Definitions

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Definitions

Chap 1
Hardware: The physical parts of computing devices.

A portable device: A portable device is any device that can easily be


carried.

Storage: Storage is where data is permanently kept on your computer

User interface: The means by which the user and a computer system
interact, in particular the use of input devices and software.

Connectivity: Its a device's ability to connect to networks and other


devices. (wired/wireless)

GPS: GPS is a global navigation satellite system that provides


geolocation and time information to a GPS receiver anywhere on or
near the Earth using radio waves.

Biometrics: Biometrics is the process by which a person's unique


physical and other traits are detected and recorded by an electronic
device or system as a means of confirming identity.

Touch screen: A touch screen is a computer display screen that is also


an input device.

Sensors: Sensors are used to input data from the surroundings


environment into the computer.
Memory: Computer memory is any physical device capable of storing
information temporarily or permanently.

Miniaturization: Miniaturization is the trend to manufacture ever


smaller mechanical, optical and electronic products and devices.

A processor: A processor is an integrated electronic circuit that


performs the calculations that run a computer. A processor or
micro-processor is the 'brain' of a computer system.

RFID: Radio-Frequency Identification (RFID) is the use of radio waves


to read and capture information stored on a tag attached to an object.

NFC: NFC stands for Near Field Communication. Essentially, it's a


way for your phone to interact with something in close proximity.

QR code: A QR code (short for "quick response" code) is a type of


barcode that contains a matrix of dots that can be scanned by a QR
scanner or phone.

Technological convergence: Refers to the combination of two or more


different technologies in a single device.

Embedded Systems: An embedded system is a computer system,


made from a combination of hardware and software that is used to
perform a specific task.

Firmware: Firmware is a set of instructions programmed on a


hardware device. It provides the necessary instructions for how the
device communicates with the other computer hardware. You can
think of firmware simply as "software for hardware."
Speed: The frequency of which the processor executes instructions or
the frequency by which data is processed by the CPU.

Capacity: It’s the amount of data that can be stored on media

Bandwidth: Bandwidth is the amount of data that can be transmitted in


a fixed amount
of time.

Software: Software components are the set of instructions that we


store and run on our hardware.

Systems software: Systems software includes the programs that are


dedicated to managing the computer itself.

Application software: used to complete tasks such as creating


documents, spreadsheets, sending email, running businesses, and
even playing games!

Operating system: Operating System controls the basic functions of


the computer

Copyright: Copyright is the legal right given to an owner of an original


work to prevent others from copying/duplicating their work.

Freeware license: Software that is free to use. You can legally


download and use freeware for as long as you want without having to
pay for it.

Open source license: An open-source license is a type of license for


computer software and other products that allows the source code
design to be used, modified and/or shared under defined terms and
conditions. (OSS) is computer software distributed with its source
code available for modification.

Proprietary software: Proprietary software is primarily commercial


software that can be bought, leased or licensed from its
vendor/developer.

Creative Commons (CC) : Creative Commons (CC) licenses are


public licenses. You can use them to indicate what other people are
allowed to do with your work.

Attribution (BY): You must credit the creator, the title and the licence
the work is under. This is compulsory for all Creative Commons
licences.

Non-commercial (NC): Any use of the work must be for


non-commercial purposes only. For example, file sharing, educational
use and film festivals are all allowed, but advertising and for-profit
uses are not.

No Derivative Works (ND): The work can only be used exactly how it
is. The work cannot be adapted or modified in any way. This means
you will need to get extra permission if you want to remix the work,
crop a photo, edit down text or use a song in a film.

Share Alike (SA): Any new work produced using this material must be
made available under the same licence as the original work. So, for
example, if you remix a work under an Attribution-Share Alike licence,
you have to release the new work you create under an
Attribution-Share Alike licence.
Single user license: A single-user license typically grants a single
person the right to install the software, often on only one computer.

Multiple user license: This license permits you to install, use and
backup the Software.You must NOT sell or deliver the Software to any
third party Users may access the software in any way.

Institutional license: Institutional licensing basically means that


organizations, like schools or companies, can use certain software or
other things across many people or devices within their group. Instead
of buying separate licenses for each person or device, they get one
big license that covers everyone. This can be a more cost-effective
way for large groups to use software or other resources.

