Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
330 Cards in this Set
- Front
- Back
®Bluetooth
|
A wireless technology for exchanging data over short distances.
|
|
3G
|
3G 'third generation'. A standard for access technology enabling connection to the internet using mobile.
|
|
4G
|
4G 'fourth generation'. A much faster standard for connection to the internet than 3G.
|
|
Abnormal data
|
Invalid data used when testing a system; this is data that should not be accepted.
|
|
Absolute file path
|
Shows the whole of the path to the file from the root directory.
|
|
Absolute reference
|
In a spreadsheet, an absolute cell will always point to the exact cell described if it has a dollar sign ($) in the row or column coordinate, or in both. For example, =$A$5/A2.
|
|
Actuator
|
Device used to carry out the physical requirements of a computer.
|
|
Analogue data
|
Data in its original, physical form. Typically output from a sensor.
|
|
Analogue-to-digital converter
|
Device that changes analogue data to digital data so that it can be stored on a computer system.
|
|
Anchor
|
a type of hyperlink that will take you specifically to a different part of the web page you are on.
|
|
Animation (in presentation software)
|
An effect used on individual elements on one slide.
|
|
Animation using computers
|
Sequence of different pictures which project movement. CGI (computer-generated imagery) is the application of computer graphics to special effects in films and television programmes.
|
|
ANPR
|
Automatic number plate recognition.
|
|
Applets
|
A small program that is designed to be executed from inside another program, not from the operating system.
|
|
Applications program
|
a type of software that allows you to create many different types of documents, such as letters, invoices, presentations, web pages and so on.
|
|
Application software
|
Sets of instructions to the computer that allow the user to do something useful.
|
|
Apps
|
Short for application.
|
|
Artificial intelligence
|
An expert system that can change the rules by which it works according to experience of what has happened in previous occurrences.
|
|
Aspect ratio
|
The proportional relationship between the width and height of an image, expressed in numbers as in 14:6.
|
|
Audio-conferencing
|
A telephone meeting between multiple callers in separate locations.
|
|
Automated objects
|
Objects that update automatically every time your page is updated, for example date and time, page numbering, and so on.
|
|
Automated teller machine (ATM)
|
Cash point machine used to withdraw cash or manage a bank account.
|
|
Backing store
|
a secondary storage device for data.
|
|
Backup file
|
A copy of a file of information which is stored somewhere away from the computer and can be used to restore the file if the data is lost.
|
|
Bandwidth
|
A measurement of how much data can be sent along a communications channel in a given time, usually per second.
|
|
Bar code
|
A series of black and white lines representing a code number, used in a variety of applications.
|
|
Bar code reader
|
Device used to read bar codes - can be fixed or hand-held.
|
|
Batch processing
|
The data to be processed is collected together in batches and is then run at some later more convenient time. The data must not be time sensitive.
|
|
Binary code
|
The representation of a number in the binary system, which comprises only the digits 0 and 1.
|
|
Binary number system
|
The base-2 numeral system which represents numeric values using only two symbols, 0 and 1.
|
|
Biometric data
|
records that are used to identify people by a physical attribute that doesn't change. An example of this would be a database of fingerprints of known criminals.
|
|
Biometrics
|
The technologies that measure and analyse human body characteristics for the purpose of authentication. Typically used are fingerprints, eye retinas and irises, voice and face patterns.
|
|
Blog
|
Short for 'web log' - a website with regular entries of commentary, descriptions of events, or other material such as graphics or video.
|
|
Boolean
|
Data that can only take two states and hence can be represented by 0 or 1.
|
|
Botnets
|
Describes a number of internet computers set up to forward transmissions (including spam or viruses) to other computers on the internet.
|
|
Browser
|
A software application for searching and retrieving information resources on the world wide web.
|
|
CAD/CAM
|
Software which allows for the design of an item and then for its automatic manufacture.
|
|
Cascading style sheets (CSS)
|
A style sheet language used for describing the presentation of a document written in a markup language such as HTML.
|
|
CD-ROM
|
Compact disk read only memory - optical storage media.
|
|
CD-ROM drive
|
Device used to read CD-rom, CD-R and CD-RW media.
|
|
Cells
|
the small rectangular sections on spreadsheets used to enter data such as text, numbers or symbols and to perform calculations using formulas and functions.
|
|
CGI
|
Computer-generated imagery software for creating cartoons.
|
|
Changeover
|
The planning of how the new system is to replace the old system. Should include training/ file construction and hardware and software implementation. Typical methods are direct/phased/ parallel/pilot.
