless connection.
Type of web page that any visitor can edit.
Long range wireless network technology.
The area around a WiFi router where wireless access is available
Wireless LAN. A LAN what allows WiFi connections.
World Wide Web a series of interlinked multimedia pages stored

Page 28

Networks

s using mobile phone networks.


s using mobile phone networks.
n software for clients on a network.
he sender and receiver are not synchronised.
ons performed with a system, for security purposes.
es and passwords when a user tries to log in.

onnect main Internet sites.

f data transfer over a network connection.


ored chronologically, like a diary or journal.
eless technology often used for mobile phone headsets or earphones.
f data transfer over a network connection.
d information, to speed up access.
es services provided by a server.
ers to store data centrally and client computers to access them.
ores data for other users to access.
gns IP addresses to computers on a network.
sing a telephone line and a MODEM.
names into IP addresses.
names into IP addresses.
o web sites, such as www.itgstextbook.com
o a client computer.
ernet connection.
gns IP addresses to computers on a network.
ores email for other users to access.
on commonly used on LANs.
at offers extremely high speed transfers.
ores files for other users to access.
er the Internet, often used for uploading web sites.
ontrol data entering and leaving a network.
er the Internet, often used for uploading web sites.
ge between a local area network and the Internet.
of network bandwidth.
etwork connected devices.
sed in homes.
ovides services or performs work for others.
he standard protocol of the world wide web.
offers encrypted communication.
g several computers on a network.
ny LANs and on the Internet. See TCP.
t access to homes and businesses.
ery computer on a network.
t access to homes and businesses.
f network bandwidth.
ea such as an office building.
ea such as an office building.
used for reporting purposes and audit trails.
elf before using a computer system.
etwork connected devices.
area such as a city.
of network bandwidth.
area such as a city.
Page 29

Networks

post length, such as Twitter.


ter to a telephone line, used in dialup connections.

aining and running a network.


are equal and there are no centralised servers.
computer and a mobile phone or similar portable device.
are equal and there are no centralised servers.
computer and a mobile phone or similar portable device.
ols network access to and from a single computer.
type of service required when a computer connects to another.
ceives and processes print requests.
orming tasks, such as communication.
acts on behalf of another, or through which all Internet data must pass.
changes to web pages without them having to visit the page.
w user interaction and collaboration.
r, over a network, as though you were physically present at the keyboard.
ect two separate networks.
h technology.
disk storage to other computers on the network.
ovides services or performs work for others.
nd manage their favourite links, and share them with others.
personal profile pages and share them with friends.
disk storage to other computers on the network.
g several computers on a network.
he sender and receiver are synchronised, allowing higher speed transfer.
ch as a photo to describe its content.
rnet Protocol. Common protocol for LANs and the Internet.
ent computers rely on servers to perform their processing tasks.
h as .com or .org.
a server computer.
escribes the location of an item, such as a web page, on the Internet.
which are in separate geographical locations.
tion over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it we
which are in separate geographical locations.
tion over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it we
area, such as a country or several countries.
w user interaction and collaboration.

ores web pages.


area, such as a country or several countries.

where wireless access is available.


ws WiFi connections.
nterlinked multimedia pages stored on the Internet.

Page 30

Networks

Page 31

Networks

connect to a LAN, as though it were physically connected.

connect to a LAN, as though it were physically connected.

Page 32

Security
access levels
anti-virus
asymmetric key encryption
authentication
backdoor
biometric enrolment
biometric template
biometrics
botnet
brute force attack
CAPTCHA
Certificate Authority
ciphertext
Computer Misuse Act
cracking
DDoS
denial of service attack
dictionary attack
digital signatures
Distributed Denial of Service attack
DNS poisoning
DoS
Drive-by download
encryption
encryption key
EV SSL
false negative
false positive
full disk encryption
hacking
home directory
https
identity theft
key escrow
key logger
key pair
macro virus
malware
Multi-factor authentication
one time password
packet sniffer
passphrase
password
pharming
phishing
physical security
plaintext
private key
public key
public key encryption
root user
rootkit
secret key encryption

Settings that determine who can access an item and what they can do with it (read,
Software to detect and remove viruses and other malware.
Encryption system in which two keys are used: a public key used only to encrypt da
Establishing a user's identity.
Method of bypassing security in a system, built in by the system designers.
Process of registering a user for a biometric system by taking an initial sample.
Measurements taken from a biometric sample.
Use of fingerprints, retina scans, or other body features as an authentication mecha
Group of zombie computers under the control of a criminal.
Attempt to break a password by trying all possible combinations of letters, numbers
Scribble text displayed as an image, which the user must type in to verify that they
Organisation that issues digital certificates to individuals and companies.
Result of encrypting plaintext.
UK law governing criminal offences committed using a computer.
Gaining illegal access to a computer system
Denial of service attack committed using dozens of computers, usually zombies on
Flooding a computer system with data so that it cannot respond to genuine users.
Attempt to break a password by trying all possible words.
Technique used to authenticate remote users, such as online shopping businesses
Denial of service attack committed using dozens of computers, usually zombies on
Technique used by criminals to alter DNS records and drive users to fake sites, to c
Flooding a computer system with data so that it cannot respond to genuine users.
Program which automatically downloads when a user visits a web page, usually wit
System of encoding plaintext so that it cannot be understood with access to an enc
Used to encrypt and decrypt data.
Extended Validation SSL. Digital certificate validation technique used on the world w
When a system incorrectly rejects an action instead of accepting it.
When a system incorrectly accepts an action instead of rejecting it.
System that encrypts all data saved to a hard disk automatically and transparently.
Gaining illegal access to a computer system
Directory that contains a users personal files.
Protocol used to send web pages securely over the Internet.
Stealing personal data in order to impersonate a person.
Idea of having encryption keys stored by a third party company so the government
Software or hardware which records all key strokes on a computer system.
A public key and private key that work together in a public encryption system.
Virus that takes advantage of the macro programming languages built into some so
Generic name for malicious software
Use of several authentication techniques together, such as passwords and security
Password generated by a security token, which expires as soon as it is used.
Software or hardware used to collect data travelling over a network.
Word or phrase used to authenticate a user.
Word or phrase used to authenticate a user.
Technique used by criminals to alter DNS records and drive users to fake sites, to c
Use of fake emails and web sites to trick users into revealing sensitive data.
Locks, alarms, and other techniques used to securely a building or computer room.
Message before it is encrypted, or after it has been decrypted.
Key used for decryption in a public key encryption system.
Key used for encryption in a public key encryption system.
Encryption system in which two keys are used: a public key used only to encrypt da
User will full control over a computer system.
Type of malware which infiltrates the operating system and attempts to hide itself fr
Encryption system in which a single key is used for both encryption and decryption.
Page 33

Security
Secure Socket Layer
security token
security update
smishing
social engineering
spam
spam bot
spam filters
spyware
SSL
symmetric key encryption
system administrator
TLS
Transport Layer Security
trojan horse
unauthorised access
Virus
virus definition file
vishing
vulnerability scanner
web bug
WEP
worm
WPA
WPA2
zombie

System used to encrypt https web traffic.


Hardware device that must be present during login to authenticate a user.
Software update to fix a security problem discovered in software.
Phishing attacks committed using text messages (SMS).
Tricking a user into revealing their password or other sensitive data.
Unwanted, bulk email.
Program that scans web pages for email address, in order to send spam.
Program designed to identify and block spam messages while letting genuine mess
Malware which covertly records a user's actions, such as their key presses.
System used to encrypt https web traffic.
Encryption system in which a single key is used for both encryption and decryption.
Personal in overall charge of a computer system in an organisation.
System used to encrypt https web traffic.
System used to encrypt https web traffic.
Malware which pretends to be a genuinely useful program to trick the user into usin
Gaining illegal access to a computer system
Computer program which damages files and data spreads when infected programs
Used by anti-virus programs to recognise known viruses.
Phishing attacks committed using telephone calls or VoIP systems.
Software to scan a system for potential security problems.
Technique used by spammers to detect if an email address is valid or not.
Wired Equivalence Protocol. Wireless network encryption system.
Malicious software which replicates itself and spreads between computer systems a
Wireless Protected Access. Wireless network encryption system.
Wireless Protected Access 2. Wireless network encryption system.
Computer which has been compromised by malware and is part of a botnet.

Page 34

Security

at they can do with it (read, write, delete). Applies to files, folders and databases among other things.

key used only to encrypt data, and a private key used only to decrypt it.

system designers.
aking an initial sample.

as an authentication mechanism.

nations of letters, numbers, and symbols.


ust type in to verify that they are a person.
and companies.

puters, usually zombies on a botnet.


espond to genuine users.

nline shopping businesses.


puters, usually zombies on a botnet.
rive users to fake sites, to committing phishing.
espond to genuine users.
sits a web page, usually without their knowledge or consent.
tood with access to an encryption key.

hnique used on the world wide web.

matically and transparently.

mpany so the government can access them if needed.


computer system.
c encryption system.
nguages built into some software.

as passwords and security tokens.


as soon as it is used.

rive users to fake sites, to committing phishing.


aling sensitive data.
building or computer room.

key used only to encrypt data, and a private key used only to decrypt it.

nd attempts to hide itself from view.


encryption and decryption.
Page 35

Security

thenticate a user.

er to send spam.
while letting genuine messages through.
s their key presses.

encryption and decryption.

m to trick the user into using it.

ds when infected programs are copied.

ess is valid or not.

etween computer systems and over networks.

d is part of a botnet.