Fixed term license: A term license is the right to install software for
only a fixed term, in most cases a one or two year timeframe. Every
year, the buyer has to pay the annual fee again.

Indefinite license: An indefinite or perpetual software license allows


someone to use a program for as long as they want.

Network license: Network license allows users to use the software in a


specific LAN network.

Patch update: A patch, sometimes just called a fix, is a small piece of


software that's used to correct a problem, usually called a bug, within
an operating system or software program. Used to solve a minor
problem.

Automatic update: Automatic updates allow users to keep their


software programs updated without having to check for available
updates manually.
Upgrade update: Software Upgrading is the process of replacing a
product with a newer version of the same product. An upgrade is
generally a replacement of software or firmware with a newer or better
version.

Compatibility issues: Software incompatibility is when software


components or systems cannot operate satisfactorily together on the
same computer, or on different computers linked by a computer
network.

Chap 2
Computer network: Computer network is created when two or more
computers are connected together.

Client-server network: A computer network in which one centralized,


powerful computer (called the server) is a hub to which many less
powerful personal computers or workstations (called clients) are
connected.

Peer-to-peer network: A peer-to-peer (P2P) network is group of


computers, each of which acts as a node for sharing files within the
group. Instead of having a central server to act as a shared drive,
each computer acts as the server for the files stored upon it.

Ad hoc network: an ad hoc network refers to a network connection


established for a single session and does not require a router or a
wireless base station.

Ad hoc network: an ad hoc network is a temporary network connection


created for a specific purpose
Tethering: Tethering is the practice of using a mobile device (such as a
smartphone) as a modem to connect another device, such as a laptop
or another mobile phone to the Internet. To do so, the phone must
have mobile data enabled.

WiFi: Wi-Fi is a wireless networking technology that allows computers


and other devices to communicate over a wireless signal.

ZigBee: ZigBee is a wireless technology that allows computers and


other devices to transmit low amounts of data for those dealing with
low power issues.

Bluetooth: Bluetooth is a wireless communication standard that allows


electronic devices to connect and interact with eachother.

Cellular communication: Cellular communication is a wireless


communication technology that allows the use of mobile phones.

GSM: Global System for Mobile communication is a wireless digital


mobile network used for transmitting mobile voice and data services.

4G: 4G means the fourth generation of data technology for cellular


networks

Infrared: Infrared is a wireless communication technology that is


common, inexpensive and easy to use.

Ethernet: Ethernet is a wired communication technology used to


connect LANs together.
TCP/IP: TCP/IP is a set of standardized rules that allow computers to
communicate on a network such as the internet.

VOIP: Voice over Internet Protocol is a communication technology that


allows you to make voice calls using an internet connection instead of
a regular phone line.

SIP: Session Initiation Protocol is a signaling protocol that enables the


Voice Over Internet Protocol (VoIP) by defining the messages sent
between endpoints and managing the actual elements of a call.

Wireless transmission media: form of unguided media.

Microwave: Microwave is a wireless communication technology that


uses high frequency beams of radio waves to provide high speed
wireless connections that can send and receive voice, video, and data
information.

Radio: Radio waves are electromagnetic waves, which means that


they are made up of an oscillating pattern of electric and magnetic
fields that travels through space.

Light: Light is a broad term referring to any electromagnetic wave in


the electromagnetic spectrum ranging from gamma rays to radio
waves.

Satellite: A satellite is a body that moves around another body in a


mathematically predictable path called an Orbit.

Wired transmission media: form of guided media.


Copper Twisted Pair Cable: the wires are twisted to reduce cross talk
and electrical interference.

Fiber-optic cable: provides high quality transmission of signals at high


speed and has a glass core in the center. The glass core is then
surrounded by a glass cladding.

Power Line Communication (PLC) : a communication technology that


enables sending data over existing power cables.

Speed: Measurement of the actual rate of transfer of data in a given


time.

Bandwidth: Total amount of data that can travel through a network in a


given time.

Throughput: Throughput refers to the number of information units a


system can process within a specified amount of time.