|
|
Chart/graph
|
data taken from spreadsheets can be represented by creating a graph or chart, such as a bar, pie or line graph. You can use different colours, lines and patterns for more visual clarity.
|
|
Chip-and-pin
|
Microchip built into debit/credit cards to provide security when purchasing.
|
|
Cloud
|
we sometimes refer to something being 'in the cloud'. It refers to software applications and data that are stored online and used through the internet. Cloud computing means that we don't have to think about where our data is, because with cloud computing it will be wherever we are.
|
|
Coded data
|
Data that has been changed in some way so that entry and storage in the computer are simplified, e.g. M instead of male and F instead of female.
|
|
Columns
|
made up of cells that are adjacent to each other and go from top to bottom or bottom to top vertically.
|
|
Comma separated values (CSV)
|
A simple structured format for data; used to exchange data between programs of different types.
|
|
Command-line interface
|
Interface between the computer and the user which requires the user to type commands at a prompt supplied by the operating system.
|
|
Compiler
|
A computer program that transforms source code written in a programming language into another computer language.
|
|
Compressed hours
|
When employees work the same number of hours but over fewer days.
|
|
Computer assisted learning (CAL)
|
Using computers to teach students facts about a particular topic. Would also be used for testing and producing results.
|
|
Concept keyboard
|
A computer input device. They have a flat surface and are used with a prepared paper or plastic overlay to indicate what will be input when the board is pressed.
|
|
Consistent style
|
the style on all of a company's promotional materials, with the same colours and logo position on all documents, using the same images and there being a 'sameness' in the look of all their materials.
|
|
Contactless payment
|
Devices, including smartphones that use radio-frequency identification (RFID) or near field communication (NFC) to make secure payments.
|
|
Content management system (CMS)
|
A system used to manage the content of a website.
|
|
Contiguous data
|
Data stored in a solid uninterrupted block; usually in spreadsheets or memory.
|
|
Contrast
|
the difference between how dull or bright an image and how it appears in reality or as can be seen by the human eye.
|
|
Cookie
|
A small amount of data sent from a website when the user is browsing that site; it is stored in a user's web browser.
|
|
Copyright
|
the exclusive and assignable protection of intellectual property by law.
|
|
Corporate branding
|
the promotion of a particular company or organisation through the advertising style it uses. The more people see the style the more they associate it with that particular company or organisation.
|
|
Crop
|
cutting out a part of an image that is not required for the intended purpose.
|
|
Custom written software
|
Software that is specially commissioned to carry out a particular task.
|
|
Data
|
Material that is stored in the computer.
|
|
Data capture form
|
Form designed to collect data and then to allow easy entry of the data to the computer.
|
|
Data duplication
|
repeating data by adding data that is already held in the database.
|
|
Data logging
|
Collection of data for future processing.
|
|
Data packets
|
When data is transmitted, it is broken down into small, similar blocks of data which are reassembled once they reach their destination.
|
|
Data table
|
Table which lists and defines the purpose and type of each variable used in a computer program.
|
|
Database
|
A collection of data. It normally has more than one file (table) which can interact with other files so that the need for duplication of data is reduced.
|
|
De-skilling
|
The effect on workers who no longer need a particular skill because it is done by new technology.
|
|
Declarations
|
when using CSS to create stylesheets, the CSS rules require you to define the properties and the values for each selector you wish to use by using declarations.
|
|
Dedicated
|
Something that is designed to do only one thing. A dedicated microprocessor is used to control a washing machine, a job that it does very well, but it can't do anything else.
|
|
Design
|
Producing the parameters of the solution to a problem. Done in the order: output/input/ storage/ processing. Design can be done on paper or directly to the computer.
|
|
Desktop publisher (DTP)
|
Application that allows the import of text and graphics to the computer and can then be used to arrange it on a page.
|
|
Device driver
|
A program to control a device that is attached to your computer, such as a printer.
|
|
Digital camera
|
Camera which uses memory to store photographs instead of film. Can be used as an input device.
|
|
Digital certificate
|
An electronic certificate similar to a passport to allow the exchange of information securely over the internet using the public key infrastructure (PKI).
|
|
Digital data
|
Data in electronic form, suitable for storage on a computer.
|
|
Digital-to-analogue converter
|
Device that changes digital data to analogue data so that it can be transmitted via telecommunications or used to drive an actuator.
|
|
Direct access
|
File where the data is indexed making access to a specific piece of data very fast.