Page 36

Multimedia
AAC
alignment
AVI
Bit depth
bit rate
bitmap graphics
blue screen
BMP
buffer
CAD
CGI
citation
cloning
colour balance
colour depth
colour levels
Colour management
colour profile
Colour synchronisation
composite image
compression
Computer Aided Design
Computer Generated Imagery
copyright
Creative Commons
Cropping
desktop publishing software
digital effects
Digital Rights Management
digitisation
DOC
dots per inch
DPI
DRM
DTP
fair use
filters
FLAC
flipping
footer
GIF
GNU Free Documentation License
green screen
header
image editor
intellectual property
JPG
layer
lossless compression
lossy compression
master page
megapixel
MIDI

Lossy file format for audio.


Tools to control placement of objects in presentation or DTP software.
Lossy file format for video.
Refers to the number of colours in an image.
Amount of data used to represent a single sample in a video or audio file.
Graphics composed of rectangular grids of pixels.
Technique used to replace part of a video image matching a certain colour with
Lossless file format for audio.
Temporary storage area used to store video or audio data ready for playing.
Technical graphics software used to design products for manufacture.
Graphics created entirely on a computer, using 2D or 3D graphics software.
Acknowledge to a piece of work used as a source.
Graphics technique which copies one part of an image to another, often to rem
Graphics filtering for altering the tones and intensities of colours in an image.
Refers to the number of colours in an image.
Graphics filtering for altering the tones and intensities of colours in an image.
Ensuring printed output colours accurately match those on the screen.
Used as part of colour synchronisation to specify how a device represents colo
Ensuring printed output colours accurately match those on the screen.
Image which was created from several separate images.
Reduction in the amount of data used to store a file.
Technical graphics software used to design products for manufacture.
Graphics created entirely on a computer, using 2D or 3D graphics software.
Legal concept which protects intellectual property from authorised copying, alte
Licensing system for authors who wish to distribute their work freely.
Taking a small part (subset) of an image.
Software used for laying out text and images on pages. Commonly used for bo
General name for operations performed on an image using graphics software.
Software which restricts the actions a user can perform with a file, such as copy
The process of converting analog data into digital computer data.
File format for documents, used by Microsoft Office.
Also known as printer resolution. The number of dots of colour a printer is capa
Also known as printer resolution. The number of dots of colour a printer is capa
Software which restricts the actions a user can perform with a file, such as copy
Software used for laying out text and images on pages. Commonly used for bo
Exceptions to copyright law that allow copying in certain limited circumstances.
General name for operations performed on an image using graphics software.
Lossless file format for audio.
Image effect found in most graphics software.
Area of a document which appears the same on every page.
Lossless file format for images.
Licensing system for authors who wish to distribute their work freely.
Technique used to replace part of a video image matching a certain colour with
Area of a document which appears the same on every page.
Software used to create or edit bitmap graphics.
Refers to creations of the mind non-physical property such as photographs, m
Lossy file format for images.
Technique used in graphics software to place digital images or effects on top of
Compression technique in which the original file is completely recoverable, with
Compression technique in which some file data is sacrificed in order to reduce
A template page which is used to include standard features (such as page num
Unit used to measure the resolution of digital cameras. Refers to 1 million pixel
Musical Instrument Digital Interface. System for communication between music
Page 37

Multimedia
morphing
motion capture
MOV
MP3
MP4
MPEG
object oriented graphics
ODT
PDF
pixel
pixels per inch
plain text file
PNG
Portable Document Format
PPI
raster graphics
resolution
Rich Text Format
rotating
RTF
sample rate
scaling
selection tools
streaming media
SVG
template
text file
TIF
true colour
TXT
typography
vector graphics
video CODECs (coder-decoders)
virtual actors
Vorbis
watermarking
WAV
WMA
WYSIWYG
zip file

Effect that transforms one image into another over a series of frames.
A system used to capture human movement into a computer by attaching sens
Lossy file format for video.
Lossy file format for audio.
Lossy file format for video.
Lossy file format for video.
Graphics which are stored as a series of mathematical shapes and properties t
File format for documents, used by LibreOffice.
Common file format for the exchange of documents, which appears on screen
Individual dots which make up bitmap graphics.
Number of pixels displayed in each inch of screen output.
File format that stores characters using ASCII or Unicode encoding.
Lossless file format for images.
Common file format for the exchange of documents, which appears on screen
Number of pixels displayed in each inch of screen output.
Graphics composed of rectangular grids of pixels.
Refers to the number of pixels in an image.
File format for documents, which can store text and some basic formatting infor
Image effect found in most graphics software.
File format for documents, which can store text and some basic formatting infor
Number of samples taken each second when recording sound.
Changing the size of an image.
Tools in graphics software for selecting only a subset of an image.
Video or audio data that is played while it is downloading.
Standard file format for vector image data.
A page which is used to include standard features (such as page numbers or a
File format that stores characters using ASCII or Unicode encoding.
Lossless file format for images.
Image with 24 bit colour depth.
File format that stores characters using ASCII or Unicode encoding.
The proficient use of fonts, font sizes, and font properties such as leading and
Graphics which are stored as a series of mathematical shapes and properties t
Software required to view certain compressed video and audio formats.
Animated characters used in films, created entirely using computer graphics so
Lossy file format for audio.
The process of adding an author name or logo into an image to identify its own
Lossless file format for audio.
Lossy file format for video.
What You See Is What You Get. Refers to programs that present their output o
Compressed file format for general data.

Page 38

Multimedia

sentation or DTP software.

ample in a video or audio file.

mage matching a certain colour with computer graphics.

or audio data ready for playing.


products for manufacture.
ing 2D or 3D graphics software.

of an image to another, often to remove something from the image.


ntensities of colours in an image.

ntensities of colours in an image.


match those on the screen.
pecify how a device represents colour.
match those on the screen.
arate images.

products for manufacture.


ing 2D or 3D graphics software.
operty from authorised copying, alteration, or use.
stribute their work freely.

s on pages. Commonly used for books, magazines, and brochures.


an image using graphics software.
can perform with a file, such as copying or printing.
digital computer data.

er of dots of colour a printer is capable of producing in a certain amount of space.


er of dots of colour a printer is capable of producing in a certain amount of space.
can perform with a file, such as copying or printing.
s on pages. Commonly used for books, magazines, and brochures.
ng in certain limited circumstances.
an image using graphics software.

e on every page.

stribute their work freely.


mage matching a certain colour with computer graphics.
e on every page.

cal property such as photographs, music, stories, and films.

ce digital images or effects on top of each other to build up a final image.


l file is completely recoverable, with no loss of quality. Compare lossy compression.
data is sacrificed in order to reduce file size.
andard features (such as page numbers or a header) on each page of a document in a consistent manner.
al cameras. Refers to 1 million pixels.
m for communication between musical hardware and software applications.
Page 39

Multimedia

er over a series of frames.


t into a computer by attaching sensors to an actor and tracking their location.

athematical shapes and properties that can be independently manipulated at any time.

cuments, which appears on screen exactly as it will appear on the printer.

screen output.
CII or Unicode encoding.

cuments, which appears on screen exactly as it will appear on the printer.


screen output.

text and some basic formatting information.

text and some basic formatting information.


en recording sound.
a subset of an image.
downloading.

atures (such as page numbers or a header) on each page of a document in a consistent manner.
CII or Unicode encoding.

CII or Unicode encoding.


ont properties such as leading and kerning to display text in an appropriate manner.
athematical shapes and properties that can be independently manipulated at any time.
ed video and audio formats.
entirely using computer graphics software.

ogo into an image to identify its owner and prevent intellectual property theft.

rograms that present their output onscreen exactly as it will appear when printed.

Page 40

Databases
alternative key
auditing
Boolean operators
character check
check digit
Comma Separated Values
composite key
computer matching
consistency check
CSV
data entry form
data integrity
data matching
data mining
Data Protection Act
data redundancy
data types
data warehouses
Database Management System
DBMS
field
field size
flat file database
foreign key
forms
index
input mask
key field
knowledge discovery
length check
lookup
normalization
online encyclopaedias
opt-in
opt-out
parameter query
personal data
personally identifiable data
presence check
primary key
privacy policy
queries
range check
RDBMS
record
redundancy
redundant data
relational database
searching
secondary key
secondary use
sensitive data
sorting

Field by which a database is often searched.