Scalability: Scalability means the ability to be able to scale or adapt


the network for future growth.

Latency: Amount of time that the network is idle.

Error rate: Number of errors that occur in a given time

Packet loss: Packet loss is data lost during a specific transmission.

Availability: refers to the ability of a user to access information or


resources in a specified location and in the correct format.
Jitter: Jitter is the irregular time delay in the sending of data packets
over a network.

Switch: equipment that allows two or more IT devices to communicate


with one another.

Bridge: connects a local area network (LAN) to another local area


network that uses the same protocol

Gateway: A gateway is a network node that connects two networks


using different protocols together. A bridge is used to join two
similar types of networks, a gateway is used to join two
dissimilar networks.

Router: Routers route data around a network.

Combined router/switch: A switch router is a device that combines the


abilities of both switches and routers for routing data around and
between networks.

Modem: A modem is a hardware which connects to a computer,


broadband network or wireless router. Modem converts information
between analogue and digital formats in real time making seamless
two-way network communication.

Repeater: Repeater is a powerful network device which is used to


regenerate the signals, when they
travel over a longer distance, so that the strength of the signal remains
the same.
Server: A network server is a computer designed to act as central
origin and help in providing various resources like hardware access,
disk space, printer access, etc,. to other computers in the network.

Network interface card (NIC): A network interface card (NIC) is a


circuit board or card that is installed in a computer so that it can be
connected to a network.

WAP: A wireless access point (WAP) is a networking device that


allows wireless-capable devices to connect to a wired network.

Hub: A hub is a networking device that serves as a central connection


point within a local area network (LAN).

Active Hub: This type of hub that monitors, amplifies, and regenerates
signals. Signals are
strengthened in active hubs.

Passive Hub: passive hub serves only as a physical connection point


for computer devices, it
does not take an active role in maintaining, processing, or
regenerating signals.

IP address: An Internet Protocol (IP) address is the unique identifying


number assigned to every device connected to the internet.

IPv4: Internet Protocol version 4 (IPv4) is the fourth version of the


standard that routes Internet traffic and other packet-switched
networks. 32 bits, separated by dots, 4 numbers, 2^32 addresses.
decimal.
IPv6: The IPV6 definition stand for Internet Protocol version 6 (IPV6).
It's the latest version of the Internet protocol. 128 bits, separated by
commas, 8 numbers, 2^128 addresses. hexadecimal.

Static IP: IP address that always stays the same.

Dynamic IP: IP address thats constantly changing thats automatically


assigned to a network using a DHCP server.

DHCP: Dynamic Host Configuration Protocol (DHCP) is a network


management protocol used to dynamically assign an IP address to
any new node entering the network.

Easier definition of DHCP: Its a system that gives your device an IP


address when you connect to a network.

MAC: A Media Access Control address (MAC address) is a hardware


identifier that uniquely identifies each device on a network. 48 bit
address. hexadecimal.

Network security: Network security is any activity designed to protect


the usability and integrity of your network and data.

Unintentional threats: Unintentional threats are considered to be


human error, environmental hazards, and computer failures.

Intentional threats: Intentional threats refer to purposeful actions


resulting in the theft or damage of computer resources, equipment,
and data. Intentional threats include viruses, denial of service attacks,
theft of data, sabotage, and destruction of computer resources.
Open network: It's a setup where a network allows different
companies to offer their services through it. The owner of the network
typically only sells access to these companies, who then provide all
sorts of services directly to customers, like TV over the internet, phone
services, home alarm systems, and more.

Easier definition of open network: It's like a marketplace where the


owner of a network lets other companies sell their services directly to
customers.

OAN (open access network): An open access network (OAN) is a


telecom system where many companies share the same network to
offer services, with different groups owning the network and providing
the services.

(Software) Firewall: A firewall is used at the gateway to a network. It


controls the network traffic to and from a network, particularly the
traffic from the internet. Firewalls prevent unauthorized users from
accessing network devices and resources, such as storage.

Hardware firewall: A hardware firewall is a physical appliance that is


deployed to enforce a network boundary.

Anti-malware: Anti-malware is any resource that protects computers


and systems against malware, including viruses, spyware and other
harmful programs.