|
|
Direct data entry
|
When input devices transfer data into a computerised information system. E.g. RFID, MICR.
|
|
DNS server
|
Domain name system server. DNS turns the userfriendly version of a domain name, such as www. thisismysite.com, into numbers such as 60.22.161.42. This set of numbers is called an Internet Protocol (IP) address and is used to route you to your requested site. DNS works through a massive distributed database that stores domain names and their IP addresses so that it can find the domain name you want.
|
|
Double data entry
|
a proofing technique that uses the COUNTIF spreadsheet function together with conditional formatting to highlight the differences in two lists of items.
|
|
Drone
|
Unmanned aircraft or flying robot.
|
|
Duplex
|
a feature of printers that enables automatic printing on both sides of a sheet of paper.
|
|
Electrical overload
|
electrical circuit overloads are when too many electrical items are plugged into one socket causing more current to be put across an electrical wire or circuit than it can handle.
|
|
Electronic conferencing
|
Use of electronic communications to allow people to hold meetings without actually meeting. These links could be voice only or more often would now include live video, then known as video conferencing.
|
|
Electronic funds transfer (EFT)
|
Transfer of money from one bank account to another by computers.
|
|
Electronic funds transfer at point of sale (EFTPos)
|
Money is transferred, by computer, from the customer's bank account to the shop's bank account to pay for goods.
|
|
Encryption
|
Making data difficult to read by scrambling mathematically. Before reading, the contents must be decrypted.
|
|
Ethernet
|
the most common standard defining the wiring and signalling in a LAN.
|
|
Expert system
|
A computer system that stores facts about a particular topic and can search the facts for sensible information according to a set of rules.
|
|
External storage device
|
data storage that is separate from the computer, it usually plugs into a USB port on the computer.
|
|
Extracting a pie chart sector
|
when a section of a pie chart is extracted out of the pie chart in order to highlight or emphasise a point.
|
|
Extreme data
|
Values at the extreme ends of normal data used in testing a system; this is data that should be accepted.
|
|
Facimile (fax)
|
An exact copy of a document that is scanned transmitted as data by telecommunications links.
|
|
Field
|
An area of a record in a file which stores a specific piece of data.
|
|
File
|
A collection of data covering a particular topic.
|
|
File directory
|
An index which allows fast access to the files.
|
|
File extension
|
a way to identify the type of file.
|
|
File name
|
a way to identify a file.
|
|
Firewall
|
A stand-alone machine or an application through which external messages must be filtered. This stops viruses and unauthorised access to the system.
|
|
Flash memory cards
|
Used in mobile phones (cell phones), MP3 players and digital cameras as storage.
|
|
Flat file
|
Database held as a table and stored in a single file.
|
|
Flexible working
|
A working schedule different from normal working patterns when working hours can be varied instead of fixed.
|
|
Foreign key
|
A field in one table of a relational database that is linked to the primary key in another table.
|
|
Formatting
|
The preparation of the surface of a storage medium so that it is ready to accept data. The process results in the previous data being erased.
|
|
Formatting text
|
using the font type, font size, font colours, etc. that you prefer for your text.
|
|
Formula
|
arithmetical or mathematical operations carried out on cells even when they do not form part of a range of cells; for example, you can add cells together where you cannot use the function SUM because the cells being added up are not adjacent to each other.
|
|
Function
|
arithmetical or mathematical operations that are carried out on groups of cells, ranges, columns or rows and are very specific, for example AVERAGE or SUM.
|
|
Geographic information systems (GIS)
|
For capturing, storing, checking and displaying data related to the surface of the Earth as a map.
|
|
Graphical user interface (GUI)
|
Uses windows (W) to create a border to the information, icons (I) to represent files, menus (M) to allow user to make choices and a pointer (P) to select choices. Hence, sometimes called a WIMP.
|
|
Graphics
|
Pictorial representation and manipulation of data.
|
|
Graphics tablet
|
Device to input designs as they are being drawn by hand; also used in editing graphics/ photographs.
|
|
Gridlines
|
the visible onscreen lines between cells in a table.
|
|
Gutter margin
|
A typographical term meaning an addition to the margins on the inside of two facing pages in a book. It compensates for the part of the paper made unusable by the binding process.
|
|
Hacking
|
Unauthorised access to computer systems.
|
|
Handshake
|
When the computer wants to communicate with a device it is important that rules are established for the communication. This must be done before communicating and is known as handshaking.