Recording database transactions made by users (e.g. all edits, reads) for security purpo
AND, OR, and NOT operators used in a query.
Ensuring a field contains only the specified character types.
Way of checking mathematically if a item of data has been correctly entered.
File format for transferring data, which stores fields and records in a plain text file, separ
Primary key which consists of more than one field.
Combining several databases to build up more information about a person or set of peo
Validation check in which two fields' values are mutually dependent.
File format for transferring data, which stores fields and records in a plain text file, separ
Screen used to input data into a database.
Ensuring data is correct, consistent, and update to date.
Combining several databases to build up more information about a person or set of peo
Searching collections of data for hidden patterns.
UK law that governs the collection and use of personal data.
Data in a database which is needlessly duplicated.
Format of data in a field, such as text, number, or date.
Vast databases containing many gigabytes of data.
Software used to create, enter, edit, and retrieve data in a database.
Software used to create, enter, edit, and retrieve data in a database.
Single item of data about a single record in a database.
Validation technique. Number of characters that can be stored in a field.
Database which consists of just one table.
Database field whose sole purpose is to form part of a relationship with another table.
Screen used to input data into a database.
Field by which a database is often searched.
Validation technique. Ensures only the specified characters can be entered into a field.
Field which contains a different value for every record in that table.
Searching collections of data for hidden patterns.
Validation technique. Number of characters that can be stored in a field.
Using a list of values to limit what can be entered into a field. For example, for the 'Gend
Process of converting a database from a flat file database to a relational database.
Web site containing a large number of articles for research purposes.
System in which users must explicitly decide to participate.
System in which users must explicitly decide not to participate.
Database query whose criteria are decided by the user at run-time.
Data which could identify a user, or lead to social impacts such as identity theft.
Data which could identify a user, or lead to social impacts such as identity theft.
Validation technique. Requires a field to be completed.
Field which contains a different value for every record in that table.
Policy governing what data a company or web site will collect about you and how it will b
Method of extracting data from a database that matches specific criteria
Validation technique. Ensures a field is between a certain range of values.
Relational DBMS. See Database Management System.
Collection of fields that represent a single entity, such as a person.
Data in a database which is needlessly duplicated.
Data in a database which is needlessly duplicated.
Database containing multiple related tables and no redundant data.
Method of extracting data from a database that matches specific criteria
Field by which a database is often searched.
Using data for a purpose other than the one for which it was collected.
Data such as medical records which, if shared, could cause serious negative impacts on
Ordering records based on a field (e.g. alphabetically).
Page 41

Databases
SQL
Structured Query Language
Tab Separated Values
tab-delimited text files
table
Trans-border data flow
TSV
validation
verification
web databases

Language for managing databases by typing commands.


Language for managing databases by typing commands.
File format for transferring data, which stores fields and records in a plain text file, with f
File format for transferring data, which stores fields and records in a plain text file, with f
In databases, a collection of records representing a type of item.
Transfer of data between countries.
File format for transferring data, which stores fields and records in a plain text file, with f
Checks to ensure whether data is in the correct format.
Checking whether data is correct i.e. is the value entered in a field the actual value?

Page 42

Databases

all edits, reads) for security purposes.

been correctly entered.


d records in a plain text file, separated by commas. See also TSV (Tab Separated Values).

ation about a person or set of people.


y dependent.
d records in a plain text file, separated by commas. See also TSV (Tab Separated Values).

ation about a person or set of people.

n a database.
n a database.

e stored in a field.
relationship with another table.

cters can be entered into a field.

e stored in a field.
a field. For example, for the 'Gender' field, the values are limited to 'male' and 'female'
ase to a relational database.
arch purposes.

r at run-time.
cts such as identity theft.
cts such as identity theft.

collect about you and how it will be used.


es specific criteria
ain range of values.

dundant data.
es specific criteria

it was collected.
ause serious negative impacts on the data subject.

Page 43

Databases

d records in a plain text file, with fields separated by a tab character. See also CSV.
d records in a plain text file, with fields separated by a tab character. See also CSV.

d records in a plain text file, with fields separated by a tab character. See also CSV.

ered in a field the actual value?

Page 44

Models&Sims
absolute cell reference
assumptions
car crash model
cell format
cell range
cell reference
centralized processing
CFD
climate model
Computer model
Computer simulation
Decision Support System
distributed processing
feedback loop
flight simulator
formula
full motion platform
function
Global Climate Model
goal seek
grid computing
high performance computing
parallel processing
prediction
relative cell reference
simplification
spreadsheet
supercomputer
variables
visualisation
What-if scenario

In a spreadsheet, a cell reference which does not change when moved.


Often made during the construction of a computer model, as part of the simplification proce
Used to predict the results of car crashes.
In spreadsheets, the properties of a cell such as its colour, font, and cell type.
In spreadsheets, reference to a range of continuous cells.
In spreadsheets, a combination of row number and column letter to refer to a single cell (e.
Single computer with multiple processors working on a task.
Computational Fluid Dynamics. A technique used to model airflow in computer models.
Computer model used to predict possible future climate change.
Mathematical representation of the real world using computer software.
Based on computer models, gives users experience of events such as flying a plane.
Use of models or expert systems to aid (business) decision making processes.
Use of multiple separate computers working together on a common task.
Comparing the results of a computer model to actual (real life) results, and using the differe
Simulator hardware and software used to train pilots.
In spreadsheets, a combination of cell references and mathematical operations.
Hardware device which can move in many directions to increase the realism of simulators.
Built in features of spreadsheets for performing common calculations.
Computer model used to predict possible future climate change.
Spreadsheet tool used to determine the required values to meet a certain goal.
Use of multiple separate computers working together on a common task.
High speed computing using multiple processors
High speed computing using multiple processors
Output of a computer model.
In a spreadsheet, a cell reference which updates when moved.
Difference between a computer model's representation of a process, and the real life proce
Application software for performing numerical calculations and analysis.
Fastest computers available, capable of performing trillions of calculations per second.
Components of a computer model which can be altered to vary the output.
Graphical or animated output from a computer model or simulation.
Use of a computer model to test the results of different situations and scenarios.

Page 45

Models&Sims

when moved.
as part of the simplification process.

font, and cell type.


letter to refer to a single cell (e.g. A2).
airflow in computer models.

nts such as flying a plane.


n making processes.
common task.
ife) results, and using the differences to improve the model for the future.

hematical operations.
rease the realism of simulators.

meet a certain goal.


common task.

a process, and the real life process.


and analysis.
of calculations per second.
vary the output.

ations and scenarios.

Page 46

Business-Traditional
acceptable use policy
chip and pin
collaborative software
deskilling
EFT
Electronic Funds Transfer
email monitoring
employee monitoring
extranet
filtering
follow-the-sun working
Internet monitoring
intranet
key logger
keystroke monitoring
loyalty card
macro
macro viruses
mail merge
online banking
Point of Sale
POS
re-skilling
remote desktop
reward card
RFID
self checkout
smart shopping trolley
targeted advertising
telecommuting
teleworking

Policy that sets out what users are and are not allowed to do with IT systems.
Systems designed to reduce credit card fraud by requiring the user to authenticate themselv
Application software to let users work together on projects even if they are geographically re
Reduction in the skill needed to do a job, due to technology
Transfer of money from one account to another using computer systems and networks.
Transfer of money from one account to another using computer systems and networks.
Technology to monitor emails sent and received, usually by employees.
Technology used to monitor the work of employees using a computer system.
Content on a LAN which is available to authorised third parties.
Process of preventing access to some resources, usually web pages.
System of moving working to different offices around the globe as the day progresses, endin
Technology to monitor Internet data sent and received, usually by employees.
Content on a LAN which is only available to members of an organisation.
Software or hardware which records all key strokes on a computer system.
Software or hardware which records all key strokes on a computer system.
Card used to identify repeat customers, to allow them to accumulate reward points, and to g
In application software, a set of actions which are recorded so they can be played back late
Virus that takes advantage of the macro programming languages built into some software.
The process of automatically customising a standard letter with individual names and addre
Use of the Internet to perform tasks such as bill payment, money transfers and other bankin
Checkout system in a shop, usually connected to a store database and EFT system.
Checkout system in a shop, usually connected to a store database and EFT system.
When a de-skilled user retrains, often in a technology related discipline.
Ability to connect to a computer, over a network, as though you were physically present at th
Card used to identify repeat customers, to allow them to accumulate reward points, and to g
System of tags which contain data that can be read from a distance using radio waves.
Supermarket technology that lets users scan and pay for their own goods without staff assis
Shopping trolley with RFID technology to offer enhanced functionality.
Use of data about customers to determine which adverts they are most likely to find useful.
Working away from an organisation's main office or base, using portable computers.
Working away from an organisation's main office or base, using portable computers.

Page 47

Business-Traditional

with IT systems.
user to authenticate themselves at the point of sale.
en if they are geographically remote.

er systems and networks.


er systems and networks.

mputer system.

e as the day progresses, ending work in each location as the end of the day approaches, and moving it to a new office elsewhere where
y by employees.

puter system.
puter system.
mulate reward points, and to gather data about their shopping habits for marketing purposes
they can be played back later.
ges built into some software.
h individual names and addresses from a database.
ney transfers and other banking tasks.
base and EFT system.
base and EFT system.

u were physically present at the keyboard.


mulate reward points, and to gather data about their shopping habits for marketing purposes
tance using radio waves.
own goods without staff assistance.

are most likely to find useful.


ng portable computers.
ng portable computers.

Page 48

Business-Traditional

t to a new office elsewhere where the day is just beginning.

Page 49

Business-Online
absolute link
Active Server Pages
Active Server Pages Extended
ad blockers
ALT attribute
anchor
Apache
applet
ASP
ASPX
B2B
B2C
back-end
banner ads
bounce rate
breadcrumb trails
browser compatibility
bulk email
Business-to-Business
Business-to-Consumer
C2C
Cascading Style Sheets
Click Through Rate
Consumer-to-Consumer
conversion rate
cookies
Cost Per Click
CPC
CSS
CTR
data mining
data-driven web sites
digital certificates
direct payment
do not track
domain name
Domain Name System
dynamic web site
E-commerce
E-marketing
e-store
electronic shopping cart
enterprise information system
external link
File Transfer Protocol
filtering
first party cookie
Flash
HTML
https
hyperlinks
internal link
Internet Service Provider

HTML link to a fully specified URL.