User controls/access/rights/profile: Access controls are security


features that control how users and systems communicate and
interact with other systems and resources.
Authentication: The process of verifying the identity of a user, process,
or device, often as a prerequisite to allowing access to resources in an
information system.

Two-factor authentication: a security process in which the user


provides two different authentication factors to verify themselves to
better protect both the user's credentials and the resources the user
can access.

Biometric authentication: Biometric authentication is a security


process that relies on the unique biological characteristics of an
individual to verify that he is who is says he is.

Biometrics: Biometrics are body measurements and calculations


related to human characteristics.

Encryption: Encryption is the process of protecting information or data


by using mathematical models to scramble it in such a way that only
the parties who have the key to unscramble it can access it.

Physical controls: Physical security controls are means and devices to


control physical access to sensitive information and to protect the
availability of the information.

Physical security: Physical security is the protection of personnel,


hardware, software, networks and data from physical actions and
events that could cause serious loss or damage to an enterprise,
agency or institution. This includes protection from fire, flood, natural
disasters, burglary, theft, vandalism and terrorism.
Chap 3
Online environment: The virtual space in which a computed defined
system can function being connected to other(s) connected systems
through a communication electronic channel and sharing content.

The internet: Internet can be defined as the worldwide network where


machines like computers, servers, and smart devices are connected
together for communication and data exchange purposes.

WWW: A system of interconnected public webpages accessible


through the Internet. There are only two functions of the world
wide web:

- To send information
- To collect information

DNS: A Domain Name System (DNS) turns domain names into IP


addresses, which allow browsers to get to websites and other internet
resources. Its like a phonebook for the Internet. Humans access
information online through domain names, like nytimes.com or
espn.com.

Static web page: "Static" means unchanged or constant so, static Web
pages contain the same prebuilt content each time the page is loaded.

Dynamic web page: "dynamic" means changing or lively so, the


content of dynamic Web pages can be generated based on the users
personal interests or to stay up to date with new content and ads.
Client-side scripting: Client-side scripting simply means running
scripts, such as JavaScript, on the client device, usually within a
browser.

Server-side scripting: Server-side scripting is a technique used in web


development which involves employing scripts on a web server which
produces a response customized for each user's (client's) request to
the website.

Digital footprint: A digital footprint is a trail of data you create while


using the Internet.

Active digital footprint: An "active digital footprint" includes data that


you intentionally submit online, like sending an email.

Passive digital footprint: A "passive digital footprint" is a data trail you


unintentionally leave online, like when you visit a website, the web
server may log your IP address, which identifies your Internet service
provider and your approximate location.

Positive digital footprint: A Positive Footprint is when you post things


that are funny, happy, showing experience and knowledge , which
means you have a clean slate where there is nothing that people will
see that is bad about you.

Negative digital footprint: A Negative footprint is when you put stuff


that will embarrass you when you post it, such as talking to a person
about a crime, cyberbullying, or inappropriate talking. It could effect
ones career or family reputation.
Online community: An online community is a group of people with
common interests who use the internet to communicate, work together
and pursue their interests over time.

Monetization: The act of changing something into money, or


expressing something as money or currency.

Cloud storage: Cloud storage is a service that allows you to store and
access your data remotely over the internet

Cloud computing: Cloud computing is a method where data is stored


on remote servers and accessed through the internet.

Chap 4
IT system: an IT system is a number of components working together
towards a common goal. It consists of hardware, software, processes
and people.

Data flow diagram: Graphical representation of how data flows


through an information system without going into great detail.

Flow charts: Similar to DFD but they show us how “decisions” are
made and how data is “controlled”.

Chap 5:
Data: Raw unorganized facts without a context that has no meaning in
itself.

Information: Processed organized data with a context that has been


made meaningful.
Structured data: Data that has a standardized format for efficient
access by software and users. Typically tabular with rows and
columns.

Unstructured data: Data that isnt stored in a specific format. Typically


contains images, audios or documents.

SQL: SQL is a standard programming language used to delete, add,


create, order, duplicate and organize data from relational databases.

RDB: Relational database is a database based on the relational model


which organizes data in tables related to eachother using keys.

You might also like