|
|
Hanging paragraph
|
indentation of the second and subsequent lines of a paragraph that is different from the first indentation of the paragraph.
|
|
Hard disk
|
Magnetic storage device.
|
|
Hardware
|
The physical parts of a computer system.
|
|
HCI
|
Human computer interface.
|
|
House style
|
Sometimes called 'branding', it is a set of rules to keep all written communications of an organisation in the same format throughout that organisation.
|
|
HTML
|
Hypertext markup language.
|
|
HTTP
|
Hypertext transfer protocol.
|
|
Hub
|
Central node of a network or sub-network to which each computer is connected. Data transmitted by one computer is passed to all ports of the hub.
|
|
Hyperlink
|
A link from a hypertext document that takes you to another location when you click on a highlighted word or an image.
|
|
HyperText Transfer Protocol (HTTP)
|
Used by the World Wide Web to define how a web page is formatted and transferred.
|
|
HyperText Transfer Protocol secure variant (HTTPS)
|
HTTP using a secure encrypted link.
|
|
Icon
|
Pictorial representation of a specific file, directory, window, option, or program.
|
|
Indented paragraph
|
a paragraph that begins its first line of text a few spaces away from the left-hand margin.
|
|
In-plane switching (Ips)
|
A screen technology allowing greater viewing angles and colour reproduction.
|
|
Inference engine
|
A processing program which is the part of an expert system that derives conclusions from facts in the knowledge base of the expert system.
|
|
Information assets
|
valuable data that you wouldn't want to be stolen or corrupted.
|
|
Input device
|
transfers data into a computer so that it can be processed.
|
|
Intellectual property
|
the ideas and skills of other people that belong to them.
|
|
Integration of software
|
Pieces of software that can communicate with one another and share data without changing its form.
|
|
Interface
|
The hardware and software that create the connection between the user and the computer or the software being used.
|
|
Internet
|
A public, worldwide WAN whose contents are not controlled.
|
|
Internet café
|
Where customers can pay to use computer systems and usually coffee is available.
|
|
Internet connection sharing
|
ICS is a way of connecting more than one computer in a LAN to the internet using only one connection and IP address.
|
|
Internet Service Provider (ISP)
|
ISPs allow a connection to the internet (usually with a price attached to different levels of service).
|
|
Intranet
|
A privately operated WAN, like the Internet, except that the data content is controlled and access to it is also controlled.
|
|
ISBN
|
International Standard Book Number, which consists of 13 digits. ISBNs include a check digit calculated using a mathematical formula to validate the number.
|
|
Item
|
Item of data stored in a field.
|
|
Iteration
|
Process of repeating a sequence of steps.
|
|
Joystick
|
An input device used in games, simulations and control applications to move an object.
|
|
Key (field)
|
The field that is used to identify the record within the file. The item within the key field must be unique.
|
|
Keyboard
|
Input device used to input characters.
|
|
Landscape
|
the wider, shorter orientation of a page compared to the narrower, taller version of a page with a portrait orientation.
|
|
Laptop
|
Portable computer, able to operate from internal battery power, also known as a notebook.
|
|
Layout
|
the way objects are arranged in the space provided on the page of a document.
|
|
Legend
|
a key at the side of a chart or graph that indicates what the symbols or colours and patterns represent in the chart or graph.
|
|
Linker
|
A computer program to combine files generated by a compiler into single executable file, or another object file.
|
|
Local area network (LAN)
|
Network that is physically close together. The machines are close enough to be hard wired.
|
|
Lossless
|
A form of file compression that allows all original data to be recovered when the file is uncompressed.
|
|
Lossy
|
Lossy compression reduces a file by permanently eliminating some information so when the file is uncompressed, not all of the original information is still there (although you may not be able to notice it).
|
|
Machine code
|
Set of programming instructions to match the electronic design of a particular computer. An example of a low-level language.
|
|
Magnetic disk Storage
|
medium that can store large amounts of data in a way that allows direct access to the data.
|
|
Magnetic ink
|
Special ink used to print characters so that they are in both computer- and human-readable form.
|
|
Magnetic stripes
|
Magnetic material which stores information about the holder, typically on the back of a credit card/debit card.
|
|
Magnetic tape Storage
|
medium which is now a bit out of date but is still used to keep backup files on some systems.
|
|
Mail merge
|
A time-saving method of sending the same letter to many people with the automatic addition of individual names and addresses from a database to each letter.
|
|
Mainframe computer
|
Large-scale computer typically used in a large organisation to be the processing power for all the terminals in a multi-user system.