Technology used to create dynamic web pages, designed by Microsoft.
Technology used to create dynamic web pages, designed by Microsoft.
Software to block adverts in web pages.
HTML attribute that provides a text description of images.
HTML link which points to a different part of the same page.
Well known web server software.
Java program which runs inside a web page.
Technology used to create dynamic web pages, designed by Microsoft.
Technology used to create dynamic web pages, designed by Microsoft.
E-commerce conducted between two businesses, such as a business and their supp
E-commerce conducted between a business and their customers, for example, online
Database which stores web site content 'behind the scenes'.
Graphical adverts that are typically displayed across the top of a web page.
Percentage of users who visit a web site but immediately leave it.
Feature of a web site to help user navigation by showing the current page name and
An essential check to ensure that a web page appears the same way on all web brow
Email sent to large numbers of users at once. May be considered spam by some use
E-commerce conducted between two businesses, such as a business and their supp
E-commerce conducted between a business and their customers, for example, online
E-commerce where customers deal directly with each other, such as in online auction
Technology to specify styling and formatting information for web pages.
Percentage of users who click on an advert after seeing it.
E-commerce where customers deal directly with each other, such as in online auction
Percentage of visitors who visit a site and then make a purchase.
Small text file text by some web sites to recognise the user when they return.
Amount paid to the advertising company when a user clicks on an advert.
Amount paid to the advertising company when a user clicks on an advert.
Technology to specify styling and formatting information for web pages.
Percentage of users who click on an advert after seeing it.
Searching collections of data for hidden patterns.
A web site whose pages are generated at view-time, from data stored in a database.
Technique used to authenticate remote users, such as online shopping businesses.
E-commerce payment using a debit or credit card.
Initiative designed to stop tracking cookies from recording user's web activity.
Human readable names given to web sites, such as www.itgstextbook.com
System for translating domain names into IP addresses.
A web site whose pages are generated at view-time, from data stored in a database.
The techniques used to sell products online.
The techniques used to market produces online.
A name for a web page which lets the user browse and purchase items.
Feature of e-commerce sites which contains items for later purchase.
System that allows an organisation to collect, manage, and analyse large amounts o
HTML link which points to a separate, external web site.
System for transferring files over the Internet, often used for uploading web sites.
Software which blocks some Internet content, based on a series of rules or lists of co
Cookie left by a web site the user directly visited.
Technology often used to create interactive web pages.
HyperText Markup Language. The standard language for creating web pages.
Protocol used to send web pages securely over the Internet.
Area of a web page text or an image which when clicked takes the user to anothe
HTML link which points to a different part of the same page.
Company that provides Internet access to homes and businesses.
Page 50

Business-Online
ISP
Java
JavaScript
keyword density
keyword prominence
keyword spamming
link farm
location based service
m-commerce
meta tags
mobile commerce
MySQL
newsletter
online advertising
online reputation
payment gateway
PHP
plugins
pop-ups
ranking of sites
referrer
relative link
screen reader
scripting
Search Engine Optimisation
secure online payment
SEO
Silverlight
sitemap
social media
spam
sponsored links
SQL
styles
stylesheet
tags (HTML)
targeted advertising
third party cookie
third party hosting
third party payment service
title attribute
Top Level Domain
tracking number
unique identification number
uploading
uptime
viral advertising
virtual world
W3C
web analytics
Web Content Management System
web crawler
web hosting

Company that provides Internet access to homes and businesses.


Programming language often used to create interactive web pages.
Scripting language often used to create interactive web pages.
Frequently with which key words appear in a web page.
Locations within a web page that key words appear.
Overuse of key words in a web page in an attempt to increase search engine ranking
Service that links many pages to each other in an attempt to increase search engine
Web page which alters the information it displays based on the user's geographical lo
The use of mobile phones to conduct online purchases.
HTML tags to add additional information about a web page and its content.
The use of mobile phones to conduct online purchases.
Database system often used by data driven web sites.

Methods used to measure the trust and reliability of people in an online network, e
A trusted third party who is used to receive and process payments in an online transa
Technology used to create dynamic web pages.
Software added to web browsers to extend their functionality.
A type of advertisement which opens a new browser window to display adverts.
Process performed by search engines to determine the order of results for a given se
A small piece of information sent to sites you visit, telling the site which site you just c
HTML link to a file, with no path specified.
Accessibility feature for users with eyesight problems, which reads text aloud.
Simple programming that can be included in web pages to make them more interacti
Techniques used to increase a web page's search engine rankings.
Essential for all online transactions, often achieved using SSL or TLS encryption.
Techniques used to increase a web page's search engine rankings.
Technology often used to create interactive web pages.
Overview of a web site and all the links and pages within it.
Networks such as Facebook, Google, and Twitter, which are often used for advertisin
Unwanted, bulk email.
Links show by search engines because the link owners paid a fee.
Language for managing databases by typing commands.

File which contains CSS information to format a web page.


Keywords in HTML which are used to mark up a web page.
The use of data about an individual to determine the types of advertising which is mo
Cookie left by a web site the user did not directly visit (usually by advert companies).
Use of a separate, specialist company to store and manage a web site.
See payment gateway.
HTML attribute that provides a text description of links.
The final part of a domain name, such as .com .net or .sv
A number given to users when they order an item online, allowing them to see its pro
Used by cookies to help recognise return visitors to web sites.
To transfer data from a client to a server computer.
Measure of how long a computer system has been operating without restarting.
Advertising on social media networks which spreads rapidly from user to user.
3D environment in which character select an avatar and then explore. Sometimes us
Organisation that manages standards on the world wide web.
Software to measure and display statistics about a web site's visitors, such as pages
Software which allows management of a web site without web design skills. Content
Software which scans web pages looking for key words, so search engines can index
The process of housing or storing a web site, making it available to the public, and m
Page 51

Business-Online
web server
web spider
web traffic analysis
WebCMS
World Wide Web Consortium
WYSIWYG
XML

Computer which houses web pages and serves them to computers that request them
Software which scans web pages looking for key words, so search engines can index
Software to measure and display statistics about a web site's visitors, such as pages
Software which allows management of a web site without web design skills. Content
Organisation that manages standards on the world wide web.
What You See Is What You Get. Refers to programs that present their output onscree
A markup language used to describe data, storing the information as plain text files.

Page 52

Business-Online

gned by Microsoft.
gned by Microsoft.

gned by Microsoft.
gned by Microsoft.
ch as a business and their suppliers.
r customers, for example, online shopping.

the top of a web page.

wing the current page name and the names of pages which led to it, in order.
rs the same way on all web browsers.
e considered spam by some users.
ch as a business and their suppliers.
r customers, for example, online shopping.
h other, such as in online auction.
on for web pages.

h other, such as in online auction.

e user when they return.


clicks on an advert.
clicks on an advert.
on for web pages.

from data stored in a database. For example, when a user performs a search in a shop, all matching products are extracted from the da
s online shopping businesses.

ding user's web activity.


www.itgstextbook.com

from data stored in a database. For example, when a user performs a search in a shop, all matching products are extracted from the da

nd purchase items.
r later purchase.
e, and analyse large amounts of information about its products, its processes, and its customers.

sed for uploading web sites.


on a series of rules or lists of content.

e for creating web pages.

clicked takes the user to another web page.

d businesses.
Page 53

Business-Online

d businesses.
ve web pages.

increase search engine ranking.


empt to increase search engine ranking.
sed on the user's geographical location.
page and its content.

of people in an online network, especially when performing e-commerce or writing reviews.


ss payments in an online transaction.

window to display adverts.


he order of results for a given search.
ling the site which site you just came from.

, which reads text aloud.


ges to make them more interactive or dynamic.
gine rankings.
sing SSL or TLS encryption.
gine rankings.

ich are often used for advertising.

rs paid a fee.

types of advertising which is most likely to interest them.


(usually by advert companies).
manage a web site.

ine, allowing them to see its progress from the retailer to their door.

perating without restarting.


rapidly from user to user.
nd then explore. Sometimes used by companies for marketing purposes.

eb site's visitors, such as pages visited, durations of visits, and web browsers used.
hout web design skills. Content is stored in a database and published in different ways, such as on a web site, in a printed booklet, or in
ds, so search engines can index them.
it available to the public, and managing the servers on which it runs.
Page 54

Business-Online

to computers that request them.


ds, so search engines can index them.
eb site's visitors, such as pages visited, durations of visits, and web browsers used.
hout web design skills. Content is stored in a database and published in different ways, such as on a web site, in a printed booklet, or in

that present their output onscreen exactly as it will appear when printed.
e information as plain text files.

Page 55

Business-Online
start page:
hack

189
2

hing products are extracted from the database and a web page is generated to display them.

hing products are extracted from the database and a web page is generated to display them.

Page 56

Business-Online

n a web site, in a printed booklet, or in different languages. Sometimes called a WebCMS.

Page 57

Business-Online

n a web site, in a printed booklet, or in different languages. Sometimes called a WebCMS.

Page 58

Business-Transport
fleet management
fleet tracking
full body scanners
GPS
intelligent cars
package tracking
price comparison sites
real-time data collection
remote vehicle disabling
RFID
route planning
sensors
smart cars

Page 59

Business-Transport
Software to track and manage fleets of vehicles, including route planning and data analysis functions.
Software to display the location of vehicles, such as trucks or taxis.
Security system used at airports to produce a digital image of passengers 'without clothes'.
System of satellites that allows a user to determine their position on Earth using a special receiver.
Cars incorporating IT to improve driver safety and comfort.
Use of RFID and a web site to show customers the location of packages awaiting delivery.
Sites which aggregate price data from a variety of sources to offer customers the best deal.
Data logging systems which report data as soon as it is collected.
Ability to disable a vehicle over a computer network if it has been stolen
System of tags which contain data that can be read from a distance using radio waves.
Software to plan the optimum route between two points.
Input devices used to measure physical traits, such as sound, heat, or light.
Cars incorporating IT to improve driver safety and comfort.

Page 60

Education
1-1 programme
acceptable use policy
accessibility
anti-plagiarism software
asynchronous learning
black list
blended learning
Children's Internet Protection Act
CIPA
cyber-bullying
dictation software
e-book
e-book reader
e-learning
EDI
edutainment
Electronic Data Interchange
electronic textbooks
equality of access
false negative
false positive
flat classrooms
forums
intellectual property
interactive whiteboard
m-learning
motion controllers
multimedia
onscreen keyboard
open courseware
open textbooks
plagiarism
podcast
predictive text
profile privacy settings
projector
reference software
school information system
serious games
speech synthesis
synchronous learning
tele-learning
touch sensitive input
video conferencing
VLE
web 2.0
Virtual Learning Environment

Page 61

Education

Scheme in which every student is given their own laptop.


Policy that sets out what users are and are not allowed to do with IT systems.
Hardware and software features to help disabled users operate computer systems.
Software to detect plagiarised work by searching the Internet and previous work samples.
In a tele-learning environment, learning which does not require the teacher and student to be online at the same time.
List of banned web sites in a filtering system.
Mix of traditional teaching techniques and e-learning techniques.
US law requiring Internet filtering in US most schools and libraries.
US law requiring Internet filtering in US most schools and libraries.
Use of IT such as social networks to harass or bully individuals.
Use of software to convert spoken words into text.
An electronic book, presented as a document on a computer or an e-book reader.
Portable device used to download and read e-books.
Electronic learning. The use of IT to teach and learn.
Process of transferring data between systems in a standard format that both can understand.
Entertainment software designed to have an educational aspect.
Process of transferring data between systems in a standard format that both can understand.
E-books designed to replace traditional paper textbooks for teaching and learning
The use of technology to ensure that everybody is able to access resources, regardless of problems such as physical disa
When a system incorrectly rejects an action instead of accepting it.
When a system incorrectly accepts an action instead of rejecting it.
Use of IT to connect classrooms with other classrooms around the world
Online areas where users can post messages to each other.
Refers to creations of the mind non-physical property such as photographs, music, stories, and films.
A computer input and output device often used in classrooms. Displays computer graphics as output and allows input usin
Mobile learning. Use of mobile devices to teach and learn.
Input devices which are moved through the air to control a computer system.
Use of images, audio, text, and video data together.
Keyboard which is displayed on screen and controlled by clicking on buttons with the mouse or a touch screen.
Educational material which is released for free use and distribution.
Textbooks whose content is freely available online for reading, copying, and often editing.
Use of another user's work without proper credit or citation being given.
Sound files recorded and uploaded to a web server, usually in episodic format.
System that predicts the word being typed based on the letters already typed.
Settings in social networks and other systems to control how a user's data is shared with others.
Output device used to display computer graphics on a wall or board.
Electronic encyclopedia software containing articles, images, videos, and other reference items.
Database system for storing and managing information about a school, its students, and staff.
Games designed to teach players about an issue.
Accessibility feature for users with eyesight problems, reads text from the computer out loud.
In a tele-learning environment, learning which does requires the teacher and student to be online at the same time.
Learning that occurs when the teacher and students are in separate geographical locations.
Input devices which allows a screen to be controlled with fingers rather than using a mouse or a keyboard.
Use of video cameras and microphones to conduct a conversation over a network.
A content management system (CMS) which allows teachers to upload lessons, worksheets, quizzes, and other class mat
Refers to web pages which allow user interaction and collaboration.
A content management system (CMS) which allows teachers to upload lessons, worksheets, quizzes, and other class mat

Page 62

Education

be online at the same time.

problems such as physical disabilities.

as output and allows input using special pens or a finger.

e or a touch screen.

online at the same time.

e or a keyboard.

s, quizzes, and other class material, to be displayed on a web page.

s, quizzes, and other class material, to be displayed on a web page.

Page 63

Education
start page:

219

Page 64

Environment
ADC
analog data
analog to digital converter
BAN
Basel Action Network
Basel Convention, The
blade servers
continuous data
CRT
data centres
data layers
data logging
digital data
digital footprint
digital divide
digitisation
discrete data
donation schemes
e-waste
electronic waste
Geographical Information System
geotagged
GIS
Global Positioning System
GPS
GPS receiver
laser imaging
LCD
LEDC
Less Economically Developed Country
Lidar
life cycle (hardware)
location based service
MEDC
More Economically Developed Country
planned obsolescence
power settings
radar
recycling
reduce
redundant systems
remote sensing
refurbish
reuse
RoHS
Reduction of Harmful Substances
sample precision
sample rate
sampling
sat nav
satellite imaging
satellite navigation system
sensors
Page 65

Environment
sonar
speed throttling
take-back scheme
virtual globe
virtual machines
virtualisation
visualisation
WEEE

Page 66

Environment

Device for sampling analog data and producing a digital sample of it.
Continuous data which can be measured, such as the temperature in the room.
Device for sampling analog data and producing a digital sample of it.
Environmental campaign group that works to reduce the problems caused by e-waste.
Environmental campaign group that works to reduce the problems caused by e-waste.
Environmental agreement regarding e-waste.
Server design which is modular, allowing systems to be rapidly expanded and reducing power consumption.
Analog data which can be measured, such as the temperature in the room.
Old, large TV style computer monitors.
Large warehouses of computers that host hundreds or thousands of gigabytes of data.
Layers of information added to a Geographical Information System.
Automatic recording of data using sensors.
Discrete data which can be counted.
An individual's effect on the environment due to e-waste.
The idea that money, language, education, or infrastructure creates a gap between those who have access to information
The process of converting analog data into digital computer data.
Discrete data which can be counted.
Schemes used to find additional uses for obsolete computer equipment to extend it's useful life.
Discarded electronic equipment that is either broken or obsolete.
Discarded electronic equipment that is either broken or obsolete.
A system which allows layers of data to be placed on map data to visualise and analyse it. For example, crime rate figures
Adding tags to data (such as an image) to identify the location in which it was created.
A system which allows layers of data to be placed on map data to visualise and analyse it. For example, crime rate figures
System of satellites that allows a user to determine their position on Earth using a special receiver.
System of satellites that allows a user to determine their position on Earth using a special receiver.
Part of the GPS system which calculates its distance from satellites in space.
Remote imaging method that users laser light, often used by satellites.
Newer style flat screen monitors.
Countries to which electronic waste is often shipped for unsafe recycling and disposal.
Countries to which electronic waste is often shipped for unsafe recycling and disposal.
Remote imaging method that users laser light, often used by satellites.
For computer hardware, the period of time from its manufacture, through its use, until its eventual disposal.
Any service (e.g. web page content) which varies according to the user's location.
Countries which are often a significant source of electronic waste.
Countries which are often a significant source of electronic waste.
Idea that IT equipment is designed to have a short life expectancy before failing or becoming obsolete.
Operating systems to affect the power consumption of a computer.
Remote imaging method used by satellites.
The process of reclaiming valuable elements from waste electronic equipment, often done unsafely in developing countrie
The 'R' concerned with preventing e-waste problems by producing less waste equipment and using fewer harmful chemica
System which will take over the role of a primary system if it fails.
Techniques used by satellites to image the Earth.
The 'R' concerned with finding additional uses for equipment which is obsolete but not broken.
The 'R' concerned with finding additional uses for equipment which is obsolete but not broken.
A law which limits the harmful chemicals that manufacturers are allowed to put into their electronic equipment.
A law which limits the harmful chemicals that manufacturers are allowed to put into their electronic equipment.
During digitisation, the number of bits used to represent each sample.
During digitisation, the number of samples taken per second.
The process of converting analog data into digital computer data.
Portable GPS receiver device often used in vehicles.
The use of sensors on satellites to measure or record information, usually about the Earth.
Portable device that uses GPS to plot the user's position.
Input devices used to measure physical traits, such as sound, heat, or light.
Page 67

Environment

Remote imaging method used by satellites.


Reducing a processor's clock speed to save power when not in use.
Scheme operated by IT manufacturers to accept customers' old hardware for recycling at its end of life.
A 3D software map of the Earth, usually with layers of information added, similar to a GIS.
A software implementation of a computer system, allowing one physical computer to run several virtual computers, each
The process of using several virtual machines running on one computer to replace several separate physical computers.
Producing graphs or animations based on computer data, to help understand and analyse it.
A European law which requires electronic equipment manufacturers to accept back their equipment for recycling at its end

Page 68

Environment

ave access to information technologies and those who do not.

xample, crime rate figures can be layered on a map of a city.

xample, crime rate figures can be layered on a map of a city.

10

ely in developing countries.


ing fewer harmful chemicals.

ic equipment.
ic equipment.

Page 69

Environment

virtual computers, each with their own independent operating system and application software.
rate physical computers.

ent for recycling at its end of life.