|
|
Master slide
|
the main slide where you can create the design you want to use across all the other slides in a presentation.
|
|
Memory sticks
|
Pen drives used to store files (up to many gigabytes) or transport files from one computer to another.
|
|
Microcomputer
|
Term no longer in use to describe a PC - personal computer.
|
|
Microphone
|
Device used for input of sound to a computer system.
|
|
Microprocessor
|
A dedicated device that incorporates all the parts of a computer processor on a single chip (also known as CPU - central processing unit).
|
|
Minicomputer
|
A larger computer than a PC but smaller than a mainframe. Called a mini because when they were invented they were the smallest computer. Typically used to control the checkouts in a supermarket.
|
|
Modem
|
An abbreviation of 'modulator/demodulator' - hardware device to connect a computer to the telephone network; needed because the computer produces digital signals and the telephone network uses analogue.
|
|
Module
|
Smaller components after a problem has been broken down by the use of top- down design.
|
|
Monitor
|
Device that shows computer output in picture form. TFT monitors may be used for a PC system or be an integral part of a laptop.
|
|
Motherboard
|
A motherboard contains a computer's basic circuitry and sockets to plug in components.
|
|
Mouse
|
Input device used to control a pointer in a graphical user interface.
|
|
Multi-access (operating system)
|
Operating system which allows the resources of a computer to be used by a number of users at terminals. The processing is centralised.
|
|
Multi-tasking (operating system)
|
Operating system which can do a number of different things simultaneously. Microsoft Windows is a typical multi- tasking OS.
|
|
Multimedia
|
Combination of more than one of: text, graphics, photographs, sound, animation, video.
|
|
Multimedia package
|
Set of software which uses many different media to convey or manipulate information.
|
|
Multimedia projector
|
Output device used for presentations.
|
|
Musical instrument digital interface (MIDI)
|
A communications link between an electronic instrument and a computer. Each device must have midi hardware.
|
|
Named cell or range
|
each cell in a spreadsheet has a name by default, for example E7 is the cell in column 'E' and in row '7'.
|
|
Nested formula/function
|
you can 'nest' a formula or function inside another formula or function in one cell of a spreadsheet.
|
|
Netbook
|
Small notebook, often used simply to send emails or access the internet.
|
|
Network
|
Linked set of computer systems, allowing the sharing of resources.
|
|
Network operating system
|
Operating system which allows a number of machines to be in communication with each other and to share data and resources.
|
|
Non-contiguous data
|
Data that is not stored in a solid uninterrupted block; usually in spreadsheets or memory.
|
|
Notebook
|
Portable computer, able to operate from internal battery power, also known as a laptop.
|
|
Objectives of a solution
|
List of things that a solution should do, that has been agreed between the analyst and the user and will be used during the testing of the solution to decide whether or not the solution works.
|
|
OCR
|
Optical character recognition.
|
|
Off-line
|
This is a way of using the computer where the user or device is not directly connected to the processor.
|
|
Off-the-shelf software
|
Ready-for-use software.
|
|
OMR
|
Optical mark reader.
|
|
On-line
|
Using the computer where the user or the device is directly connected up to the processor.
|
|
Online processing
|
Processing which allows the user to interact directly with the main computer.
|
|
Operating system
|
Set of software which controls the hardware and applications of the computer and provides an interface with the outside world.
|
|
Optical disk
|
Storage device that stores large amounts of data in a way that can be accessed directly. The data is stored and read using lasers, rather than magnetically.
|
|
Optical mark form
|
Form used to record optical marks which are then read by OMR.
|
|
Page orientation
|
the way you position your page having the narrower width across the top of the page is called 'portrait' orientation; having the wider width across the top of the page is called 'landscape' orientation.
|
|
Pages
|
these are the same as spreadsheet sheets.
|
|
Pagination
|
the numbering of pages in a document.
|
|
Part-time working
|
working fewer hours per week than people usually do.
|
|
Password
|
Secret code that gives the user access to the computer, file or folder.
|
|
Pharming
|
A cyber attack that redirects a website's traffic to another, fake site.
|
|
Phishing
|
Phishing attempts to acquire sensitive information for malicious reasons whilst masquerading as a trustworthy entity in an email or other electronic communication.
|
|
Physical data
|
Data that exists in the physical world like length, area, weight. This data is analogue and is not in the right form for a digital computer.
|
|
Pixel
|
The smallest part of a computer graphic image. A large number of pixels are put together to form the whole image. The pixel is so small that it cannot be seen.