Page 70

Environment
Start page

Page 71

235

Environment

Page 72

Health
addiction
Carpel Tunnel Syndrome
centralised database
clinical decision support system
computer model
CTS
cybernetics
e-prescriptions
EDI
EHR
Electronic Data Interchange
Electronic Health Records
Electronic Medical Records
EMR
ergonomics
Human Genome Project
medical expert system
myoelectric control
neural control
opt-in
opt-out
Personal Health Record
PHR
prosthetics
remote monitoring
Repetitive Strain Injury
RSI
smart cards
store-and-forward telemedicine
telehealth
telemedicine
telesurgery
virtual reality
VPN

Page 73

Health

Compulsive use of a computer system that can lead to negative effects, including health problems. A growing problem!
A health problem causing pain in the wrist, often associated with overuse or incorrect of a computer system.
database in which all data in stored in one centralised location.
Expert system for medical diagnosis
Mathematical representation of the real world using computer software.
A health problem causing pain in the wrist, often associated with overuse or incorrect of a computer system.
Integration of IT into the human body.
Electronic prescriptions.
Process of transferring data between systems in a standard format that both can understand.
Computerised medical records, often stored on a centralised server.
Process of transferring data between systems in a standard format that both can understand.
Computerised medical records, often stored on a centralised server.
Computerised medical records, often stored on a centralised server.
Computerised medical records, often stored on a centralised server.
Meaning a system design for user comfort.
An online project designed to centrally store information about the human genome.
Expert system for medical diagnosis support.
Control of IT using electrical impulses from the body
Control of IT using electrical impulses from the brain
System in which users must explicitly decide to participate.
System in which users must explicitly decide not to participate.
Electronic health records which are stored on the patient's own computer system.
Electronic health records which are stored on the patient's own computer system.
Devices used to replace a user's arms or legs if they have been amputated. Increasing becoming computerised.
Use of IT to monitor the health of patients over a large distance.
Injury caused by overuse or incorrect use of a computer, which can affect the wrists, arms, back, or shoulders.
Injury caused by overuse or incorrect use of a computer, which can affect the wrists, arms, back, or shoulders.
Credit card sized card containing a microchip for data storage and processing.
Telemedicine using techniques such as email, which do not operate in real time.
Using IT to perform medical consultations when the doctor and patient are in geographically separate locations.
Using IT to perform medical consultations when the doctor and patient are in geographically separate locations.
Using IT to perform surgery on a patient in a geographically separate location from the doctor.
A virtual world which the user views using a special headset, and may participate in using specialist input devices.
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer ca

Page 74

Health

owing problem!

mote computer can securely connect to a LAN, as though it were physically connected.

Page 75

Home&Leisure
3D modelling
augmented reality
avatar
biometrics
CAVE
Cave Automated Virtual Environment
citizen journalism
copyright infringement
digital restoration
Digital Rights Management
digital radio
digital television
digitisation
DRM
e-book
electronic ink
Entertainment Software Rating Board
ESRB
ground penetrating radar
HDTV
High Definition Television
home automation
Home Theatre PC
HTPC
IPTV
laser scanning
Massively Multiplayer Online Game
Massively Multiplayer Online Role Playing G
MMOG
MMORPG
Motion Picture Association of America
MPAA
news aggregator
P2P
Pan European Game Information
paywall
Peer-to-Peer
PEGI
piracy
Recording Industry Association of America
RFID
RIAA
smart home
smart meters
social news
stereolithography
streaming media
Video On Demand
virtual worlds
VOD

Software often used in the digital restoration of historic sites or artefacts.


Overlapping layers of computer data with images of the real world.
Representation of a person in a virtual environment.
Use of fingerprints, retina scans, or other body features as an authenticatio
Form of virtual reality which projects images on the walls surrounding a use
Form of virtual reality which projects images on the walls surrounding a use
News reporting by everyday citizens using mobile technology, rather than tr
Illegally copying or distributing copyrighted material.
The process of using digital versions of historic works or places and softwa
Software which restricts the actions a user can perform with a file, such as
Upgraded version of radio signals which offers higher quality than analog te
Upgraded version of television signals which offers higher quality than analo
The process of converting analog data into digital computer data.
Software which restricts the actions a user can perform with a file, such as
An electronic book, presented as a document on a computer or an e-book r
Technology used in e-book readers to improve display quality.
Organisation that provides content ratings for computer games.
Organisation that provides content ratings for computer games.
Specialist imaging hardware used to detect and visualise objects buried und
Television images that have a resolution up to 1920 x 1080.
Television images that have a resolution up to 1920 x 1080.
Home which uses technology to improve its efficiency, security, and comfor
Computer with multimedia capabilities designed specifically for watching tel
Computer with multimedia capabilities designed specifically for watching tel
Systems which allows television images and sound to be delivered over the
Technique used to build 3D computer models of real world locations.
Games played by connecting to a central server and interacting with other p
Games played by connecting to a central server and interacting with other p
Games played by connecting to a central server and interacting with other p
Games played by connecting to a central server and interacting with other p
Film industry group that works to reduce illegal copying of films.
Film industry group that works to reduce illegal copying of films.
Software which fetches news headlines from a variety of sources for display
Network in which all computers are equal and there are no centralised serv
Organisation that provides content ratings for computer games in Europe.
System to prevent access to a web site's content unless the user pays a su
Network in which all computers are equal and there are no centralised serv
Organisation that provides content ratings for computer games in Europe.
Term for the illegal copying or downloading of copyrighted material.
Music industry group that works to reduce illegal copying of music.
System of tags which contain data that can be read from a distance using r
Music industry group that works to reduce illegal copying of music.
Home which uses technology to improve its efficiency, security, and comfor
Systems which measure a household's consumption of water or resources,
News sites which rank news stories based on user ratings.
'3D printer' that can produce actual objects from computer models.
Video or audio data that is played while it is downloading.
Television and films which can be streamed at any time from the Internet, ra
3D environment in which character select an avatar and then explore. Som
Television and films which can be streamed at any time from the Internet, ra

Page 76

Home&Leisure

digital restoration of historic sites or artefacts.


puter data with images of the real world.
n in a virtual environment.
scans, or other body features as an authentication mechanism.
h projects images on the walls surrounding a user.
h projects images on the walls surrounding a user.
ay citizens using mobile technology, rather than traditional media.
ting copyrighted material.
al versions of historic works or places and software to rebuild them to their previous states.
e actions a user can perform with a file, such as copying or printing.
signals which offers higher quality than analog television.
sion signals which offers higher quality than analog television.
analog data into digital computer data.
e actions a user can perform with a file, such as copying or printing.
nted as a document on a computer or an e-book reader.
k readers to improve display quality.
content ratings for computer games.
content ratings for computer games.
re used to detect and visualise objects buried underground.
ve a resolution up to 1920 x 1080.
ve a resolution up to 1920 x 1080.
ogy to improve its efficiency, security, and comfort, by automating many aspects.
capabilities designed specifically for watching television and films.
capabilities designed specifically for watching television and films.
vision images and sound to be delivered over the Internet.
D computer models of real world locations.
ing to a central server and interacting with other players in a virtual world.
ing to a central server and interacting with other players in a virtual world.
ing to a central server and interacting with other players in a virtual world.
ing to a central server and interacting with other players in a virtual world.
orks to reduce illegal copying of films.
orks to reduce illegal copying of films.
ws headlines from a variety of sources for display in one location.
uters are equal and there are no centralised servers.
content ratings for computer games in Europe.
to a web site's content unless the user pays a subscription fee.
uters are equal and there are no centralised servers.
content ratings for computer games in Europe.
g or downloading of copyrighted material.
works to reduce illegal copying of music.
ain data that can be read from a distance using radio waves.
works to reduce illegal copying of music.
ogy to improve its efficiency, security, and comfort, by automating many aspects.
household's consumption of water or resources, producing statistics that can be used to improve efficiency.
ws stories based on user ratings.
ce actual objects from computer models.
played while it is downloading.
can be streamed at any time from the Internet, rather than waiting for a TV broadcast.
character select an avatar and then explore. Sometimes used by companies for marketing purposes.
can be streamed at any time from the Internet, rather than waiting for a TV broadcast.

Page 77

Home&Leisure
273

Page 78

Politics&Government
ANPR
augmented reality
Automatic Number Plate Recognition
battlefield network
biometrics
black boxes
black list
Children Internet Protection Act (CIPA)
content rating
cyber-terrorism
cyber-warfare
Denial of Service attack
Digital Millennium Copyright Act
Direct Recording Electronic
DMCA
DNA database
DNS
DNS Poisoning
DRE voting machine
drone
e-passport
e-petition
electronic voting
false negative
false positive
filter
firewall
future warrior
GPS
Internet voting
Internet Watch Foundation
IP address
IWF
keyword filter
micro-payments
mission creep
mixed reality
online voting
open government
optical scanning electronic voting system
PNDRE
precision guided weapons
Public Network Direct Recording Electronic
RFID
simulation
smart weapons
software verification
tactile feedback
UAV
Unmanned Aerial Vehicle
URL
virtual reality
virtual reality headset