|
|
Placeholders
|
'frames' or 'empty boxes' to insert items of text, images, sound, video and so on.
|
|
Plotter
|
Device used to produce hard copy output of line drawings from a computer.
|
|
Point of sale (POS)
|
The cash register/till in the shop where customers pay for their purchases.
|
|
Pointer
|
device Used for input to the computer by pointing at a particular output on the screen. Typically the pointer is a mouse.
|
|
Presentation software
|
Software that allows a presentation to be produced using linked screens (or frames) that can be followed in an order. Allows use of animation and sound as well as standard outputs.
|
|
Preview
|
a tool that allows you to see what your document will look like before you either print it out, save it or send it somewhere else
|
|
Primary key
|
In a relational database it is a key field that is unique for each record. It is a unique identifier, such as a passport number. A relational database must always have one primary key.
|
|
Printer
|
Device used to produce hard-copy output from a computer.
|
|
Privacy of data
|
Some data is confidential and methods need to be used to ensure that the wrong people do not see it. Methods used include passwords and encryption.
|
|
Privacy settings
|
Settings in your software to control who is allowed who is authorised to view your postings.
|
|
Private key
|
Used in cryptography, it is an encryption/ decryption key known only to the people exchanging. It is shared by the communicators so that each could encrypt and decrypt messages.
|
|
Process control (operating system)
|
An operating system which allows a processor to control the use of sensors and actuators.
|
|
Processor
|
called CPU, short for central processing unit.
|
|
Proofing Reading
|
a copy of a publication to find and correct errors in text or art.
|
|
Protocol
|
Guidelines or procedures to follow for the format of data transmitted between two devices, for example: FTP, HTTP.
|
|
Prototyping
|
Producing a partial solution to a problem so that that area of the problem can be tested without reference to the rest of the solution.
|
|
Proxy server
|
Controls the access of authorised users to data on a different network and prevents external users gaining control of the system.
|
|
Pseudo-code
|
A method of describing the design of a system in the user's own language. Looks like programming code but cannot be run or compiled.
|
|
Public key
|
In cryptography it is a value provided as an encryption key, when, if combined with a private key can be used to encrypt messages and digital signatures.
|
|
Radio-Frequency Identification (RFID)
|
A RFID reader will typically consist of a small chip and an antenna.
|
|
Random access memory (RAM)
|
That part of the computer's memory that is used to store programs and files that are being used by the computer at that time. The contents of RAM are lost when the power is turned off.
|
|
Range
|
a group of cells in a spreadsheet that consist of more than one row and column and where the cells are all adjacent to each other.
|
|
Re-skilling
|
When a worker with a particular skill that is no longer needed learns and uses a different skill.
|
|
Read only memory (ROM)
|
That part of the computer's memory that is not erased when the power is turned off. Contains code used when the computer is turned on.
|
|
Real-time processing
|
Operating system that processes an input and produces output immediately.
|
|
Record
|
Part of a file which stores data about a particular entity. All records in the file store the same type of data.
|
|
Reflect
|
producing a mirror image of the original image.
|
|
Relational table
|
Complex database structure stored in more than one table, which are linked together (by foreign keys).
|
|
Relative file path
|
A path specifies a unique location in a file system. A relative path starts from a given working directory, not from the root directory. Avoiding the need to provide the full absolute path.
|
|
Relative reference
|
When a relative reference is replicated to other rows or columns, the cell reference will automatically update itself accordingly, unlike the absolute cell reference which always points to an exact cell.
|
|
Repetitive strain injury (RSI)
|
Injury caused by the constant use of certain muscles, mainly fingers or joints in the arms, as a result of typing for long periods of time.
|
|
Requirement specification
|
List of the necessary hardware and software to put a solution into practice and a list of the wishes of the proposed user of the solution.
|
|
Resize
|
changing the width and/or height of an image to fit its intended purpose.
|
|
Resolution
|
Measurement of the clarity of an image based on the number of pixels used to create the image.
|
|
Robotics
|
Study, design and use of robots for use in automated industrial processes.
|
|
Rotate
|
turning an image around from its original position.
|
|
Router
|
Complex hub which contains the network addresses of the attached computers and can forward data to the correct location, often used where a LAN connects to a WAN.
|
|
Routkits
|
A malicious program to allow an unauthorised user to control a computer system undetected.
|
|
Rows
|
made up of cells that are adjacent to each other and go from left to right or right to left horizontally.