Software which processes video camera data to read vehicle number plates
Overlapping layers of computer data with images of the real world.
Software which processes video camera data to read vehicle number plates
Large scale network gathering information from soldiers, vehicles, and map
Use of fingerprints, retina scans, or other body features as an authentication
Closed system whose internal operation cannot be inspected.
List of banned web sites in a filtering system.
US Law requiring schools to filter Internet content to protect children.
System whereby web site content is categorised so that filters can block it if
Using computer hacking techniques to commit acts of terrorism.
Using computer hacking techniques to commit acts of war.
Flooding a computer system with data so that it cannot respond to genuine
Law designed to improve copyright protection for media companies, and ma
Voting machines where users cast votes by touching a screen.
Law designed to improve copyright protection for media companies, and ma
A database, often national, that contains DNA samples taken from people a
System for translating domain names into IP addresses.
Technique used by criminals to alter DNS records and drive users to fake si
A type of electronic voting machine that allows the user to vote by selecting
An unmanned aerial vehicle often used by the military for surveillance opera
Passport with a microchip containing biometric features, and RFID technolo
An online petition that can be signed by people supporting a cause.
Any use of IT to count or cast votes in an election.
When a system incorrectly rejects an action instead of accepting it.
When a system incorrectly accepts an action instead of rejecting it.
Software which blocks some Internet content, based on a series of rules or
Software or hardware used to control data entering and leaving a network.
Information technology designed to improve a soldier's understanding of the
System of satellites that allows a user to determine their position on Earth u
Systems which allows users to vote over the Internet.
Organisation that works with British ISPs to block access to illegal content o
Unique address assigned to every computer on a network.
Organisation that works with British ISPs to block access to illegal content o
Filter that blocks web pages containing specified key words.
Online donations collected in small amounts, but which add up when contrib
When the use of an IT system extends beyond its original purpose.
Combination of virtual reality and real life training.
Casting votes over the Internet.
Use of IT to publish data about government operations, improving transpare
Voting machines which count paper ballots cast by voters.
Voting machines where users cast votes over a network like the Internet.
Weapons that use IT to improve their accuracy or effectiveness.
Voting machines where users cast votes over a network like the Internet.
System of tags which contain data that can be read from a distance using ra
Based on computer models, gives users experience of events such as flying
Weapons that use IT to improve their accuracy or effectiveness.
The use of experts to examine the source code of a program to check that i
Output from a computer system in the form of force, movement, or resistan
An unmanned aerial vehicle often used by the military for surveillance opera
An unmanned aerial vehicle often used by the military for surveillance opera
Describes the location of an item, such as a web page, on the Internet.
A virtual world which the user views using a special headset, and may partic
Primary output device used by a virtual reality system.
Page 79

Politics&Government
Voter Verified Paper Audit Trails
VVPAT
weighted filter
white list
wired soldiers

An electronic voting system that produces a paper receipt of the vote cast, a
An electronic voting system that produces a paper receipt of the vote cast, a
A filter which considers the words in a page as well as the context in which
List of allowed web sites in a filtering system.
Information technology designed to improve a soldier's understanding of the

Page 80

Politics&Government

data to read vehicle number plates and compare it to those stored in a database.
h images of the real world.
data to read vehicle number plates and compare it to those stored in a database.
on from soldiers, vehicles, and maps to provide an overall view of the battlefield.
r body features as an authentication mechanism.
cannot be inspected.

t content to protect children.


gorised so that filters can block it if necessary.
ommit acts of terrorism.
ommit acts of war.
o that it cannot respond to genuine users.
ction for media companies, and make it illegal to bypass copy protection systems such as DRM.
by touching a screen.
ction for media companies, and make it illegal to bypass copy protection systems such as DRM.
DNA samples taken from people arrested by the police.
o IP addresses.
S records and drive users to fake sites, to committing phishing.
allows the user to vote by selecting the candidates name using a touchscreen.
by the military for surveillance operations.
metric features, and RFID technology to transmit these to immigration control.
people supporting a cause.

tion instead of accepting it.


ction instead of rejecting it.
ntent, based on a series of rules or lists of content.
ta entering and leaving a network.
ove a soldier's understanding of the battlefield around him.
determine their position on Earth using a special receiver.
the Internet.
to block access to illegal content on the Internet.
uter on a network.
to block access to illegal content on the Internet.
pecified key words.
unts, but which add up when contributed by thousands of users.
eyond its original purpose.

ent operations, improving transparency.


ots cast by voters.
over a network like the Internet.
curacy or effectiveness.
over a network like the Internet.
an be read from a distance using radio waves.
experience of events such as flying a plane.
curacy or effectiveness.
e code of a program to check that it works correctly.
rm of force, movement, or resistance.
by the military for surveillance operations.
by the military for surveillance operations.
s a web page, on the Internet.
g a special headset, and may participate in using specialist input devices.
eality system.
Page 81

Politics&Government

s a paper receipt of the vote cast, allowing a recount if necessary.


s a paper receipt of the vote cast, allowing a recount if necessary.
age as well as the context in which they appear.

ove a soldier's understanding of the battlefield around him.

Page 82

Politics&Government
289

Page 83

Politics&Government

Page 84

IT Systems in Organizations
Development Personnel
information system (IS) managers
analyst
database administrator
development manager
network manager
programmer
support staff
Analysis Stage
business case
client
constraints
CP
Critical Path
data collection
end-user
feasibility study
functional requirements
Gantt chart
milestones
non-functional requirements
organisational IT policies
PERT chart
project goals
project management methodology
project management software
project manager
project plan
requirements specification
scope
SWOT
technical documentation
user documentation
Design Stage
attributes
cardinality
Data Flow Diagram
data structure
DFD
entities
entity relationship diagram
ERD
outputs
processes
prototype interface
relationships
system context diagram
user interface
Implementation Stage
alpha testing
Page 85

IT Systems in Organizations
bugs
Capability Maturity Model Integration
CMMI
Frequently Asked Questions
implementation
load testing
online lessons
prototypes
quality assurance methods
quality control processes
software testers
test plan
training
tutorial
user manual
Testing Stage
beta tester
beta testing
bug tracking system
handover
user acceptance testing
Installation Stage
changeover
delivery
deployment
direct changeover
installation
parallel running
phased changeover
Maintenance Stage
adaptive maintenance
corrective maintenance
incident escalation
Incident management system
incident tracking system
internal support
maintenance
perfective maintenance
phase out
preventative maintenance
regression testing
support
Development Approach and Methodologies
acceptance testing
agile development
PMBoK
PRINCE2
procurement
project initiation document
Page 86

IT Systems in Organizations
SSADM
user acceptance testing
waterfall development
Misc Terms
Custom / bespoke software
emulator
IDE
Integrated Development Environment
legacy system
off-the-shelf software
SDLC
source code
System development lifecycle
virtual machine

Page 87

IT Systems in Organizations

Person responsible for all IT purchases, deployments, and systems within an organisation.
In project development, person who documents the current system, finding its problems and areas for improvement
The person in an organisation who is responsible for setting up, maintaining, and monitoring the organisation's database(s
In project development, person who oversees programmers as they create the system specified in the design.
The person responsible for the installation, configuration, and monitoring of an organisation's network.
A person who writes computer programs by following a design document.
Staff who train users and help them with problems as they occur

Analysis of the benefits and problems of a proposed IT project.


Person or organisation who commissions an IT project.
Limitations within which an IT system must work.
Longest (slowest) path through a project's development, as determined by using a PERT chart.
Longest (slowest) path through a project's development, as determined by using a PERT chart.
Used to find information about an existing system during the development of a new system.
Person who will use an IT project one it is finished.
Examination of a proposed system to see if its creation is possible.
Specific features and functions that a proposed IT system must have.
Used to chart the stages of a planned IT project and the people responsible for each stage.
Key points during project development, such as the completion of a stage.
Conditions that a proposed IT system must meet, such as working on certain hardware or giving results within a certain tim
Policies governing the appropriate use of IT, data integrity, security procedures, and other aspects of IT use with an organ
Charting system to show the inter-dependencies in projects.
Clear statement of the intentions of a proposed IT project.
Systems and techniques designed to encourage successful projects and avoid project failure.
Software to help plan, manage, and guide the process of IT project development.
Person with overall responsibility for an IT project.
Clear definition of the goals, scope, and schedule of a proposed IT project.
Clear list of the functional and non-functional requirements for a proposed IT project.
Clear definition of the boundaries of an IT project.
Analysis method sometimes used when creating a business case.
Documentation intended for programmers and developers of an IT system.
Documentation intended for users of an IT system, helping them understand and use it.

Component of an Entity Relationship Diagram.


Property of a relationship in an Entity Relationship Diagram.
Shows processes in a system and the flows of data between them.
The way the data within an IT system is organised and related.
Shows processes in a system and the flows of data between them.
Component of an Entity Relationship Diagram.
Shows the items of data stored in a system and the relationships between them.
Shows the items of data stored in a system and the relationships between them.
During analysis, a list of the results that a system must produce.
During analysis, a list of the procedures a system must implement.
Early version of a user interface to get feedback about its effectiveness.
The links between separate items of data.
High level DFD of a system.
The part of a system that allows a user to interact with it.

Initial testing of an IT system.


Page 88

IT Systems in Organizations
Errors in a computer program or system, hopefully found during testing.
Quality assurance method that describes an organisation's level of maturity.
Quality assurance method that describes an organisation's level of maturity.
A list of common problems that users experience, and their answers.
Stage in the SDLC where the system is created (programmed).
Testing of an IT system with the amount of work it can be expected to process in real world conditions.
A form of training delivered online.
An early version of a project, designed to get feedback from the client and users.
In project development, used to ensure the whole development team are following standardised best practises.
Processes to ensure code produced by programmers followed accepted best practices.
People who perform alpha, beta, and acceptance testing.
List of all tests and test data that should be tried with a system.
Ensuring that users will be able to work with a new IT system.
A document which explains how to perform key tasks, step by step.
A document which explains to users how to use a computer system.

Person who attempts to find bugs in software before it is released to customers.


Testing of an IT system once all features have been added and only bugs need to be worked out.
Used to track and manage bugs in a piece of software.
Point at which the developers of a system formally pass it to the client.
Tests performed by a client before formally accepting an IT system from the developers.

Moving from an old system to a new IT system.