|
|
Sans-serif
|
font font types that do not have any serifs or 'tails' at the ends of characters.
|
|
Scales
|
the units of measurement used on the axes of a chart or graph.
|
|
Scanner Device
|
that reads an image on paper into the computer.
|
|
Script
|
a set of instructions for a computer.
|
|
Scripting language
|
a fairly simple programming language, such as JavaScript, used to create a script.
|
|
Search engine
|
A computer program that searches for and identifies items in a database that correspond to keywords entered by the user for finding particular sites on the world wide web.
|
|
Secondary storage
|
device sometimes called external memory, this is non-volatile memory (does not lose stored data when the computer is switched off).
|
|
Secure socket layer (SSL)
|
Layer that allows an encrypted connection between your web server and the web browser of visitors to it enabling private information to be transmitted without problems such as eavesdropping, data tampering or message forgery.
|
|
Security of data
|
Data that is being stored is necessary otherwise it would not be stored. The security of the data is how it is looked after to make sure that it is not destroyed, typically by making backups of the data.
|
|
Security settings
|
Settings you can change to protect your computer from harm.
|
|
Selectors
|
when using CSS to create stylesheets, the CSS rules require you to specify the selectors (HTML elements) to which you wish the styles to apply before defining the declarations. The declarations are applied to the selectors.
|
|
Sensors
|
Input devices that capture physical data.
|
|
Sequential file
|
File where the data is stored in a logical order, e.g. Alphabetic.
|
|
Serial file
|
File where the data is stored in the order in which it was received.
|
|
Sheets
|
in spreadsheets, the sheets are like the different pages of a book. You can rename each sheet to whatever you prefer and add as many sheets as you need to.
|
|
Slogan
|
a phrase or a string of words (not necessarily a sentence) that are representative of a company or organisation.
|
|
Smartcard
|
A plastic card such as a credit or debit card with a built-in microprocessor that are used to carry out financial transactions.
|
|
Smartphone
|
A mobile phone that can perform many of the functions that a computer performs.
|
|
Smishing
|
A security attack where a user is tricked into downloading a virus or malware onto a cellular phone or mobile device.
|
|
Social networking
|
People use a website to talk, share ideas and images and to make new friends.
|
|
Software
|
A general term for instructions to a computer to perform a variety of tasks.
|
|
Solid-state
|
media storage media with no moving parts, based on electronic circuits and using flash memory.
|
|
Solid-state memory
|
Similar to RAM only the data is persistent (non-volatile). Used as a replacement for hard disks.
|
|
Sound card
|
this enables the computer to send audio information to an audio device, such speakers or headphones.
|
|
Spam
|
When multiple copies of the same message are sent over the internet to try to force the message on people who would not otherwise choose to receive it.
|
|
Speakers
|
Electro-mechanical device producing sound output from electricity input.
|
|
Spreadsheet
|
Application designed to handle numbers and calculations in a grid formation. Is also used for predicting future trends according to rules that govern the numerical data input.
|
|
Spyware
|
A program that can secretly record what you do on computer. It usually tries to capture passwords, banking and credit card details for fraudulent purposes.
|
|
Stepwise
|
refinement The breaking down of a large problem into smaller sub-problems (see top-down design).
|
|
Storage media
|
something onto which data is written for safe keeping, like a tape or a disk.
|
|
Supercomputer
|
Most powerful type of computer. The extremely fast processing speeds make it useful for applications requiring large amounts of calculation like weather forecasting.
|
|
Switch
|
Similar to hub but only sends data to devices that are addressed, rather than all devices. Used to cut down traffic on complicated networks.
|
|
Syntax
|
every language has a set of rules that govern the ways their words combine to form phrases, clauses and sentences. Similarly, in computer programming languages, syntax defines the combinations of symbols that are considered to be a correctly structured document or fragment in that language.
|
|
System
|
flowchart Diagrammatic representation of the way the hardware and software operate in the system and the way that the files are stored.
|
|
Systems
|
analysis Standardised set of steps that can be used to analyse a problem and design and implement a solution to the problem.
|
|
Systems analyst
|
Person responsible for carrying out the stages of systems analysis on a project.
|
|
Systems life cycle
|
the different stages in the process of producing a new IT system.
|
|
Systems software
|
Software that operates the computer hardware and provides a platform for running application software.
|
|
Tablet
|
A small, wireless, portable, personal computer which has a touch screen interface.
|
|
Tabs
|
small buttons typically placed at the bottom of a spreadsheet and serve to navigate between the different sheets.