Installing a new IT system at the client's premises.
Stage in the SDLC where the system is deployed at the client's site.
Immediate removal of an old system and complete replacement with a new IT system.
Installing a new IT system at the client's premises.
Running the old system and the new system side by side.
One part of an organisation switches to a new IT system to test it, while others remain using the old system.

Maintenance that changes software to make it work with a new software environment.
Maintenance that fixes bugs in software.
Moving a problem with an IT project to a higher level if it cannot be solved.
Used to keep track of problems and difficulties encountered in an IT system.
Used to keep track of problems and difficulties encountered in an IT system.
Support for an IT system provided within an organisation.
Alterations made to a system after it has been formally handed over.
Maintenance that changes software to incorporate new user requirements (or changed requirements).
Gradually removing an old IT system from use.
Maintenance that changes software to avoid possible future problems.
Testing to ensuring changes to an IT system did not break any previously working functionality.
Staff who help users with problems they encounter while using an IT system.

Testing performed by the client and users as part of the handover process.
Development method that focuses on creating small, working parts of a project at regular intervals.
Project Management Body of Knowledge. A project management methodology.
PRojects IN Controlled Environments 2. A project management methodology.
The act of acquiring the necessary items (software, hardware, staff) to develop an IT system.
Document used in PRINCE2 to describe the key features of an IT project.
Page 89

IT Systems in Organizations

Structured Systems Analysis and Design Method. A project management methodology.


Testing performed by the client and users as part of the handover process.
Development method that focuses on completing each stage of the SDLC for the entire project before moving onto the ne

Software created specific for an individual or organisation.


A computer program which simulates another type of computer, so that it can run programs designed for it.
Set of programs used by system developers to create IT systems.
Set of programs used by system developers to create IT systems.
An old, out of date IT system which is still used because it is essential to an organisation.
Software which is widely available and can be bought by anybody.
The stages in the life time of an IT system, from its first proposal, through its design and creation, to its eventual phasing o
Instructions that make up the software, entered by the programmer using a programming language.
The stages in the life time of an IT system, from its first proposal, through its design and creation, to its eventual phasing o
A software implementation of a computer system, allowing one physical computer to run several virtual computers, each

Page 90

IT Systems in Organizations
309

ems and areas for improvement


onitoring the organisation's database(s).
em specified in the design.
nisation's network.

ware or giving results within a certain time.


other aspects of IT use with an organisation.

Page 91

IT Systems in Organizations

al world conditions.

standardised best practises.

be worked out.

ain using the old system.

ged requirements).

egular intervals.

Page 92

IT Systems in Organizations

ntire project before moving onto the next.

rograms designed for it.

and creation, to its eventual phasing out.


mming language.
and creation, to its eventual phasing out.
o run several virtual computers, each with their own independent operating system and application software.

Page 93

AI & Robotics
Artificial Intelligence
AI
Artificial Intelligence
Artificial Neural Network
Boolean logic
brute force searching
CAPTCHA
chaining
Chinese Room, the
computational intelligence
confidence interval
expert system shell
expert systems
feedback loop
fuzzy logic
fuzzy set theory
hand writing recognition
heuristics
IF-THEN rule
inference engine
inference rule
knowledge base
knowledge domain
knowledge engineer
knowledge representation
logic
machine learning
machine translation
natural language processing
neural networks
pattern recognition
Searching
set theory
speech recognition
training data
Turing test
user interface

Creating a system that produces results comparable to human intelligence.


Creating a system that produces results comparable to human intelligence.
AI system that attempts to mimic the neurons and synapses in the human brain.
Logic in which clauses can have one of two states such as yes or no, true or false.
AI technique that considers all possible solutions, looking for the best.
System designed to create text that is unreadable to a computer but understandable to a p
Use of logical statements to come to a conclusion.
Thought experiment dealing with the idea of knowledge.
Approach that tries to create systems that think and learn in the same way humans do.
Level of certainty in an answer a pattern recognition system provides.
Software used to create expert systems.
Software designed to make the same decisions that a human expert would, in a given kno
Use of previous answers (right or wrong) to improve the decision making process next tim
Logic in which items can have multiple values. Used in AI.
System in which items can be partial or complete members of a set. Used in AI.
System to recognise human writing and convert it to text.
General rules for performing a task, used to improve the perform of searching algorithms i
Rule used by the inference engine in an expert system to describe the relationship betwee
Part of an expert system which attempts to relate the users input with knowledge stored in
Rule used by the inference engine in an expert system to describe the relationship betwee
Area of an expert system where all facts about the knowledge domain are stored.
Area of knowledge in which an expert system specialises.
Programmer responsible for entering expert knowledge into an expert system.
Different techniques for representing concepts and their relationships inside a computer sy
Rule used by the inference engine in an expert system to describe the relationship betwee
Technique for making a computer produce better results by learning from past experience
Technique for automatically translating one human language into another.
Techniques for processing human languages to enable a computer to understand their me
AI technique that tries to simulate the human brain, using neurons and synapses.
Computational Intelligence technique where computers are trained on examples and learn
AI technique that considers all possible solutions, looking for the best.
Mathematical theory used in some AI techniques.
Computer system that can process spoken language and understand its meaning.
Example data used in a pattern recognition system.
Proposed test to see if a computer is intelligent or not.
Part of an expert system that accepts users inputs and presents answers.

Robotics
android
autonomous
camera
clamps
claws
computer vision
heat sensor
humanoid
humidity sensor
infrared sensor
lasers
light sensor
lights
magnetism sensor

Robot designed to look like a human, with lifelike skin and other features.
Robot which operates without human intervention.
Common input device in robotics.
Common output device in robotics.
Common output device in robotics.
Techniques to let computers and robots see and understand the world around them.
Common input device in robotics.
Robot designed generally like a human bipedal, upright, and arms, and a head.
Common input device in robotics.
Common input device in robotics.
Common input device in robotics.
Common input device in robotics.
Common output device in robotics.
Common input device in robotics.
Page 94

AI & Robotics
motors
pH sensor
pressure sensor
proximity sensor
radar
relays
robot
robotic arm
robotic fingers
sensors
sirens
sound sensor
speakers
tracks
wheels

Common output device in robotics.


Common input device in robotics.
Common input device in robotics.
Common input device in robotics.
Common input device in robotics.
Common output device in robotics.
Computerised device that performs manual or physical tasks, either autonomously or unde
Common output device in robotics.
Common output device in robotics.
Input devices used to measure physical traits, such as sound, heat, or light.
Common output device in robotics.
Common input device in robotics.
Common output device in robotics.
Common output device in robotics.
Common output device in robotics.

Page 95

AI & Robotics

o human intelligence.
o human intelligence.
napses in the human brain.
uch as yes or no, true or false.
king for the best.
a computer but understandable to a person, to reduce spam.

earn in the same way humans do.


ystem provides.

a human expert would, in a given knowledge domain.


he decision making process next time.

mbers of a set. Used in AI.

he perform of searching algorithms in AI applications.


m to describe the relationship between key concepts.
users input with knowledge stored in the knowledge base.
m to describe the relationship between key concepts.
owledge domain are stored.

ge into an expert system.


eir relationships inside a computer system.
m to describe the relationship between key concepts.
ults by learning from past experiences.
nguage into another.
e a computer to understand their meaning.
sing neurons and synapses.
rs are trained on examples and learn to recognise similarities between them.
king for the best.

and understand its meaning.

d presents answers.

and other features.

erstand the world around them.

ight, and arms, and a head.

Page 96

AI & Robotics

al tasks, either autonomously or under remote control.

s sound, heat, or light.

Page 97

CaseStudy 2012
ACID
Adobe Flash Player
Centralised database
Distributed database
Client-side software
Concurrency
Customer relationship
Plug-ins
Record locking
Smartphone
Tablet device
Atomicity
Consistency
Isolation
Durability
QR code
Mail merge
Unicode
CMS
Virtual Private Network
Comma Separated Valu

Page 98

CaseStudy 2012

Atomicity, Consistency, Isolation, Durability. Properties of a database that help guarantee data integrity.
A web browser plugin which allows a variety of multimedia and interactive content to be included in web pages.
A database in which all data is stored in a single central location.
A database in which data is stored on multiple computers in separate physical locations. Various techniques are used to s
In a web environment, refers to software that runs in the user's browser rather than on the web server.
Methods used to ensure multiple (concurrent) operations can be performed on a database without causing data integrity p
A computerised system for managing an organisation's customer, sales, and marketing information. This might also includ
Software added to web browsers to extend their functionality.
Technique used in databases to prevent a record being accessed by more than one user at a time. This prevents data inte
Mobile phone with capabilities typically including Internet access and a camera.
Portable device, often with a touch screen.
Part of ACID. A way of ensuring that database transactions either happen in their entirety, or not at all. For example, a pay
Part of ACID. Ensures that data in a database is always in a consistent state i.e. that it follows all data validation rules. (
Part of ACID. Ensures that one database transaction cannot unintentionally affect another. For example, two transactions
Part of ACID. Durability means that once a transaction has occurred, it must stay occurred, even if the power is lost or th
Quick Response Code. A type of 2D bar code that can store more data than a regular UPC bar code.
The process of automatically customising a standard letter with individual names and addresses from a database.
Encoding system to store text, with support for multiple languages and alphabets, and thousands of characters. Compare
Content Management System. Software which allows management of a web site without web design skills. Content is stor
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer ca
File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (T

Page 99

CaseStudy 2012

or neither do.

d a WebCMS.

Page 100

You might also like