|
|
Tabulation
|
refers to how far to the left or right text is indented.
|
|
Technical documentation
|
Set of detailed descriptions about how the solution was arrived at and how it works. Intended for someone who needs to maintain the system.
|
|
Tele-conferencing
|
A conference between two or more people in separate locations using computer networks to transmit audio and video data.
|
|
Template
|
a frame upon which to build a document by simply copying the same style or filling in your own relevant information in the spaces provided
|
|
Test plan
|
Set of test instructions designed to test specific parts of the solution.
|
|
Test strategy
|
Decision made by the systems analyst about who/where/when and how the eventual solution is to be tested.
|
|
Tethering
|
Using a mobile device that's connected to the internet as a modem for another device, such as a laptop or a WiFi-only tablet.
|
|
Thermistor
|
Semiconductor device that is used to read temperature (its resistance varies with temperature).
|
|
Time dependent
|
Data which must be used immediately otherwise it becomes useless is said to be time dependent.
|
|
Top-down design
|
The breaking down of a large problem into smaller sub-problems (see stepwise refinement).
|
|
Touch screen
|
Screen that allows input as well as output. Input is accomplished by pointing at an area of the screen.
|
|
Touchpad
|
Used in laptops as an alternative to a mouse as an input device.
|
|
Trackerball
|
An input device used to control pointers; may be used in older laptops. Very similar to a mouse.
|
|
Transitions (in presentation software)
|
An effect used to make a slide appear or disappear, such as fade or blinds.
|
|
Trilateration
|
A technique to find the user's position, speed, and elevation by constantly receiving and analysing radio signals from GPS satellites.
|
|
Universal resource locator (URL)
|
Unique reference for each resource on the internet.
|
|
User documentation
|
Detailed descriptions of how to use the system.
|
|
Utilities
|
A small program that provides an addition to the capabilities provided by the operating system such as: antivirus, disk repair, file management, etc.
|
|
Validation
|
Checking data input to a system to ensure that it follows certain rules and is sensible.
|
|
Variable
|
Symbolic name, often in programming code, that can take different values.
|
|
Verification
|
Checking of data input to ensure that is correct.
|
|
Video card
|
this is an internal circuit board for displaying images from a computer onto a screen.
|
|
Video conferencing
|
Electronic meeting where all physically separated participants can be seen as well as heard.
|
|
Virus
|
Computer code that is maliciously placed on a computer system with the aim of damaging the system.
|
|
Virus protection
|
Software which identifies viruses and deals with them by not allowing access or erasing them.
|
|
Vishing
|
A fraudulent phone call from someone, for example, posing as a bank representative who tries to persuade victims to reveal financial information.
|
|
Visual verification
|
a proofing technique whereby you visually check a document for accuracy and correctness.
|
|
VOIP
|
Voice Over Internet Protocol.
|
|
Watermark
|
A very faint design visible behind the main text.
|
|
Web 2.0
|
Use of the internet that aims to enhance communications, secure information sharing and other forms of collaboration. Web 2.0 concepts have led to the development of social-networking sites, file- sharing sites, wikis and blogs.
|
|
Website authoring
|
Application that enables the user to create a website.
|
|
Wide area network (WAN)
|
Machines on the network are so far apart that they cannot be hard-wired. Interconnected by satellite, radio or fibre-optic cable.
|
|
Widow / orphan
|
A term used for the lines at the beginning or end of a paragraph, which are split between the top or bottom of a page or column, separated from the rest of the paragraph.
|
|
WiFi
|
Wireless technology to connect devices with each other without the use of cables or wires.
|
|
WIKI
|
Web page(s) designed so anyone who accesses it can contribute or modify the content.
|
|
Wild card search
|
A search for multiple words using wildcard characters such as an asterisk () wildcard character to search for a string of characters e.g. chair, would find, wheelchair, armchair, easychair, or any words ending in chair.
|
|
WLAN
|
a Wireless Local Area Network covers short distances, using radio or infrared signals.
|
|
Word processor
|
Application dedicated to the production of text-based documents.
|
|
World Wide Web
|
an information system that operates over the internet. It lets documents connect to other documents using hyperlinks, so that the user can search for information by moving from one document to another.
|
|
Worms
|
A program that self-replicates; it penetrates an operating system with the intent of spreading malicious code.
|
|
XML
|
Extensible markup language designed to store and transport data to be both human- and machine-readable.
|
|
Data manipulation |
The process of changing data to make it easier to read or to make it more organised. |